<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-05-21T06:01:31</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:35637" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143420" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35638" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-3.5.9-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-3.5.9-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox-3.5.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations-3.5.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35639" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.0.r4359-15.22.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.0.r4359-15.22.49 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156399" comment="NetworkManager-0.7.0.r4359-15.22.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156400" comment="NetworkManager-glib-0.7.0.r4359-15.22.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35640" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.0.r1053-11.16.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.0.r1053-11.16.61 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156401" comment="NetworkManager-gnome-0.7.0.r1053-11.16.61 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35641" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054497" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054495" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054496" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35642" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.12.105 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.12.105 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156402" comment="PackageKit-0.3.14-2.12.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156403" comment="PackageKit-lang-0.3.14-2.12.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156404" comment="hal-0.5.12-23.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156405" comment="hal-32bit-0.5.12-23.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156406" comment="hal-doc-0.5.12-23.40.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156407" comment="hal-x86-0.5.12-23.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156408" comment="libpackagekit-glib10-0.3.14-2.12.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156409" comment="yast2-core-2.17.35-0.2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35643" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.34.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.34.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156410" comment="PolicyKit-0.9-14.34.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156411" comment="PolicyKit-32bit-0.9-14.34.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156412" comment="PolicyKit-doc-0.9-14.34.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156413" comment="PolicyKit-x86-0.9-14.34.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35644" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.6.2-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.6.2-1.14 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156414" comment="amavisd-new-2.6.2-1.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35645" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.10-2.24.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.10-2.24.5 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156415" comment="apache2-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156416" comment="apache2-doc-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156417" comment="apache2-example-pages-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156418" comment="apache2-prefork-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156419" comment="apache2-utils-2.2.10-2.24.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156420" comment="apache2-worker-2.2.10-2.24.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35646" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143445" comment="apache2-mod_perl-2.0.4-40.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35647" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php5-5.2.6-50.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2008-5624" ref_url="https://www.suse.com/security/cve/CVE-2008-5624/" source="CVE"/>
		<reference ref_id="CVE-2008-5625" ref_url="https://www.suse.com/security/cve/CVE-2008-5625/" source="CVE"/>
		<reference ref_id="CVE-2008-5814" ref_url="https://www.suse.com/security/cve/CVE-2008-5814/" source="CVE"/>
		<reference ref_id="CVE-2009-1271" ref_url="https://www.suse.com/security/cve/CVE-2009-1271/" source="CVE"/>
		<reference ref_id="CVE-2009-1272" ref_url="https://www.suse.com/security/cve/CVE-2009-1272/" source="CVE"/>
		<reference ref_id="CVE-2009-2626" ref_url="https://www.suse.com/security/cve/CVE-2009-2626/" source="CVE"/>
		<reference ref_id="CVE-2009-3546" ref_url="https://www.suse.com/security/cve/CVE-2009-3546/" source="CVE"/>
		<reference ref_id="CVE-2009-4017" ref_url="https://www.suse.com/security/cve/CVE-2009-4017/" source="CVE"/>
		<reference ref_id="CVE-2009-4142" ref_url="https://www.suse.com/security/cve/CVE-2009-4142/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php5-5.2.6-50.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5624/">CVE-2008-5624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5625/">CVE-2008-5625</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5814/">CVE-2008-5814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1271/">CVE-2009-1271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1272/">CVE-2009-1272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2626/">CVE-2009-2626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3546/">CVE-2009-3546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4017/">CVE-2009-4017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4142/">CVE-2009-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058031" comment="apache2-mod_php5-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111688" comment="php5-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058032" comment="php5-bcmath-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058033" comment="php5-bz2-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058034" comment="php5-calendar-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058035" comment="php5-ctype-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058036" comment="php5-curl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058037" comment="php5-dba-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058038" comment="php5-dbase-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058039" comment="php5-dom-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058040" comment="php5-exif-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058041" comment="php5-fastcgi-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058042" comment="php5-ftp-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058043" comment="php5-gd-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058044" comment="php5-gettext-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058045" comment="php5-gmp-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058046" comment="php5-hash-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058047" comment="php5-iconv-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058048" comment="php5-json-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058049" comment="php5-ldap-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058050" comment="php5-mbstring-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058051" comment="php5-mcrypt-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058052" comment="php5-mysql-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058053" comment="php5-odbc-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058054" comment="php5-openssl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058055" comment="php5-pcntl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058056" comment="php5-pdo-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058057" comment="php5-pear-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058058" comment="php5-pgsql-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058059" comment="php5-pspell-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058060" comment="php5-shmop-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058061" comment="php5-snmp-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058062" comment="php5-soap-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058063" comment="php5-suhosin-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058064" comment="php5-sysvmsg-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058065" comment="php5-sysvsem-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058066" comment="php5-sysvshm-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058067" comment="php5-tokenizer-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058068" comment="php5-wddx-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058069" comment="php5-xmlreader-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058070" comment="php5-xmlrpc-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058071" comment="php5-xmlwriter-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058072" comment="php5-xsl-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058073" comment="php5-zip-5.2.6-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058074" comment="php5-zlib-5.2.6-50.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35648" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.19.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.19.22 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144309" comment="avahi-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144310" comment="avahi-lang-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144311" comment="avahi-utils-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144312" comment="libavahi-client3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144313" comment="libavahi-client3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144314" comment="libavahi-client3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144315" comment="libavahi-common3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144316" comment="libavahi-common3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144317" comment="libavahi-common3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144318" comment="libavahi-core5-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144319" comment="libdns_sd-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144320" comment="libdns_sd-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144321" comment="libdns_sd-x86-0.6.23-11.19.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35649" version="1" class="patch">
	<metadata>
		<title>bind-9.5.0P2-20.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.5.0P2-20.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057433" comment="bind-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057427" comment="bind-chrootenv-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057428" comment="bind-doc-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057431" comment="bind-libs-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057429" comment="bind-libs-32bit-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057430" comment="bind-libs-x86-9.5.0P2-20.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057432" comment="bind-utils-9.5.0P2-20.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35650" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-11.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-11.17 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144329" comment="boost-license-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144330" comment="libboost_program_options1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144331" comment="libboost_regex1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144332" comment="libboost_signals1_36_0-1.36.0-11.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35651" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.246 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.246 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156421" comment="bzip2-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156422" comment="bzip2-doc-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156423" comment="libbz2-1-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156424" comment="libbz2-1-32bit-1.0.5-34.246 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156425" comment="libbz2-1-x86-1.0.5-34.246 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35652" version="1" class="patch">
	<metadata>
		<title>cifs-mount-3.4.3-1.17.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-mount-3.4.3-1.17.2 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156426" comment="cifs-mount-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156427" comment="ldapsmb-1.34b-11.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156428" comment="libsmbclient0-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156429" comment="libsmbclient0-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156430" comment="libsmbclient0-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156431" comment="libtalloc1-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156432" comment="libtalloc1-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156433" comment="libtalloc1-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156434" comment="libtdb1-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156435" comment="libtdb1-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156436" comment="libtdb1-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156437" comment="libwbclient0-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156438" comment="libwbclient0-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156439" comment="libwbclient0-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156440" comment="samba-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156441" comment="samba-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156442" comment="samba-client-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156443" comment="samba-client-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156444" comment="samba-client-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156445" comment="samba-krb-printing-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156446" comment="samba-winbind-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156447" comment="samba-winbind-32bit-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156448" comment="samba-winbind-x86-3.4.3-1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156449" comment="samba-x86-3.4.3-1.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35653" version="1" class="patch">
	<metadata>
		<title>clamav-0.96-0.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.96-0.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107268" comment="clamav-0.96-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35654" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143519" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35655" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.24.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.24.4 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156450" comment="cron-4.1-194.24.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35656" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058945" comment="cups-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058941" comment="cups-client-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058944" comment="cups-libs-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058942" comment="cups-libs-32bit-1.3.9-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058943" comment="cups-libs-x86-1.3.9-8.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35657" version="1" class="patch">
	<metadata>
		<title>curl-7.19.0-11.24.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.0-11.24.25 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156451" comment="curl-7.19.0-11.24.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156452" comment="libcurl4-7.19.0-11.24.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156453" comment="libcurl4-32bit-7.19.0-11.24.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156454" comment="libcurl4-x86-7.19.0-11.24.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35658" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055776" comment="cyrus-imapd-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055777" comment="perl-Cyrus-IMAP-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055778" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35659" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.11.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.11.29 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156455" comment="dbus-1-1.2.10-3.11.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156456" comment="dbus-1-32bit-1.2.10-3.11.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156457" comment="dbus-1-x11-1.2.10-3.11.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156458" comment="dbus-1-x86-1.2.10-3.11.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35660" version="1" class="patch">
	<metadata>
		<title>dhcp-3.1.3.ESV-0.3.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-3.1.3.ESV-0.3.38 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156459" comment="dhcp-3.1.3.ESV-0.3.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156460" comment="dhcp-client-3.1.3.ESV-0.3.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156461" comment="dhcp-relay-3.1.3.ESV-0.3.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156462" comment="dhcp-server-3.1.3.ESV-0.3.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35661" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.1.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.1.51 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156463" comment="e2fsprogs-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156464" comment="libcom_err2-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156465" comment="libcom_err2-32bit-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156466" comment="libcom_err2-x86-1.41.9-2.1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156467" comment="libext2fs2-1.41.9-2.1.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35662" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.32.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.32.4 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156468" comment="emacs-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156469" comment="emacs-el-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156470" comment="emacs-info-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156471" comment="emacs-nox-22.3-4.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156472" comment="emacs-x11-22.3-4.32.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35663" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.17.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.17.55 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156473" comment="enscript-1.6.4-152.17.55 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35664" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.2.68 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.2.68 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156474" comment="evince-2.28.2-0.2.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156475" comment="evince-doc-2.28.2-0.2.68 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156476" comment="evince-lang-2.28.2-0.2.68 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35665" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.10.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.10.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156477" comment="evolution-data-server-2.28.2-0.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156478" comment="evolution-data-server-32bit-2.28.2-0.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156479" comment="evolution-data-server-lang-2.28.2-0.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156480" comment="evolution-data-server-x86-2.28.2-0.10.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35666" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057200" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057203" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057201" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057202" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35667" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053783" comment="fetchmail-6.3.8.90-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053784" comment="fetchmailconf-6.3.8.90-13.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35668" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.17 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156481" comment="file-4.24-43.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156482" comment="file-32bit-4.24-43.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156483" comment="file-x86-4.24-43.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35669" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.24.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.24.11 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156484" comment="findutils-4.4.0-38.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156485" comment="findutils-locate-4.4.0-38.24.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35670" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.7.19.77 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.7.19.77 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156486" comment="freeradius-server-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144357" comment="freeradius-server-dialupadmin-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144358" comment="freeradius-server-doc-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144359" comment="freeradius-server-libs-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144360" comment="freeradius-server-utils-2.1.1-7.7.19.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35671" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156487" comment="freetype2-2.3.7-25.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156488" comment="freetype2-32bit-2.3.7-25.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156489" comment="freetype2-x86-2.3.7-25.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35672" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.3.7-25.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.3.7-25.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144361" comment="ft2demos-2.3.7-25.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35673" version="1" class="patch">
	<metadata>
		<title>fuse-2.7.2-61.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.7.2-61.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060019" comment="fuse-2.7.2-61.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060020" comment="libfuse2-2.7.2-61.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35674" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143559" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35675" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143560" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143561" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35676" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143562" comment="gd-2.0.36.RC1-52.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35677" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.27.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.27.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156490" comment="ghostscript-fonts-other-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156491" comment="ghostscript-fonts-rus-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156492" comment="ghostscript-fonts-std-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156493" comment="ghostscript-library-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156494" comment="ghostscript-omni-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156495" comment="ghostscript-x11-8.62-32.27.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156496" comment="libgimpprint-4.2.7-32.27.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35678" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.2.23 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144362" comment="glib2-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144363" comment="glib2-doc-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144364" comment="glib2-lang-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144365" comment="libgio-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144366" comment="libgio-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144367" comment="libgio-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144368" comment="libglib-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144369" comment="libglib-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144370" comment="libglib-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144371" comment="libgmodule-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144372" comment="libgmodule-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144373" comment="libgmodule-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144374" comment="libgobject-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144375" comment="libgobject-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144376" comment="libgobject-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144377" comment="libgthread-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144378" comment="libgthread-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144379" comment="libgthread-2_0-0-x86-2.22.5-0.2.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35679" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.41.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058364" comment="gmime-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143597" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058363" comment="gmime-doc-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058365" comment="libgmime-2_0-3-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143600" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35680" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.4.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.4.30 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156497" comment="gnome-screensaver-2.28.3-0.4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156498" comment="gnome-screensaver-lang-2.28.3-0.4.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35681" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054538" comment="gnutls-2.4.1-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054541" comment="libgnutls26-2.4.1-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054539" comment="libgnutls26-32bit-2.4.1-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054540" comment="libgnutls26-x86-2.4.1-24.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35682" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156499" comment="gpg2-2.0.9-25.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156500" comment="gpg2-lang-2.0.9-25.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35683" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.25-1.1.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.25-1.1.133 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156501" comment="gstreamer-0_10-plugins-base-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156502" comment="gstreamer-0_10-plugins-base-32bit-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156503" comment="gstreamer-0_10-plugins-base-doc-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156504" comment="gstreamer-0_10-plugins-base-lang-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156505" comment="gstreamer-0_10-plugins-base-x86-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156506" comment="libgstapp-0_10-0-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156507" comment="libgstapp-0_10-0-32bit-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156508" comment="libgstapp-0_10-0-x86-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156509" comment="libgstinterfaces-0_10-0-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156510" comment="libgstinterfaces-0_10-0-32bit-0.10.25-1.1.133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156511" comment="libgstinterfaces-0_10-0-x86-0.10.25-1.1.133 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35684" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.17-1.1.126 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.17-1.1.126 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156512" comment="gstreamer-0_10-plugins-good-0.10.17-1.1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156513" comment="gstreamer-0_10-plugins-good-doc-0.10.17-1.1.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156514" comment="gstreamer-0_10-plugins-good-lang-0.10.17-1.1.126 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35685" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156515" comment="gtk2-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156516" comment="gtk2-32bit-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156517" comment="gtk2-doc-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156518" comment="gtk2-lang-2.18.9-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156519" comment="gtk2-x86-2.18.9-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35686" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156520" comment="gvim-7.2-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156521" comment="vim-7.2-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156522" comment="vim-base-7.2-8.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156523" comment="vim-data-7.2-8.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35687" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057426" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35688" version="1" class="patch">
	<metadata>
		<title>hplip-3.9.8-3.4.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.9.8-3.4.30 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156524" comment="hplip-3.9.8-3.4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156525" comment="hplip-hpijs-3.9.8-3.4.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35689" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.1.93 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.1.93 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143631" comment="ipsec-tools-0.7.3-1.1.93 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35690" version="1" class="patch">
	<metadata>
		<title>java-1_4_2-ibm-1.4.2_sr13.3-1.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2788" ref_url="https://www.suse.com/security/cve/CVE-2007-2788/" source="CVE"/>
		<reference ref_id="CVE-2007-2789" ref_url="https://www.suse.com/security/cve/CVE-2007-2789/" source="CVE"/>
		<reference ref_id="CVE-2007-3004" ref_url="https://www.suse.com/security/cve/CVE-2007-3004/" source="CVE"/>
		<reference ref_id="CVE-2007-3005" ref_url="https://www.suse.com/security/cve/CVE-2007-3005/" source="CVE"/>
		<reference ref_id="CVE-2007-3655" ref_url="https://www.suse.com/security/cve/CVE-2007-3655/" source="CVE"/>
		<reference ref_id="CVE-2007-3698" ref_url="https://www.suse.com/security/cve/CVE-2007-3698/" source="CVE"/>
		<reference ref_id="CVE-2007-3922" ref_url="https://www.suse.com/security/cve/CVE-2007-3922/" source="CVE"/>
		<reference ref_id="CVE-2007-4381" ref_url="https://www.suse.com/security/cve/CVE-2007-4381/" source="CVE"/>
		<reference ref_id="CVE-2007-5232" ref_url="https://www.suse.com/security/cve/CVE-2007-5232/" source="CVE"/>
		<reference ref_id="CVE-2007-5236" ref_url="https://www.suse.com/security/cve/CVE-2007-5236/" source="CVE"/>
		<reference ref_id="CVE-2007-5238" ref_url="https://www.suse.com/security/cve/CVE-2007-5238/" source="CVE"/>
		<reference ref_id="CVE-2007-5239" ref_url="https://www.suse.com/security/cve/CVE-2007-5239/" source="CVE"/>
		<reference ref_id="CVE-2007-5240" ref_url="https://www.suse.com/security/cve/CVE-2007-5240/" source="CVE"/>
		<reference ref_id="CVE-2007-5273" ref_url="https://www.suse.com/security/cve/CVE-2007-5273/" source="CVE"/>
		<reference ref_id="CVE-2007-5274" ref_url="https://www.suse.com/security/cve/CVE-2007-5274/" source="CVE"/>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-3104" ref_url="https://www.suse.com/security/cve/CVE-2008-3104/" source="CVE"/>
		<reference ref_id="CVE-2008-3112" ref_url="https://www.suse.com/security/cve/CVE-2008-3112/" source="CVE"/>
		<reference ref_id="CVE-2008-3113" ref_url="https://www.suse.com/security/cve/CVE-2008-3113/" source="CVE"/>
		<reference ref_id="CVE-2008-3114" ref_url="https://www.suse.com/security/cve/CVE-2008-3114/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_4_2-ibm-1.4.2_sr13.3-1.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2788/">CVE-2007-2788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2789/">CVE-2007-2789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3004/">CVE-2007-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3005/">CVE-2007-3005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3655/">CVE-2007-3655</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3698/">CVE-2007-3698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3922/">CVE-2007-3922</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4381/">CVE-2007-4381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5232/">CVE-2007-5232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5236/">CVE-2007-5236</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5238/">CVE-2007-5238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5239/">CVE-2007-5239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5240/">CVE-2007-5240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5273/">CVE-2007-5273</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5274/">CVE-2007-5274</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3104/">CVE-2008-3104</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3112/">CVE-2008-3112</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3113/">CVE-2008-3113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3114/">CVE-2008-3114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057171" comment="java-1_4_2-ibm-1.4.2_sr13.3-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057169" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.3-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057170" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.3-1.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35691" version="1" class="patch">
	<metadata>
		<title>java-1_6_0-ibm-1.6.0_sr7.0-1.6.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1188" ref_url="https://www.suse.com/security/cve/CVE-2008-1188/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1191" ref_url="https://www.suse.com/security/cve/CVE-2008-1191/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1193" ref_url="https://www.suse.com/security/cve/CVE-2008-1193/" source="CVE"/>
		<reference ref_id="CVE-2008-1194" ref_url="https://www.suse.com/security/cve/CVE-2008-1194/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_6_0-ibm-1.6.0_sr7.0-1.6.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1188/">CVE-2008-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1191/">CVE-2008-1191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1193/">CVE-2008-1193</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1194/">CVE-2008-1194</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156526" comment="java-1_6_0-ibm-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156527" comment="java-1_6_0-ibm-alsa-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156528" comment="java-1_6_0-ibm-fonts-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156529" comment="java-1_6_0-ibm-jdbc-1.6.0_sr7.0-1.6.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156530" comment="java-1_6_0-ibm-plugin-1.6.0_sr7.0-1.6.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35692" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.8.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.8.35 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156531" comment="kde4-kgreeter-plugins-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143634" comment="kdebase4-wallpapers-4.3.5-0.8.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156532" comment="kdebase4-workspace-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156533" comment="kdebase4-workspace-ksysguardd-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156534" comment="kdm-4.3.5-0.8.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156535" comment="kwin-4.3.5-0.8.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35693" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143639" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143640" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143641" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35694" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056569" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056564" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056567" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056565" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056566" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056568" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35695" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.2.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.2.46 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156536" comment="kdelibs4-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156537" comment="kdelibs4-core-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156538" comment="kdelibs4-doc-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156539" comment="libkde4-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156540" comment="libkde4-32bit-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156541" comment="libkde4-x86-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156542" comment="libkdecore4-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156543" comment="libkdecore4-32bit-4.3.5-0.2.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156544" comment="libkdecore4-x86-4.3.5-0.2.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35696" version="1" class="patch">
	<metadata>
		<title>kernel-default-2.6.32.12-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-2.6.32.12-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156545" comment="kernel-default-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156546" comment="kernel-default-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156547" comment="kernel-default-devel-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156548" comment="kernel-default-man-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156549" comment="kernel-pae-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156550" comment="kernel-pae-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156551" comment="kernel-pae-devel-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156552" comment="kernel-ppc64-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156553" comment="kernel-ppc64-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156554" comment="kernel-ppc64-devel-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156555" comment="kernel-source-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156556" comment="kernel-syms-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156557" comment="kernel-trace-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156558" comment="kernel-trace-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156559" comment="kernel-trace-devel-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156560" comment="kernel-xen-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156561" comment="kernel-xen-base-2.6.32.12-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156562" comment="kernel-xen-devel-2.6.32.12-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35697" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059529" comment="krb5-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059523" comment="krb5-32bit-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059524" comment="krb5-apps-clients-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059525" comment="krb5-apps-servers-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059526" comment="krb5-client-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059527" comment="krb5-server-1.6.3-133.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059528" comment="krb5-x86-1.6.3-133.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35698" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144432" comment="krb5-doc-1.6.3-133.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35699" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144433" comment="krb5-plugin-kdb-ldap-1.6.3-133.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144434" comment="krb5-plugin-preauth-pkinit-1.6.3-133.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35700" version="1" class="patch">
	<metadata>
		<title>kvm-0.12.3-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-0.12.3-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156563" comment="kvm-0.12.3-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35701" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.14.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.14.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143670" comment="lcms-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143671" comment="liblcms1-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143672" comment="liblcms1-32bit-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143673" comment="liblcms1-x86-1.17-77.14.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35702" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111684" comment="libMagickCore1-6.4.3.6-7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111747" comment="libMagickCore1-32bit-6.4.3.6-7.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35703" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.2-1.6.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.2-1.6.9 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156564" comment="libQtWebKit4-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156565" comment="libQtWebKit4-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156566" comment="libQtWebKit4-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156567" comment="libqt4-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156568" comment="libqt4-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156569" comment="libqt4-qt3support-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156570" comment="libqt4-qt3support-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156571" comment="libqt4-qt3support-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156572" comment="libqt4-sql-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156573" comment="libqt4-sql-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156574" comment="libqt4-sql-mysql-4.6.2-1.6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156575" comment="libqt4-sql-sqlite-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156576" comment="libqt4-sql-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156577" comment="libqt4-x11-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156578" comment="libqt4-x11-32bit-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156579" comment="libqt4-x11-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156580" comment="libqt4-x86-4.6.2-1.6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156581" comment="qt4-x11-tools-4.6.2-1.6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35704" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143717" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35705" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.20.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.20.2 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055474" comment="libapr-util1-1.3.4-12.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055473" comment="libapr-util1-32bit-1.3.4-12.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055476" comment="libapr1-1.3.3-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055475" comment="libapr1-32bit-1.3.3-11.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35706" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143718" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35707" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.17-0.3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.17-0.3.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156582" comment="libdrm-2.4.17-0.3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156583" comment="libdrm-32bit-2.4.17-0.3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156584" comment="libdrm-x86-2.4.17-0.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35708" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144466" comment="libexif-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144467" comment="libexif-32bit-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144468" comment="libexif-x86-0.6.17-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35709" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143723" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35710" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.2.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.2.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144469" comment="libgtop-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144470" comment="libgtop-2_0-7-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144471" comment="libgtop-doc-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144472" comment="libgtop-lang-2.28.0-1.2.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35711" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.24.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.24.11 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156585" comment="libicu-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156586" comment="libicu-32bit-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156587" comment="libicu-doc-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144473" comment="libicu-x86-4.0-7.24.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35712" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057091" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057089" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057090" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057094" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057092" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057093" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35713" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143739" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35714" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.67-13.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.67-13.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111740" comment="libmysqlclient15-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111752" comment="libmysqlclient15-32bit-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111781" comment="libmysqlclient15-x86-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111741" comment="libmysqlclient_r15-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111742" comment="mysql-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111743" comment="mysql-Max-5.0.67-13.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111744" comment="mysql-client-5.0.67-13.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35715" version="1" class="patch">
	<metadata>
		<title>libneon27-0.28.3-2.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.28.3-2.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055774" comment="libneon27-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055772" comment="libneon27-32bit-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055773" comment="libneon27-x86-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055775" comment="neon-0.28.3-2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35716" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058587" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058585" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058586" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058588" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35717" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032233" comment="libopensc2-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032231" comment="libopensc2-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032232" comment="libopensc2-x86-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032236" comment="opensc-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032234" comment="opensc-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032235" comment="opensc-x86-0.11.6-5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35718" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8h-30.27.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8h-30.27.11 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156588" comment="libopenssl0_9_8-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156589" comment="libopenssl0_9_8-32bit-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156590" comment="libopenssl0_9_8-x86-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156591" comment="openssl-0.9.8h-30.27.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156592" comment="openssl-doc-0.9.8h-30.27.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35719" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053357" comment="libpng12-0-1.2.31-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053355" comment="libpng12-0-32bit-1.2.31-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053356" comment="libpng12-0-x86-1.2.31-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35720" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.2.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.2.44 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156593" comment="libpoppler-glib4-0.12.3-1.2.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156594" comment="libpoppler-qt4-3-0.12.3-1.2.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156595" comment="libpoppler5-0.12.3-1.2.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156596" comment="poppler-tools-0.12.3-1.2.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35721" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.21-1.5.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.21-1.5.26 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156597" comment="libpulse-browse0-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156598" comment="libpulse-mainloop-glib0-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156599" comment="libpulse0-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156600" comment="libpulse0-32bit-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156601" comment="libpulse0-x86-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156602" comment="pulseaudio-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156603" comment="pulseaudio-esound-compat-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156604" comment="pulseaudio-gdm-hooks-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156605" comment="pulseaudio-lang-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156606" comment="pulseaudio-module-x11-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156607" comment="pulseaudio-module-zeroconf-0.9.21-1.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156608" comment="pulseaudio-utils-0.9.21-1.5.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35722" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.0-8.9.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.0-8.9.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061430" comment="libpython2_6-1_0-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061429" comment="libpython2_6-1_0-32bit-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156609" comment="libpython2_6-1_0-x86-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156610" comment="python-base-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156611" comment="python-base-32bit-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156612" comment="python-base-x86-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156613" comment="python-xml-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143870" comment="pyxml-0.8.4-194.23.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35723" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143768" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156614" comment="libtirpc1-0.2.1-1.2.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35724" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143770" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143771" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143772" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35725" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.1.46 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156615" comment="libsndfile-1.0.20-2.1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156616" comment="libsndfile-32bit-1.0.20-2.1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156617" comment="libsndfile-x86-1.0.20-2.1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35726" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156618" comment="libsnmp15-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156619" comment="libsnmp15-32bit-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156620" comment="libsnmp15-x86-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156621" comment="net-snmp-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156622" comment="perl-SNMP-5.4.2.1-8.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156623" comment="snmp-mibs-5.4.2.1-8.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35727" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.28.2-0.1.151 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.28.2-0.1.151 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156624" comment="libsoup-2_4-1-2.28.2-0.1.151 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156625" comment="libsoup-2_4-1-32bit-2.28.2-0.1.151 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156626" comment="libsoup-2_4-1-x86-2.28.2-0.1.151 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35728" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054051" comment="libtiff3-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054049" comment="libtiff3-32bit-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054050" comment="libtiff3-x86-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054052" comment="tiff-3.8.2-141.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35729" version="1" class="patch">
	<metadata>
		<title>libvirt-0.7.6-1.9.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-0.7.6-1.9.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156627" comment="libvirt-0.7.6-1.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156628" comment="libvirt-doc-0.7.6-1.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156629" comment="libvirt-python-0.7.6-1.9.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35730" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156630" comment="libvorbis-1.2.0-79.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156631" comment="libvorbis-32bit-1.2.0-79.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156632" comment="libvorbis-doc-1.2.0-79.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156633" comment="libvorbis-x86-1.2.0-79.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35731" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.1.37 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.1.37 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156634" comment="libxml2-2.7.6-0.1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156635" comment="libxml2-32bit-2.7.6-0.1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156636" comment="libxml2-doc-2.7.6-0.1.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156637" comment="libxml2-x86-2.7.6-0.1.37 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35732" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144499" comment="libxslt-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144500" comment="libxslt-32bit-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144501" comment="libxslt-x86-1.1.24-19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35733" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143802" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35734" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.12-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.12-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156638" comment="mailman-2.1.12-0.1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35735" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143806" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35736" version="1" class="patch">
	<metadata>
		<title>mono-core-2.0.1-1.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.0.1-1.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111692" comment="mono-core-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111693" comment="mono-data-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111694" comment="mono-data-postgresql-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111695" comment="mono-data-sqlite-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111696" comment="mono-locale-extras-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111697" comment="mono-nunit-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111698" comment="mono-web-2.0.1-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111699" comment="mono-winforms-2.0.1-1.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35737" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner190-1.9.0.19-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0071" ref_url="https://www.suse.com/security/cve/CVE-2009-0071/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1194" ref_url="https://www.suse.com/security/cve/CVE-2009-1194/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1392" ref_url="https://www.suse.com/security/cve/CVE-2009-1392/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-1832" ref_url="https://www.suse.com/security/cve/CVE-2009-1832/" source="CVE"/>
		<reference ref_id="CVE-2009-1833" ref_url="https://www.suse.com/security/cve/CVE-2009-1833/" source="CVE"/>
		<reference ref_id="CVE-2009-1834" ref_url="https://www.suse.com/security/cve/CVE-2009-1834/" source="CVE"/>
		<reference ref_id="CVE-2009-1835" ref_url="https://www.suse.com/security/cve/CVE-2009-1835/" source="CVE"/>
		<reference ref_id="CVE-2009-1836" ref_url="https://www.suse.com/security/cve/CVE-2009-1836/" source="CVE"/>
		<reference ref_id="CVE-2009-1837" ref_url="https://www.suse.com/security/cve/CVE-2009-1837/" source="CVE"/>
		<reference ref_id="CVE-2009-1838" ref_url="https://www.suse.com/security/cve/CVE-2009-1838/" source="CVE"/>
		<reference ref_id="CVE-2009-1839" ref_url="https://www.suse.com/security/cve/CVE-2009-1839/" source="CVE"/>
		<reference ref_id="CVE-2009-1840" ref_url="https://www.suse.com/security/cve/CVE-2009-1840/" source="CVE"/>
		<reference ref_id="CVE-2009-1841" ref_url="https://www.suse.com/security/cve/CVE-2009-1841/" source="CVE"/>
		<reference ref_id="CVE-2009-2462" ref_url="https://www.suse.com/security/cve/CVE-2009-2462/" source="CVE"/>
		<reference ref_id="CVE-2009-2463" ref_url="https://www.suse.com/security/cve/CVE-2009-2463/" source="CVE"/>
		<reference ref_id="CVE-2009-2464" ref_url="https://www.suse.com/security/cve/CVE-2009-2464/" source="CVE"/>
		<reference ref_id="CVE-2009-2465" ref_url="https://www.suse.com/security/cve/CVE-2009-2465/" source="CVE"/>
		<reference ref_id="CVE-2009-2466" ref_url="https://www.suse.com/security/cve/CVE-2009-2466/" source="CVE"/>
		<reference ref_id="CVE-2009-2467" ref_url="https://www.suse.com/security/cve/CVE-2009-2467/" source="CVE"/>
		<reference ref_id="CVE-2009-2469" ref_url="https://www.suse.com/security/cve/CVE-2009-2469/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2471" ref_url="https://www.suse.com/security/cve/CVE-2009-2471/" source="CVE"/>
		<reference ref_id="CVE-2009-2472" ref_url="https://www.suse.com/security/cve/CVE-2009-2472/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3076" ref_url="https://www.suse.com/security/cve/CVE-2009-3076/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3382" ref_url="https://www.suse.com/security/cve/CVE-2009-3382/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3981" ref_url="https://www.suse.com/security/cve/CVE-2009-3981/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3986" ref_url="https://www.suse.com/security/cve/CVE-2009-3986/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner190-1.9.0.19-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0071/">CVE-2009-0071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1194/">CVE-2009-1194</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1392/">CVE-2009-1392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1832/">CVE-2009-1832</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1833/">CVE-2009-1833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1834/">CVE-2009-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1835/">CVE-2009-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1836/">CVE-2009-1836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1837/">CVE-2009-1837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1838/">CVE-2009-1838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1839/">CVE-2009-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1840/">CVE-2009-1840</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1841/">CVE-2009-1841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2462/">CVE-2009-2462</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2463/">CVE-2009-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2464/">CVE-2009-2464</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2465/">CVE-2009-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2466/">CVE-2009-2466</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2467/">CVE-2009-2467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2469/">CVE-2009-2469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2471/">CVE-2009-2471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2472/">CVE-2009-2472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3076/">CVE-2009-3076</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3382/">CVE-2009-3382</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3981/">CVE-2009-3981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3986/">CVE-2009-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations-1.9.0.19-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059480" comment="mozilla-xulrunner190-x86-1.9.0.19-0.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35738" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner191-1.9.1.9-1.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner191-1.9.1.9-1.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156639" comment="mozilla-xulrunner191-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156640" comment="mozilla-xulrunner191-32bit-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156641" comment="mozilla-xulrunner191-gnomevfs-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156642" comment="mozilla-xulrunner191-translations-1.9.1.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156643" comment="mozilla-xulrunner191-x86-1.9.1.9-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35739" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111745" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35740" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053628" comment="nagios-3.0.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053627" comment="nagios-www-3.0.6-1.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35741" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.13-1.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.13-1.35 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144505" comment="nagios-plugins-1.4.13-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144506" comment="nagios-plugins-extras-1.4.13-1.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35742" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.4p8-1.3.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.4p8-1.3.28 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156644" comment="ntp-4.2.4p8-1.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156645" comment="ntp-doc-4.2.4p8-1.3.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35743" version="1" class="patch">
	<metadata>
		<title>openssh-5.1p1-41.31.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-5.1p1-41.31.36 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156646" comment="openssh-5.1p1-41.31.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156647" comment="openssh-askpass-5.1p1-41.31.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35744" version="1" class="patch">
	<metadata>
		<title>openswan-2.6.16-1.34.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-4190" ref_url="https://www.suse.com/security/cve/CVE-2008-4190/" source="CVE"/>
		<reference ref_id="CVE-2009-2185" ref_url="https://www.suse.com/security/cve/CVE-2009-2185/" source="CVE"/>
		<description>
These are all security issues fixed in the openswan-2.6.16-1.34.3 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4190/">CVE-2008-4190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2185/">CVE-2009-2185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054997" comment="openswan-2.6.16-1.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054996" comment="openswan-doc-2.6.16-1.34.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35745" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.31 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144517" comment="openvpn-2.0.9-143.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144518" comment="openvpn-auth-pam-plugin-2.0.9-143.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35746" version="1" class="patch">
	<metadata>
		<title>pam-1.0.4-0.5.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.0.4-0.5.12 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156648" comment="pam-1.0.4-0.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156649" comment="pam-32bit-1.0.4-0.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156650" comment="pam-doc-1.0.4-0.5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156651" comment="pam-x86-1.0.4-0.5.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35747" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.10.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.10.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144519" comment="pam_krb5-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144520" comment="pam_krb5-32bit-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144521" comment="pam_krb5-x86-2.3.1-47.10.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35748" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143844" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143845" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143846" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35749" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.13.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.13.65 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144522" comment="pam_mount-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144523" comment="pam_mount-32bit-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144524" comment="pam_mount-x86-0.47-13.13.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35750" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.47.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.47.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156652" comment="perl-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156653" comment="perl-32bit-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156654" comment="perl-base-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156655" comment="perl-doc-5.10.0-64.47.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156656" comment="perl-x86-5.10.0-64.47.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35751" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056793" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35752" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143857" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35753" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.2.5-26.22.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.2.5-26.22.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156657" comment="perl-spamassassin-3.2.5-26.22.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156658" comment="spamassassin-3.2.5-26.22.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35754" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.9-0.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.9-0.1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057282" comment="postgresql-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057276" comment="postgresql-contrib-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057277" comment="postgresql-docs-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057280" comment="postgresql-libs-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057278" comment="postgresql-libs-32bit-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057279" comment="postgresql-libs-x86-8.3.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057281" comment="postgresql-server-8.3.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35755" version="1" class="patch">
	<metadata>
		<title>puppet-0.24.8-1.3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-0.24.8-1.3.5 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156659" comment="puppet-0.24.8-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156660" comment="puppet-server-0.24.8-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35756" version="1" class="patch">
	<metadata>
		<title>python-2.6.0-8.9.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.0-8.9.28 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156661" comment="python-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156662" comment="python-32bit-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156663" comment="python-curses-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156664" comment="python-demo-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156665" comment="python-gdbm-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156666" comment="python-idle-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156667" comment="python-tk-2.6.0-8.9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156668" comment="python-x86-2.6.0-8.9.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35757" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143871" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143872" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143873" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35758" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.1.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.1.55 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156669" comment="quagga-0.99.15-0.1.55 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35759" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.33.82 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.33.82 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156670" comment="rsync-3.0.4-2.33.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35760" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p72-5.24.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p72-5.24.2 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156671" comment="ruby-1.8.7.p72-5.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156672" comment="ruby-doc-html-1.8.7.p72-5.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156673" comment="ruby-tk-1.8.7.p72-5.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35761" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059011" comment="squid-2.7.STABLE5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35762" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156674" comment="star-1.5final-28.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35763" version="1" class="patch">
	<metadata>
		<title>sudo-1.6.9p17-21.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.6.9p17-21.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058612" comment="sudo-1.6.9p17-21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35764" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.27.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.27.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156675" comment="syslog-ng-2.0.9-27.27.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35765" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.9.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.9.56 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156676" comment="sysstat-8.1.5-7.9.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156677" comment="sysstat-isag-8.1.5-7.9.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35766" version="1" class="patch">
	<metadata>
		<title>systemtap-1.0-0.15.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.0-0.15.16 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156678" comment="systemtap-1.0-0.15.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156679" comment="systemtap-client-1.0-0.15.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156680" comment="systemtap-server-1.0-0.15.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35767" version="1" class="patch">
	<metadata>
		<title>tar-1.20-23.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.20-23.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060021" comment="tar-1.20-23.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35768" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143901" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35769" version="1" class="patch">
	<metadata>
		<title>unzip-5.52-142.23.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-5.52-142.23.43 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156681" comment="unzip-5.52-142.23.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35770" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.1.37 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.1.37 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156682" comment="w3m-0.5.2-132.1.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35771" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111746" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35772" version="1" class="patch">
	<metadata>
		<title>wireshark-1.0.5-1.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.0.5-1.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058844" comment="wireshark-1.0.5-1.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35773" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143905" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35774" version="1" class="patch">
	<metadata>
		<title>xen-4.0.0_21091_04-0.2.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.0.0_21091_04-0.2.6 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156683" comment="xen-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156684" comment="xen-doc-html-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156685" comment="xen-doc-pdf-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156686" comment="xen-kmp-default-4.0.0_21091_04_2.6.32.12_0.7-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156687" comment="xen-kmp-pae-4.0.0_21091_04_2.6.32.12_0.7-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156688" comment="xen-libs-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156689" comment="xen-tools-4.0.0_21091_04-0.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156690" comment="xen-tools-domU-4.0.0_21091_04-0.2.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35775" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.24.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.24.15 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156691" comment="xorg-x11-7.4-9.24.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156692" comment="xorg-x11-xauth-7.4-9.24.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35776" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.19.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.19.19 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156693" comment="xorg-x11-Xvnc-7.4-27.19.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156694" comment="xorg-x11-server-7.4-27.19.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156695" comment="xorg-x11-server-extra-7.4-27.19.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35777" version="1" class="patch">
	<metadata>
		<title>xpdf-tools-3.02-138.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2009-0146" ref_url="https://www.suse.com/security/cve/CVE-2009-0146/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<description>
These are all security issues fixed in the xpdf-tools-3.02-138.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0146/">CVE-2009-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054103" comment="xpdf-tools-3.02-138.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35778" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143924" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35779" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP1.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562777" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35780" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143420" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35781" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-10.0-0.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-10.0-0.3.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072845" comment="MozillaFirefox-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072844" comment="MozillaFirefox-translations-10.0-0.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35782" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.1_git20090811-3.20.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.1_git20090811-3.20.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144250" comment="NetworkManager-0.7.1_git20090811-3.20.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144251" comment="NetworkManager-glib-0.7.1_git20090811-3.20.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35783" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.1-5.22.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.1-5.22.28 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143428" comment="NetworkManager-gnome-0.7.1-5.22.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35784" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054497" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054495" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054496" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35785" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.23.126 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.23.126 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144252" comment="PackageKit-0.3.14-2.23.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144253" comment="PackageKit-lang-0.3.14-2.23.126 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144254" comment="hal-0.5.12-23.58.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144255" comment="hal-32bit-0.5.12-23.58.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144256" comment="hal-doc-0.5.12-23.58.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144257" comment="hal-x86-0.5.12-23.58.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144258" comment="libpackagekit-glib10-0.3.14-2.23.126 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35786" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144259" comment="PolicyKit-0.9-14.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144260" comment="PolicyKit-32bit-0.9-14.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143438" comment="PolicyKit-doc-0.9-14.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144261" comment="PolicyKit-x86-0.9-14.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35787" version="1" class="patch">
	<metadata>
		<title>aaa_base-11-6.65.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-11-6.65.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144262" comment="aaa_base-11-6.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35788" version="1" class="patch">
	<metadata>
		<title>acpid-1.0.6-91.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0798" ref_url="https://www.suse.com/security/cve/CVE-2009-0798/" source="CVE"/>
		<description>
These are all security issues fixed in the acpid-1.0.6-91.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0798/">CVE-2009-0798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144263" comment="acpid-1.0.6-91.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35789" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.7.0-18.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.7.0-18.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143442" comment="amavisd-new-2.7.0-18.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35790" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072163" comment="apache2-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072158" comment="apache2-doc-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072159" comment="apache2-example-pages-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072160" comment="apache2-prefork-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072161" comment="apache2-utils-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072162" comment="apache2-worker-2.2.12-1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35791" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.26-1.30.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.26-1.30.110 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076368" comment="apache2-mod_jk-1.2.26-1.30.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35792" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143445" comment="apache2-mod_perl-2.0.4-40.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35793" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php5-5.2.14-0.7.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2008-2829" ref_url="https://www.suse.com/security/cve/CVE-2008-2829/" source="CVE"/>
		<reference ref_id="CVE-2008-5498" ref_url="https://www.suse.com/security/cve/CVE-2008-5498/" source="CVE"/>
		<reference ref_id="CVE-2008-5557" ref_url="https://www.suse.com/security/cve/CVE-2008-5557/" source="CVE"/>
		<reference ref_id="CVE-2008-5624" ref_url="https://www.suse.com/security/cve/CVE-2008-5624/" source="CVE"/>
		<reference ref_id="CVE-2008-5625" ref_url="https://www.suse.com/security/cve/CVE-2008-5625/" source="CVE"/>
		<reference ref_id="CVE-2008-5814" ref_url="https://www.suse.com/security/cve/CVE-2008-5814/" source="CVE"/>
		<reference ref_id="CVE-2009-0754" ref_url="https://www.suse.com/security/cve/CVE-2009-0754/" source="CVE"/>
		<reference ref_id="CVE-2009-1271" ref_url="https://www.suse.com/security/cve/CVE-2009-1271/" source="CVE"/>
		<reference ref_id="CVE-2009-1272" ref_url="https://www.suse.com/security/cve/CVE-2009-1272/" source="CVE"/>
		<reference ref_id="CVE-2009-2626" ref_url="https://www.suse.com/security/cve/CVE-2009-2626/" source="CVE"/>
		<reference ref_id="CVE-2009-2687" ref_url="https://www.suse.com/security/cve/CVE-2009-2687/" source="CVE"/>
		<reference ref_id="CVE-2009-3291" ref_url="https://www.suse.com/security/cve/CVE-2009-3291/" source="CVE"/>
		<reference ref_id="CVE-2009-3292" ref_url="https://www.suse.com/security/cve/CVE-2009-3292/" source="CVE"/>
		<reference ref_id="CVE-2009-3293" ref_url="https://www.suse.com/security/cve/CVE-2009-3293/" source="CVE"/>
		<reference ref_id="CVE-2009-3546" ref_url="https://www.suse.com/security/cve/CVE-2009-3546/" source="CVE"/>
		<reference ref_id="CVE-2009-4017" ref_url="https://www.suse.com/security/cve/CVE-2009-4017/" source="CVE"/>
		<reference ref_id="CVE-2009-4142" ref_url="https://www.suse.com/security/cve/CVE-2009-4142/" source="CVE"/>
		<reference ref_id="CVE-2010-0397" ref_url="https://www.suse.com/security/cve/CVE-2010-0397/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-3870" ref_url="https://www.suse.com/security/cve/CVE-2010-3870/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2010-4697" ref_url="https://www.suse.com/security/cve/CVE-2010-4697/" source="CVE"/>
		<reference ref_id="CVE-2010-4698" ref_url="https://www.suse.com/security/cve/CVE-2010-4698/" source="CVE"/>
		<reference ref_id="CVE-2010-4699" ref_url="https://www.suse.com/security/cve/CVE-2010-4699/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-0752" ref_url="https://www.suse.com/security/cve/CVE-2011-0752/" source="CVE"/>
		<reference ref_id="CVE-2011-0753" ref_url="https://www.suse.com/security/cve/CVE-2011-0753/" source="CVE"/>
		<reference ref_id="CVE-2011-0755" ref_url="https://www.suse.com/security/cve/CVE-2011-0755/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1148" ref_url="https://www.suse.com/security/cve/CVE-2011-1148/" source="CVE"/>
		<reference ref_id="CVE-2011-1464" ref_url="https://www.suse.com/security/cve/CVE-2011-1464/" source="CVE"/>
		<reference ref_id="CVE-2011-1469" ref_url="https://www.suse.com/security/cve/CVE-2011-1469/" source="CVE"/>
		<reference ref_id="CVE-2011-1470" ref_url="https://www.suse.com/security/cve/CVE-2011-1470/" source="CVE"/>
		<reference ref_id="CVE-2011-1471" ref_url="https://www.suse.com/security/cve/CVE-2011-1471/" source="CVE"/>
		<reference ref_id="CVE-2011-1938" ref_url="https://www.suse.com/security/cve/CVE-2011-1938/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php5-5.2.14-0.7.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2829/">CVE-2008-2829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5498/">CVE-2008-5498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5557/">CVE-2008-5557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5624/">CVE-2008-5624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5625/">CVE-2008-5625</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5814/">CVE-2008-5814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0754/">CVE-2009-0754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1271/">CVE-2009-1271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1272/">CVE-2009-1272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2626/">CVE-2009-2626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2687/">CVE-2009-2687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3291/">CVE-2009-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3292/">CVE-2009-3292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3293/">CVE-2009-3293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3546/">CVE-2009-3546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4017/">CVE-2009-4017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4142/">CVE-2009-4142</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0397/">CVE-2010-0397</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3870/">CVE-2010-3870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4697/">CVE-2010-4697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4698/">CVE-2010-4698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4699/">CVE-2010-4699</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0752/">CVE-2011-0752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0753/">CVE-2011-0753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0755/">CVE-2011-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1148/">CVE-2011-1148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1464/">CVE-2011-1464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1469/">CVE-2011-1469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1470/">CVE-2011-1470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1471/">CVE-2011-1471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1938/">CVE-2011-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068818" comment="apache2-mod_php5-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111789" comment="php5-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068819" comment="php5-bcmath-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068820" comment="php5-bz2-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068821" comment="php5-calendar-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068822" comment="php5-ctype-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068823" comment="php5-curl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068824" comment="php5-dba-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068825" comment="php5-dbase-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068826" comment="php5-dom-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068827" comment="php5-exif-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068828" comment="php5-fastcgi-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068829" comment="php5-ftp-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068830" comment="php5-gd-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068831" comment="php5-gettext-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068832" comment="php5-gmp-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068833" comment="php5-hash-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068834" comment="php5-iconv-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068835" comment="php5-json-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068836" comment="php5-ldap-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068837" comment="php5-mbstring-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068838" comment="php5-mcrypt-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068839" comment="php5-mysql-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068840" comment="php5-odbc-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068841" comment="php5-openssl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068842" comment="php5-pcntl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068843" comment="php5-pdo-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068844" comment="php5-pear-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068845" comment="php5-pgsql-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068846" comment="php5-pspell-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068847" comment="php5-shmop-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068848" comment="php5-snmp-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068849" comment="php5-soap-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068850" comment="php5-suhosin-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068851" comment="php5-sysvmsg-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068852" comment="php5-sysvsem-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068853" comment="php5-sysvshm-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068854" comment="php5-tokenizer-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068855" comment="php5-wddx-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068856" comment="php5-xmlreader-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068857" comment="php5-xmlrpc-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068858" comment="php5-xmlwriter-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068859" comment="php5-xsl-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068860" comment="php5-zip-5.2.14-0.7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068861" comment="php5-zlib-5.2.14-0.7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35794" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php53-5.3.8-0.19.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php53-5.3.8-0.19.6 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144264" comment="apache2-mod_php53-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144265" comment="php53-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144266" comment="php53-bcmath-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144267" comment="php53-bz2-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144268" comment="php53-calendar-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144269" comment="php53-ctype-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144270" comment="php53-curl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144271" comment="php53-dba-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144272" comment="php53-dom-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144273" comment="php53-exif-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144274" comment="php53-fastcgi-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144275" comment="php53-fileinfo-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144276" comment="php53-ftp-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144277" comment="php53-gd-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144278" comment="php53-gettext-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144279" comment="php53-gmp-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144280" comment="php53-iconv-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144281" comment="php53-intl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144282" comment="php53-json-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144283" comment="php53-ldap-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144284" comment="php53-mbstring-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144285" comment="php53-mcrypt-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144286" comment="php53-mysql-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144287" comment="php53-odbc-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144288" comment="php53-openssl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144289" comment="php53-pcntl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144290" comment="php53-pdo-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144291" comment="php53-pear-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144292" comment="php53-pgsql-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144293" comment="php53-pspell-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144294" comment="php53-shmop-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144295" comment="php53-snmp-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144296" comment="php53-soap-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144297" comment="php53-suhosin-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144298" comment="php53-sysvmsg-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144299" comment="php53-sysvsem-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144300" comment="php53-sysvshm-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144301" comment="php53-tokenizer-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144302" comment="php53-wddx-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144303" comment="php53-xmlreader-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144304" comment="php53-xmlrpc-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144305" comment="php53-xmlwriter-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144306" comment="php53-xsl-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144307" comment="php53-zip-5.3.8-0.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144308" comment="php53-zlib-5.3.8-0.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35795" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.19.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.19.22 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144309" comment="avahi-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144310" comment="avahi-lang-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144311" comment="avahi-utils-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144312" comment="libavahi-client3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144313" comment="libavahi-client3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144314" comment="libavahi-client3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144315" comment="libavahi-common3-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144316" comment="libavahi-common3-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144317" comment="libavahi-common3-x86-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144318" comment="libavahi-core5-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144319" comment="libdns_sd-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144320" comment="libdns_sd-32bit-0.6.23-11.19.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144321" comment="libdns_sd-x86-0.6.23-11.19.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35796" version="1" class="patch">
	<metadata>
		<title>bind-9.6ESVR5P1-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.6ESVR5P1-0.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144322" comment="bind-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144323" comment="bind-chrootenv-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144324" comment="bind-doc-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144325" comment="bind-libs-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144326" comment="bind-libs-32bit-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144327" comment="bind-libs-x86-9.6ESVR5P1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144328" comment="bind-utils-9.6ESVR5P1-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35797" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-11.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-11.17 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144329" comment="boost-license-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144330" comment="libboost_program_options1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144331" comment="libboost_regex1_36_0-1.36.0-11.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144332" comment="libboost_signals1_36_0-1.36.0-11.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35798" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111700" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111701" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111702" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111748" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111773" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35799" version="1" class="patch">
	<metadata>
		<title>cifs-utils-5.1-0.4.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2011-1678" ref_url="https://www.suse.com/security/cve/CVE-2011-1678/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-5.1-0.4.9 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1678/">CVE-2011-1678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144333" comment="cifs-utils-5.1-0.4.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35800" version="1" class="patch">
	<metadata>
		<title>clamav-0.97.3-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.97.3-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071561" comment="clamav-0.97.3-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35801" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143519" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35802" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.199.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.199.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144334" comment="cron-4.1-194.199.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35803" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.44.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070960" comment="cups-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070956" comment="cups-client-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070959" comment="cups-libs-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070957" comment="cups-libs-32bit-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070958" comment="cups-libs-x86-1.3.9-8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35804" version="1" class="patch">
	<metadata>
		<title>curl-7.19.7-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.7-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072828" comment="curl-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072831" comment="libcurl4-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072829" comment="libcurl4-32bit-7.19.7-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072830" comment="libcurl4-x86-7.19.7-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35805" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071558" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071559" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071560" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35806" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144335" comment="dbus-1-1.2.10-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144336" comment="dbus-1-32bit-1.2.10-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144337" comment="dbus-1-x11-1.2.10-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144338" comment="dbus-1-x86-1.2.10-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35807" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143534" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143535" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143536" comment="dbus-1-glib-x86-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35808" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.3.P2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.3.P2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144339" comment="dhcp-4.2.3.P2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144340" comment="dhcp-client-4.2.3.P2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144341" comment="dhcp-relay-4.2.3.P2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144342" comment="dhcp-server-4.2.3.P2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35809" version="1" class="patch">
	<metadata>
		<title>dhcpcd-3.2.3-44.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcpcd-3.2.3-44.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144343" comment="dhcpcd-3.2.3-44.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067078" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35810" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144344" comment="e2fsprogs-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144345" comment="libcom_err2-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144346" comment="libcom_err2-32bit-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144347" comment="libcom_err2-x86-1.41.9-2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144348" comment="libext2fs2-1.41.9-2.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35811" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-32bit-61-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-32bit-61-1.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069763" comment="ecryptfs-utils-61-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069761" comment="ecryptfs-utils-32bit-61-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069762" comment="ecryptfs-utils-x86-61-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35812" version="1" class="patch">
	<metadata>
		<title>ed-0.2-1001.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>
These are all security issues fixed in the ed-0.2-1001.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065506" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35813" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143546" comment="emacs-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143547" comment="emacs-el-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143548" comment="emacs-info-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143549" comment="emacs-nox-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143550" comment="emacs-x11-22.3-4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35814" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143551" comment="enscript-1.6.4-152.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35815" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111794" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111795" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111796" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35816" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.26.33.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.26.33.14 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144349" comment="evolution-data-server-2.28.2-0.26.33.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144350" comment="evolution-data-server-32bit-2.28.2-0.26.33.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144351" comment="evolution-data-server-lang-2.28.2-0.26.33.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144352" comment="evolution-data-server-x86-2.28.2-0.26.33.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35817" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057200" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057203" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057201" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057202" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35818" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.20.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.20.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070961" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070962" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35819" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144353" comment="file-4.24-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144354" comment="file-32bit-4.24-43.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144355" comment="file-x86-4.24-43.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35820" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143555" comment="findutils-4.4.0-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143556" comment="findutils-locate-4.4.0-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35821" version="1" class="patch">
	<metadata>
		<title>foomatic-filters-3.0.2-269.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the foomatic-filters-3.0.2-269.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069764" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35822" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144356" comment="freeradius-server-2.1.1-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144357" comment="freeradius-server-dialupadmin-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144358" comment="freeradius-server-doc-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144359" comment="freeradius-server-libs-2.1.1-7.7.19.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144360" comment="freeradius-server-utils-2.1.1-7.7.19.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35823" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072124" comment="freetype2-2.3.7-25.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072122" comment="freetype2-32bit-2.3.7-25.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072123" comment="freetype2-x86-2.3.7-25.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35824" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.3.7-25.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.3.7-25.9 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144361" comment="ft2demos-2.3.7-25.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35825" version="1" class="patch">
	<metadata>
		<title>fuse-2.7.2-61.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.7.2-61.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066589" comment="fuse-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066591" comment="libfuse2-2.7.2-61.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35826" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143559" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35827" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143560" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143561" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35828" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.18 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143562" comment="gd-2.0.36.RC1-52.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35829" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061853" comment="ghostscript-fonts-other-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061854" comment="ghostscript-fonts-rus-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061855" comment="ghostscript-fonts-std-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061856" comment="ghostscript-library-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061857" comment="ghostscript-omni-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061858" comment="ghostscript-x11-8.62-32.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061859" comment="libgimpprint-4.2.7-32.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35830" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.2.23 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144362" comment="glib2-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144363" comment="glib2-doc-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144364" comment="glib2-lang-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144365" comment="libgio-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144366" comment="libgio-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144367" comment="libgio-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144368" comment="libglib-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144369" comment="libglib-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144370" comment="libglib-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144371" comment="libgmodule-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144372" comment="libgmodule-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144373" comment="libgmodule-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144374" comment="libgobject-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144375" comment="libgobject-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144376" comment="libgobject-2_0-0-x86-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144377" comment="libgthread-2_0-0-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144378" comment="libgthread-2_0-0-32bit-2.22.5-0.2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144379" comment="libgthread-2_0-0-x86-2.22.5-0.2.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35831" version="1" class="patch">
	<metadata>
		<title>glibc-2.11.3-17.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.11.3-17.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144380" comment="glibc-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144381" comment="glibc-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144382" comment="glibc-devel-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144383" comment="glibc-devel-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144384" comment="glibc-html-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144385" comment="glibc-i18ndata-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144386" comment="glibc-info-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144387" comment="glibc-locale-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144388" comment="glibc-locale-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144389" comment="glibc-locale-x86-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144390" comment="glibc-profile-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144391" comment="glibc-profile-32bit-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144392" comment="glibc-profile-x86-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144393" comment="glibc-x86-2.11.3-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144394" comment="nscd-2.11.3-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35832" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143596" comment="gmime-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143597" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143598" comment="gmime-doc-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143599" comment="libgmime-2_0-3-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143600" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35833" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144395" comment="gnome-screensaver-2.28.3-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144396" comment="gnome-screensaver-lang-2.28.3-0.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35834" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.39.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.39.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072750" comment="gnutls-2.4.1-24.39.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072753" comment="libgnutls26-2.4.1-24.39.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072751" comment="libgnutls26-32bit-2.4.1-24.39.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072752" comment="libgnutls26-x86-2.4.1-24.39.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35835" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.33.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.33.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144397" comment="gpg2-2.0.9-25.33.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144398" comment="gpg2-lang-2.0.9-25.33.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35836" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143605" comment="gstreamer-0_10-plugins-base-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143606" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143607" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143608" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143609" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143610" comment="libgstapp-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143611" comment="libgstapp-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143612" comment="libgstapp-0_10-0-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143613" comment="libgstinterfaces-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143614" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143615" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35837" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.30-5.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.30-5.8.11 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143616" comment="gstreamer-0_10-plugins-good-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143617" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143618" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35838" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.21.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.21.4 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144399" comment="gtk2-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144400" comment="gtk2-32bit-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144401" comment="gtk2-doc-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144402" comment="gtk2-lang-2.18.9-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144403" comment="gtk2-x86-2.18.9-0.21.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35839" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.15.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143623" comment="gvim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143624" comment="vim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143625" comment="vim-base-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143626" comment="vim-data-7.2-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35840" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057426" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35841" version="1" class="patch">
	<metadata>
		<title>hplip-3.11.10-0.6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.11.10-0.6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071605" comment="hplip-3.11.10-0.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071604" comment="hplip-hpijs-3.11.10-0.6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35842" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.1.93 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.1.93 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143631" comment="ipsec-tools-0.7.3-1.1.93 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35843" version="1" class="patch">
	<metadata>
		<title>java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2788" ref_url="https://www.suse.com/security/cve/CVE-2007-2788/" source="CVE"/>
		<reference ref_id="CVE-2007-2789" ref_url="https://www.suse.com/security/cve/CVE-2007-2789/" source="CVE"/>
		<reference ref_id="CVE-2007-3004" ref_url="https://www.suse.com/security/cve/CVE-2007-3004/" source="CVE"/>
		<reference ref_id="CVE-2007-3005" ref_url="https://www.suse.com/security/cve/CVE-2007-3005/" source="CVE"/>
		<reference ref_id="CVE-2007-3655" ref_url="https://www.suse.com/security/cve/CVE-2007-3655/" source="CVE"/>
		<reference ref_id="CVE-2007-3698" ref_url="https://www.suse.com/security/cve/CVE-2007-3698/" source="CVE"/>
		<reference ref_id="CVE-2007-3922" ref_url="https://www.suse.com/security/cve/CVE-2007-3922/" source="CVE"/>
		<reference ref_id="CVE-2007-4381" ref_url="https://www.suse.com/security/cve/CVE-2007-4381/" source="CVE"/>
		<reference ref_id="CVE-2007-5232" ref_url="https://www.suse.com/security/cve/CVE-2007-5232/" source="CVE"/>
		<reference ref_id="CVE-2007-5236" ref_url="https://www.suse.com/security/cve/CVE-2007-5236/" source="CVE"/>
		<reference ref_id="CVE-2007-5238" ref_url="https://www.suse.com/security/cve/CVE-2007-5238/" source="CVE"/>
		<reference ref_id="CVE-2007-5239" ref_url="https://www.suse.com/security/cve/CVE-2007-5239/" source="CVE"/>
		<reference ref_id="CVE-2007-5240" ref_url="https://www.suse.com/security/cve/CVE-2007-5240/" source="CVE"/>
		<reference ref_id="CVE-2007-5273" ref_url="https://www.suse.com/security/cve/CVE-2007-5273/" source="CVE"/>
		<reference ref_id="CVE-2007-5274" ref_url="https://www.suse.com/security/cve/CVE-2007-5274/" source="CVE"/>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-3104" ref_url="https://www.suse.com/security/cve/CVE-2008-3104/" source="CVE"/>
		<reference ref_id="CVE-2008-3112" ref_url="https://www.suse.com/security/cve/CVE-2008-3112/" source="CVE"/>
		<reference ref_id="CVE-2008-3113" ref_url="https://www.suse.com/security/cve/CVE-2008-3113/" source="CVE"/>
		<reference ref_id="CVE-2008-3114" ref_url="https://www.suse.com/security/cve/CVE-2008-3114/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0084" ref_url="https://www.suse.com/security/cve/CVE-2010-0084/" source="CVE"/>
		<reference ref_id="CVE-2010-0085" ref_url="https://www.suse.com/security/cve/CVE-2010-0085/" source="CVE"/>
		<reference ref_id="CVE-2010-0087" ref_url="https://www.suse.com/security/cve/CVE-2010-0087/" source="CVE"/>
		<reference ref_id="CVE-2010-0088" ref_url="https://www.suse.com/security/cve/CVE-2010-0088/" source="CVE"/>
		<reference ref_id="CVE-2010-0089" ref_url="https://www.suse.com/security/cve/CVE-2010-0089/" source="CVE"/>
		<reference ref_id="CVE-2010-0091" ref_url="https://www.suse.com/security/cve/CVE-2010-0091/" source="CVE"/>
		<reference ref_id="CVE-2010-0095" ref_url="https://www.suse.com/security/cve/CVE-2010-0095/" source="CVE"/>
		<reference ref_id="CVE-2010-0839" ref_url="https://www.suse.com/security/cve/CVE-2010-0839/" source="CVE"/>
		<reference ref_id="CVE-2010-0840" ref_url="https://www.suse.com/security/cve/CVE-2010-0840/" source="CVE"/>
		<reference ref_id="CVE-2010-0841" ref_url="https://www.suse.com/security/cve/CVE-2010-0841/" source="CVE"/>
		<reference ref_id="CVE-2010-0842" ref_url="https://www.suse.com/security/cve/CVE-2010-0842/" source="CVE"/>
		<reference ref_id="CVE-2010-0843" ref_url="https://www.suse.com/security/cve/CVE-2010-0843/" source="CVE"/>
		<reference ref_id="CVE-2010-0844" ref_url="https://www.suse.com/security/cve/CVE-2010-0844/" source="CVE"/>
		<reference ref_id="CVE-2010-0846" ref_url="https://www.suse.com/security/cve/CVE-2010-0846/" source="CVE"/>
		<reference ref_id="CVE-2010-0847" ref_url="https://www.suse.com/security/cve/CVE-2010-0847/" source="CVE"/>
		<reference ref_id="CVE-2010-0848" ref_url="https://www.suse.com/security/cve/CVE-2010-0848/" source="CVE"/>
		<reference ref_id="CVE-2010-0849" ref_url="https://www.suse.com/security/cve/CVE-2010-0849/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2788/">CVE-2007-2788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2789/">CVE-2007-2789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3004/">CVE-2007-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3005/">CVE-2007-3005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3655/">CVE-2007-3655</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3698/">CVE-2007-3698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3922/">CVE-2007-3922</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4381/">CVE-2007-4381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5232/">CVE-2007-5232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5236/">CVE-2007-5236</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5238/">CVE-2007-5238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5239/">CVE-2007-5239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5240/">CVE-2007-5240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5273/">CVE-2007-5273</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5274/">CVE-2007-5274</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3104/">CVE-2008-3104</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3112/">CVE-2008-3112</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3113/">CVE-2008-3113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3114/">CVE-2008-3114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0084/">CVE-2010-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0085/">CVE-2010-0085</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0087/">CVE-2010-0087</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0088/">CVE-2010-0088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0089/">CVE-2010-0089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0091/">CVE-2010-0091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0095/">CVE-2010-0095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0839/">CVE-2010-0839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0840/">CVE-2010-0840</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0841/">CVE-2010-0841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0842/">CVE-2010-0842</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0843/">CVE-2010-0843</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0844/">CVE-2010-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0846/">CVE-2010-0846</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0847/">CVE-2010-0847</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0848/">CVE-2010-0848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0849/">CVE-2010-0849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070093" comment="java-1_4_2-ibm-1.4.2_sr13.10-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070091" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.10-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070092" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.10-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35844" version="1" class="patch">
	<metadata>
		<title>java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1188" ref_url="https://www.suse.com/security/cve/CVE-2008-1188/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1191" ref_url="https://www.suse.com/security/cve/CVE-2008-1191/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1193" ref_url="https://www.suse.com/security/cve/CVE-2008-1193/" source="CVE"/>
		<reference ref_id="CVE-2008-1194" ref_url="https://www.suse.com/security/cve/CVE-2008-1194/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0771" ref_url="https://www.suse.com/security/cve/CVE-2010-0771/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3550" ref_url="https://www.suse.com/security/cve/CVE-2010-3550/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3555" ref_url="https://www.suse.com/security/cve/CVE-2010-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3558" ref_url="https://www.suse.com/security/cve/CVE-2010-3558/" source="CVE"/>
		<reference ref_id="CVE-2010-3559" ref_url="https://www.suse.com/security/cve/CVE-2010-3559/" source="CVE"/>
		<reference ref_id="CVE-2010-3560" ref_url="https://www.suse.com/security/cve/CVE-2010-3560/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3563" ref_url="https://www.suse.com/security/cve/CVE-2010-3563/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3566" ref_url="https://www.suse.com/security/cve/CVE-2010-3566/" source="CVE"/>
		<reference ref_id="CVE-2010-3567" ref_url="https://www.suse.com/security/cve/CVE-2010-3567/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3573" ref_url="https://www.suse.com/security/cve/CVE-2010-3573/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1188/">CVE-2008-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1191/">CVE-2008-1191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1193/">CVE-2008-1193</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1194/">CVE-2008-1194</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0771/">CVE-2010-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3550/">CVE-2010-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3555/">CVE-2010-3555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3558/">CVE-2010-3558</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3559/">CVE-2010-3559</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3560/">CVE-2010-3560</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3563/">CVE-2010-3563</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3566/">CVE-2010-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3567/">CVE-2010-3567</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3573/">CVE-2010-3573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144404" comment="java-1_6_0-ibm-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144405" comment="java-1_6_0-ibm-alsa-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144406" comment="java-1_6_0-ibm-fonts-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144407" comment="java-1_6_0-ibm-jdbc-1.6.0_sr9.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144408" comment="java-1_6_0-ibm-plugin-1.6.0_sr9.3-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35845" version="1" class="patch">
	<metadata>
		<title>kbd-1.14.1-16.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.14.1-16.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143632" comment="kbd-1.14.1-16.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35846" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.10.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144409" comment="kde4-kgreeter-plugins-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143634" comment="kdebase4-wallpapers-4.3.5-0.8.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144410" comment="kdebase4-workspace-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144411" comment="kdebase4-workspace-ksysguardd-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144412" comment="kdm-4.3.5-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144413" comment="kwin-4.3.5-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35847" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143639" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143640" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143641" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35848" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056569" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056564" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056567" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056565" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056566" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056568" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35849" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068608" comment="kdelibs4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068606" comment="kdelibs4-core-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068607" comment="kdelibs4-doc-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068611" comment="libkde4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068609" comment="libkde4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068610" comment="libkde4-x86-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068614" comment="libkdecore4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068612" comment="libkdecore4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068613" comment="libkdecore4-x86-4.3.5-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35850" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065196" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065197" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065198" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065199" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065200" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35851" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.0.13-0.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.0.13-0.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144414" comment="kernel-default-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144415" comment="kernel-default-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144416" comment="kernel-default-devel-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144417" comment="kernel-default-man-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144418" comment="kernel-pae-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144419" comment="kernel-pae-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144420" comment="kernel-pae-devel-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144421" comment="kernel-ppc64-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144422" comment="kernel-ppc64-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144423" comment="kernel-ppc64-devel-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144424" comment="kernel-source-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144425" comment="kernel-syms-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144426" comment="kernel-trace-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144427" comment="kernel-trace-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144428" comment="kernel-trace-devel-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144429" comment="kernel-xen-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144430" comment="kernel-xen-base-3.0.13-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144431" comment="kernel-xen-devel-3.0.13-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35852" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.48.48.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.48.48.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072351" comment="krb5-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072345" comment="krb5-32bit-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072346" comment="krb5-apps-clients-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072347" comment="krb5-apps-servers-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072348" comment="krb5-client-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072349" comment="krb5-server-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072350" comment="krb5-x86-1.6.3-133.48.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35853" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.21 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144432" comment="krb5-doc-1.6.3-133.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35854" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.12 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144433" comment="krb5-plugin-kdb-ldap-1.6.3-133.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144434" comment="krb5-plugin-preauth-pkinit-1.6.3-133.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35855" version="1" class="patch">
	<metadata>
		<title>kvm-0.15.1-0.17.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-0.15.1-0.17.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144435" comment="kvm-0.15.1-0.17.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35856" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.14.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.14.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143670" comment="lcms-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143671" comment="liblcms1-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143672" comment="liblcms1-32bit-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143673" comment="liblcms1-x86-1.17-77.14.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35857" version="1" class="patch">
	<metadata>
		<title>ldapsmb-1.34b-12.18.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<description>
These are all security issues fixed in the ldapsmb-1.34b-12.18.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144436" comment="ldapsmb-1.34b-12.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144437" comment="libldb1-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144438" comment="libsmbclient0-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144439" comment="libsmbclient0-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144440" comment="libsmbclient0-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144441" comment="libtalloc2-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144442" comment="libtalloc2-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144443" comment="libtalloc2-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144444" comment="libtdb1-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144445" comment="libtdb1-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144446" comment="libtdb1-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144447" comment="libtevent0-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144448" comment="libwbclient0-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144449" comment="libwbclient0-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144450" comment="libwbclient0-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144451" comment="samba-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144452" comment="samba-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144453" comment="samba-client-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144454" comment="samba-client-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144455" comment="samba-client-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144456" comment="samba-krb-printing-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144457" comment="samba-winbind-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144458" comment="samba-winbind-32bit-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144459" comment="samba-winbind-x86-3.6.3-0.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144460" comment="samba-x86-3.6.3-0.18.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35858" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144461" comment="libMagickCore1-6.4.3.6-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144462" comment="libMagickCore1-32bit-6.4.3.6-7.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35859" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.3-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.3-5.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072598" comment="libQtWebKit4-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072596" comment="libQtWebKit4-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072597" comment="libQtWebKit4-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072611" comment="libqt4-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072599" comment="libqt4-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072602" comment="libqt4-qt3support-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072600" comment="libqt4-qt3support-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072601" comment="libqt4-qt3support-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072606" comment="libqt4-sql-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072603" comment="libqt4-sql-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072604" comment="libqt4-sql-sqlite-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072605" comment="libqt4-sql-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072609" comment="libqt4-x11-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072607" comment="libqt4-x11-32bit-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072608" comment="libqt4-x11-x86-4.6.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072610" comment="libqt4-x86-4.6.3-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35860" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143717" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35861" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069401" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069399" comment="libapr-util1-32bit-1.3.4-12.22.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35862" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069403" comment="libapr1-1.3.3-11.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069402" comment="libapr1-32bit-1.3.3-11.18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35863" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143718" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35864" version="1" class="patch">
	<metadata>
		<title>libcap-progs-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-progs-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111803" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111804" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111826" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111818" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35865" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.34-2.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.34-2.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067003" comment="libcgroup1-0.34-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35866" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.27-0.6.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.27-0.6.6 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144463" comment="libdrm-2.4.27-0.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144464" comment="libdrm-32bit-2.4.27-0.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144465" comment="libdrm-x86-2.4.27-0.6.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35867" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.12 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144466" comment="libexif-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144467" comment="libexif-32bit-0.6.17-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144468" comment="libexif-x86-0.6.17-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35868" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143723" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35869" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.13.1-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.13.1-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072304" comment="libfreebl3-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072303" comment="libfreebl3-32bit-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107302" comment="libfreebl3-x86-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072314" comment="mozilla-nss-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072307" comment="mozilla-nss-32bit-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072313" comment="mozilla-nss-tools-3.13.1-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107303" comment="mozilla-nss-x86-3.13.1-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35870" version="1" class="patch">
	<metadata>
		<title>libgdiplus0-2.6.7-0.5.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgdiplus0-2.6.7-0.5.76 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143734" comment="libgdiplus0-2.6.7-0.5.76 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35871" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069283" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069281" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069282" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35872" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.2.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.2.20 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144469" comment="libgtop-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144470" comment="libgtop-2_0-7-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144471" comment="libgtop-doc-2.28.0-1.2.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144472" comment="libgtop-lang-2.28.0-1.2.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35873" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.24.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.24.11 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009156585" comment="libicu-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156586" comment="libicu-32bit-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009156587" comment="libicu-doc-4.0-7.24.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144473" comment="libicu-x86-4.0-7.24.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35874" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072647" comment="libicu-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072645" comment="libicu-32bit-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072646" comment="libicu-doc-4.0-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35875" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057091" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057089" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057090" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057094" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057092" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057093" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35876" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143739" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35877" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.94-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.94-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144474" comment="libmysqlclient15-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144475" comment="libmysqlclient15-32bit-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144476" comment="libmysqlclient15-x86-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144477" comment="libmysqlclient_r15-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144478" comment="mysql-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144479" comment="mysql-Max-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144480" comment="mysql-client-5.0.94-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144481" comment="mysql-tools-5.0.94-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35878" version="1" class="patch">
	<metadata>
		<title>libneon27-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143743" comment="libneon27-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143744" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143745" comment="libneon27-x86-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35879" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058587" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058585" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058586" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058588" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35880" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.7 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144482" comment="libnewt0_52-0.52.10-1.35.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144483" comment="newt-0.52.10-1.35.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144484" comment="python-newt-0.52.10-1.35.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35881" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065553" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065551" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065552" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065556" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065554" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065555" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35882" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-0.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-0.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072492" comment="libopenssl0_9_8-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072490" comment="libopenssl0_9_8-32bit-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072491" comment="libopenssl0_9_8-x86-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072494" comment="openssl-0.9.8j-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072493" comment="openssl-doc-0.9.8j-0.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35883" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069807" comment="libpng12-0-1.2.31-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069805" comment="libpng12-0-32bit-1.2.31-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069806" comment="libpng12-0-x86-1.2.31-5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35884" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064463" comment="libpoppler-glib4-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064464" comment="libpoppler-qt4-3-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064465" comment="libpoppler5-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064466" comment="poppler-tools-0.12.3-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35885" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.23-0.7.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.23-0.7.128 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143749" comment="libpulse-browse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143750" comment="libpulse-mainloop-glib0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143751" comment="libpulse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143752" comment="libpulse0-32bit-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143753" comment="libpulse0-x86-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143754" comment="pulseaudio-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143755" comment="pulseaudio-esound-compat-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143756" comment="pulseaudio-gdm-hooks-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143757" comment="pulseaudio-lang-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143758" comment="pulseaudio-module-x11-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143759" comment="pulseaudio-module-zeroconf-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143760" comment="pulseaudio-utils-0.9.23-0.7.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35886" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.0-8.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.0-8.12.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068531" comment="libpython2_6-1_0-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068529" comment="libpython2_6-1_0-32bit-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068530" comment="libpython2_6-1_0-x86-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068535" comment="python-base-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068533" comment="python-base-32bit-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068534" comment="python-base-x86-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068542" comment="python-xml-2.6.0-8.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35887" version="1" class="patch">
	<metadata>
		<title>libqt4-sql-mysql-4.6.3-5.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-sql-mysql-4.6.3-5.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070883" comment="libqt4-sql-mysql-4.6.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070892" comment="qt4-x11-tools-4.6.3-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35888" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143768" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143769" comment="libtirpc1-0.2.1-1.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35889" version="1" class="patch">
	<metadata>
		<title>librsvg-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070704" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070702" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070703" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070705" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35890" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143770" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143771" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143772" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35891" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069633" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069631" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069632" comment="libsndfile-x86-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35892" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144485" comment="libsnmp15-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144486" comment="libsnmp15-32bit-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144487" comment="libsnmp15-x86-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144488" comment="net-snmp-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144489" comment="perl-SNMP-5.4.2.1-8.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144490" comment="snmp-mibs-5.4.2.1-8.12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35893" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.32.2-4.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.32.2-4.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144491" comment="libsoup-2_4-1-2.32.2-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144492" comment="libsoup-2_4-1-32bit-2.32.2-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144493" comment="libsoup-2_4-1-x86-2.32.2-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35894" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.142.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.142.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067884" comment="libtiff3-3.8.2-141.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067882" comment="libtiff3-32bit-3.8.2-141.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067883" comment="libtiff3-x86-3.8.2-141.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067885" comment="tiff-3.8.2-141.142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35895" version="1" class="patch">
	<metadata>
		<title>libvirt-0.9.6-0.13.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-0.9.6-0.13.42 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144494" comment="libvirt-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144495" comment="libvirt-client-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144496" comment="libvirt-client-32bit-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144497" comment="libvirt-doc-0.9.6-0.13.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144498" comment="libvirt-python-0.9.6-0.13.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35896" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061093" comment="libvorbis-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061090" comment="libvorbis-32bit-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061091" comment="libvorbis-doc-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061092" comment="libvorbis-x86-1.2.0-79.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35897" version="1" class="patch">
	<metadata>
		<title>libxcrypt-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070132" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070130" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070131" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143797" comment="pam-modules-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143798" comment="pam-modules-32bit-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143799" comment="pam-modules-x86-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143800" comment="pwdutils-3.2.15-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143801" comment="pwdutils-plugin-audit-3.2.15-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35898" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072708" comment="libxml2-2.7.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072705" comment="libxml2-32bit-2.7.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072706" comment="libxml2-doc-2.7.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072707" comment="libxml2-x86-2.7.6-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35899" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144499" comment="libxslt-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144500" comment="libxslt-32bit-1.1.24-19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144501" comment="libxslt-x86-1.1.24-19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35900" version="1" class="patch">
	<metadata>
		<title>libzip1-0.9-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip1-0.9-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068337" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35901" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143802" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35902" version="1" class="patch">
	<metadata>
		<title>logrotate-3.7.7-10.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.7.7-10.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068574" comment="logrotate-3.7.7-10.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35903" version="1" class="patch">
	<metadata>
		<title>logwatch-7.3.6-65.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.3.6-65.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143803" comment="logwatch-7.3.6-65.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35904" version="1" class="patch">
	<metadata>
		<title>lvm2-2.02.84-3.25.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>
These are all security issues fixed in the lvm2-2.02.84-3.25.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144502" comment="lvm2-2.02.84-3.25.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35905" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.14-9.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.14-9.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067854" comment="mailman-2.1.14-9.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35906" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143806" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35907" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-8.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143807" comment="mipv6d-2.0.2.umip.0.4-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35908" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.7.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.7.19 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143808" comment="mono-core-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143809" comment="mono-data-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143810" comment="mono-data-postgresql-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143811" comment="mono-data-sqlite-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143812" comment="mono-locale-extras-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143813" comment="mono-nunit-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143814" comment="mono-web-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143815" comment="mono-winforms-2.6.7-0.7.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35909" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-1.9.2.24-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-1.9.2.24-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107301" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107304" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107299" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107300" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107305" comment="mozilla-xulrunner192-x86-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35910" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111745" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35911" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144503" comment="nagios-3.0.6-1.25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144504" comment="nagios-www-3.0.6-1.25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35912" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.13-1.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.13-1.35 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144505" comment="nagios-plugins-1.4.13-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144506" comment="nagios-plugins-extras-1.4.13-1.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35913" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.4p8-1.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.4p8-1.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144507" comment="ntp-4.2.4p8-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144508" comment="ntp-doc-4.2.4p8-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35914" version="1" class="patch">
	<metadata>
		<title>ofed-1.5.2-0.22.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-1.5.2-0.22.23 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144509" comment="ofed-1.5.2-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144510" comment="ofed-doc-1.5.2-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144511" comment="ofed-kmp-default-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144512" comment="ofed-kmp-pae-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144513" comment="ofed-kmp-ppc64-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144514" comment="ofed-kmp-trace-1.5.2_3.0.13_0.27-0.22.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35915" version="1" class="patch">
	<metadata>
		<title>openslp-1.2.0-172.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-1.2.0-172.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143829" comment="openslp-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143830" comment="openslp-32bit-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143831" comment="openslp-server-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143832" comment="openslp-x86-1.2.0-172.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35916" version="1" class="patch">
	<metadata>
		<title>openssh-5.1p1-41.51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-5.1p1-41.51.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144515" comment="openssh-5.1p1-41.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144516" comment="openssh-askpass-5.1p1-41.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35917" version="1" class="patch">
	<metadata>
		<title>openswan-2.6.16-1.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4190" ref_url="https://www.suse.com/security/cve/CVE-2008-4190/" source="CVE"/>
		<reference ref_id="CVE-2009-2185" ref_url="https://www.suse.com/security/cve/CVE-2009-2185/" source="CVE"/>
		<reference ref_id="CVE-2011-4073" ref_url="https://www.suse.com/security/cve/CVE-2011-4073/" source="CVE"/>
		<description>
These are all security issues fixed in the openswan-2.6.16-1.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4190/">CVE-2008-4190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2185/">CVE-2009-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4073/">CVE-2011-4073</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072165" comment="openswan-2.6.16-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072164" comment="openswan-doc-2.6.16-1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35918" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.31 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144517" comment="openvpn-2.0.9-143.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144518" comment="openvpn-auth-pam-plugin-2.0.9-143.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35919" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069566" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069564" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069565" comment="opie-x86-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35920" version="1" class="patch">
	<metadata>
		<title>pam-1.1.5-0.10.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.5-0.10.17 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143837" comment="pam-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143838" comment="pam-32bit-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143839" comment="pam-doc-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143840" comment="pam-x86-1.1.5-0.10.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35921" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.10.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.10.15 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144519" comment="pam_krb5-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144520" comment="pam_krb5-32bit-2.3.1-47.10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144521" comment="pam_krb5-x86-2.3.1-47.10.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35922" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143844" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143845" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143846" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35923" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.13.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.13.65 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144522" comment="pam_mount-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144523" comment="pam_mount-32bit-0.47-13.13.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144524" comment="pam_mount-x86-0.47-13.13.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35924" version="1" class="patch">
	<metadata>
		<title>pango-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066424" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066421" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066422" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066423" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35925" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.3.8-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.3.8-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065684" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35926" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065687" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065685" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065686" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35927" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.55.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068387" comment="perl-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068383" comment="perl-32bit-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068384" comment="perl-base-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068385" comment="perl-doc-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068386" comment="perl-x86-5.10.0-64.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35928" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056793" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35929" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143857" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35930" version="1" class="patch">
	<metadata>
		<title>perl-libwww-perl-5.816-2.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-libwww-perl-5.816-2.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143858" comment="perl-libwww-perl-5.816-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35931" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.3.1-10.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.3.1-10.8.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143859" comment="perl-spamassassin-3.3.1-10.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143860" comment="spamassassin-3.3.1-10.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35932" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.14-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.14-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066604" comment="postgresql-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066598" comment="postgresql-contrib-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066599" comment="postgresql-docs-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066602" comment="postgresql-libs-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066600" comment="postgresql-libs-32bit-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066601" comment="postgresql-libs-x86-8.3.14-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066603" comment="postgresql-server-8.3.14-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35933" version="1" class="patch">
	<metadata>
		<title>puppet-2.6.12-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-2.6.12-0.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144525" comment="puppet-2.6.12-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144526" comment="puppet-server-2.6.12-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35934" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.22-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.22-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144527" comment="pure-ftpd-1.0.22-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35935" version="1" class="patch">
	<metadata>
		<title>python-2.6.0-8.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.0-8.12.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068543" comment="python-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068532" comment="python-32bit-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068536" comment="python-curses-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068537" comment="python-demo-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068538" comment="python-gdbm-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068539" comment="python-idle-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068540" comment="python-tk-2.6.0-8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068541" comment="python-x86-2.6.0-8.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35936" version="1" class="patch">
	<metadata>
		<title>python-sssd-config-1.5.11-0.9.96 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<description>
These are all security issues fixed in the python-sssd-config-1.5.11-0.9.96 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144528" comment="python-sssd-config-1.5.11-0.9.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144529" comment="sssd-1.5.11-0.9.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144530" comment="sssd-32bit-1.5.11-0.9.96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144531" comment="sssd-tools-1.5.11-0.9.96 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35937" version="1" class="patch">
	<metadata>
		<title>pyxml-0.8.4-194.23.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the pyxml-0.8.4-194.23.38 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143870" comment="pyxml-0.8.4-194.23.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35938" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143871" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143872" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143873" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35939" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.6.2 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070706" comment="quagga-0.99.15-0.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35940" version="1" class="patch">
	<metadata>
		<title>radvd-1.1-1.24.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.1-1.24.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071831" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35941" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.38.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144532" comment="rsync-3.0.4-2.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35942" version="1" class="patch">
	<metadata>
		<title>rsyslog-5.8.7-0.5.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-5.8.7-0.5.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144533" comment="rsyslog-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144534" comment="rsyslog-diag-tools-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144535" comment="rsyslog-doc-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144536" comment="rsyslog-module-gssapi-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144537" comment="rsyslog-module-gtls-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144538" comment="rsyslog-module-mysql-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144539" comment="rsyslog-module-pgsql-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144540" comment="rsyslog-module-relp-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144541" comment="rsyslog-module-snmp-5.8.7-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144542" comment="rsyslog-module-udpspoof-5.8.7-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35943" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p357-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p357-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072842" comment="ruby-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072840" comment="ruby-doc-html-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072841" comment="ruby-tk-1.8.7.p357-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35944" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072757" comment="squid-2.7.STABLE5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35945" version="1" class="patch">
	<metadata>
		<title>squid3-3.1.12-8.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2005-0094" ref_url="https://www.suse.com/security/cve/CVE-2005-0094/" source="CVE"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<description>
These are all security issues fixed in the squid3-3.1.12-8.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-0094/">CVE-2005-0094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072759" comment="squid3-3.1.12-8.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35946" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-13.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143886" comment="squidGuard-1.4-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143887" comment="squidGuard-doc-1.4-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35947" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144543" comment="star-1.5final-28.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35948" version="1" class="patch">
	<metadata>
		<title>sudo-1.7.6p2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.7.6p2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144544" comment="sudo-1.7.6p2-0.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35949" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.71.47-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.71.47-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144545" comment="sysconfig-0.71.47-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35950" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144546" comment="syslog-ng-2.0.9-27.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35951" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144547" comment="sysstat-8.1.5-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144548" comment="sysstat-isag-8.1.5-7.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35952" version="1" class="patch">
	<metadata>
		<title>system-config-printer-1.0.8-9.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the system-config-printer-1.0.8-9.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072481" comment="system-config-printer-1.0.8-9.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072480" comment="system-config-printer-lang-1.0.8-9.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35953" version="1" class="patch">
	<metadata>
		<title>systemtap-1.5-0.7.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.5-0.7.54 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144549" comment="systemtap-1.5-0.7.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144550" comment="systemtap-server-1.5-0.7.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35954" version="1" class="patch">
	<metadata>
		<title>t1lib-5.1.1-100.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-5.1.1-100.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065858" comment="t1lib-5.1.1-100.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35955" version="1" class="patch">
	<metadata>
		<title>tar-1.26-1.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.26-1.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143897" comment="tar-1.26-1.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35956" version="1" class="patch">
	<metadata>
		<title>tftp-0.48-101.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-0.48-101.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069328" comment="tftp-0.48-101.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35957" version="1" class="patch">
	<metadata>
		<title>tgt-0.9.10-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the tgt-0.9.10-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144551" comment="tgt-0.9.10-0.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35958" version="1" class="patch">
	<metadata>
		<title>tomcat6-6.0.18-20.35.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1232" ref_url="https://www.suse.com/security/cve/CVE-2008-1232/" source="CVE"/>
		<reference ref_id="CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947/" source="CVE"/>
		<reference ref_id="CVE-2008-2370" ref_url="https://www.suse.com/security/cve/CVE-2008-2370/" source="CVE"/>
		<reference ref_id="CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938/" source="CVE"/>
		<reference ref_id="CVE-2008-5515" ref_url="https://www.suse.com/security/cve/CVE-2008-5515/" source="CVE"/>
		<reference ref_id="CVE-2009-0033" ref_url="https://www.suse.com/security/cve/CVE-2009-0033/" source="CVE"/>
		<reference ref_id="CVE-2009-0580" ref_url="https://www.suse.com/security/cve/CVE-2009-0580/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<reference ref_id="CVE-2009-0783" ref_url="https://www.suse.com/security/cve/CVE-2009-0783/" source="CVE"/>
		<reference ref_id="CVE-2009-2693" ref_url="https://www.suse.com/security/cve/CVE-2009-2693/" source="CVE"/>
		<reference ref_id="CVE-2009-2901" ref_url="https://www.suse.com/security/cve/CVE-2009-2901/" source="CVE"/>
		<reference ref_id="CVE-2009-2902" ref_url="https://www.suse.com/security/cve/CVE-2009-2902/" source="CVE"/>
		<reference ref_id="CVE-2010-1157" ref_url="https://www.suse.com/security/cve/CVE-2010-1157/" source="CVE"/>
		<reference ref_id="CVE-2010-2227" ref_url="https://www.suse.com/security/cve/CVE-2010-2227/" source="CVE"/>
		<reference ref_id="CVE-2010-3718" ref_url="https://www.suse.com/security/cve/CVE-2010-3718/" source="CVE"/>
		<reference ref_id="CVE-2010-4172" ref_url="https://www.suse.com/security/cve/CVE-2010-4172/" source="CVE"/>
		<reference ref_id="CVE-2011-0013" ref_url="https://www.suse.com/security/cve/CVE-2011-0013/" source="CVE"/>
		<reference ref_id="CVE-2011-0534" ref_url="https://www.suse.com/security/cve/CVE-2011-0534/" source="CVE"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-2204" ref_url="https://www.suse.com/security/cve/CVE-2011-2204/" source="CVE"/>
		<reference ref_id="CVE-2011-2526" ref_url="https://www.suse.com/security/cve/CVE-2011-2526/" source="CVE"/>
		<reference ref_id="CVE-2011-3190" ref_url="https://www.suse.com/security/cve/CVE-2011-3190/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat6-6.0.18-20.35.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1232/">CVE-2008-1232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2370/">CVE-2008-2370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5515/">CVE-2008-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0033/">CVE-2009-0033</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0580/">CVE-2009-0580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0783/">CVE-2009-0783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2693/">CVE-2009-2693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2901/">CVE-2009-2901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2902/">CVE-2009-2902</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1157/">CVE-2010-1157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2227/">CVE-2010-2227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3718/">CVE-2010-3718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4172/">CVE-2010-4172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0013/">CVE-2011-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0534/">CVE-2011-0534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2204/">CVE-2011-2204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2526/">CVE-2011-2526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3190/">CVE-2011-3190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072827" comment="tomcat6-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072820" comment="tomcat6-admin-webapps-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072821" comment="tomcat6-docs-webapp-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072822" comment="tomcat6-javadoc-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072823" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072824" comment="tomcat6-lib-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072825" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072826" comment="tomcat6-webapps-6.0.18-20.35.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35959" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143901" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35960" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-11.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-11.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143902" comment="unzip-6.00-11.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35961" version="1" class="patch">
	<metadata>
		<title>vte-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061711" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061709" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061710" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35962" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061666" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35963" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111746" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35964" version="1" class="patch">
	<metadata>
		<title>wireshark-1.4.10-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.4.10-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071923" comment="wireshark-1.4.10-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35965" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143905" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35966" version="1" class="patch">
	<metadata>
		<title>xen-4.1.2_14-0.5.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.1.2_14-0.5.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144552" comment="xen-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144553" comment="xen-doc-html-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144554" comment="xen-doc-pdf-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144555" comment="xen-kmp-default-4.1.2_14_3.0.13_0.27-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144556" comment="xen-kmp-pae-4.1.2_14_3.0.13_0.27-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144557" comment="xen-libs-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144558" comment="xen-libs-32bit-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144559" comment="xen-tools-4.1.2_14-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144560" comment="xen-tools-domU-4.1.2_14-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35967" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.47.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.47.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144561" comment="xorg-x11-7.4-9.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144562" comment="xorg-x11-xauth-7.4-9.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35968" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.60.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.60.5 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144563" comment="xorg-x11-Xvnc-7.4-27.60.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144564" comment="xorg-x11-server-7.4-27.60.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144565" comment="xorg-x11-server-extra-7.4-27.60.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35969" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-32bit-7.4-8.26.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-32bit-7.4-8.26.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071551" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071549" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071550" comment="xorg-x11-libs-x86-7.4-8.26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35970" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143924" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35971" version="1" class="patch">
	<metadata>
		<title>yast2-2.17.119-0.5.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-2.17.119-0.5.25 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144566" comment="yast2-2.17.119-0.5.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35972" version="1" class="patch">
	<metadata>
		<title>yast2-core-2.17.44-0.5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-2.17.44-0.5.3 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144567" comment="yast2-core-2.17.44-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35973" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562777" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35974" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143420" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35975" version="1" class="patch">
	<metadata>
		<title>Mesa-32bit-9.0.3-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-32bit-9.0.3-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143421" comment="Mesa-9.0.3-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143422" comment="Mesa-32bit-9.0.3-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143423" comment="Mesa-x86-9.0.3-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35976" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-17.0.4esr-0.10.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-17.0.4esr-0.10.42 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143424" comment="MozillaFirefox-17.0.4esr-0.10.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143425" comment="MozillaFirefox-translations-17.0.4esr-0.10.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35977" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.1_git20090811-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.1_git20090811-3.28.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143426" comment="NetworkManager-0.7.1_git20090811-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143427" comment="NetworkManager-glib-0.7.1_git20090811-3.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35978" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.1-5.22.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.1-5.22.28 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143428" comment="NetworkManager-gnome-0.7.1-5.22.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35979" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054497" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054495" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054496" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35980" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.28.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.28.46 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143429" comment="PackageKit-0.3.14-2.28.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143430" comment="PackageKit-lang-0.3.14-2.28.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143431" comment="hal-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143432" comment="hal-32bit-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143433" comment="hal-doc-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143434" comment="hal-x86-0.5.12-23.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143435" comment="libpackagekit-glib10-0.3.14-2.28.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35981" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.41.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143436" comment="PolicyKit-0.9-14.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143437" comment="PolicyKit-32bit-0.9-14.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143438" comment="PolicyKit-doc-0.9-14.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143439" comment="PolicyKit-x86-0.9-14.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35982" version="1" class="patch">
	<metadata>
		<title>aaa_base-11-6.90.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-11-6.90.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143440" comment="aaa_base-11-6.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35983" version="1" class="patch">
	<metadata>
		<title>acpid-1.0.6-91.25.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0798" ref_url="https://www.suse.com/security/cve/CVE-2009-0798/" source="CVE"/>
		<reference ref_id="CVE-2011-4578" ref_url="https://www.suse.com/security/cve/CVE-2011-4578/" source="CVE"/>
		<description>
These are all security issues fixed in the acpid-1.0.6-91.25.20 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0798/">CVE-2009-0798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4578/">CVE-2011-4578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143441" comment="acpid-1.0.6-91.25.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35984" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.7.0-18.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.7.0-18.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143442" comment="amavisd-new-2.7.0-18.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35985" version="1" class="patch">
	<metadata>
		<title>ant-1.7.1-20.9.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2098" ref_url="https://www.suse.com/security/cve/CVE-2012-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.7.1-20.9.53 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2098/">CVE-2012-2098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143443" comment="ant-1.7.1-20.9.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143444" comment="ant-trax-1.7.1-16.9.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35986" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.38.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.38.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077061" comment="apache2-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077056" comment="apache2-doc-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077057" comment="apache2-example-pages-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077058" comment="apache2-prefork-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077059" comment="apache2-utils-2.2.12-1.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077060" comment="apache2-worker-2.2.12-1.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35987" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.26-1.30.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.26-1.30.110 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076368" comment="apache2-mod_jk-1.2.26-1.30.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35988" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143445" comment="apache2-mod_perl-2.0.4-40.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35989" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php53-5.3.17-0.13.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2386" ref_url="https://www.suse.com/security/cve/CVE-2012-2386/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php53-5.3.17-0.13.7 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2386/">CVE-2012-2386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143446" comment="apache2-mod_php53-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143447" comment="php53-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143448" comment="php53-bcmath-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143449" comment="php53-bz2-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143450" comment="php53-calendar-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143451" comment="php53-ctype-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143452" comment="php53-curl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143453" comment="php53-dba-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143454" comment="php53-dom-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143455" comment="php53-exif-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143456" comment="php53-fastcgi-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143457" comment="php53-fileinfo-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143458" comment="php53-ftp-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143459" comment="php53-gd-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143460" comment="php53-gettext-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143461" comment="php53-gmp-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143462" comment="php53-iconv-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143463" comment="php53-intl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143464" comment="php53-json-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143465" comment="php53-ldap-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143466" comment="php53-mbstring-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143467" comment="php53-mcrypt-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143468" comment="php53-mysql-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143469" comment="php53-odbc-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143470" comment="php53-openssl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143471" comment="php53-pcntl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143472" comment="php53-pdo-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143473" comment="php53-pear-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143474" comment="php53-pgsql-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143475" comment="php53-pspell-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143476" comment="php53-shmop-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143477" comment="php53-snmp-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143478" comment="php53-soap-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143479" comment="php53-suhosin-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143480" comment="php53-sysvmsg-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143481" comment="php53-sysvsem-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143482" comment="php53-sysvshm-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143483" comment="php53-tokenizer-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143484" comment="php53-wddx-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143485" comment="php53-xmlreader-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143486" comment="php53-xmlrpc-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143487" comment="php53-xmlwriter-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143488" comment="php53-xsl-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143489" comment="php53-zip-5.3.17-0.13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143490" comment="php53-zlib-5.3.17-0.13.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35990" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.7.1-0.2.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.7.1-0.2.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077067" comment="apache2-mod_security2-2.7.1-0.2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35991" version="1" class="patch">
	<metadata>
		<title>ark-4.3.5-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>
These are all security issues fixed in the ark-4.3.5-0.3.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073173" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073174" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073175" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073176" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073177" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073178" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073179" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073180" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073181" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073182" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073183" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35992" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.30.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.30.4 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143491" comment="avahi-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143492" comment="avahi-lang-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143493" comment="avahi-utils-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143494" comment="libavahi-client3-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143495" comment="libavahi-client3-32bit-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143496" comment="libavahi-client3-x86-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143497" comment="libavahi-common3-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143498" comment="libavahi-common3-32bit-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143499" comment="libavahi-common3-x86-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143500" comment="libavahi-core5-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143501" comment="libdns_sd-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143502" comment="libdns_sd-32bit-0.6.23-11.30.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143503" comment="libdns_sd-x86-0.6.23-11.30.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35993" version="1" class="patch">
	<metadata>
		<title>bind-9.6ESVR7P4-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.6ESVR7P4-0.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143504" comment="bind-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143505" comment="bind-chrootenv-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143506" comment="bind-doc-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143507" comment="bind-libs-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143508" comment="bind-libs-32bit-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143509" comment="bind-libs-x86-9.6ESVR7P4-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143510" comment="bind-utils-9.6ESVR7P4-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35994" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-12.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-12.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074909" comment="boost-license-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074910" comment="libboost_program_options1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074917" comment="libboost_regex1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074911" comment="libboost_signals1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074912" comment="libboost_thread1_36_0-1.36.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35995" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111700" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111701" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111702" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111748" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111773" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35996" version="1" class="patch">
	<metadata>
		<title>cifs-utils-5.1-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2011-1678" ref_url="https://www.suse.com/security/cve/CVE-2011-1678/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-5.1-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1678/">CVE-2011-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143511" comment="cifs-utils-5.1-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35997" version="1" class="patch">
	<metadata>
		<title>clamav-0.97.7-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.97.7-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112218" comment="clamav-0.97.7-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35998" version="1" class="patch">
	<metadata>
		<title>compat-libldap-2_3-0-2.3.37-2.24.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the compat-libldap-2_3-0-2.3.37-2.24.36 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143512" comment="compat-libldap-2_3-0-2.3.37-2.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143513" comment="libldap-2_4-2-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143514" comment="libldap-2_4-2-32bit-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143515" comment="libldap-2_4-2-x86-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143516" comment="openldap2-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143517" comment="openldap2-back-meta-2.4.26-0.24.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143518" comment="openldap2-client-2.4.26-0.24.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35999" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143519" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36000" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.207.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.207.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143520" comment="cron-4.1-194.207.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36001" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.46.46.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.46.46.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143521" comment="cups-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143522" comment="cups-client-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143523" comment="cups-libs-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143524" comment="cups-libs-32bit-1.3.9-8.46.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143525" comment="cups-libs-x86-1.3.9-8.46.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36002" version="1" class="patch">
	<metadata>
		<title>curl-7.19.7-1.26.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.7-1.26.8 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143526" comment="curl-7.19.7-1.26.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143527" comment="libcurl4-7.19.7-1.26.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143528" comment="libcurl4-32bit-7.19.7-1.26.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143529" comment="libcurl4-x86-7.19.7-1.26.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36003" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-144.23.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-144.23.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073075" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073074" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36004" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071558" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071559" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071560" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36005" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143530" comment="dbus-1-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143531" comment="dbus-1-32bit-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143532" comment="dbus-1-x11-1.2.10-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143533" comment="dbus-1-x86-1.2.10-3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36006" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143534" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143535" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143536" comment="dbus-1-glib-x86-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36007" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.4.P2-0.16.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.4.P2-0.16.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143537" comment="dhcp-4.2.4.P2-0.16.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143538" comment="dhcp-client-4.2.4.P2-0.16.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143539" comment="dhcp-relay-4.2.4.P2-0.16.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143540" comment="dhcp-server-4.2.4.P2-0.16.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36008" version="1" class="patch">
	<metadata>
		<title>dhcpcd-3.2.3-44.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcpcd-3.2.3-44.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074692" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067078" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36009" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143541" comment="e2fsprogs-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143542" comment="libcom_err2-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143543" comment="libcom_err2-32bit-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143544" comment="libcom_err2-x86-1.41.9-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143545" comment="libext2fs2-1.41.9-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36010" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-32bit-61-1.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-3145" ref_url="https://www.suse.com/security/cve/CVE-2011-3145/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-32bit-61-1.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3145/">CVE-2011-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074331" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074329" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074330" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36011" version="1" class="patch">
	<metadata>
		<title>ed-0.2-1001.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>
These are all security issues fixed in the ed-0.2-1001.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065506" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36012" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143546" comment="emacs-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143547" comment="emacs-el-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143548" comment="emacs-info-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143549" comment="emacs-nox-22.3-4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143550" comment="emacs-x11-22.3-4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36013" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143551" comment="enscript-1.6.4-152.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36014" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111794" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111795" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111796" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36015" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.29.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.29.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075137" comment="evolution-data-server-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075135" comment="evolution-data-server-32bit-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075136" comment="evolution-data-server-lang-2.28.2-0.29.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075143" comment="evolution-data-server-x86-2.28.2-0.29.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36016" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074688" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074691" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074689" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074690" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36017" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.20.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.20.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070961" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070962" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36018" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143552" comment="file-4.24-43.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143553" comment="file-32bit-4.24-43.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143554" comment="file-x86-4.24-43.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36019" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143555" comment="findutils-4.4.0-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143556" comment="findutils-locate-4.4.0-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36020" version="1" class="patch">
	<metadata>
		<title>foomatic-filters-3.0.2-269.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the foomatic-filters-3.0.2-269.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069764" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36021" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112262" comment="freeradius-server-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112263" comment="freeradius-server-dialupadmin-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112264" comment="freeradius-server-doc-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112265" comment="freeradius-server-libs-2.1.1-7.16.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112266" comment="freeradius-server-utils-2.1.1-7.16.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36022" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076460" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076458" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076471" comment="freetype2-x86-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076461" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36023" version="1" class="patch">
	<metadata>
		<title>fuse-2.8.7-0.9.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.8.7-0.9.12 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143557" comment="fuse-2.8.7-0.9.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143558" comment="libfuse2-2.8.7-0.9.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36024" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143559" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36025" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143560" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143561" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36026" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.18 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143562" comment="gd-2.0.36.RC1-52.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36027" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2009-3743" ref_url="https://www.suse.com/security/cve/CVE-2009-3743/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-4054" ref_url="https://www.suse.com/security/cve/CVE-2010-4054/" source="CVE"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3743/">CVE-2009-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4054/">CVE-2010-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075764" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075765" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075766" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075767" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075768" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075769" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075770" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36028" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.8.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.8.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143563" comment="glib2-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143564" comment="glib2-doc-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143565" comment="glib2-lang-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143566" comment="libgio-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143567" comment="libgio-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143568" comment="libgio-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143569" comment="libglib-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143570" comment="libglib-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143571" comment="libglib-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143572" comment="libgmodule-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143573" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143574" comment="libgmodule-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143575" comment="libgobject-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143576" comment="libgobject-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143577" comment="libgobject-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143578" comment="libgthread-2_0-0-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143579" comment="libgthread-2_0-0-32bit-2.22.5-0.8.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143580" comment="libgthread-2_0-0-x86-2.22.5-0.8.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36029" version="1" class="patch">
	<metadata>
		<title>glibc-2.11.3-17.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.11.3-17.54.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143581" comment="glibc-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143582" comment="glibc-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143583" comment="glibc-devel-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143584" comment="glibc-devel-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143585" comment="glibc-html-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143586" comment="glibc-i18ndata-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143587" comment="glibc-info-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143588" comment="glibc-locale-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143589" comment="glibc-locale-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143590" comment="glibc-locale-x86-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143591" comment="glibc-profile-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143592" comment="glibc-profile-32bit-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143593" comment="glibc-profile-x86-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143594" comment="glibc-x86-2.11.3-17.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143595" comment="nscd-2.11.3-17.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36030" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143596" comment="gmime-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143597" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143598" comment="gmime-doc-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143599" comment="libgmime-2_0-3-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143600" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36031" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143601" comment="gnome-screensaver-2.28.3-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143602" comment="gnome-screensaver-lang-2.28.3-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36032" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.39.45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.39.45.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077121" comment="gnutls-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077132" comment="libgnutls-extra26-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077123" comment="libgnutls26-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077122" comment="libgnutls26-32bit-2.4.1-24.39.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077133" comment="libgnutls26-x86-2.4.1-24.39.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36033" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.33.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.33.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143603" comment="gpg2-2.0.9-25.33.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143604" comment="gpg2-lang-2.0.9-25.33.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36034" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143605" comment="gstreamer-0_10-plugins-base-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143606" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143607" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143608" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143609" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143610" comment="libgstapp-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143611" comment="libgstapp-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143612" comment="libgstapp-0_10-0-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143613" comment="libgstinterfaces-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143614" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143615" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36035" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.30-5.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.30-5.8.11 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143616" comment="gstreamer-0_10-plugins-good-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143617" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143618" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36036" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074875" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074872" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074886" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074874" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074887" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36037" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.20.4-0.14.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.20.4-0.14.9 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143619" comment="guestfs-data-1.20.4-0.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143620" comment="guestfs-tools-1.20.4-0.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143621" comment="guestfsd-1.20.4-0.14.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143622" comment="libguestfs0-1.20.4-0.14.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36038" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.15.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143623" comment="gvim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143624" comment="vim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143625" comment="vim-base-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143626" comment="vim-data-7.2-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36039" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143627" comment="gzip-1.3.12-69.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36040" version="1" class="patch">
	<metadata>
		<title>hplip-3.11.10-0.6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.11.10-0.6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071605" comment="hplip-3.11.10-0.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071604" comment="hplip-hpijs-3.11.10-0.6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36041" version="1" class="patch">
	<metadata>
		<title>hyper-v-5-0.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-5-0.7.10 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143628" comment="hyper-v-5-0.7.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36042" version="1" class="patch">
	<metadata>
		<title>ibutils-1.5.7-0.7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3277" ref_url="https://www.suse.com/security/cve/CVE-2008-3277/" source="CVE"/>
		<description>
These are all security issues fixed in the ibutils-1.5.7-0.7.31 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3277/">CVE-2008-3277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143629" comment="ibutils-1.5.7-0.7.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143630" comment="ibutils-32bit-1.5.7-0.7.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36043" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.1.93 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.1.93 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143631" comment="ipsec-tools-0.7.3-1.1.93 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36044" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-httpclient3-3.0.1-253.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-httpclient3-3.0.1-253.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076985" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36045" version="1" class="patch">
	<metadata>
		<title>java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1187" ref_url="https://www.suse.com/security/cve/CVE-2008-1187/" source="CVE"/>
		<reference ref_id="CVE-2008-1188" ref_url="https://www.suse.com/security/cve/CVE-2008-1188/" source="CVE"/>
		<reference ref_id="CVE-2008-1189" ref_url="https://www.suse.com/security/cve/CVE-2008-1189/" source="CVE"/>
		<reference ref_id="CVE-2008-1190" ref_url="https://www.suse.com/security/cve/CVE-2008-1190/" source="CVE"/>
		<reference ref_id="CVE-2008-1191" ref_url="https://www.suse.com/security/cve/CVE-2008-1191/" source="CVE"/>
		<reference ref_id="CVE-2008-1192" ref_url="https://www.suse.com/security/cve/CVE-2008-1192/" source="CVE"/>
		<reference ref_id="CVE-2008-1193" ref_url="https://www.suse.com/security/cve/CVE-2008-1193/" source="CVE"/>
		<reference ref_id="CVE-2008-1194" ref_url="https://www.suse.com/security/cve/CVE-2008-1194/" source="CVE"/>
		<reference ref_id="CVE-2008-1195" ref_url="https://www.suse.com/security/cve/CVE-2008-1195/" source="CVE"/>
		<reference ref_id="CVE-2008-1196" ref_url="https://www.suse.com/security/cve/CVE-2008-1196/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0771" ref_url="https://www.suse.com/security/cve/CVE-2010-0771/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-3541" ref_url="https://www.suse.com/security/cve/CVE-2010-3541/" source="CVE"/>
		<reference ref_id="CVE-2010-3548" ref_url="https://www.suse.com/security/cve/CVE-2010-3548/" source="CVE"/>
		<reference ref_id="CVE-2010-3549" ref_url="https://www.suse.com/security/cve/CVE-2010-3549/" source="CVE"/>
		<reference ref_id="CVE-2010-3550" ref_url="https://www.suse.com/security/cve/CVE-2010-3550/" source="CVE"/>
		<reference ref_id="CVE-2010-3551" ref_url="https://www.suse.com/security/cve/CVE-2010-3551/" source="CVE"/>
		<reference ref_id="CVE-2010-3553" ref_url="https://www.suse.com/security/cve/CVE-2010-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-3555" ref_url="https://www.suse.com/security/cve/CVE-2010-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-3556" ref_url="https://www.suse.com/security/cve/CVE-2010-3556/" source="CVE"/>
		<reference ref_id="CVE-2010-3557" ref_url="https://www.suse.com/security/cve/CVE-2010-3557/" source="CVE"/>
		<reference ref_id="CVE-2010-3558" ref_url="https://www.suse.com/security/cve/CVE-2010-3558/" source="CVE"/>
		<reference ref_id="CVE-2010-3559" ref_url="https://www.suse.com/security/cve/CVE-2010-3559/" source="CVE"/>
		<reference ref_id="CVE-2010-3560" ref_url="https://www.suse.com/security/cve/CVE-2010-3560/" source="CVE"/>
		<reference ref_id="CVE-2010-3562" ref_url="https://www.suse.com/security/cve/CVE-2010-3562/" source="CVE"/>
		<reference ref_id="CVE-2010-3563" ref_url="https://www.suse.com/security/cve/CVE-2010-3563/" source="CVE"/>
		<reference ref_id="CVE-2010-3565" ref_url="https://www.suse.com/security/cve/CVE-2010-3565/" source="CVE"/>
		<reference ref_id="CVE-2010-3566" ref_url="https://www.suse.com/security/cve/CVE-2010-3566/" source="CVE"/>
		<reference ref_id="CVE-2010-3567" ref_url="https://www.suse.com/security/cve/CVE-2010-3567/" source="CVE"/>
		<reference ref_id="CVE-2010-3568" ref_url="https://www.suse.com/security/cve/CVE-2010-3568/" source="CVE"/>
		<reference ref_id="CVE-2010-3569" ref_url="https://www.suse.com/security/cve/CVE-2010-3569/" source="CVE"/>
		<reference ref_id="CVE-2010-3571" ref_url="https://www.suse.com/security/cve/CVE-2010-3571/" source="CVE"/>
		<reference ref_id="CVE-2010-3572" ref_url="https://www.suse.com/security/cve/CVE-2010-3572/" source="CVE"/>
		<reference ref_id="CVE-2010-3573" ref_url="https://www.suse.com/security/cve/CVE-2010-3573/" source="CVE"/>
		<reference ref_id="CVE-2010-3574" ref_url="https://www.suse.com/security/cve/CVE-2010-3574/" source="CVE"/>
		<reference ref_id="CVE-2010-4476" ref_url="https://www.suse.com/security/cve/CVE-2010-4476/" source="CVE"/>
		<reference ref_id="CVE-2012-0551" ref_url="https://www.suse.com/security/cve/CVE-2012-0551/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1721" ref_url="https://www.suse.com/security/cve/CVE-2012-1721/" source="CVE"/>
		<reference ref_id="CVE-2012-1722" ref_url="https://www.suse.com/security/cve/CVE-2012-1722/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1481" ref_url="https://www.suse.com/security/cve/CVE-2013-1481/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1187/">CVE-2008-1187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1188/">CVE-2008-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1189/">CVE-2008-1189</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1190/">CVE-2008-1190</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1191/">CVE-2008-1191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1192/">CVE-2008-1192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1193/">CVE-2008-1193</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1194/">CVE-2008-1194</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1195/">CVE-2008-1195</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1196/">CVE-2008-1196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0771/">CVE-2010-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3541/">CVE-2010-3541</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3548/">CVE-2010-3548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3549/">CVE-2010-3549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3550/">CVE-2010-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3551/">CVE-2010-3551</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3553/">CVE-2010-3553</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3555/">CVE-2010-3555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3556/">CVE-2010-3556</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3557/">CVE-2010-3557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3558/">CVE-2010-3558</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3559/">CVE-2010-3559</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3560/">CVE-2010-3560</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3562/">CVE-2010-3562</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3563/">CVE-2010-3563</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3565/">CVE-2010-3565</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3566/">CVE-2010-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3567/">CVE-2010-3567</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3568/">CVE-2010-3568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3569/">CVE-2010-3569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3571/">CVE-2010-3571</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3572/">CVE-2010-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3573/">CVE-2010-3573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3574/">CVE-2010-3574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4476/">CVE-2010-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0551/">CVE-2012-0551</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1721/">CVE-2012-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1722/">CVE-2012-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1481/">CVE-2013-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077099" comment="java-1_6_0-ibm-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077095" comment="java-1_6_0-ibm-alsa-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077096" comment="java-1_6_0-ibm-fonts-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077097" comment="java-1_6_0-ibm-jdbc-1.6.0_sr13.1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077098" comment="java-1_6_0-ibm-plugin-1.6.0_sr13.1-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36046" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-ibm-1.7.0_sr4.1-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-0551" ref_url="https://www.suse.com/security/cve/CVE-2012-0551/" source="CVE"/>
		<reference ref_id="CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531/" source="CVE"/>
		<reference ref_id="CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532/" source="CVE"/>
		<reference ref_id="CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533/" source="CVE"/>
		<reference ref_id="CVE-2012-1541" ref_url="https://www.suse.com/security/cve/CVE-2012-1541/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1721" ref_url="https://www.suse.com/security/cve/CVE-2012-1721/" source="CVE"/>
		<reference ref_id="CVE-2012-1722" ref_url="https://www.suse.com/security/cve/CVE-2012-1722/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143/" source="CVE"/>
		<reference ref_id="CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3213" ref_url="https://www.suse.com/security/cve/CVE-2012-3213/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-3342" ref_url="https://www.suse.com/security/cve/CVE-2012-3342/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5067" ref_url="https://www.suse.com/security/cve/CVE-2012-5067/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0351" ref_url="https://www.suse.com/security/cve/CVE-2013-0351/" source="CVE"/>
		<reference ref_id="CVE-2013-0409" ref_url="https://www.suse.com/security/cve/CVE-2013-0409/" source="CVE"/>
		<reference ref_id="CVE-2013-0419" ref_url="https://www.suse.com/security/cve/CVE-2013-0419/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0423" ref_url="https://www.suse.com/security/cve/CVE-2013-0423/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0437" ref_url="https://www.suse.com/security/cve/CVE-2013-0437/" source="CVE"/>
		<reference ref_id="CVE-2013-0438" ref_url="https://www.suse.com/security/cve/CVE-2013-0438/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0445" ref_url="https://www.suse.com/security/cve/CVE-2013-0445/" source="CVE"/>
		<reference ref_id="CVE-2013-0446" ref_url="https://www.suse.com/security/cve/CVE-2013-0446/" source="CVE"/>
		<reference ref_id="CVE-2013-0449" ref_url="https://www.suse.com/security/cve/CVE-2013-0449/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0485" ref_url="https://www.suse.com/security/cve/CVE-2013-0485/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1473" ref_url="https://www.suse.com/security/cve/CVE-2013-1473/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1487" ref_url="https://www.suse.com/security/cve/CVE-2013-1487/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-ibm-1.7.0_sr4.1-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0551/">CVE-2012-0551</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1541/">CVE-2012-1541</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1721/">CVE-2012-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1722/">CVE-2012-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3213/">CVE-2012-3213</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3342/">CVE-2012-3342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5067/">CVE-2012-5067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0351/">CVE-2013-0351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0409/">CVE-2013-0409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0419/">CVE-2013-0419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0423/">CVE-2013-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0437/">CVE-2013-0437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0438/">CVE-2013-0438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0445/">CVE-2013-0445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0446/">CVE-2013-0446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0449/">CVE-2013-0449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0485/">CVE-2013-0485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1473/">CVE-2013-1473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1487/">CVE-2013-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112815" comment="java-1_7_0-ibm-1.7.0_sr4.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112826" comment="java-1_7_0-ibm-alsa-1.7.0_sr4.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112816" comment="java-1_7_0-ibm-jdbc-1.7.0_sr4.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112827" comment="java-1_7_0-ibm-plugin-1.7.0_sr4.1-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36047" version="1" class="patch">
	<metadata>
		<title>jpeg-6b-879.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the jpeg-6b-879.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075206" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075208" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075207" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075212" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36048" version="1" class="patch">
	<metadata>
		<title>kbd-1.14.1-16.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.14.1-16.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143632" comment="kbd-1.14.1-16.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36049" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.12.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.12.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143633" comment="kde4-kgreeter-plugins-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143634" comment="kdebase4-wallpapers-4.3.5-0.8.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143635" comment="kdebase4-workspace-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143636" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143637" comment="kdm-4.3.5-0.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143638" comment="kwin-4.3.5-0.12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36050" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143639" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143640" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143641" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36051" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056569" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056564" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056567" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056565" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056566" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056568" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36052" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143642" comment="kdelibs4-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143643" comment="kdelibs4-core-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143644" comment="kdelibs4-doc-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143645" comment="libkde4-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143646" comment="libkde4-32bit-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143647" comment="libkde4-x86-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143648" comment="libkdecore4-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143649" comment="libkdecore4-32bit-4.3.5-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143650" comment="libkdecore4-x86-4.3.5-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36053" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065196" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065197" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065198" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065199" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065200" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36054" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.0.76-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146/" source="CVE"/>
		<reference ref_id="CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2663" ref_url="https://www.suse.com/security/cve/CVE-2012-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461/" source="CVE"/>
		<reference ref_id="CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848/" source="CVE"/>
		<reference ref_id="CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.0.76-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2663/">CVE-2012-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143651" comment="kernel-default-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143652" comment="kernel-default-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143653" comment="kernel-default-devel-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143654" comment="kernel-default-man-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143655" comment="kernel-pae-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143656" comment="kernel-pae-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143657" comment="kernel-pae-devel-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143658" comment="kernel-ppc64-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143659" comment="kernel-ppc64-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143660" comment="kernel-ppc64-devel-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143661" comment="kernel-source-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143662" comment="kernel-syms-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143663" comment="kernel-trace-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143664" comment="kernel-trace-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143665" comment="kernel-trace-devel-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143666" comment="kernel-xen-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143667" comment="kernel-xen-base-3.0.76-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143668" comment="kernel-xen-devel-3.0.76-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36055" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.49.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.49.54.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112587" comment="krb5-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112588" comment="krb5-32bit-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112589" comment="krb5-apps-clients-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112590" comment="krb5-apps-servers-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112591" comment="krb5-client-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112595" comment="krb5-server-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112812" comment="krb5-x86-1.6.3-133.49.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36056" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.21 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112592" comment="krb5-doc-1.6.3-133.49.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36057" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.49.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.49.54.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112593" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112594" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36058" version="1" class="patch">
	<metadata>
		<title>kvm-1.4.1-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<reference ref_id="CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-1.4.1-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143669" comment="kvm-1.4.1-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36059" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.14.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.14.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143670" comment="lcms-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143671" comment="liblcms1-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143672" comment="liblcms1-32bit-1.17-77.14.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143673" comment="liblcms1-x86-1.17-77.14.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36060" version="1" class="patch">
	<metadata>
		<title>ldapsmb-1.34b-12.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<description>
These are all security issues fixed in the ldapsmb-1.34b-12.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143674" comment="ldapsmb-1.34b-12.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143675" comment="libldb1-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143676" comment="libsmbclient0-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143677" comment="libsmbclient0-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143678" comment="libsmbclient0-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143679" comment="libtalloc2-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143680" comment="libtalloc2-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143681" comment="libtalloc2-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143682" comment="libtdb1-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143683" comment="libtdb1-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143684" comment="libtdb1-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143685" comment="libtevent0-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143686" comment="libwbclient0-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143687" comment="libwbclient0-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143688" comment="libwbclient0-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143689" comment="samba-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143690" comment="samba-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143691" comment="samba-client-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143692" comment="samba-client-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143693" comment="samba-client-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143694" comment="samba-krb-printing-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143695" comment="samba-winbind-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143696" comment="samba-winbind-32bit-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143697" comment="samba-winbind-x86-3.6.3-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143698" comment="samba-x86-3.6.3-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36061" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<reference ref_id="CVE-2012-3437" ref_url="https://www.suse.com/security/cve/CVE-2012-3437/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3437/">CVE-2012-3437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077182" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077181" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36062" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.3-5.25.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.3-5.25.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143699" comment="libQtWebKit4-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143700" comment="libQtWebKit4-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143701" comment="libQtWebKit4-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143702" comment="libqt4-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143703" comment="libqt4-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143704" comment="libqt4-qt3support-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143705" comment="libqt4-qt3support-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143706" comment="libqt4-qt3support-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143707" comment="libqt4-sql-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143708" comment="libqt4-sql-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143709" comment="libqt4-sql-mysql-4.6.3-5.25.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143710" comment="libqt4-sql-sqlite-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143711" comment="libqt4-sql-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143712" comment="libqt4-x11-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143713" comment="libqt4-x11-32bit-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143714" comment="libqt4-x11-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143715" comment="libqt4-x86-4.6.3-5.25.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143716" comment="qt4-x11-tools-4.6.3-5.25.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36063" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143717" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36064" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069401" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069399" comment="libapr-util1-32bit-1.3.4-12.22.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36065" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072983" comment="libapr1-1.3.3-11.18.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072982" comment="libapr1-32bit-1.3.3-11.18.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36066" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143718" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36067" version="1" class="patch">
	<metadata>
		<title>libcap-progs-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-progs-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111803" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111804" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111826" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111818" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36068" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.37.1-5.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.37.1-5.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143719" comment="libcgroup1-0.37.1-5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36069" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.41-0.8.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.41-0.8.46 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143720" comment="libdrm-2.4.41-0.8.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143721" comment="libdrm-32bit-2.4.41-0.8.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143722" comment="libdrm-x86-2.4.41-0.8.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36070" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.1.9-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.1.9-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076988" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076990" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076989" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076991" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076993" comment="postgresql91-contrib-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076994" comment="postgresql91-docs-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076995" comment="postgresql91-server-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36071" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075040" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075039" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075063" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36072" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143723" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36073" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.14.3-0.11.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.14.3-0.11.11 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143724" comment="libfreebl3-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143725" comment="libfreebl3-32bit-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143726" comment="libfreebl3-x86-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143727" comment="libsoftokn3-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143728" comment="libsoftokn3-32bit-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143729" comment="libsoftokn3-x86-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143730" comment="mozilla-nss-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143731" comment="mozilla-nss-32bit-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143732" comment="mozilla-nss-tools-3.14.3-0.11.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143733" comment="mozilla-nss-x86-3.14.3-0.11.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36074" version="1" class="patch">
	<metadata>
		<title>libgdiplus0-2.6.7-0.5.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgdiplus0-2.6.7-0.5.76 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143734" comment="libgdiplus0-2.6.7-0.5.76 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36075" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069283" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069281" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069282" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36076" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.9.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.9.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143735" comment="libgtop-2.28.0-1.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143736" comment="libgtop-2_0-7-2.28.0-1.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143737" comment="libgtop-doc-2.28.0-1.9.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143738" comment="libgtop-lang-2.28.0-1.9.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36077" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.26.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.26.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076347" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076348" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076349" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076350" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36078" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057091" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057089" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057090" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057094" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057092" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057093" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36079" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143739" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36080" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.96-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.96-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076518" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076517" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076523" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076520" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143740" comment="mysql-5.5.31-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143741" comment="mysql-client-5.5.31-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143742" comment="mysql-tools-5.5.31-0.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36081" version="1" class="patch">
	<metadata>
		<title>libneon27-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143743" comment="libneon27-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143744" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143745" comment="libneon27-x86-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36082" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058587" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058585" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058586" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058588" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36083" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.113 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143746" comment="libnewt0_52-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143747" comment="newt-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143748" comment="python-newt-0.52.10-1.35.113 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36084" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065553" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065551" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065552" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065556" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065554" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065555" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36085" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-0.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-0.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076924" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076923" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076935" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076933" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076936" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076925" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076937" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36086" version="1" class="patch">
	<metadata>
		<title>libotr2-3.2.0-10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr2-3.2.0-10.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076091" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36087" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075195" comment="libpng12-0-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075194" comment="libpng12-0-32bit-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075199" comment="libpng12-0-x86-1.2.31-5.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36088" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076958" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076959" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076960" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076961" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36089" version="1" class="patch">
	<metadata>
		<title>libproxy0-0.3.1-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy0-0.3.1-2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076276" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076270" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076272" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076273" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076275" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076277" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36090" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.23-0.7.128 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.23-0.7.128 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143749" comment="libpulse-browse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143750" comment="libpulse-mainloop-glib0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143751" comment="libpulse0-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143752" comment="libpulse0-32bit-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143753" comment="libpulse0-x86-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143754" comment="pulseaudio-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143755" comment="pulseaudio-esound-compat-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143756" comment="pulseaudio-gdm-hooks-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143757" comment="pulseaudio-lang-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143758" comment="pulseaudio-module-x11-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143759" comment="pulseaudio-module-zeroconf-0.9.23-0.7.128 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143760" comment="pulseaudio-utils-0.9.23-0.7.128 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36091" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.8-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.8-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143761" comment="libpython2_6-1_0-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143762" comment="libpython2_6-1_0-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143763" comment="libpython2_6-1_0-x86-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143764" comment="python-base-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143765" comment="python-base-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143766" comment="python-base-x86-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143767" comment="python-xml-2.6.8-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36092" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143768" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143769" comment="libtirpc1-0.2.1-1.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36093" version="1" class="patch">
	<metadata>
		<title>librsvg-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070704" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070702" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070703" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070705" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36094" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143770" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143771" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143772" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36095" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069633" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069631" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069632" comment="libsndfile-x86-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36096" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143773" comment="libsnmp15-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143774" comment="libsnmp15-32bit-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143775" comment="libsnmp15-x86-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143776" comment="net-snmp-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143777" comment="perl-SNMP-5.4.2.1-8.12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143778" comment="snmp-mibs-5.4.2.1-8.12.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36097" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.32.2-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<reference ref_id="CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.32.2-4.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143779" comment="libsoup-2_4-1-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143780" comment="libsoup-2_4-1-32bit-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143781" comment="libsoup-2_4-1-x86-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36098" version="1" class="patch">
	<metadata>
		<title>libsss_idmap0-1.9.4-0.12.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libsss_idmap0-1.9.4-0.12.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143782" comment="libsss_idmap0-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143783" comment="python-sssd-config-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143784" comment="sssd-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143785" comment="sssd-32bit-1.9.4-0.12.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143786" comment="sssd-tools-1.9.4-0.12.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36099" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.152.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2088" ref_url="https://www.suse.com/security/cve/CVE-2012-2088/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.152.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2088/">CVE-2012-2088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077218" comment="libtiff3-3.8.2-141.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077217" comment="libtiff3-32bit-3.8.2-141.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077223" comment="libtiff3-x86-3.8.2-141.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077224" comment="tiff-3.8.2-141.152.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36100" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.10-0.9.50 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.10-0.9.50 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143787" comment="libtspi1-0.3.10-0.9.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143788" comment="libtspi1-32bit-0.3.10-0.9.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143789" comment="libtspi1-x86-0.3.10-0.9.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143790" comment="trousers-0.3.10-0.9.50 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36101" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.6.2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.6.2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075498" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075500" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075499" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111805" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36102" version="1" class="patch">
	<metadata>
		<title>libvirt-1.0.5.1-0.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2012-4423" ref_url="https://www.suse.com/security/cve/CVE-2012-4423/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-1.0.5.1-0.7.10 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4423/">CVE-2012-4423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143791" comment="libvirt-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143792" comment="libvirt-client-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143793" comment="libvirt-client-32bit-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143794" comment="libvirt-doc-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143795" comment="libvirt-lock-sanlock-1.0.5.1-0.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143796" comment="libvirt-python-1.0.5.1-0.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36103" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073153" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073150" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073151" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073152" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36104" version="1" class="patch">
	<metadata>
		<title>libxcrypt-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070132" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070130" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070131" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143797" comment="pam-modules-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143798" comment="pam-modules-32bit-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143799" comment="pam-modules-x86-11-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143800" comment="pwdutils-3.2.15-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143801" comment="pwdutils-plugin-audit-3.2.15-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36105" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2012-0841" ref_url="https://www.suse.com/security/cve/CVE-2012-0841/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0841/">CVE-2012-0841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077146" comment="libxml2-2.7.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077144" comment="libxml2-32bit-2.7.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077151" comment="libxml2-doc-2.7.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077152" comment="libxml2-x86-2.7.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36106" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077120" comment="libxslt-1.1.24-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077119" comment="libxslt-32bit-1.1.24-19.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077131" comment="libxslt-x86-1.1.24-19.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36107" version="1" class="patch">
	<metadata>
		<title>libzip1-0.9-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip1-0.9-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068337" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36108" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143802" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36109" version="1" class="patch">
	<metadata>
		<title>logrotate-3.7.7-10.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.7.7-10.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073168" comment="logrotate-3.7.7-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36110" version="1" class="patch">
	<metadata>
		<title>logwatch-7.3.6-65.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.3.6-65.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143803" comment="logwatch-7.3.6-65.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36111" version="1" class="patch">
	<metadata>
		<title>lvm2-2.02.98-0.25.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>
These are all security issues fixed in the lvm2-2.02.98-0.25.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143804" comment="lvm2-2.02.98-0.25.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36112" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.14-9.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.14-9.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143805" comment="mailman-2.1.14-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36113" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143806" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36114" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-8.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143807" comment="mipv6d-2.0.2.umip.0.4-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36115" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.7.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.7.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143808" comment="mono-core-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143809" comment="mono-data-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143810" comment="mono-data-postgresql-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143811" comment="mono-data-sqlite-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143812" comment="mono-locale-extras-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143813" comment="mono-nunit-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143814" comment="mono-web-2.6.7-0.7.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143815" comment="mono-winforms-2.6.7-0.7.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36116" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075117" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075123" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075120" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075121" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075127" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075128" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075130" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075131" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36117" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-1.9.2.27-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3666" ref_url="https://www.suse.com/security/cve/CVE-2011-3666/" source="CVE"/>
		<reference ref_id="CVE-2011-3670" ref_url="https://www.suse.com/security/cve/CVE-2011-3670/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-1.9.2.27-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3666/">CVE-2011-3666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3670/">CVE-2011-3670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073033" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073029" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073030" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073031" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073032" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36118" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111745" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36119" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076709" comment="nagios-3.0.6-1.25.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076708" comment="nagios-www-3.0.6-1.25.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36120" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.16-0.11.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.16-0.11.35 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143816" comment="nagios-plugins-1.4.16-0.11.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143817" comment="nagios-plugins-extras-1.4.16-0.11.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36121" version="1" class="patch">
	<metadata>
		<title>nfs-client-1.2.3-18.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-1.2.3-18.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077277" comment="nfs-client-1.2.3-18.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36122" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.4p8-1.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.4p8-1.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143818" comment="ntp-4.2.4p8-1.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143819" comment="ntp-doc-4.2.4p8-1.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36123" version="1" class="patch">
	<metadata>
		<title>ofed-1.5.4.1-0.11.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-1.5.4.1-0.11.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143820" comment="ofed-1.5.4.1-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143821" comment="ofed-doc-1.5.4.1-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143822" comment="ofed-kmp-default-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143823" comment="ofed-kmp-pae-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143824" comment="ofed-kmp-ppc64-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143825" comment="ofed-kmp-trace-1.5.4.1_3.0.76_0.11-0.11.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36124" version="1" class="patch">
	<metadata>
		<title>openCryptoki-2.4.2-0.9.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-4454" ref_url="https://www.suse.com/security/cve/CVE-2012-4454/" source="CVE"/>
		<reference ref_id="CVE-2012-4455" ref_url="https://www.suse.com/security/cve/CVE-2012-4455/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-2.4.2-0.9.12 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4454/">CVE-2012-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4455/">CVE-2012-4455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143826" comment="openCryptoki-2.4.2-0.9.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143827" comment="openCryptoki-32bit-2.4.2-0.9.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143828" comment="openCryptoki-64bit-2.4.2-0.9.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36125" version="1" class="patch">
	<metadata>
		<title>openslp-1.2.0-172.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-1.2.0-172.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143829" comment="openslp-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143830" comment="openslp-32bit-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143831" comment="openslp-server-1.2.0-172.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143832" comment="openslp-x86-1.2.0-172.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36126" version="1" class="patch">
	<metadata>
		<title>openssh-6.2p2-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-6.2p2-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143833" comment="openssh-6.2p2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143834" comment="openssh-askpass-6.2p2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36127" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.38.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.38.22 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143835" comment="openvpn-2.0.9-143.38.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143836" comment="openvpn-auth-pam-plugin-2.0.9-143.38.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36128" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069566" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069564" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069565" comment="opie-x86-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36129" version="1" class="patch">
	<metadata>
		<title>pam-1.1.5-0.10.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.5-0.10.17 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143837" comment="pam-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143838" comment="pam-32bit-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143839" comment="pam-doc-1.1.5-0.10.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143840" comment="pam-x86-1.1.5-0.10.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36130" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143841" comment="pam_krb5-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143842" comment="pam_krb5-32bit-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143843" comment="pam_krb5-x86-2.3.1-47.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36131" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143844" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143845" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143846" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36132" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143847" comment="pam_mount-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143848" comment="pam_mount-32bit-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143849" comment="pam_mount-x86-0.47-13.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36133" version="1" class="patch">
	<metadata>
		<title>pango-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066424" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066421" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066422" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066423" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36134" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.3.8-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.3.8-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065684" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36135" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065687" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065685" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065686" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36136" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.67.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<reference ref_id="CVE-2011-2728" ref_url="https://www.suse.com/security/cve/CVE-2011-2728/" source="CVE"/>
		<reference ref_id="CVE-2012-5526" ref_url="https://www.suse.com/security/cve/CVE-2012-5526/" source="CVE"/>
		<reference ref_id="CVE-2012-6329" ref_url="https://www.suse.com/security/cve/CVE-2012-6329/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.67.52 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2728/">CVE-2011-2728</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5526/">CVE-2012-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6329/">CVE-2012-6329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143850" comment="perl-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143851" comment="perl-32bit-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143852" comment="perl-Module-Build-0.2808.01-0.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143853" comment="perl-Test-Simple-0.72-0.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143854" comment="perl-base-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143855" comment="perl-doc-5.10.0-64.67.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143856" comment="perl-x86-5.10.0-64.67.52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36137" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056793" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36138" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143857" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36139" version="1" class="patch">
	<metadata>
		<title>perl-libwww-perl-5.816-2.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-libwww-perl-5.816-2.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143858" comment="perl-libwww-perl-5.816-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36140" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.3.1-10.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.3.1-10.8.3 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143859" comment="perl-spamassassin-3.3.1-10.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143860" comment="spamassassin-3.3.1-10.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36141" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.23-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.23-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076900" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076905" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076906" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076907" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36142" version="1" class="patch">
	<metadata>
		<title>puppet-2.6.18-0.4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<reference ref_id="CVE-2011-1986" ref_url="https://www.suse.com/security/cve/CVE-2011-1986/" source="CVE"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-1987" ref_url="https://www.suse.com/security/cve/CVE-2012-1987/" source="CVE"/>
		<reference ref_id="CVE-2012-1988" ref_url="https://www.suse.com/security/cve/CVE-2012-1988/" source="CVE"/>
		<reference ref_id="CVE-2012-1989" ref_url="https://www.suse.com/security/cve/CVE-2012-1989/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-2.6.18-0.4.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-1986/">CVE-2011-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1987/">CVE-2012-1987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1988/">CVE-2012-1988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1989/">CVE-2012-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076978" comment="puppet-2.6.18-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076986" comment="puppet-server-2.6.18-0.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36143" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.22-3.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.22-3.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143861" comment="pure-ftpd-1.0.22-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36144" version="1" class="patch">
	<metadata>
		<title>python-2.6.8-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.8-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143862" comment="python-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143863" comment="python-32bit-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143864" comment="python-curses-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143865" comment="python-demo-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143866" comment="python-gdbm-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143867" comment="python-idle-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143868" comment="python-tk-2.6.8-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143869" comment="python-x86-2.6.8-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36145" version="1" class="patch">
	<metadata>
		<title>python-pam-0.5.0-3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1502" ref_url="https://www.suse.com/security/cve/CVE-2012-1502/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pam-0.5.0-3.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1502/">CVE-2012-1502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074309" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36146" version="1" class="patch">
	<metadata>
		<title>pyxml-0.8.4-194.23.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the pyxml-0.8.4-194.23.38 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143870" comment="pyxml-0.8.4-194.23.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36147" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143871" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143872" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143873" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36148" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143874" comment="quagga-0.99.15-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36149" version="1" class="patch">
	<metadata>
		<title>radvd-1.1-1.24.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.1-1.24.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071831" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36150" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.47.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.47.28 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143875" comment="rsync-3.0.4-2.47.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36151" version="1" class="patch">
	<metadata>
		<title>rsyslog-5.10.1-0.7.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-5.10.1-0.7.49 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143876" comment="rsyslog-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143877" comment="rsyslog-diag-tools-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143878" comment="rsyslog-doc-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143879" comment="rsyslog-module-gssapi-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143880" comment="rsyslog-module-gtls-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143881" comment="rsyslog-module-mysql-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143882" comment="rsyslog-module-pgsql-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143883" comment="rsyslog-module-relp-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143884" comment="rsyslog-module-snmp-5.10.1-0.7.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143885" comment="rsyslog-module-udpspoof-5.10.1-0.7.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36152" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p357-0.9.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<reference ref_id="CVE-2012-4466" ref_url="https://www.suse.com/security/cve/CVE-2012-4466/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p357-0.9.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4466/">CVE-2012-4466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076775" comment="ruby-1.8.7.p357-0.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076786" comment="ruby-doc-html-1.8.7.p357-0.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076787" comment="ruby-tk-1.8.7.p357-0.9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36153" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.3.11-0.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.3.11-0.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075799" comment="sblim-sfcb-1.3.11-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36154" version="1" class="patch">
	<metadata>
		<title>socat-1.7.0.0-1.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2799" ref_url="https://www.suse.com/security/cve/CVE-2010-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-0219" ref_url="https://www.suse.com/security/cve/CVE-2012-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.0.0-1.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2799/">CVE-2010-2799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0219/">CVE-2012-0219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074796" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36155" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.12.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.12.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076602" comment="squid-2.7.STABLE5-2.12.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36156" version="1" class="patch">
	<metadata>
		<title>squid3-3.1.12-8.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2005-0094" ref_url="https://www.suse.com/security/cve/CVE-2005-0094/" source="CVE"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<description>
These are all security issues fixed in the squid3-3.1.12-8.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-0094/">CVE-2005-0094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076661" comment="squid3-3.1.12-8.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36157" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-13.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143886" comment="squidGuard-1.4-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143887" comment="squidGuard-doc-1.4-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36158" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.23.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.23.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143888" comment="star-1.5final-28.23.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36159" version="1" class="patch">
	<metadata>
		<title>stunnel-4.54-0.9.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-4.54-0.9.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143889" comment="stunnel-4.54-0.9.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36160" version="1" class="patch">
	<metadata>
		<title>sudo-1.7.6p2-0.17.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.7.6p2-0.17.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143890" comment="sudo-1.7.6p2-0.17.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36161" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.71.61-0.11.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.71.61-0.11.12 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143891" comment="sysconfig-0.71.61-0.11.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36162" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.34.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.34.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143892" comment="syslog-ng-2.0.9-27.34.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36163" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.45.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.45.24 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143893" comment="sysstat-8.1.5-7.45.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143894" comment="sysstat-isag-8.1.5-7.45.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36164" version="1" class="patch">
	<metadata>
		<title>system-config-printer-1.0.8-9.23.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the system-config-printer-1.0.8-9.23.44 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143895" comment="system-config-printer-1.0.8-9.23.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143896" comment="system-config-printer-lang-1.0.8-9.23.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36165" version="1" class="patch">
	<metadata>
		<title>systemtap-1.5-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2012-0875" ref_url="https://www.suse.com/security/cve/CVE-2012-0875/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.5-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0875/">CVE-2012-0875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077055" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077054" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36166" version="1" class="patch">
	<metadata>
		<title>t1lib-5.1.1-100.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-5.1.1-100.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074582" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36167" version="1" class="patch">
	<metadata>
		<title>taglib-1.5-19.23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>
These are all security issues fixed in the taglib-1.5-19.23.4 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074585" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074583" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074584" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36168" version="1" class="patch">
	<metadata>
		<title>tar-1.26-1.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.26-1.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143897" comment="tar-1.26-1.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36169" version="1" class="patch">
	<metadata>
		<title>tftp-0.48-101.31.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-0.48-101.31.27 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143898" comment="tftp-0.48-101.31.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36170" version="1" class="patch">
	<metadata>
		<title>tgt-0.9.10-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the tgt-0.9.10-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143899" comment="tgt-0.9.10-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36171" version="1" class="patch">
	<metadata>
		<title>tomcat6-6.0.18-20.35.40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-1232" ref_url="https://www.suse.com/security/cve/CVE-2008-1232/" source="CVE"/>
		<reference ref_id="CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947/" source="CVE"/>
		<reference ref_id="CVE-2008-2370" ref_url="https://www.suse.com/security/cve/CVE-2008-2370/" source="CVE"/>
		<reference ref_id="CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938/" source="CVE"/>
		<reference ref_id="CVE-2008-5515" ref_url="https://www.suse.com/security/cve/CVE-2008-5515/" source="CVE"/>
		<reference ref_id="CVE-2009-0033" ref_url="https://www.suse.com/security/cve/CVE-2009-0033/" source="CVE"/>
		<reference ref_id="CVE-2009-0580" ref_url="https://www.suse.com/security/cve/CVE-2009-0580/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<reference ref_id="CVE-2009-0783" ref_url="https://www.suse.com/security/cve/CVE-2009-0783/" source="CVE"/>
		<reference ref_id="CVE-2009-2693" ref_url="https://www.suse.com/security/cve/CVE-2009-2693/" source="CVE"/>
		<reference ref_id="CVE-2009-2901" ref_url="https://www.suse.com/security/cve/CVE-2009-2901/" source="CVE"/>
		<reference ref_id="CVE-2009-2902" ref_url="https://www.suse.com/security/cve/CVE-2009-2902/" source="CVE"/>
		<reference ref_id="CVE-2010-1157" ref_url="https://www.suse.com/security/cve/CVE-2010-1157/" source="CVE"/>
		<reference ref_id="CVE-2010-2227" ref_url="https://www.suse.com/security/cve/CVE-2010-2227/" source="CVE"/>
		<reference ref_id="CVE-2010-3718" ref_url="https://www.suse.com/security/cve/CVE-2010-3718/" source="CVE"/>
		<reference ref_id="CVE-2010-4172" ref_url="https://www.suse.com/security/cve/CVE-2010-4172/" source="CVE"/>
		<reference ref_id="CVE-2011-0013" ref_url="https://www.suse.com/security/cve/CVE-2011-0013/" source="CVE"/>
		<reference ref_id="CVE-2011-0534" ref_url="https://www.suse.com/security/cve/CVE-2011-0534/" source="CVE"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-2204" ref_url="https://www.suse.com/security/cve/CVE-2011-2204/" source="CVE"/>
		<reference ref_id="CVE-2011-2526" ref_url="https://www.suse.com/security/cve/CVE-2011-2526/" source="CVE"/>
		<reference ref_id="CVE-2011-3190" ref_url="https://www.suse.com/security/cve/CVE-2011-3190/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<reference ref_id="CVE-2012-2733" ref_url="https://www.suse.com/security/cve/CVE-2012-2733/" source="CVE"/>
		<reference ref_id="CVE-2012-3546" ref_url="https://www.suse.com/security/cve/CVE-2012-3546/" source="CVE"/>
		<reference ref_id="CVE-2012-4431" ref_url="https://www.suse.com/security/cve/CVE-2012-4431/" source="CVE"/>
		<reference ref_id="CVE-2012-4534" ref_url="https://www.suse.com/security/cve/CVE-2012-4534/" source="CVE"/>
		<reference ref_id="CVE-2012-5568" ref_url="https://www.suse.com/security/cve/CVE-2012-5568/" source="CVE"/>
		<reference ref_id="CVE-2012-5885" ref_url="https://www.suse.com/security/cve/CVE-2012-5885/" source="CVE"/>
		<reference ref_id="CVE-2012-5886" ref_url="https://www.suse.com/security/cve/CVE-2012-5886/" source="CVE"/>
		<reference ref_id="CVE-2012-5887" ref_url="https://www.suse.com/security/cve/CVE-2012-5887/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat6-6.0.18-20.35.40.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1232/">CVE-2008-1232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2370/">CVE-2008-2370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5515/">CVE-2008-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0033/">CVE-2009-0033</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0580/">CVE-2009-0580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0783/">CVE-2009-0783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2693/">CVE-2009-2693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2901/">CVE-2009-2901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2902/">CVE-2009-2902</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1157/">CVE-2010-1157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2227/">CVE-2010-2227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3718/">CVE-2010-3718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4172/">CVE-2010-4172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0013/">CVE-2011-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0534/">CVE-2011-0534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2204/">CVE-2011-2204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2526/">CVE-2011-2526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3190/">CVE-2011-3190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2733/">CVE-2012-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3546/">CVE-2012-3546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4431/">CVE-2012-4431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4534/">CVE-2012-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5568/">CVE-2012-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5885/">CVE-2012-5885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5886/">CVE-2012-5886</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5887/">CVE-2012-5887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076487" comment="tomcat6-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076480" comment="tomcat6-admin-webapps-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076481" comment="tomcat6-docs-webapp-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076482" comment="tomcat6-javadoc-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076483" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076484" comment="tomcat6-lib-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076485" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076486" comment="tomcat6-webapps-6.0.18-20.35.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36172" version="1" class="patch">
	<metadata>
		<title>unixODBC_23-2.3.1-0.9.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC_23-2.3.1-0.9.40 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143900" comment="unixODBC_23-2.3.1-0.9.40 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36173" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143901" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36174" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-11.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-11.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143902" comment="unzip-6.00-11.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36175" version="1" class="patch">
	<metadata>
		<title>virt-utils-1.2.1-0.7.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-utils-1.2.1-0.7.19 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143903" comment="virt-utils-1.2.1-0.7.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36176" version="1" class="patch">
	<metadata>
		<title>vte-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061711" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061709" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061710" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36177" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061666" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36178" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111746" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36179" version="1" class="patch">
	<metadata>
		<title>wireshark-1.8.6-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-1593" ref_url="https://www.suse.com/security/cve/CVE-2012-1593/" source="CVE"/>
		<reference ref_id="CVE-2012-1595" ref_url="https://www.suse.com/security/cve/CVE-2012-1595/" source="CVE"/>
		<reference ref_id="CVE-2012-1596" ref_url="https://www.suse.com/security/cve/CVE-2012-1596/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.8.6-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1593/">CVE-2012-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1595/">CVE-2012-1595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1596/">CVE-2012-1596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077108" comment="wireshark-1.8.6-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36180" version="1" class="patch">
	<metadata>
		<title>x3270-3.3.12-517.12.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2012-5662" ref_url="https://www.suse.com/security/cve/CVE-2012-5662/" source="CVE"/>
		<description>
These are all security issues fixed in the x3270-3.3.12-517.12.34 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5662/">CVE-2012-5662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143904" comment="x3270-3.3.12-517.12.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36181" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143905" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36182" version="1" class="patch">
	<metadata>
		<title>xen-4.2.2_04-0.7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.2.2_04-0.7.5 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143906" comment="xen-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143907" comment="xen-doc-html-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143908" comment="xen-doc-pdf-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143909" comment="xen-kmp-default-4.2.2_04_3.0.76_0.11-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143910" comment="xen-kmp-pae-4.2.2_04_3.0.76_0.11-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143911" comment="xen-libs-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143912" comment="xen-libs-32bit-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143913" comment="xen-tools-4.2.2_04-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143914" comment="xen-tools-domU-4.2.2_04-0.7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36183" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.62.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.62.46 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143915" comment="xorg-x11-7.4-9.62.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143916" comment="xorg-x11-xauth-7.4-9.62.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36184" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.81.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.81.7 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143917" comment="xorg-x11-Xvnc-7.4-27.81.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143918" comment="xorg-x11-server-7.4-27.81.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143919" comment="xorg-x11-server-extra-7.4-27.81.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36185" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-32bit-7.4-8.26.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-32bit-7.4-8.26.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071551" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071549" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071550" comment="xorg-x11-libs-x86-7.4-8.26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36186" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libxcb-32bit-7.4-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libxcb-32bit-7.4-1.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143920" comment="xorg-x11-libxcb-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143921" comment="xorg-x11-libxcb-32bit-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143922" comment="xorg-x11-libxcb-x86-7.4-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36187" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-dmx-7.3.99-17.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-dmx-7.3.99-17.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074291" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143923" comment="xorg-x11-server-rdp-7.3.99-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36188" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143924" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36189" version="1" class="patch">
	<metadata>
		<title>yast2-2.17.129-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-2.17.129-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143925" comment="yast2-2.17.129-0.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36190" version="1" class="patch">
	<metadata>
		<title>yast2-core-2.17.45-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-2.17.45-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143926" comment="yast2-core-2.17.45-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36191" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP3.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562777" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36192" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143420" comment="LibVNCServer-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36193" version="1" class="patch">
	<metadata>
		<title>Mesa-32bit-9.0.3-0.28.29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1872" ref_url="https://www.suse.com/security/cve/CVE-2013-1872/" source="CVE"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-32bit-9.0.3-0.28.29.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1872/">CVE-2013-1872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143928" comment="Mesa-9.0.3-0.28.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143929" comment="Mesa-32bit-9.0.3-0.28.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143930" comment="Mesa-x86-9.0.3-0.28.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36194" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-31.7.0esr-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-31.7.0esr-0.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110027" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110026" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36195" version="1" class="patch">
	<metadata>
		<title>NetworkManager-0.7.1_git20090811-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-0.7.1_git20090811-3.28.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143426" comment="NetworkManager-0.7.1_git20090811-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143427" comment="NetworkManager-glib-0.7.1_git20090811-3.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36196" version="1" class="patch">
	<metadata>
		<title>NetworkManager-gnome-0.7.1-5.22.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-gnome-0.7.1-5.22.28 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143428" comment="NetworkManager-gnome-0.7.1-5.22.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36197" version="1" class="patch">
	<metadata>
		<title>OpenEXR-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054497" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054495" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054496" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36198" version="1" class="patch">
	<metadata>
		<title>PackageKit-0.3.14-2.30.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-0.3.14-2.30.11 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143931" comment="PackageKit-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143932" comment="PackageKit-lang-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143933" comment="hal-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143934" comment="hal-32bit-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143935" comment="hal-doc-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143936" comment="hal-x86-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143937" comment="libpackagekit-glib10-0.3.14-2.30.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36199" version="1" class="patch">
	<metadata>
		<title>PolicyKit-0.9-14.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-0.9-14.43.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143938" comment="PolicyKit-0.9-14.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143939" comment="PolicyKit-32bit-0.9-14.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143940" comment="PolicyKit-doc-0.9-14.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143941" comment="PolicyKit-x86-0.9-14.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36200" version="1" class="patch">
	<metadata>
		<title>a2ps-4.13-1326.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>
These are all security issues fixed in the a2ps-4.13-1326.37.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098629" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36201" version="1" class="patch">
	<metadata>
		<title>aaa_base-11-6.105.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-11-6.105.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143942" comment="aaa_base-11-6.105.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36202" version="1" class="patch">
	<metadata>
		<title>acpid-1.0.6-91.25.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0798" ref_url="https://www.suse.com/security/cve/CVE-2009-0798/" source="CVE"/>
		<reference ref_id="CVE-2011-4578" ref_url="https://www.suse.com/security/cve/CVE-2011-4578/" source="CVE"/>
		<description>
These are all security issues fixed in the acpid-1.0.6-91.25.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0798/">CVE-2009-0798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4578/">CVE-2011-4578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143441" comment="acpid-1.0.6-91.25.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36203" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.7.0-18.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-1349" ref_url="https://www.suse.com/security/cve/CVE-2005-1349/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.7.0-18.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-1349/">CVE-2005-1349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143442" comment="amavisd-new-2.7.0-18.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36204" version="1" class="patch">
	<metadata>
		<title>ant-1.7.1-20.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2098" ref_url="https://www.suse.com/security/cve/CVE-2012-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.7.1-20.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2098/">CVE-2012-2098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143943" comment="ant-1.7.1-20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143944" comment="ant-trax-1.7.1-16.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36205" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.51.52.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2003-1418" ref_url="https://www.suse.com/security/cve/CVE-2003-1418/" source="CVE"/>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<reference ref_id="CVE-2013-1862" ref_url="https://www.suse.com/security/cve/CVE-2013-1862/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.51.52.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2003-1418/">CVE-2003-1418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1862/">CVE-2013-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108649" comment="apache2-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108644" comment="apache2-doc-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108645" comment="apache2-example-pages-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108646" comment="apache2-prefork-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108647" comment="apache2-utils-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108648" comment="apache2-worker-2.2.12-1.51.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36206" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.40-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0774" ref_url="https://www.suse.com/security/cve/CVE-2007-0774/" source="CVE"/>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.40-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0774/">CVE-2007-0774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143945" comment="apache2-mod_jk-1.2.40-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36207" version="1" class="patch">
	<metadata>
		<title>apache2-mod_nss-1.0.8-0.4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_nss-1.0.8-0.4.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143946" comment="apache2-mod_nss-1.0.8-0.4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36208" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143947" comment="apache2-mod_perl-2.0.4-40.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36209" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php53-5.3.17-0.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2386" ref_url="https://www.suse.com/security/cve/CVE-2012-2386/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-4635" ref_url="https://www.suse.com/security/cve/CVE-2013-4635/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php53-5.3.17-0.41.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2386/">CVE-2012-2386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4635/">CVE-2013-4635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110219" comment="apache2-mod_php53-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112868" comment="php53-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110220" comment="php53-bcmath-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110221" comment="php53-bz2-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110222" comment="php53-calendar-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110223" comment="php53-ctype-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110224" comment="php53-curl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110225" comment="php53-dba-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110226" comment="php53-dom-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110227" comment="php53-exif-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110228" comment="php53-fastcgi-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110229" comment="php53-fileinfo-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110230" comment="php53-ftp-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110231" comment="php53-gd-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110232" comment="php53-gettext-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110233" comment="php53-gmp-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110234" comment="php53-iconv-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110235" comment="php53-intl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110236" comment="php53-json-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110237" comment="php53-ldap-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110238" comment="php53-mbstring-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110239" comment="php53-mcrypt-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110240" comment="php53-mysql-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110241" comment="php53-odbc-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110242" comment="php53-openssl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110243" comment="php53-pcntl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110244" comment="php53-pdo-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110245" comment="php53-pear-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110246" comment="php53-pgsql-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110247" comment="php53-pspell-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110248" comment="php53-shmop-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110249" comment="php53-snmp-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110250" comment="php53-soap-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110251" comment="php53-suhosin-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110252" comment="php53-sysvmsg-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110253" comment="php53-sysvsem-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110254" comment="php53-sysvshm-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110255" comment="php53-tokenizer-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110256" comment="php53-wddx-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110257" comment="php53-xmlreader-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110258" comment="php53-xmlrpc-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110259" comment="php53-xmlwriter-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110260" comment="php53-xsl-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110261" comment="php53-zip-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110262" comment="php53-zlib-5.3.17-0.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36210" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.7.1-0.2.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<reference ref_id="CVE-2013-5705" ref_url="https://www.suse.com/security/cve/CVE-2013-5705/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.7.1-0.2.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5705/">CVE-2013-5705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099258" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36211" version="1" class="patch">
	<metadata>
		<title>ark-4.3.5-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>
These are all security issues fixed in the ark-4.3.5-0.3.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073173" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073174" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073175" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073176" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073177" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073178" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073179" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073180" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073181" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073182" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073183" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36212" version="1" class="patch">
	<metadata>
		<title>augeas-0.9.0-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-0.9.0-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009099535" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099534" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099536" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36213" version="1" class="patch">
	<metadata>
		<title>automake-1.10.1-4.131.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.10.1-4.131.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009089841" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36214" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.23-11.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.23-11.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143948" comment="avahi-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143949" comment="avahi-lang-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143950" comment="avahi-utils-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143951" comment="libavahi-client3-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143952" comment="libavahi-client3-32bit-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143953" comment="libavahi-client3-x86-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143954" comment="libavahi-common3-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143955" comment="libavahi-common3-32bit-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143956" comment="libavahi-common3-x86-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143957" comment="libavahi-core5-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143958" comment="libdns_sd-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143959" comment="libdns_sd-32bit-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143960" comment="libdns_sd-x86-0.6.23-11.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36215" version="1" class="patch">
	<metadata>
		<title>bash-3.2-147.27.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-3.2-147.27.35 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143961" comment="bash-3.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143962" comment="bash-doc-3.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143963" comment="bash-x86-3.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143964" comment="libreadline5-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143965" comment="libreadline5-32bit-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143966" comment="libreadline5-x86-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143967" comment="readline-doc-5.2-147.27.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36216" version="1" class="patch">
	<metadata>
		<title>bind-9.9.6P1-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.9.6P1-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106119" comment="bind-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106113" comment="bind-chrootenv-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106115" comment="bind-doc-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106117" comment="bind-libs-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106116" comment="bind-libs-32bit-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103747" comment="bind-libs-x86-9.9.6P1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106118" comment="bind-utils-9.9.6P1-0.5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36217" version="1" class="patch">
	<metadata>
		<title>binutils-2.24-3.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.24-3.62 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143968" comment="binutils-2.24-3.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36218" version="1" class="patch">
	<metadata>
		<title>boost-license-1.36.0-12.6.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-license-1.36.0-12.6.49 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143969" comment="boost-license-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143970" comment="boost-license1_49_0-1.49.0-0.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143971" comment="libboost_program_options1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143972" comment="libboost_regex1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143973" comment="libboost_signals1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143974" comment="libboost_system1_49_0-1.49.0-0.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143975" comment="libboost_thread1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143976" comment="libboost_thread1_49_0-1.49.0-0.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36219" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111700" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111701" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111702" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111748" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111773" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36220" version="1" class="patch">
	<metadata>
		<title>cifs-utils-5.1-0.14.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2011-1678" ref_url="https://www.suse.com/security/cve/CVE-2011-1678/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-5.1-0.14.46 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1678/">CVE-2011-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143977" comment="cifs-utils-5.1-0.14.46 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36221" version="1" class="patch">
	<metadata>
		<title>clamav-0.98.7-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4182" ref_url="https://www.suse.com/security/cve/CVE-2006-4182/" source="CVE"/>
		<reference ref_id="CVE-2006-5295" ref_url="https://www.suse.com/security/cve/CVE-2006-5295/" source="CVE"/>
		<reference ref_id="CVE-2006-5874" ref_url="https://www.suse.com/security/cve/CVE-2006-5874/" source="CVE"/>
		<reference ref_id="CVE-2007-0897" ref_url="https://www.suse.com/security/cve/CVE-2007-0897/" source="CVE"/>
		<reference ref_id="CVE-2007-0898" ref_url="https://www.suse.com/security/cve/CVE-2007-0898/" source="CVE"/>
		<reference ref_id="CVE-2007-1745" ref_url="https://www.suse.com/security/cve/CVE-2007-1745/" source="CVE"/>
		<reference ref_id="CVE-2007-1997" ref_url="https://www.suse.com/security/cve/CVE-2007-1997/" source="CVE"/>
		<reference ref_id="CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335/" source="CVE"/>
		<reference ref_id="CVE-2007-6336" ref_url="https://www.suse.com/security/cve/CVE-2007-6336/" source="CVE"/>
		<reference ref_id="CVE-2007-6337" ref_url="https://www.suse.com/security/cve/CVE-2007-6337/" source="CVE"/>
		<reference ref_id="CVE-2007-6595" ref_url="https://www.suse.com/security/cve/CVE-2007-6595/" source="CVE"/>
		<reference ref_id="CVE-2007-6596" ref_url="https://www.suse.com/security/cve/CVE-2007-6596/" source="CVE"/>
		<reference ref_id="CVE-2008-0318" ref_url="https://www.suse.com/security/cve/CVE-2008-0318/" source="CVE"/>
		<reference ref_id="CVE-2008-0728" ref_url="https://www.suse.com/security/cve/CVE-2008-0728/" source="CVE"/>
		<reference ref_id="CVE-2008-1100" ref_url="https://www.suse.com/security/cve/CVE-2008-1100/" source="CVE"/>
		<reference ref_id="CVE-2008-2713" ref_url="https://www.suse.com/security/cve/CVE-2008-2713/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.98.7-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4182/">CVE-2006-4182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5295/">CVE-2006-5295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5874/">CVE-2006-5874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0897/">CVE-2007-0897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0898/">CVE-2007-0898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1745/">CVE-2007-1745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1997/">CVE-2007-1997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6336/">CVE-2007-6336</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6337/">CVE-2007-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6595/">CVE-2007-6595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6596/">CVE-2007-6596</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0318/">CVE-2008-0318</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0728/">CVE-2008-0728</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1100/">CVE-2008-1100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2713/">CVE-2008-2713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109607" comment="clamav-0.98.7-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36222" version="1" class="patch">
	<metadata>
		<title>compat-libldap-2_3-0-2.3.37-2.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<description>
These are all security issues fixed in the compat-libldap-2_3-0-2.3.37-2.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109626" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109624" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109623" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109627" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109622" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109628" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109625" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36223" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143519" comment="coolkey-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36224" version="1" class="patch">
	<metadata>
		<title>coreutils-8.12-6.25.32.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.12-6.25.32.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109145" comment="coreutils-8.12-6.25.32.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109144" comment="coreutils-lang-8.12-6.25.32.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109146" comment="coreutils-x86-8.12-6.25.32.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36225" version="1" class="patch">
	<metadata>
		<title>cpio-2.9-75.78.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.9-75.78.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102978" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102977" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36226" version="1" class="patch">
	<metadata>
		<title>cron-4.1-194.211.213.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.1-194.211.213.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143978" comment="cron-4.1-194.211.213.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36227" version="1" class="patch">
	<metadata>
		<title>cups-1.3.9-8.46.56.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.3.9-8.46.56.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110279" comment="cups-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110276" comment="cups-client-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110278" comment="cups-libs-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110277" comment="cups-libs-32bit-1.3.9-8.46.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110280" comment="cups-libs-x86-1.3.9-8.46.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36228" version="1" class="patch">
	<metadata>
		<title>curl-7.19.7-1.42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.19.7-1.42.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109965" comment="curl-7.19.7-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109967" comment="libcurl4-7.19.7-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109966" comment="libcurl4-32bit-7.19.7-1.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109968" comment="libcurl4-x86-7.19.7-1.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36229" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-144.23.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-144.23.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073075" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073074" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36230" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071558" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071559" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071560" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36231" version="1" class="patch">
	<metadata>
		<title>davfs2-1.5.2-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362/" source="CVE"/>
		<description>
These are all security issues fixed in the davfs2-1.5.2-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143979" comment="davfs2-1.5.2-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36232" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.2.10-3.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.2.10-3.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100695" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100692" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100693" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100694" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36233" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143534" comment="dbus-1-glib-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143535" comment="dbus-1-glib-32bit-0.76-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143536" comment="dbus-1-glib-x86-0.76-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36234" version="1" class="patch">
	<metadata>
		<title>dhcp-4.2.4.P2-0.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.2.4.P2-0.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143980" comment="dhcp-4.2.4.P2-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143981" comment="dhcp-client-4.2.4.P2-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143982" comment="dhcp-relay-4.2.4.P2-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143983" comment="dhcp-server-4.2.4.P2-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36235" version="1" class="patch">
	<metadata>
		<title>dhcpcd-3.2.3-44.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcpcd-3.2.3-44.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074692" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067078" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36236" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.71-0.14.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.71-0.14.9 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143984" comment="dnsmasq-2.71-0.14.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36237" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.41.9-2.14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.41.9-2.14.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143985" comment="e2fsprogs-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143986" comment="libcom_err2-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143987" comment="libcom_err2-32bit-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143988" comment="libcom_err2-x86-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143989" comment="libext2fs2-1.41.9-2.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36238" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-32bit-61-1.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-3145" ref_url="https://www.suse.com/security/cve/CVE-2011-3145/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-32bit-61-1.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3145/">CVE-2011-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074331" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074329" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074330" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36239" version="1" class="patch">
	<metadata>
		<title>ed-0.2-1001.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>
These are all security issues fixed in the ed-0.2-1001.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065506" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36240" version="1" class="patch">
	<metadata>
		<title>elfutils-0.152-4.9.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.152-4.9.17 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107083" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107084" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107090" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107086" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107085" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107091" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107088" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107087" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107092" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107089" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107082" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107093" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36241" version="1" class="patch">
	<metadata>
		<title>emacs-22.3-4.42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-22.3-4.42.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109215" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109216" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109213" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109212" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109214" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36242" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.4-152.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.4-152.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143551" comment="enscript-1.6.4-152.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36243" version="1" class="patch">
	<metadata>
		<title>evince-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111794" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111795" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111796" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36244" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-2.28.2-0.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-2.28.2-0.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102331" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102329" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102330" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102332" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36245" version="1" class="patch">
	<metadata>
		<title>expat-2.0.1-88.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.0.1-88.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074688" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074691" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074689" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074690" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36246" version="1" class="patch">
	<metadata>
		<title>fastjar-0.95-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>
These are all security issues fixed in the fastjar-0.95-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091213" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36247" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.8.90-13.20.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5867" ref_url="https://www.suse.com/security/cve/CVE-2006-5867/" source="CVE"/>
		<reference ref_id="CVE-2006-5974" ref_url="https://www.suse.com/security/cve/CVE-2006-5974/" source="CVE"/>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2007-4565" ref_url="https://www.suse.com/security/cve/CVE-2007-4565/" source="CVE"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.8.90-13.20.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5867/">CVE-2006-5867</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5974/">CVE-2006-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4565/">CVE-2007-4565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070961" comment="fetchmail-6.3.8.90-13.20.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070962" comment="fetchmailconf-6.3.8.90-13.20.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36248" version="1" class="patch">
	<metadata>
		<title>file-32bit-4.24-43.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>
These are all security issues fixed in the file-32bit-4.24-43.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102013" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102012" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102016" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36249" version="1" class="patch">
	<metadata>
		<title>findutils-4.4.0-38.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2452" ref_url="https://www.suse.com/security/cve/CVE-2007-2452/" source="CVE"/>
		<description>
These are all security issues fixed in the findutils-4.4.0-38.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2452/">CVE-2007-2452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143555" comment="findutils-4.4.0-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143556" comment="findutils-locate-4.4.0-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36250" version="1" class="patch">
	<metadata>
		<title>foomatic-filters-3.0.2-269.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<description>
These are all security issues fixed in the foomatic-filters-3.0.2-269.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069764" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36251" version="1" class="patch">
	<metadata>
		<title>freeradius-server-2.1.1-7.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-2.1.1-7.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098692" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098688" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098689" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098690" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098691" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36252" version="1" class="patch">
	<metadata>
		<title>freetype2-2.3.7-25.35.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-2.3.7-25.35.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110209" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110208" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110211" comment="freetype2-x86-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110210" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36253" version="1" class="patch">
	<metadata>
		<title>fuse-2.8.7-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.8.7-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110282" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110283" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36254" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143559" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36255" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.36-26.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4936" ref_url="https://www.suse.com/security/cve/CVE-2008-4936/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.36-26.31 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4936/">CVE-2008-4936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143560" comment="g3utils-1.1.36-26.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143561" comment="mgetty-1.1.36-26.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36256" version="1" class="patch">
	<metadata>
		<title>gd-2.0.36.RC1-52.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.0.36.RC1-52.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109218" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36257" version="1" class="patch">
	<metadata>
		<title>ghostscript-fonts-other-8.62-32.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2009-3743" ref_url="https://www.suse.com/security/cve/CVE-2009-3743/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-4054" ref_url="https://www.suse.com/security/cve/CVE-2010-4054/" source="CVE"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-fonts-other-8.62-32.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3743/">CVE-2009-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4054/">CVE-2010-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075764" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075765" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075766" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075767" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075768" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075769" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075770" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36258" version="1" class="patch">
	<metadata>
		<title>glib2-2.22.5-0.8.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-2.22.5-0.8.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143990" comment="glib2-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143991" comment="glib2-doc-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143992" comment="glib2-lang-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143993" comment="libgio-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143994" comment="libgio-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143995" comment="libgio-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143996" comment="libglib-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143997" comment="libglib-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143998" comment="libglib-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143999" comment="libgmodule-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144000" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144001" comment="libgmodule-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144002" comment="libgobject-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144003" comment="libgobject-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144004" comment="libgobject-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144005" comment="libgthread-2_0-0-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144006" comment="libgthread-2_0-0-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144007" comment="libgthread-2_0-0-x86-2.22.5-0.8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36259" version="1" class="patch">
	<metadata>
		<title>glibc-2.11.3-17.84.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.11.3-17.84.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144008" comment="glibc-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144009" comment="glibc-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144010" comment="glibc-devel-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144011" comment="glibc-devel-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144012" comment="glibc-html-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144013" comment="glibc-i18ndata-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144014" comment="glibc-info-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144015" comment="glibc-locale-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144016" comment="glibc-locale-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144017" comment="glibc-locale-x86-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144018" comment="glibc-profile-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144019" comment="glibc-profile-32bit-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144020" comment="glibc-profile-x86-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144021" comment="glibc-x86-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144022" comment="nscd-2.11.3-17.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36260" version="1" class="patch">
	<metadata>
		<title>gmime-2.2.23-1.50.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2.2.23-1.50.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143596" comment="gmime-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143597" comment="gmime-2_4-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143598" comment="gmime-doc-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143599" comment="libgmime-2_0-3-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143600" comment="libgmime-2_4-2-2.4.8-1.2.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36261" version="1" class="patch">
	<metadata>
		<title>gnome-screensaver-2.28.3-0.39.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0887" ref_url="https://www.suse.com/security/cve/CVE-2008-0887/" source="CVE"/>
		<reference ref_id="CVE-2010-0414" ref_url="https://www.suse.com/security/cve/CVE-2010-0414/" source="CVE"/>
		<reference ref_id="CVE-2010-0422" ref_url="https://www.suse.com/security/cve/CVE-2010-0422/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-screensaver-2.28.3-0.39.17 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0887/">CVE-2008-0887</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0414/">CVE-2010-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0422/">CVE-2010-0422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144023" comment="gnome-screensaver-2.28.3-0.39.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144024" comment="gnome-screensaver-lang-2.28.3-0.39.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36262" version="1" class="patch">
	<metadata>
		<title>gnutls-2.4.1-24.39.55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-5138" ref_url="https://www.suse.com/security/cve/CVE-2009-5138/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-2.4.1-24.39.55.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-5138/">CVE-2009-5138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108436" comment="gnutls-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108435" comment="libgnutls-extra26-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108438" comment="libgnutls26-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108437" comment="libgnutls26-32bit-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108439" comment="libgnutls26-x86-2.4.1-24.39.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36263" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.9-25.33.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3746" ref_url="https://www.suse.com/security/cve/CVE-2006-3746/" source="CVE"/>
		<reference ref_id="CVE-2006-6169" ref_url="https://www.suse.com/security/cve/CVE-2006-6169/" source="CVE"/>
		<reference ref_id="CVE-2008-1530" ref_url="https://www.suse.com/security/cve/CVE-2008-1530/" source="CVE"/>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2012-6085" ref_url="https://www.suse.com/security/cve/CVE-2012-6085/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.9-25.33.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3746/">CVE-2006-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6169/">CVE-2006-6169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1530/">CVE-2008-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6085/">CVE-2012-6085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098771" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098770" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36264" version="1" class="patch">
	<metadata>
		<title>gpgme-1.1.6-25.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.1.6-25.32.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009099921" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099922" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36265" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143605" comment="gstreamer-0_10-plugins-base-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143606" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143607" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143608" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143609" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143610" comment="libgstapp-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143611" comment="libgstapp-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143612" comment="libgstapp-0_10-0-x86-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143613" comment="libgstinterfaces-0_10-0-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143614" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.15.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143615" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.15.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36266" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-good-0.10.30-5.12.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2009-0386" ref_url="https://www.suse.com/security/cve/CVE-2009-0386/" source="CVE"/>
		<reference ref_id="CVE-2009-0387" ref_url="https://www.suse.com/security/cve/CVE-2009-0387/" source="CVE"/>
		<reference ref_id="CVE-2009-0397" ref_url="https://www.suse.com/security/cve/CVE-2009-0397/" source="CVE"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-good-0.10.30-5.12.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0386/">CVE-2009-0386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0387/">CVE-2009-0387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0397/">CVE-2009-0397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144025" comment="gstreamer-0_10-plugins-good-0.10.30-5.12.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144026" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.12.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144027" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.12.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36267" version="1" class="patch">
	<metadata>
		<title>gtk2-2.18.9-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-2.18.9-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074875" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074872" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074886" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074874" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074887" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36268" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.20.12-0.18.70 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.20.12-0.18.70 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144028" comment="guestfs-data-1.20.12-0.18.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144029" comment="guestfs-tools-1.20.12-0.18.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144030" comment="guestfsd-1.20.12-0.18.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144031" comment="libguestfs0-1.20.12-0.18.70 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36269" version="1" class="patch">
	<metadata>
		<title>gvim-7.2-8.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2438" ref_url="https://www.suse.com/security/cve/CVE-2007-2438/" source="CVE"/>
		<reference ref_id="CVE-2007-2953" ref_url="https://www.suse.com/security/cve/CVE-2007-2953/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.2-8.15.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2438/">CVE-2007-2438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2953/">CVE-2007-2953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143623" comment="gvim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143624" comment="vim-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143625" comment="vim-base-7.2-8.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143626" comment="vim-data-7.2-8.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36270" version="1" class="patch">
	<metadata>
		<title>gzip-1.3.12-69.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.3.12-69.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143627" comment="gzip-1.3.12-69.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36271" version="1" class="patch">
	<metadata>
		<title>hplip-3.11.10-0.6.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2007-5208" ref_url="https://www.suse.com/security/cve/CVE-2007-5208/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.11.10-0.6.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5208/">CVE-2007-5208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009093256" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009093255" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36272" version="1" class="patch">
	<metadata>
		<title>hyper-v-6-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-6-3.5 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144032" comment="hyper-v-6-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36273" version="1" class="patch">
	<metadata>
		<title>ibutils-1.5.7-0.15.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3277" ref_url="https://www.suse.com/security/cve/CVE-2008-3277/" source="CVE"/>
		<reference ref_id="CVE-2013-1894" ref_url="https://www.suse.com/security/cve/CVE-2013-1894/" source="CVE"/>
		<description>
These are all security issues fixed in the ibutils-1.5.7-0.15.22 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3277/">CVE-2008-3277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1894/">CVE-2013-1894</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144033" comment="ibutils-1.5.7-0.15.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144034" comment="ibutils-32bit-1.5.7-0.15.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36274" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.7.3-1.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2008-3652" ref_url="https://www.suse.com/security/cve/CVE-2008-3652/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.7.3-1.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3652/">CVE-2008-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144035" comment="ipsec-tools-0.7.3-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36275" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-fileupload-1.1.1-1.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-fileupload-1.1.1-1.37.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098503" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098502" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36276" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-httpclient3-3.0.1-253.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-httpclient3-3.0.1-253.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076985" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36277" version="1" class="patch">
	<metadata>
		<title>java-1_7_1-ibm-1.7.1_sr3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_1-ibm-1.7.1_sr3.0-1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144036" comment="java-1_7_1-ibm-1.7.1_sr3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144037" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144038" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.0-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144039" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.0-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36278" version="1" class="patch">
	<metadata>
		<title>jpeg-6b-879.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the jpeg-6b-879.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075206" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075208" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075207" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075212" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36279" version="1" class="patch">
	<metadata>
		<title>kbd-1.14.1-16.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.14.1-16.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144040" comment="kbd-1.14.1-16.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36280" version="1" class="patch">
	<metadata>
		<title>kde4-kgreeter-plugins-4.3.5-0.12.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>
These are all security issues fixed in the kde4-kgreeter-plugins-4.3.5-0.12.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098370" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098371" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098373" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098372" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098374" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098375" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36281" version="1" class="patch">
	<metadata>
		<title>kdebase3-runtime-3.5.10-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase3-runtime-3.5.10-20.31 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143639" comment="kdebase3-runtime-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143640" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143641" comment="kdebase3-runtime-x86-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36282" version="1" class="patch">
	<metadata>
		<title>kdebase4-runtime-4.3.5-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase4-runtime-4.3.5-0.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107756" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36283" version="1" class="patch">
	<metadata>
		<title>kdelibs3-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056569" comment="kdelibs3-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056564" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056567" comment="kdelibs3-default-style-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056565" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056566" comment="kdelibs3-default-style-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056568" comment="kdelibs3-x86-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36284" version="1" class="patch">
	<metadata>
		<title>kdelibs4-4.3.5-0.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-4.3.5-0.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112896" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112897" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112898" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112899" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112900" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112933" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112901" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112902" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112934" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36285" version="1" class="patch">
	<metadata>
		<title>kdenetwork4-filesharing-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kdenetwork4-filesharing-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065196" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065197" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065198" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065199" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065200" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36286" version="1" class="patch">
	<metadata>
		<title>kdirstat-2.4.4-255.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>
These are all security issues fixed in the kdirstat-2.4.4-255.28.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098705" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36287" version="1" class="patch">
	<metadata>
		<title>kernel-default-3.0.101-63.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146/" source="CVE"/>
		<reference ref_id="CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2663" ref_url="https://www.suse.com/security/cve/CVE-2012-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398/" source="CVE"/>
		<reference ref_id="CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461/" source="CVE"/>
		<reference ref_id="CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-1059" ref_url="https://www.suse.com/security/cve/CVE-2013-1059/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819/" source="CVE"/>
		<reference ref_id="CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848/" source="CVE"/>
		<reference ref_id="CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015/" source="CVE"/>
		<reference ref_id="CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094/" source="CVE"/>
		<reference ref_id="CVE-2013-2148" ref_url="https://www.suse.com/security/cve/CVE-2013-2148/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-3301" ref_url="https://www.suse.com/security/cve/CVE-2013-3301/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514/" source="CVE"/>
		<reference ref_id="CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515/" source="CVE"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055/" source="CVE"/>
		<reference ref_id="CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186/" source="CVE"/>
		<reference ref_id="CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-3.0.101-63.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2663/">CVE-2012-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1059/">CVE-2013-1059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2148/">CVE-2013-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3301/">CVE-2013-3301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144041" comment="kernel-default-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144042" comment="kernel-default-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144043" comment="kernel-default-devel-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144044" comment="kernel-default-man-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144045" comment="kernel-pae-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144046" comment="kernel-pae-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144047" comment="kernel-pae-devel-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144048" comment="kernel-ppc64-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144049" comment="kernel-ppc64-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144050" comment="kernel-ppc64-devel-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144051" comment="kernel-source-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144052" comment="kernel-syms-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144053" comment="kernel-trace-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144054" comment="kernel-trace-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144055" comment="kernel-trace-devel-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144056" comment="kernel-xen-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144057" comment="kernel-xen-base-3.0.101-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144058" comment="kernel-xen-devel-3.0.101-63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36288" version="1" class="patch">
	<metadata>
		<title>krb5-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107541" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107539" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107542" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107543" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107540" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107538" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107547" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36289" version="1" class="patch">
	<metadata>
		<title>krb5-doc-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-doc-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107544" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36290" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107545" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107546" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36291" version="1" class="patch">
	<metadata>
		<title>kvm-1.4.2-30.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-5714" ref_url="https://www.suse.com/security/cve/CVE-2008-5714/" source="CVE"/>
		<reference ref_id="CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2016" ref_url="https://www.suse.com/security/cve/CVE-2013-2016/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-2894" ref_url="https://www.suse.com/security/cve/CVE-2014-2894/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<description>
These are all security issues fixed in the kvm-1.4.2-30.5 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5714/">CVE-2008-5714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2016/">CVE-2013-2016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2894/">CVE-2014-2894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144059" comment="kvm-1.4.2-30.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36292" version="1" class="patch">
	<metadata>
		<title>lcms-1.17-77.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the lcms-1.17-77.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091580" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091583" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091581" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091582" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36293" version="1" class="patch">
	<metadata>
		<title>ldapsmb-1.34b-12.58.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the ldapsmb-1.34b-12.58.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144060" comment="ldapsmb-1.34b-12.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144061" comment="libldb1-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144062" comment="libsmbclient0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144063" comment="libsmbclient0-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144064" comment="libsmbclient0-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144065" comment="libtalloc2-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144066" comment="libtalloc2-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144067" comment="libtalloc2-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144068" comment="libtdb1-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144069" comment="libtdb1-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144070" comment="libtdb1-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144071" comment="libtevent0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144072" comment="libtevent0-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144073" comment="libwbclient0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144074" comment="libwbclient0-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144075" comment="libwbclient0-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144076" comment="samba-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144077" comment="samba-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144078" comment="samba-client-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144079" comment="samba-client-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144080" comment="samba-client-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144081" comment="samba-krb-printing-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144082" comment="samba-winbind-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144083" comment="samba-winbind-32bit-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144084" comment="samba-winbind-x86-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144085" comment="samba-x86-3.6.3-0.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36294" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.2.1-68.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.2.1-68.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102504" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102506" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102505" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102507" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36295" version="1" class="patch">
	<metadata>
		<title>libMagickCore1-32bit-6.4.3.6-7.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<reference ref_id="CVE-2012-3437" ref_url="https://www.suse.com/security/cve/CVE-2012-3437/" source="CVE"/>
		<reference ref_id="CVE-2014-1947" ref_url="https://www.suse.com/security/cve/CVE-2014-1947/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore1-32bit-6.4.3.6-7.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3437/">CVE-2012-3437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1947/">CVE-2014-1947</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102727" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102726" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36296" version="1" class="patch">
	<metadata>
		<title>libQtWebKit4-32bit-4.6.3-5.34.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit4-32bit-4.6.3-5.34.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110009" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109994" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109995" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110019" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110010" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110012" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110011" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110020" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110016" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110013" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110014" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110015" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110021" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110018" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110017" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110022" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110023" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110024" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36297" version="1" class="patch">
	<metadata>
		<title>libadns1-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns1-1.4-73.21 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143717" comment="libadns1-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36298" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144086" comment="libapr-util1-1.3.4-12.22.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144087" comment="libapr-util1-32bit-1.3.4-12.22.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144088" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36299" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.19.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.19.8 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144089" comment="libapr1-1.3.3-11.18.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144090" comment="libapr1-32bit-1.3.3-11.18.19.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36300" version="1" class="patch">
	<metadata>
		<title>libarchive2-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive2-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143718" comment="libarchive2-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36301" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.19.1-6.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.19.1-6.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144091" comment="libblkid1-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144092" comment="libblkid1-32bit-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144093" comment="libblkid1-x86-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144094" comment="libuuid1-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144095" comment="libuuid1-32bit-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144096" comment="libuuid1-x86-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144097" comment="util-linux-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144098" comment="util-linux-lang-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144099" comment="uuid-runtime-2.19.1-6.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36302" version="1" class="patch">
	<metadata>
		<title>libcap-progs-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-progs-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111803" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111804" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111826" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111818" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36303" version="1" class="patch">
	<metadata>
		<title>libcgroup1-0.41.rc1-2.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup1-0.41.rc1-2.34 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144100" comment="libcgroup1-0.41.rc1-2.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36304" version="1" class="patch">
	<metadata>
		<title>libdrm-2.4.52-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-2.4.52-0.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144101" comment="libdrm-2.4.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144102" comment="libdrm-32bit-2.4.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144103" comment="libdrm-x86-2.4.52-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36305" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.4.4-0.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.4.4-0.6.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144104" comment="libecpg6-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144105" comment="libpq5-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144106" comment="libpq5-32bit-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144107" comment="postgresql94-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144108" comment="postgresql94-contrib-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144109" comment="postgresql94-docs-9.4.4-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144110" comment="postgresql94-server-9.4.4-0.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36306" version="1" class="patch">
	<metadata>
		<title>libevent-1_4-2-1.4.5-24.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-1_4-2-1.4.5-24.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112617" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36307" version="1" class="patch">
	<metadata>
		<title>libexif-0.6.17-2.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-0.6.17-2.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075040" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075039" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075063" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36308" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143723" comment="libexiv2-4-0.17.1-31.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36309" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.17.3-0.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-2566" ref_url="https://www.suse.com/security/cve/CVE-2013-2566/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.17.3-0.8.11 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2566/">CVE-2013-2566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107502" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107501" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107508" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107504" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107503" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107509" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107507" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107505" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107506" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107510" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36310" version="1" class="patch">
	<metadata>
		<title>libgcc_s1-32bit-4.8.3+r212056-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcc_s1-32bit-4.8.3+r212056-2.17 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144111" comment="libgcc_s1-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144112" comment="libgcc_s1-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144113" comment="libgcc_s1-x86-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144114" comment="libgfortran3-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144115" comment="libgomp1-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144116" comment="libgomp1-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144117" comment="libquadmath0-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144118" comment="libstdc++6-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144119" comment="libstdc++6-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144120" comment="libstdc++6-x86-4.8.3+r212056-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36311" version="1" class="patch">
	<metadata>
		<title>libgcrypt11-1.5.0-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt11-1.5.0-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009099938" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099936" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099937" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36312" version="1" class="patch">
	<metadata>
		<title>libgdiplus0-2.6.7-0.5.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgdiplus0-2.6.7-0.5.76 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143734" comment="libgdiplus0-2.6.7-0.5.76 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36313" version="1" class="patch">
	<metadata>
		<title>libgnomesu-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069283" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069281" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069282" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36314" version="1" class="patch">
	<metadata>
		<title>libgtop-2.28.0-1.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2.28.0-1.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144121" comment="libgtop-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144122" comment="libgtop-2_0-7-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144123" comment="libgtop-doc-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144124" comment="libgtop-lang-2.28.0-1.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36315" version="1" class="patch">
	<metadata>
		<title>libicu-32bit-4.0-7.26.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-32bit-4.0-7.26.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076347" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076348" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076349" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076350" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36316" version="1" class="patch">
	<metadata>
		<title>libjasper-1.900.1-134.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper-1.900.1-134.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106033" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106032" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106034" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36317" version="1" class="patch">
	<metadata>
		<title>libksba-1.0.4-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-1.0.4-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102976" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36318" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057091" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057089" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057090" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057094" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057092" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057093" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36319" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.03-12.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.03-12.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098769" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098767" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098768" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36320" version="1" class="patch">
	<metadata>
		<title>libmpfr1-2.3.2-3.118.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr1-2.3.2-3.118.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144125" comment="libmpfr1-2.3.2-3.118.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144126" comment="libmpfr1-32bit-2.3.2-3.118.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112935" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36321" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.0.20060920alpha-74.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.0.20060920alpha-74.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107714" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36322" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143739" comment="libmusicbrainz4-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36323" version="1" class="patch">
	<metadata>
		<title>libmysql55client18-32bit-5.5.43-0.7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1861" ref_url="https://www.suse.com/security/cve/CVE-2013-1861/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2013-3783" ref_url="https://www.suse.com/security/cve/CVE-2013-3783/" source="CVE"/>
		<reference ref_id="CVE-2013-3793" ref_url="https://www.suse.com/security/cve/CVE-2013-3793/" source="CVE"/>
		<reference ref_id="CVE-2013-3794" ref_url="https://www.suse.com/security/cve/CVE-2013-3794/" source="CVE"/>
		<reference ref_id="CVE-2013-3795" ref_url="https://www.suse.com/security/cve/CVE-2013-3795/" source="CVE"/>
		<reference ref_id="CVE-2013-3796" ref_url="https://www.suse.com/security/cve/CVE-2013-3796/" source="CVE"/>
		<reference ref_id="CVE-2013-3798" ref_url="https://www.suse.com/security/cve/CVE-2013-3798/" source="CVE"/>
		<reference ref_id="CVE-2013-3801" ref_url="https://www.suse.com/security/cve/CVE-2013-3801/" source="CVE"/>
		<reference ref_id="CVE-2013-3802" ref_url="https://www.suse.com/security/cve/CVE-2013-3802/" source="CVE"/>
		<reference ref_id="CVE-2013-3804" ref_url="https://www.suse.com/security/cve/CVE-2013-3804/" source="CVE"/>
		<reference ref_id="CVE-2013-3805" ref_url="https://www.suse.com/security/cve/CVE-2013-3805/" source="CVE"/>
		<reference ref_id="CVE-2013-3806" ref_url="https://www.suse.com/security/cve/CVE-2013-3806/" source="CVE"/>
		<reference ref_id="CVE-2013-3807" ref_url="https://www.suse.com/security/cve/CVE-2013-3807/" source="CVE"/>
		<reference ref_id="CVE-2013-3808" ref_url="https://www.suse.com/security/cve/CVE-2013-3808/" source="CVE"/>
		<reference ref_id="CVE-2013-3809" ref_url="https://www.suse.com/security/cve/CVE-2013-3809/" source="CVE"/>
		<reference ref_id="CVE-2013-3810" ref_url="https://www.suse.com/security/cve/CVE-2013-3810/" source="CVE"/>
		<reference ref_id="CVE-2013-3811" ref_url="https://www.suse.com/security/cve/CVE-2013-3811/" source="CVE"/>
		<reference ref_id="CVE-2013-3812" ref_url="https://www.suse.com/security/cve/CVE-2013-3812/" source="CVE"/>
		<reference ref_id="CVE-2013-4316" ref_url="https://www.suse.com/security/cve/CVE-2013-4316/" source="CVE"/>
		<reference ref_id="CVE-2013-5860" ref_url="https://www.suse.com/security/cve/CVE-2013-5860/" source="CVE"/>
		<reference ref_id="CVE-2013-5881" ref_url="https://www.suse.com/security/cve/CVE-2013-5881/" source="CVE"/>
		<reference ref_id="CVE-2013-5882" ref_url="https://www.suse.com/security/cve/CVE-2013-5882/" source="CVE"/>
		<reference ref_id="CVE-2013-5891" ref_url="https://www.suse.com/security/cve/CVE-2013-5891/" source="CVE"/>
		<reference ref_id="CVE-2013-5894" ref_url="https://www.suse.com/security/cve/CVE-2013-5894/" source="CVE"/>
		<reference ref_id="CVE-2013-5908" ref_url="https://www.suse.com/security/cve/CVE-2013-5908/" source="CVE"/>
		<reference ref_id="CVE-2014-0001" ref_url="https://www.suse.com/security/cve/CVE-2014-0001/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384/" source="CVE"/>
		<reference ref_id="CVE-2014-0386" ref_url="https://www.suse.com/security/cve/CVE-2014-0386/" source="CVE"/>
		<reference ref_id="CVE-2014-0393" ref_url="https://www.suse.com/security/cve/CVE-2014-0393/" source="CVE"/>
		<reference ref_id="CVE-2014-0401" ref_url="https://www.suse.com/security/cve/CVE-2014-0401/" source="CVE"/>
		<reference ref_id="CVE-2014-0402" ref_url="https://www.suse.com/security/cve/CVE-2014-0402/" source="CVE"/>
		<reference ref_id="CVE-2014-0412" ref_url="https://www.suse.com/security/cve/CVE-2014-0412/" source="CVE"/>
		<reference ref_id="CVE-2014-0420" ref_url="https://www.suse.com/security/cve/CVE-2014-0420/" source="CVE"/>
		<reference ref_id="CVE-2014-0427" ref_url="https://www.suse.com/security/cve/CVE-2014-0427/" source="CVE"/>
		<reference ref_id="CVE-2014-0430" ref_url="https://www.suse.com/security/cve/CVE-2014-0430/" source="CVE"/>
		<reference ref_id="CVE-2014-0431" ref_url="https://www.suse.com/security/cve/CVE-2014-0431/" source="CVE"/>
		<reference ref_id="CVE-2014-0433" ref_url="https://www.suse.com/security/cve/CVE-2014-0433/" source="CVE"/>
		<reference ref_id="CVE-2014-0437" ref_url="https://www.suse.com/security/cve/CVE-2014-0437/" source="CVE"/>
		<reference ref_id="CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419/" source="CVE"/>
		<reference ref_id="CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430/" source="CVE"/>
		<reference ref_id="CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431/" source="CVE"/>
		<reference ref_id="CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432/" source="CVE"/>
		<reference ref_id="CVE-2014-2434" ref_url="https://www.suse.com/security/cve/CVE-2014-2434/" source="CVE"/>
		<reference ref_id="CVE-2014-2435" ref_url="https://www.suse.com/security/cve/CVE-2014-2435/" source="CVE"/>
		<reference ref_id="CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436/" source="CVE"/>
		<reference ref_id="CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438/" source="CVE"/>
		<reference ref_id="CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440/" source="CVE"/>
		<reference ref_id="CVE-2014-2442" ref_url="https://www.suse.com/security/cve/CVE-2014-2442/" source="CVE"/>
		<reference ref_id="CVE-2014-2444" ref_url="https://www.suse.com/security/cve/CVE-2014-2444/" source="CVE"/>
		<reference ref_id="CVE-2014-2450" ref_url="https://www.suse.com/security/cve/CVE-2014-2450/" source="CVE"/>
		<reference ref_id="CVE-2014-2451" ref_url="https://www.suse.com/security/cve/CVE-2014-2451/" source="CVE"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0385" ref_url="https://www.suse.com/security/cve/CVE-2015-0385/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0405" ref_url="https://www.suse.com/security/cve/CVE-2015-0405/" source="CVE"/>
		<reference ref_id="CVE-2015-0409" ref_url="https://www.suse.com/security/cve/CVE-2015-0409/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0423" ref_url="https://www.suse.com/security/cve/CVE-2015-0423/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0438" ref_url="https://www.suse.com/security/cve/CVE-2015-0438/" source="CVE"/>
		<reference ref_id="CVE-2015-0439" ref_url="https://www.suse.com/security/cve/CVE-2015-0439/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0498" ref_url="https://www.suse.com/security/cve/CVE-2015-0498/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0500" ref_url="https://www.suse.com/security/cve/CVE-2015-0500/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0503" ref_url="https://www.suse.com/security/cve/CVE-2015-0503/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-0506" ref_url="https://www.suse.com/security/cve/CVE-2015-0506/" source="CVE"/>
		<reference ref_id="CVE-2015-0507" ref_url="https://www.suse.com/security/cve/CVE-2015-0507/" source="CVE"/>
		<reference ref_id="CVE-2015-0508" ref_url="https://www.suse.com/security/cve/CVE-2015-0508/" source="CVE"/>
		<reference ref_id="CVE-2015-0511" ref_url="https://www.suse.com/security/cve/CVE-2015-0511/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2566" ref_url="https://www.suse.com/security/cve/CVE-2015-2566/" source="CVE"/>
		<reference ref_id="CVE-2015-2567" ref_url="https://www.suse.com/security/cve/CVE-2015-2567/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-2576" ref_url="https://www.suse.com/security/cve/CVE-2015-2576/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysql55client18-32bit-5.5.43-0.7.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1861/">CVE-2013-1861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3783/">CVE-2013-3783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3793/">CVE-2013-3793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3794/">CVE-2013-3794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3795/">CVE-2013-3795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3796/">CVE-2013-3796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3798/">CVE-2013-3798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3801/">CVE-2013-3801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3802/">CVE-2013-3802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3804/">CVE-2013-3804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3805/">CVE-2013-3805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3806/">CVE-2013-3806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3807/">CVE-2013-3807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3808/">CVE-2013-3808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3809/">CVE-2013-3809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3810/">CVE-2013-3810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3811/">CVE-2013-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3812/">CVE-2013-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4316/">CVE-2013-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5860/">CVE-2013-5860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5881/">CVE-2013-5881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5882/">CVE-2013-5882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5891/">CVE-2013-5891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5894/">CVE-2013-5894</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5908/">CVE-2013-5908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0001/">CVE-2014-0001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0386/">CVE-2014-0386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0393/">CVE-2014-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0401/">CVE-2014-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0402/">CVE-2014-0402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0412/">CVE-2014-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0420/">CVE-2014-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0427/">CVE-2014-0427</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0430/">CVE-2014-0430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0431/">CVE-2014-0431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0433/">CVE-2014-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0437/">CVE-2014-0437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2434/">CVE-2014-2434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2435/">CVE-2014-2435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2442/">CVE-2014-2442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2444/">CVE-2014-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2450/">CVE-2014-2450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2451/">CVE-2014-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0385/">CVE-2015-0385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0405/">CVE-2015-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0409/">CVE-2015-0409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0423/">CVE-2015-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0438/">CVE-2015-0438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0439/">CVE-2015-0439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0498/">CVE-2015-0498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0500/">CVE-2015-0500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0503/">CVE-2015-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0506/">CVE-2015-0506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0507/">CVE-2015-0507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0508/">CVE-2015-0508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0511/">CVE-2015-0511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2566/">CVE-2015-2566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2567/">CVE-2015-2567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2576/">CVE-2015-2576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109861" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109860" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109865" comment="libmysql55client18-x86-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109862" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109858" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109859" comment="libmysql55client_r18-x86-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109864" comment="mysql-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109863" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109866" comment="mysql-tools-5.5.43-0.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36324" version="1" class="patch">
	<metadata>
		<title>libmysqlclient15-32bit-5.0.96-0.6.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient15-32bit-5.0.96-0.6.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108147" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108146" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108152" comment="libmysqlclient15-x86-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108148" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36325" version="1" class="patch">
	<metadata>
		<title>libneon27-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143743" comment="libneon27-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143744" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143745" comment="libneon27-x86-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36326" version="1" class="patch">
	<metadata>
		<title>libnetpbm10-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm10-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058587" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058585" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058586" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058588" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36327" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.113 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143746" comment="libnewt0_52-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143747" comment="newt-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143748" comment="python-newt-0.52.10-1.35.113 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36328" version="1" class="patch">
	<metadata>
		<title>libopensc2-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the libopensc2-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065553" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065551" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065552" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065556" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065554" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065555" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36329" version="1" class="patch">
	<metadata>
		<title>libopenssl0_9_8-0.9.8j-0.70.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl0_9_8-0.9.8j-0.70.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107900" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107897" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107899" comment="libopenssl0_9_8-hmac-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107898" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107971" comment="libopenssl0_9_8-x86-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107902" comment="openssl-0.9.8j-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107901" comment="openssl-doc-0.9.8j-0.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36330" version="1" class="patch">
	<metadata>
		<title>libotr2-3.2.0-10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr2-3.2.0-10.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076091" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36331" version="1" class="patch">
	<metadata>
		<title>libpixman-1-0-0.24.4-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1591" ref_url="https://www.suse.com/security/cve/CVE-2013-1591/" source="CVE"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>
These are all security issues fixed in the libpixman-1-0-0.24.4-0.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1591/">CVE-2013-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009092675" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009092673" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009092674" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36332" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.31-5.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.31-5.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098501" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098499" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098500" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36333" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib4-0.12.3-1.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib4-0.12.3-1.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098332" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098333" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098334" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098335" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36334" version="1" class="patch">
	<metadata>
		<title>libproxy0-0.3.1-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy0-0.3.1-2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076276" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076270" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076272" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076273" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076275" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076277" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36335" version="1" class="patch">
	<metadata>
		<title>libpulse-browse0-0.9.23-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-browse0-0.9.23-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144127" comment="libpulse-browse0-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144128" comment="libpulse-mainloop-glib0-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144129" comment="libpulse-mainloop-glib0-32bit-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144130" comment="libpulse-mainloop-glib0-x86-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144131" comment="libpulse0-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144132" comment="libpulse0-32bit-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144133" comment="libpulse0-x86-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144134" comment="pulseaudio-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144135" comment="pulseaudio-esound-compat-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144136" comment="pulseaudio-gdm-hooks-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144137" comment="pulseaudio-lang-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144138" comment="pulseaudio-module-x11-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144139" comment="pulseaudio-module-zeroconf-0.9.23-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144140" comment="pulseaudio-utils-0.9.23-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36336" version="1" class="patch">
	<metadata>
		<title>libpython2_6-1_0-2.6.9-0.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_6-1_0-2.6.9-0.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144141" comment="libpython2_6-1_0-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144142" comment="libpython2_6-1_0-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144143" comment="libpython2_6-1_0-x86-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144144" comment="python-base-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144145" comment="python-base-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144146" comment="python-base-x86-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144147" comment="python-xml-2.6.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36337" version="1" class="patch">
	<metadata>
		<title>librpcsecgss-0.18-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the librpcsecgss-0.18-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143768" comment="librpcsecgss-0.18-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144148" comment="libtirpc1-0.2.1-1.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36338" version="1" class="patch">
	<metadata>
		<title>librsvg-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070704" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070702" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070703" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070705" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36339" version="1" class="patch">
	<metadata>
		<title>libsamplerate-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143770" comment="libsamplerate-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143771" comment="libsamplerate-32bit-0.1.4-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143772" comment="libsamplerate-x86-0.1.4-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36340" version="1" class="patch">
	<metadata>
		<title>libsndfile-1.0.20-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-1.0.20-2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105659" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105658" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105660" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36341" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100007" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100005" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100006" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100008" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100009" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100010" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36342" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.32.2-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<reference ref_id="CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.32.2-4.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143779" comment="libsoup-2_4-1-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143780" comment="libsoup-2_4-1-32bit-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143781" comment="libsoup-2_4-1-x86-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36343" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.2.9-4.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.2.9-4.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108442" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36344" version="1" class="patch">
	<metadata>
		<title>libsss_idmap0-1.9.4-0.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libsss_idmap0-1.9.4-0.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144149" comment="libsss_idmap0-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144150" comment="python-sssd-config-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144151" comment="sssd-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144152" comment="sssd-32bit-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144153" comment="sssd-tools-1.9.4-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36345" version="1" class="patch">
	<metadata>
		<title>libtasn1-1.5-1.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-1.5-1.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109685" comment="libtasn1-1.5-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109684" comment="libtasn1-3-1.5-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109683" comment="libtasn1-3-32bit-1.5-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109686" comment="libtasn1-3-x86-1.5-1.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36346" version="1" class="patch">
	<metadata>
		<title>libtevent0-x86-3.6.3-0.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<description>
These are all security issues fixed in the libtevent0-x86-3.6.3-0.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144154" comment="libtevent0-x86-3.6.3-0.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36347" version="1" class="patch">
	<metadata>
		<title>libtiff3-3.8.2-141.154.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2088" ref_url="https://www.suse.com/security/cve/CVE-2012-2088/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff3-3.8.2-141.154.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2088/">CVE-2012-2088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091279" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091277" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091278" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091280" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36348" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.10-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.10-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144155" comment="libtspi1-0.3.10-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144156" comment="libtspi1-32bit-0.3.10-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144157" comment="libtspi1-x86-0.3.10-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144158" comment="trousers-0.3.10-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36349" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.6.2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.6.2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075498" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075500" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075499" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111805" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36350" version="1" class="patch">
	<metadata>
		<title>libvirt-1.2.5-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2012-4423" ref_url="https://www.suse.com/security/cve/CVE-2012-4423/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-4291" ref_url="https://www.suse.com/security/cve/CVE-2013-4291/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-5651" ref_url="https://www.suse.com/security/cve/CVE-2013-5651/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-1.2.5-3.76 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4423/">CVE-2012-4423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4291/">CVE-2013-4291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5651/">CVE-2013-5651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144159" comment="libvirt-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144160" comment="libvirt-client-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144161" comment="libvirt-client-32bit-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144162" comment="libvirt-doc-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144163" comment="libvirt-lock-sanlock-1.2.5-3.76 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36351" version="1" class="patch">
	<metadata>
		<title>libvorbis-1.2.0-79.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-1.2.0-79.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073153" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073150" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073151" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073152" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36352" version="1" class="patch">
	<metadata>
		<title>libwsman1-2.2.3-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the libwsman1-2.2.3-0.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009101875" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101876" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101877" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144164" comment="suseRegister-1.4-1.38.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36353" version="1" class="patch">
	<metadata>
		<title>libxcrypt-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070132" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070130" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070131" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144165" comment="pam-modules-11-1.25.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144166" comment="pam-modules-32bit-11-1.25.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144167" comment="pam-modules-x86-11-1.25.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144168" comment="pwdutils-3.2.15-0.17.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144169" comment="pwdutils-plugin-audit-3.2.15-0.17.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36354" version="1" class="patch">
	<metadata>
		<title>libxml2-2.7.6-0.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2012-0841" ref_url="https://www.suse.com/security/cve/CVE-2012-0841/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2.7.6-0.31.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0841/">CVE-2012-0841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009101725" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101723" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101726" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101727" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36355" version="1" class="patch">
	<metadata>
		<title>libxslt-1.1.24-19.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<reference ref_id="CVE-2013-4520" ref_url="https://www.suse.com/security/cve/CVE-2013-4520/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-1.1.24-19.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4520/">CVE-2013-4520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091329" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091327" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091328" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36356" version="1" class="patch">
	<metadata>
		<title>libzip1-0.9-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip1-0.9-1.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068337" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36357" version="1" class="patch">
	<metadata>
		<title>log4net-1.2.10-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0743" ref_url="https://www.suse.com/security/cve/CVE-2006-0743/" source="CVE"/>
		<description>
These are all security issues fixed in the log4net-1.2.10-1.36 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0743/">CVE-2006-0743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143802" comment="log4net-1.2.10-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36358" version="1" class="patch">
	<metadata>
		<title>logrotate-3.7.7-10.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.7.7-10.30.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144170" comment="logrotate-3.7.7-10.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36359" version="1" class="patch">
	<metadata>
		<title>logwatch-7.3.6-65.74.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.3.6-65.74.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144171" comment="logwatch-7.3.6-65.74.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36360" version="1" class="patch">
	<metadata>
		<title>lvm2-2.02.98-0.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>
These are all security issues fixed in the lvm2-2.02.98-0.33.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144172" comment="lvm2-2.02.98-0.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36361" version="1" class="patch">
	<metadata>
		<title>lxc-0.8.0-0.23.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>
These are all security issues fixed in the lxc-0.8.0-0.23.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144173" comment="lxc-0.8.0-0.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36362" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.14-9.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2191" ref_url="https://www.suse.com/security/cve/CVE-2006-2191/" source="CVE"/>
		<reference ref_id="CVE-2006-2941" ref_url="https://www.suse.com/security/cve/CVE-2006-2941/" source="CVE"/>
		<reference ref_id="CVE-2006-3636" ref_url="https://www.suse.com/security/cve/CVE-2006-3636/" source="CVE"/>
		<reference ref_id="CVE-2010-3089" ref_url="https://www.suse.com/security/cve/CVE-2010-3089/" source="CVE"/>
		<reference ref_id="CVE-2010-3090" ref_url="https://www.suse.com/security/cve/CVE-2010-3090/" source="CVE"/>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.14-9.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2191/">CVE-2006-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2941/">CVE-2006-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3636/">CVE-2006-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3089/">CVE-2010-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3090/">CVE-2010-3090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143805" comment="mailman-2.1.14-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36363" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-1.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-1.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144174" comment="mailx-12.5-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36364" version="1" class="patch">
	<metadata>
		<title>man-2.5.2-17.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4250" ref_url="https://www.suse.com/security/cve/CVE-2006-4250/" source="CVE"/>
		<description>
These are all security issues fixed in the man-2.5.2-17.16 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4250/">CVE-2006-4250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143806" comment="man-2.5.2-17.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36365" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-8.7.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143807" comment="mipv6d-2.0.2.umip.0.4-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36366" version="1" class="patch">
	<metadata>
		<title>mono-core-2.6.7-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<reference ref_id="CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318/" source="CVE"/>
		<reference ref_id="CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319/" source="CVE"/>
		<reference ref_id="CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320/" source="CVE"/>
		<description>
These are all security issues fixed in the mono-core-2.6.7-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109245" comment="mono-core-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109251" comment="mono-data-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109248" comment="mono-data-postgresql-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109249" comment="mono-data-sqlite-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109255" comment="mono-locale-extras-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109256" comment="mono-nunit-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109258" comment="mono-web-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109259" comment="mono-winforms-2.6.7-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36367" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.10.7-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.10.7-0.3.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009101265" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101264" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101271" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36368" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-1.9.2.27-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3666" ref_url="https://www.suse.com/security/cve/CVE-2011-3666/" source="CVE"/>
		<reference ref_id="CVE-2011-3670" ref_url="https://www.suse.com/security/cve/CVE-2011-3670/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-1.9.2.27-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3666/">CVE-2011-3666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3670/">CVE-2011-3670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073033" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073029" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073030" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073031" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073032" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36369" version="1" class="patch">
	<metadata>
		<title>mutt-1.5.17-42.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1558" ref_url="https://www.suse.com/security/cve/CVE-2007-1558/" source="CVE"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.5.17-42.39.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1558/">CVE-2007-1558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109091" comment="mutt-1.5.17-42.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36370" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098667" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098666" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36371" version="1" class="patch">
	<metadata>
		<title>nagios-nrpe-2.12-24.4.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1362" ref_url="https://www.suse.com/security/cve/CVE-2013-1362/" source="CVE"/>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-nrpe-2.12-24.4.10.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1362/">CVE-2013-1362</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098716" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098715" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098717" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36372" version="1" class="patch">
	<metadata>
		<title>nagios-plugins-1.4.16-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5623" ref_url="https://www.suse.com/security/cve/CVE-2007-5623/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-plugins-1.4.16-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5623/">CVE-2007-5623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009101145" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101144" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36373" version="1" class="patch">
	<metadata>
		<title>nfs-client-1.2.3-18.38.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-1.2.3-18.38.43.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144175" comment="nfs-client-1.2.3-18.38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144176" comment="nfs-doc-1.2.3-18.38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144177" comment="nfs-kernel-server-1.2.3-18.38.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36374" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p2-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p2-2.18 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144178" comment="ntp-4.2.8p2-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144179" comment="ntp-doc-4.2.8p2-2.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36375" version="1" class="patch">
	<metadata>
		<title>ofed-1.5.4.1-20.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-1.5.4.1-20.26 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144180" comment="ofed-1.5.4.1-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144181" comment="ofed-doc-1.5.4.1-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144182" comment="ofed-kmp-default-1.5.4.1_3.0.101_63-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144183" comment="ofed-kmp-pae-1.5.4.1_3.0.101_63-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144184" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_63-20.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144185" comment="ofed-kmp-trace-1.5.4.1_3.0.101_63-20.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36376" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.2-0.11.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4454" ref_url="https://www.suse.com/security/cve/CVE-2012-4454/" source="CVE"/>
		<reference ref_id="CVE-2012-4455" ref_url="https://www.suse.com/security/cve/CVE-2012-4455/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.2-0.11.26 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4454/">CVE-2012-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4455/">CVE-2012-4455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144186" comment="openCryptoki-3.2-0.11.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144187" comment="openCryptoki-32bit-3.2-0.11.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144188" comment="openCryptoki-64bit-3.2-0.11.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36377" version="1" class="patch">
	<metadata>
		<title>openslp-1.2.0-172.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-1.2.0-172.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109700" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109699" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109698" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109701" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36378" version="1" class="patch">
	<metadata>
		<title>openssh-6.6p1-4.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-6.6p1-4.7 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144189" comment="openssh-6.6p1-4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144190" comment="openssh-fips-6.6p1-4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36379" version="1" class="patch">
	<metadata>
		<title>openvpn-2.0.9-143.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.0.9-143.44.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102621" comment="openvpn-2.0.9-143.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102622" comment="openvpn-auth-pam-plugin-2.0.9-143.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36380" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069566" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069564" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069565" comment="opie-x86-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36381" version="1" class="patch">
	<metadata>
		<title>pam-1.1.5-0.15.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.5-0.15.9 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144191" comment="pam-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144192" comment="pam-32bit-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144193" comment="pam-doc-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144194" comment="pam-x86-1.1.5-0.15.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36382" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.3.1-47.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.3.1-47.12.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143841" comment="pam_krb5-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143842" comment="pam_krb5-32bit-2.3.1-47.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143843" comment="pam_krb5-x86-2.3.1-47.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36383" version="1" class="patch">
	<metadata>
		<title>pam_ldap-184-147.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5170" ref_url="https://www.suse.com/security/cve/CVE-2006-5170/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ldap-184-147.20 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5170/">CVE-2006-5170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143844" comment="pam_ldap-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143845" comment="pam_ldap-32bit-184-147.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143846" comment="pam_ldap-x86-184-147.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36384" version="1" class="patch">
	<metadata>
		<title>pam_mount-0.47-13.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5138" ref_url="https://www.suse.com/security/cve/CVE-2008-5138/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_mount-0.47-13.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5138/">CVE-2008-5138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143847" comment="pam_mount-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143848" comment="pam_mount-32bit-0.47-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143849" comment="pam_mount-x86-0.47-13.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36385" version="1" class="patch">
	<metadata>
		<title>pango-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066424" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066421" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066422" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066423" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36386" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.3.8-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.3.8-3.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065684" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36387" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065687" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065685" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065686" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36388" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.10.0-64.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<reference ref_id="CVE-2011-2728" ref_url="https://www.suse.com/security/cve/CVE-2011-2728/" source="CVE"/>
		<reference ref_id="CVE-2012-5526" ref_url="https://www.suse.com/security/cve/CVE-2012-5526/" source="CVE"/>
		<reference ref_id="CVE-2012-6329" ref_url="https://www.suse.com/security/cve/CVE-2012-6329/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.10.0-64.72.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2728/">CVE-2011-2728</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5526/">CVE-2012-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6329/">CVE-2012-6329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144195" comment="perl-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144196" comment="perl-32bit-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144197" comment="perl-Module-Build-0.2808.01-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144198" comment="perl-Test-Simple-0.72-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144199" comment="perl-base-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144200" comment="perl-doc-5.10.0-64.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144201" comment="perl-x86-5.10.0-64.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36389" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.56-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.56-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056793" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36390" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.028-50.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143857" comment="perl-Tk-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36391" version="1" class="patch">
	<metadata>
		<title>perl-libwww-perl-5.816-2.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0633" ref_url="https://www.suse.com/security/cve/CVE-2011-0633/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-libwww-perl-5.816-2.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0633/">CVE-2011-0633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143858" comment="perl-libwww-perl-5.816-2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36392" version="1" class="patch">
	<metadata>
		<title>perl-spamassassin-3.3.1-10.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0451" ref_url="https://www.suse.com/security/cve/CVE-2007-0451/" source="CVE"/>
		<reference ref_id="CVE-2007-2873" ref_url="https://www.suse.com/security/cve/CVE-2007-2873/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-spamassassin-3.3.1-10.8.3 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0451/">CVE-2007-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2873/">CVE-2007-2873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143859" comment="perl-spamassassin-3.3.1-10.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143860" comment="spamassassin-3.3.1-10.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36393" version="1" class="patch">
	<metadata>
		<title>popt-1.7-37.63.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the popt-1.7-37.63.64.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144202" comment="popt-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144203" comment="popt-32bit-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144204" comment="popt-x86-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144205" comment="rpm-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144206" comment="rpm-32bit-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144207" comment="rpm-x86-4.4.2.3-37.63.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36394" version="1" class="patch">
	<metadata>
		<title>postgresql-8.3.23-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-8.3.23-0.4.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076900" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076905" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076906" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076907" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36395" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.2.22-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.2.22-2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144208" comment="powerpc-utils-1.2.22-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36396" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.6.7-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.6.7-1.31 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144209" comment="ppc64-diag-2.6.7-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36397" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.5.git-2.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.5.git-2.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099941" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36398" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-240.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-240.8.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100586" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36399" version="1" class="patch">
	<metadata>
		<title>puppet-2.7.26-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0156" ref_url="https://www.suse.com/security/cve/CVE-2010-0156/" source="CVE"/>
		<reference ref_id="CVE-2011-1986" ref_url="https://www.suse.com/security/cve/CVE-2011-1986/" source="CVE"/>
		<reference ref_id="CVE-2011-3848" ref_url="https://www.suse.com/security/cve/CVE-2011-3848/" source="CVE"/>
		<reference ref_id="CVE-2011-3869" ref_url="https://www.suse.com/security/cve/CVE-2011-3869/" source="CVE"/>
		<reference ref_id="CVE-2011-3870" ref_url="https://www.suse.com/security/cve/CVE-2011-3870/" source="CVE"/>
		<reference ref_id="CVE-2011-3871" ref_url="https://www.suse.com/security/cve/CVE-2011-3871/" source="CVE"/>
		<reference ref_id="CVE-2011-3872" ref_url="https://www.suse.com/security/cve/CVE-2011-3872/" source="CVE"/>
		<reference ref_id="CVE-2012-1987" ref_url="https://www.suse.com/security/cve/CVE-2012-1987/" source="CVE"/>
		<reference ref_id="CVE-2012-1988" ref_url="https://www.suse.com/security/cve/CVE-2012-1988/" source="CVE"/>
		<reference ref_id="CVE-2012-1989" ref_url="https://www.suse.com/security/cve/CVE-2012-1989/" source="CVE"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<reference ref_id="CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567/" source="CVE"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<description>
These are all security issues fixed in the puppet-2.7.26-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0156/">CVE-2010-0156</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-1986/">CVE-2011-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3848/">CVE-2011-3848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3869/">CVE-2011-3869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3870/">CVE-2011-3870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3871/">CVE-2011-3871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3872/">CVE-2011-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1987/">CVE-2012-1987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1988/">CVE-2012-1988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1989/">CVE-2012-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144210" comment="puppet-2.7.26-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144211" comment="puppet-server-2.7.26-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36400" version="1" class="patch">
	<metadata>
		<title>pure-ftpd-1.0.22-3.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0411" ref_url="https://www.suse.com/security/cve/CVE-2011-0411/" source="CVE"/>
		<reference ref_id="CVE-2011-3171" ref_url="https://www.suse.com/security/cve/CVE-2011-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the pure-ftpd-1.0.22-3.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0411/">CVE-2011-0411</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3171/">CVE-2011-3171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102493" comment="pure-ftpd-1.0.22-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36401" version="1" class="patch">
	<metadata>
		<title>python-2.6.9-0.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.6.9-0.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144212" comment="python-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144213" comment="python-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144214" comment="python-curses-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144215" comment="python-demo-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144216" comment="python-gdbm-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144217" comment="python-idle-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144218" comment="python-tk-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144219" comment="python-x86-2.6.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36402" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.6-168.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.6-168.34.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098685" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36403" version="1" class="patch">
	<metadata>
		<title>python-lxml-2.3.6-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-2.3.6-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100957" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36404" version="1" class="patch">
	<metadata>
		<title>python-pam-0.5.0-3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1502" ref_url="https://www.suse.com/security/cve/CVE-2012-1502/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pam-0.5.0-3.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1502/">CVE-2012-1502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074309" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36405" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7-6.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7-6.22.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144220" comment="python-pywbem-0.7-6.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36406" version="1" class="patch">
	<metadata>
		<title>pyxml-0.8.4-194.23.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
These are all security issues fixed in the pyxml-0.8.4-194.23.38 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143870" comment="pyxml-0.8.4-194.23.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36407" version="1" class="patch">
	<metadata>
		<title>qt3-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143871" comment="qt3-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143872" comment="qt3-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143873" comment="qt3-x86-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36408" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.14.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103900" comment="quagga-0.99.15-0.14.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36409" version="1" class="patch">
	<metadata>
		<title>radvd-1.1-1.24.8.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.1-1.24.8.19 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144221" comment="radvd-1.1-1.24.8.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36410" version="1" class="patch">
	<metadata>
		<title>rsync-3.0.4-2.47.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4091" ref_url="https://www.suse.com/security/cve/CVE-2007-4091/" source="CVE"/>
		<reference ref_id="CVE-2007-6199" ref_url="https://www.suse.com/security/cve/CVE-2007-6199/" source="CVE"/>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.0.4-2.47.28 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4091/">CVE-2007-4091</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6199/">CVE-2007-6199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143875" comment="rsync-3.0.4-2.47.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36411" version="1" class="patch">
	<metadata>
		<title>rsyslog-5.10.1-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-5.10.1-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100967" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100958" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100959" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100960" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100961" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100962" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100963" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100964" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100965" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100966" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36412" version="1" class="patch">
	<metadata>
		<title>ruby-1.8.7.p357-0.9.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<reference ref_id="CVE-2012-4466" ref_url="https://www.suse.com/security/cve/CVE-2012-4466/" source="CVE"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-1.8.7.p357-0.9.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4466/">CVE-2012-4466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105486" comment="ruby-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105481" comment="ruby-doc-html-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105485" comment="ruby-tk-1.8.7.p357-0.9.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36413" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.3.11-0.23.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.3.11-0.23.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144222" comment="sblim-sfcb-1.3.11-0.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36414" version="1" class="patch">
	<metadata>
		<title>sendmail-8.14.3-50.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>
These are all security issues fixed in the sendmail-8.14.3-50.24.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098750" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36415" version="1" class="patch">
	<metadata>
		<title>shim-0.7.318.81ee561d-0.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.7.318.81ee561d-0.9.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102690" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36416" version="1" class="patch">
	<metadata>
		<title>socat-1.7.0.0-1.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2799" ref_url="https://www.suse.com/security/cve/CVE-2010-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-0219" ref_url="https://www.suse.com/security/cve/CVE-2012-0219/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.0.0-1.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2799/">CVE-2010-2799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0219/">CVE-2012-0219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074796" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36417" version="1" class="patch">
	<metadata>
		<title>squid-2.7.STABLE5-2.12.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0478" ref_url="https://www.suse.com/security/cve/CVE-2009-0478/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-2.7.STABLE5-2.12.16.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0478/">CVE-2009-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009090553" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36418" version="1" class="patch">
	<metadata>
		<title>squid3-3.1.12-8.16.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-0094" ref_url="https://www.suse.com/security/cve/CVE-2005-0094/" source="CVE"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-0189" ref_url="https://www.suse.com/security/cve/CVE-2013-0189/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609/" source="CVE"/>
		<description>
These are all security issues fixed in the squid3-3.1.12-8.16.20.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-0094/">CVE-2005-0094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0189/">CVE-2013-0189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100639" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36419" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-13.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-13.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143886" comment="squidGuard-1.4-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143887" comment="squidGuard-doc-1.4-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36420" version="1" class="patch">
	<metadata>
		<title>star-1.5final-28.23.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4134" ref_url="https://www.suse.com/security/cve/CVE-2007-4134/" source="CVE"/>
		<description>
These are all security issues fixed in the star-1.5final-28.23.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4134/">CVE-2007-4134</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144223" comment="star-1.5final-28.23.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36421" version="1" class="patch">
	<metadata>
		<title>strongswan-4.4.0-6.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-4.4.0-6.25.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098714" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098713" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36422" version="1" class="patch">
	<metadata>
		<title>stunnel-4.54-0.9.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-4.54-0.9.24 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143889" comment="stunnel-4.54-0.9.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36423" version="1" class="patch">
	<metadata>
		<title>sudo-1.7.6p2-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.7.6p2-0.23.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110042" comment="sudo-1.7.6p2-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36424" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.71.61-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.71.61-0.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144224" comment="sysconfig-0.71.61-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36425" version="1" class="patch">
	<metadata>
		<title>syslog-ng-2.0.9-27.34.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5110" ref_url="https://www.suse.com/security/cve/CVE-2008-5110/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-ng-2.0.9-27.34.36.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5110/">CVE-2008-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143892" comment="syslog-ng-2.0.9-27.34.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36426" version="1" class="patch">
	<metadata>
		<title>sysstat-8.1.5-7.50.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3852" ref_url="https://www.suse.com/security/cve/CVE-2007-3852/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-8.1.5-7.50.25 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3852/">CVE-2007-3852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144225" comment="sysstat-8.1.5-7.50.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144226" comment="sysstat-isag-8.1.5-7.50.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36427" version="1" class="patch">
	<metadata>
		<title>system-config-printer-1.0.8-9.23.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the system-config-printer-1.0.8-9.23.44 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143895" comment="system-config-printer-1.0.8-9.23.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143896" comment="system-config-printer-lang-1.0.8-9.23.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36428" version="1" class="patch">
	<metadata>
		<title>systemtap-1.5-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2012-0875" ref_url="https://www.suse.com/security/cve/CVE-2012-0875/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-1.5-0.9.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0875/">CVE-2012-0875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077055" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077054" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36429" version="1" class="patch">
	<metadata>
		<title>t1lib-5.1.1-100.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-5.1.1-100.21.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074582" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36430" version="1" class="patch">
	<metadata>
		<title>taglib-1.5-19.23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>
These are all security issues fixed in the taglib-1.5-19.23.4 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074585" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074583" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074584" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36431" version="1" class="patch">
	<metadata>
		<title>tar-1.26-1.2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2001-1267" ref_url="https://www.suse.com/security/cve/CVE-2001-1267/" source="CVE"/>
		<reference ref_id="CVE-2002-0399" ref_url="https://www.suse.com/security/cve/CVE-2002-0399/" source="CVE"/>
		<reference ref_id="CVE-2006-6097" ref_url="https://www.suse.com/security/cve/CVE-2006-6097/" source="CVE"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.26-1.2.6.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2001-1267/">CVE-2001-1267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2002-0399/">CVE-2002-0399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6097/">CVE-2006-6097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144227" comment="tar-1.26-1.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36432" version="1" class="patch">
	<metadata>
		<title>tcpdump-3.9.8-1.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-3.9.8-1.27.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108650" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36433" version="1" class="patch">
	<metadata>
		<title>tftp-0.48-101.31.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-0.48-101.31.27 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143898" comment="tftp-0.48-101.31.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36434" version="1" class="patch">
	<metadata>
		<title>tgt-0.9.10-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the tgt-0.9.10-0.17.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143899" comment="tgt-0.9.10-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36435" version="1" class="patch">
	<metadata>
		<title>tomcat6-6.0.41-0.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1232" ref_url="https://www.suse.com/security/cve/CVE-2008-1232/" source="CVE"/>
		<reference ref_id="CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947/" source="CVE"/>
		<reference ref_id="CVE-2008-2370" ref_url="https://www.suse.com/security/cve/CVE-2008-2370/" source="CVE"/>
		<reference ref_id="CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938/" source="CVE"/>
		<reference ref_id="CVE-2008-5515" ref_url="https://www.suse.com/security/cve/CVE-2008-5515/" source="CVE"/>
		<reference ref_id="CVE-2009-0033" ref_url="https://www.suse.com/security/cve/CVE-2009-0033/" source="CVE"/>
		<reference ref_id="CVE-2009-0580" ref_url="https://www.suse.com/security/cve/CVE-2009-0580/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<reference ref_id="CVE-2009-0783" ref_url="https://www.suse.com/security/cve/CVE-2009-0783/" source="CVE"/>
		<reference ref_id="CVE-2009-2693" ref_url="https://www.suse.com/security/cve/CVE-2009-2693/" source="CVE"/>
		<reference ref_id="CVE-2009-2901" ref_url="https://www.suse.com/security/cve/CVE-2009-2901/" source="CVE"/>
		<reference ref_id="CVE-2009-2902" ref_url="https://www.suse.com/security/cve/CVE-2009-2902/" source="CVE"/>
		<reference ref_id="CVE-2010-1157" ref_url="https://www.suse.com/security/cve/CVE-2010-1157/" source="CVE"/>
		<reference ref_id="CVE-2010-2227" ref_url="https://www.suse.com/security/cve/CVE-2010-2227/" source="CVE"/>
		<reference ref_id="CVE-2010-3718" ref_url="https://www.suse.com/security/cve/CVE-2010-3718/" source="CVE"/>
		<reference ref_id="CVE-2010-4172" ref_url="https://www.suse.com/security/cve/CVE-2010-4172/" source="CVE"/>
		<reference ref_id="CVE-2011-0013" ref_url="https://www.suse.com/security/cve/CVE-2011-0013/" source="CVE"/>
		<reference ref_id="CVE-2011-0534" ref_url="https://www.suse.com/security/cve/CVE-2011-0534/" source="CVE"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-2204" ref_url="https://www.suse.com/security/cve/CVE-2011-2204/" source="CVE"/>
		<reference ref_id="CVE-2011-2526" ref_url="https://www.suse.com/security/cve/CVE-2011-2526/" source="CVE"/>
		<reference ref_id="CVE-2011-3190" ref_url="https://www.suse.com/security/cve/CVE-2011-3190/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-2733" ref_url="https://www.suse.com/security/cve/CVE-2012-2733/" source="CVE"/>
		<reference ref_id="CVE-2012-3439" ref_url="https://www.suse.com/security/cve/CVE-2012-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2012-3546" ref_url="https://www.suse.com/security/cve/CVE-2012-3546/" source="CVE"/>
		<reference ref_id="CVE-2012-4431" ref_url="https://www.suse.com/security/cve/CVE-2012-4431/" source="CVE"/>
		<reference ref_id="CVE-2012-4534" ref_url="https://www.suse.com/security/cve/CVE-2012-4534/" source="CVE"/>
		<reference ref_id="CVE-2012-5568" ref_url="https://www.suse.com/security/cve/CVE-2012-5568/" source="CVE"/>
		<reference ref_id="CVE-2012-5885" ref_url="https://www.suse.com/security/cve/CVE-2012-5885/" source="CVE"/>
		<reference ref_id="CVE-2012-5886" ref_url="https://www.suse.com/security/cve/CVE-2012-5886/" source="CVE"/>
		<reference ref_id="CVE-2012-5887" ref_url="https://www.suse.com/security/cve/CVE-2012-5887/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat6-6.0.41-0.43.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1232/">CVE-2008-1232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2370/">CVE-2008-2370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5515/">CVE-2008-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0033/">CVE-2009-0033</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0580/">CVE-2009-0580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0783/">CVE-2009-0783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2693/">CVE-2009-2693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2901/">CVE-2009-2901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2902/">CVE-2009-2902</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1157/">CVE-2010-1157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2227/">CVE-2010-2227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3718/">CVE-2010-3718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4172/">CVE-2010-4172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0013/">CVE-2011-0013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0534/">CVE-2011-0534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2204/">CVE-2011-2204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2526/">CVE-2011-2526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3190/">CVE-2011-3190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2733/">CVE-2012-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3439/">CVE-2012-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3546/">CVE-2012-3546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4431/">CVE-2012-4431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4534/">CVE-2012-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5568/">CVE-2012-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5885/">CVE-2012-5885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5886/">CVE-2012-5886</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5887/">CVE-2012-5887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009099545" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099538" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099539" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099540" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099541" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099542" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099543" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099544" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36436" version="1" class="patch">
	<metadata>
		<title>unixODBC_23-2.3.1-0.9.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC_23-2.3.1-0.9.40 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143900" comment="unixODBC_23-2.3.1-0.9.40 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36437" version="1" class="patch">
	<metadata>
		<title>unrar-3.80.2-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3726" ref_url="https://www.suse.com/security/cve/CVE-2007-3726/" source="CVE"/>
		<description>
These are all security issues fixed in the unrar-3.80.2-2.8 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3726/">CVE-2007-3726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143901" comment="unrar-3.80.2-2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36438" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-11.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-2475" ref_url="https://www.suse.com/security/cve/CVE-2005-2475/" source="CVE"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-11.13.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-2475/">CVE-2005-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106835" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36439" version="1" class="patch">
	<metadata>
		<title>vino-2.28.1-2.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-2.28.1-2.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091215" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091214" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36440" version="1" class="patch">
	<metadata>
		<title>virt-utils-1.2.1-10.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-utils-1.2.1-10.41 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144228" comment="virt-utils-1.2.1-10.41 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36441" version="1" class="patch">
	<metadata>
		<title>vsftpd-2.0.7-4.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-2.0.7-4.35.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144229" comment="vsftpd-2.0.7-4.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36442" version="1" class="patch">
	<metadata>
		<title>vte-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061711" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061709" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061710" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36443" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.2-132.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6772" ref_url="https://www.suse.com/security/cve/CVE-2006-6772/" source="CVE"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.2-132.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6772/">CVE-2006-6772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061666" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36444" version="1" class="patch">
	<metadata>
		<title>wget-1.11.4-1.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.11.4-1.19.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101160" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36445" version="1" class="patch">
	<metadata>
		<title>wireshark-1.10.13-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-1593" ref_url="https://www.suse.com/security/cve/CVE-2012-1593/" source="CVE"/>
		<reference ref_id="CVE-2012-1595" ref_url="https://www.suse.com/security/cve/CVE-2012-1595/" source="CVE"/>
		<reference ref_id="CVE-2012-1596" ref_url="https://www.suse.com/security/cve/CVE-2012-1596/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074/" source="CVE"/>
		<reference ref_id="CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075/" source="CVE"/>
		<reference ref_id="CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076/" source="CVE"/>
		<reference ref_id="CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077/" source="CVE"/>
		<reference ref_id="CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078/" source="CVE"/>
		<reference ref_id="CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079/" source="CVE"/>
		<reference ref_id="CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080/" source="CVE"/>
		<reference ref_id="CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081/" source="CVE"/>
		<reference ref_id="CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421/" source="CVE"/>
		<reference ref_id="CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.10.13-0.2.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1593/">CVE-2012-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1595/">CVE-2012-1595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1596/">CVE-2012-1596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112696" comment="wireshark-1.10.13-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36446" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-0.7.1-6.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-0.7.1-6.15.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101152" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36447" version="1" class="patch">
	<metadata>
		<title>x3270-3.3.12-517.12.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-5662" ref_url="https://www.suse.com/security/cve/CVE-2012-5662/" source="CVE"/>
		<description>
These are all security issues fixed in the x3270-3.3.12-517.12.34 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5662/">CVE-2012-5662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143904" comment="x3270-3.3.12-517.12.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36448" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-217.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-217.26.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098512" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36449" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.0.2-36.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0386" ref_url="https://www.suse.com/security/cve/CVE-2008-0386/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.0.2-36.18 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0386/">CVE-2008-0386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143905" comment="xdg-utils-1.0.2-36.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36450" version="1" class="patch">
	<metadata>
		<title>xen-4.4.2_08-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<reference ref_id="CVE-2014-9065" ref_url="https://www.suse.com/security/cve/CVE-2014-9065/" source="CVE"/>
		<reference ref_id="CVE-2014-9066" ref_url="https://www.suse.com/security/cve/CVE-2014-9066/" source="CVE"/>
		<reference ref_id="CVE-2015-0361" ref_url="https://www.suse.com/security/cve/CVE-2015-0361/" source="CVE"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.4.2_08-1.7 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9065/">CVE-2014-9065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9066/">CVE-2014-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0361/">CVE-2015-0361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144230" comment="xen-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144231" comment="xen-doc-html-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144232" comment="xen-kmp-default-4.4.2_08_3.0.101_63-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144233" comment="xen-kmp-pae-4.4.2_08_3.0.101_63-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144234" comment="xen-libs-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144235" comment="xen-libs-32bit-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144236" comment="xen-tools-4.4.2_08-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144237" comment="xen-tools-domU-4.4.2_08-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36451" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.14-130.133.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.14-130.133.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098336" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36452" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.4-9.65.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4568" ref_url="https://www.suse.com/security/cve/CVE-2007-4568/" source="CVE"/>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.4-9.65.46 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4568/">CVE-2007-4568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144238" comment="xorg-x11-7.4-9.65.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144239" comment="xorg-x11-xauth-7.4-9.65.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36453" version="1" class="patch">
	<metadata>
		<title>xorg-x11-Xvnc-7.4-27.105.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-Xvnc-7.4-27.105.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110272" comment="xorg-x11-Xvnc-7.4-27.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110274" comment="xorg-x11-server-7.4-27.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110273" comment="xorg-x11-server-extra-7.4-27.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36454" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libX11-32bit-7.4-5.11.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libX11-32bit-7.4-5.11.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103948" comment="xorg-x11-libX11-7.4-5.11.11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103947" comment="xorg-x11-libX11-32bit-7.4-5.11.11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077515" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36455" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXext-32bit-7.4-1.18.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXext-32bit-7.4-1.18.16 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077723" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077722" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077740" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36456" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXfixes-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXfixes-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103952" comment="xorg-x11-libXfixes-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103951" comment="xorg-x11-libXfixes-32bit-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077741" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36457" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXp-32bit-7.4-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXp-32bit-7.4-1.18.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103964" comment="xorg-x11-libXp-7.4-1.18.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103963" comment="xorg-x11-libXp-32bit-7.4-1.18.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077523" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36458" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXrender-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXrender-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103956" comment="xorg-x11-libXrender-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103955" comment="xorg-x11-libXrender-32bit-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077743" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36459" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXt-32bit-7.4-1.19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXt-32bit-7.4-1.19.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103962" comment="xorg-x11-libXt-7.4-1.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103961" comment="xorg-x11-libXt-32bit-7.4-1.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077745" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36460" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXv-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXv-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103958" comment="xorg-x11-libXv-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103957" comment="xorg-x11-libXv-32bit-7.4-1.16.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077744" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36461" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-32bit-7.4-8.26.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-32bit-7.4-8.26.44.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108447" comment="xorg-x11-libs-7.4-8.26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108446" comment="xorg-x11-libs-32bit-7.4-8.26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108448" comment="xorg-x11-libs-x86-7.4-8.26.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36462" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libxcb-32bit-7.4-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libxcb-32bit-7.4-1.29.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143920" comment="xorg-x11-libxcb-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143921" comment="xorg-x11-libxcb-32bit-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143922" comment="xorg-x11-libxcb-x86-7.4-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36463" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-dmx-7.3.99-17.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-dmx-7.3.99-17.11.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074291" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144240" comment="xorg-x11-server-rdp-7.3.99-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36464" version="1" class="patch">
	<metadata>
		<title>xterm-238-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
These are all security issues fixed in the xterm-238-1.16 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143924" comment="xterm-238-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36465" version="1" class="patch">
	<metadata>
		<title>yast2-2.17.140-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-2.17.140-1.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144241" comment="yast2-2.17.140-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36466" version="1" class="patch">
	<metadata>
		<title>yast2-core-2.17.46-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-2.17.46-0.5.1 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144242" comment="yast2-core-2.17.46-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36467" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-911.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-911.22 package on the GA media of SUSE Linux Enterprise Server 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562777" comment="zoo-2.10-911.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36468" version="1" class="patch">
	<metadata>
		<title>curl-openssl1-7.19.7-1.51.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-openssl1-7.19.7-1.51.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562778" comment="curl-openssl1-7.19.7-1.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562779" comment="libcurl4-openssl1-7.19.7-1.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562780" comment="libcurl4-openssl1-32bit-7.19.7-1.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36469" version="1" class="patch">
	<metadata>
		<title>libcurl4-openssl1-32bit-7.19.7-0.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<description>
These are all security issues fixed in the libcurl4-openssl1-32bit-7.19.7-0.38.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100664" comment="libcurl4-openssl1-7.19.7-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100662" comment="libcurl4-openssl1-32bit-7.19.7-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36470" version="1" class="patch">
	<metadata>
		<title>libldap-openssl1-2_4-2-2.4.26-0.28.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-openssl1-2_4-2-2.4.26-0.28.8 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100667" comment="libldap-openssl1-2_4-2-2.4.26-0.28.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100665" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.28.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36471" version="1" class="patch">
	<metadata>
		<title>libopenssl1-devel-1.0.1g-0.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl1-devel-1.0.1g-0.12.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100647" comment="libopenssl1-devel-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100650" comment="libopenssl1_0_0-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100648" comment="libopenssl1_0_0-32bit-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100652" comment="openssl1-1.0.1g-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100651" comment="openssl1-doc-1.0.1g-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36472" version="1" class="patch">
	<metadata>
		<title>libslp1-openssl1-1.2.0-172.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<description>
These are all security issues fixed in the libslp1-openssl1-1.2.0-172.26.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562781" comment="libslp1-openssl1-1.2.0-172.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36473" version="1" class="patch">
	<metadata>
		<title>libsnmp15-openssl1-32bit-5.4.2.1-8.12.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-openssl1-32bit-5.4.2.1-8.12.31.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562782" comment="libsnmp15-openssl1-5.4.2.1-8.12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562783" comment="libsnmp15-openssl1-32bit-5.4.2.1-8.12.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36474" version="1" class="patch">
	<metadata>
		<title>mailx-openssl1-12.5-1.11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-openssl1-12.5-1.11.2 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562784" comment="mailx-openssl1-12.5-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36475" version="1" class="patch">
	<metadata>
		<title>openssh-openssl1-6.6p1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-0225" ref_url="https://www.suse.com/security/cve/CVE-2006-0225/" source="CVE"/>
		<reference ref_id="CVE-2007-4752" ref_url="https://www.suse.com/security/cve/CVE-2007-4752/" source="CVE"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-openssl1-6.6p1-10.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0225/">CVE-2006-0225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4752/">CVE-2007-4752</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121359" comment="openssh-openssl1-6.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121360" comment="openssh-openssl1-helpers-6.6p1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36476" version="1" class="patch">
	<metadata>
		<title>openvpn-openssl1-2.3.2-0.10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-openssl1-2.3.2-0.10.3.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009167443" comment="openvpn-openssl1-2.3.2-0.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009167444" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36477" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-openssl1-1.3.11-0.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381/" source="CVE"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-openssl1-1.3.11-0.28.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009154342" comment="sblim-sfcb-openssl1-1.3.11-0.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36478" version="1" class="patch">
	<metadata>
		<title>stunnel-openssl1-4.54-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-openssl1-4.54-0.11.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562785" comment="stunnel-openssl1-4.54-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36479" version="1" class="patch">
	<metadata>
		<title>vsftpd-openssl1-2.0.7-4.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-openssl1-2.0.7-4.43.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562786" comment="vsftpd-openssl1-2.0.7-4.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36480" version="1" class="patch">
	<metadata>
		<title>wget-openssl1-1.11.4-1.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="CVE-2006-6719" ref_url="https://www.suse.com/security/cve/CVE-2006-6719/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-openssl1-1.11.4-1.22.1 package on the GA media of SUSE Linux Enterprise Server 11-SECURITY.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6719/">CVE-2006-6719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562787" comment="wget-openssl1-1.11.4-1.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36481" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick-1.2.5-4.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-4601" ref_url="https://www.suse.com/security/cve/CVE-2005-4601/" source="CVE"/>
		<reference ref_id="CVE-2006-3743" ref_url="https://www.suse.com/security/cve/CVE-2006-3743/" source="CVE"/>
		<reference ref_id="CVE-2006-3744" ref_url="https://www.suse.com/security/cve/CVE-2006-3744/" source="CVE"/>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2008-1096" ref_url="https://www.suse.com/security/cve/CVE-2008-1096/" source="CVE"/>
		<reference ref_id="CVE-2008-1097" ref_url="https://www.suse.com/security/cve/CVE-2008-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>
These are all security issues fixed in the GraphicsMagick-1.2.5-4.33.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-4601/">CVE-2005-4601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3743/">CVE-2006-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3744/">CVE-2006-3744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1096/">CVE-2008-1096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1097/">CVE-2008-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077243" comment="GraphicsMagick-1.2.5-4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077244" comment="libGraphicsMagick2-1.2.5-4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077245" comment="perl-GraphicsMagick-1.2.5-4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36482" version="1" class="patch">
	<metadata>
		<title>ImageMagick-6.4.3.6-7.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5456" ref_url="https://www.suse.com/security/cve/CVE-2006-5456/" source="CVE"/>
		<reference ref_id="CVE-2007-1667" ref_url="https://www.suse.com/security/cve/CVE-2007-1667/" source="CVE"/>
		<reference ref_id="CVE-2007-1797" ref_url="https://www.suse.com/security/cve/CVE-2007-1797/" source="CVE"/>
		<reference ref_id="CVE-2007-4985" ref_url="https://www.suse.com/security/cve/CVE-2007-4985/" source="CVE"/>
		<reference ref_id="CVE-2007-4986" ref_url="https://www.suse.com/security/cve/CVE-2007-4986/" source="CVE"/>
		<reference ref_id="CVE-2007-4987" ref_url="https://www.suse.com/security/cve/CVE-2007-4987/" source="CVE"/>
		<reference ref_id="CVE-2007-4988" ref_url="https://www.suse.com/security/cve/CVE-2007-4988/" source="CVE"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<reference ref_id="CVE-2012-3437" ref_url="https://www.suse.com/security/cve/CVE-2012-3437/" source="CVE"/>
		<reference ref_id="CVE-2014-1947" ref_url="https://www.suse.com/security/cve/CVE-2014-1947/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-6.4.3.6-7.30.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5456/">CVE-2006-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1667/">CVE-2007-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1797/">CVE-2007-1797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4985/">CVE-2007-4985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4986/">CVE-2007-4986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4987/">CVE-2007-4987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4988/">CVE-2007-4988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3437/">CVE-2012-3437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1947/">CVE-2014-1947</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102720" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102719" comment="ImageMagick-devel-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102721" comment="libMagick++-devel-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102722" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102724" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102723" comment="libMagickWand1-32bit-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102725" comment="perl-PerlMagick-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36483" version="1" class="patch">
	<metadata>
		<title>LibVNCServer-devel-0.9.1-154.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2450" ref_url="https://www.suse.com/security/cve/CVE-2006-2450/" source="CVE"/>
		<description>
These are all security issues fixed in the LibVNCServer-devel-0.9.1-154.24 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2450/">CVE-2006-2450</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145394" comment="LibVNCServer-devel-0.9.1-154.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36484" version="1" class="patch">
	<metadata>
		<title>Mesa-devel-32bit-9.0.3-0.28.29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1872" ref_url="https://www.suse.com/security/cve/CVE-2013-1872/" source="CVE"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-devel-32bit-9.0.3-0.28.29.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1872/">CVE-2013-1872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145395" comment="Mesa-devel-9.0.3-0.28.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145396" comment="Mesa-devel-32bit-9.0.3-0.28.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36485" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-devel-31.7.0esr-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6077" ref_url="https://www.suse.com/security/cve/CVE-2006-6077/" source="CVE"/>
		<reference ref_id="CVE-2007-0008" ref_url="https://www.suse.com/security/cve/CVE-2007-0008/" source="CVE"/>
		<reference ref_id="CVE-2007-0009" ref_url="https://www.suse.com/security/cve/CVE-2007-0009/" source="CVE"/>
		<reference ref_id="CVE-2007-0078" ref_url="https://www.suse.com/security/cve/CVE-2007-0078/" source="CVE"/>
		<reference ref_id="CVE-2007-0079" ref_url="https://www.suse.com/security/cve/CVE-2007-0079/" source="CVE"/>
		<reference ref_id="CVE-2007-0775" ref_url="https://www.suse.com/security/cve/CVE-2007-0775/" source="CVE"/>
		<reference ref_id="CVE-2007-0776" ref_url="https://www.suse.com/security/cve/CVE-2007-0776/" source="CVE"/>
		<reference ref_id="CVE-2007-0777" ref_url="https://www.suse.com/security/cve/CVE-2007-0777/" source="CVE"/>
		<reference ref_id="CVE-2007-0780" ref_url="https://www.suse.com/security/cve/CVE-2007-0780/" source="CVE"/>
		<reference ref_id="CVE-2007-0800" ref_url="https://www.suse.com/security/cve/CVE-2007-0800/" source="CVE"/>
		<reference ref_id="CVE-2007-0981" ref_url="https://www.suse.com/security/cve/CVE-2007-0981/" source="CVE"/>
		<reference ref_id="CVE-2007-0995" ref_url="https://www.suse.com/security/cve/CVE-2007-0995/" source="CVE"/>
		<reference ref_id="CVE-2007-0996" ref_url="https://www.suse.com/security/cve/CVE-2007-0996/" source="CVE"/>
		<reference ref_id="CVE-2007-3089" ref_url="https://www.suse.com/security/cve/CVE-2007-3089/" source="CVE"/>
		<reference ref_id="CVE-2007-3285" ref_url="https://www.suse.com/security/cve/CVE-2007-3285/" source="CVE"/>
		<reference ref_id="CVE-2007-3656" ref_url="https://www.suse.com/security/cve/CVE-2007-3656/" source="CVE"/>
		<reference ref_id="CVE-2007-3670" ref_url="https://www.suse.com/security/cve/CVE-2007-3670/" source="CVE"/>
		<reference ref_id="CVE-2007-3734" ref_url="https://www.suse.com/security/cve/CVE-2007-3734/" source="CVE"/>
		<reference ref_id="CVE-2007-3735" ref_url="https://www.suse.com/security/cve/CVE-2007-3735/" source="CVE"/>
		<reference ref_id="CVE-2007-3736" ref_url="https://www.suse.com/security/cve/CVE-2007-3736/" source="CVE"/>
		<reference ref_id="CVE-2007-3737" ref_url="https://www.suse.com/security/cve/CVE-2007-3737/" source="CVE"/>
		<reference ref_id="CVE-2007-3738" ref_url="https://www.suse.com/security/cve/CVE-2007-3738/" source="CVE"/>
		<reference ref_id="CVE-2008-0412" ref_url="https://www.suse.com/security/cve/CVE-2008-0412/" source="CVE"/>
		<reference ref_id="CVE-2008-0414" ref_url="https://www.suse.com/security/cve/CVE-2008-0414/" source="CVE"/>
		<reference ref_id="CVE-2008-0415" ref_url="https://www.suse.com/security/cve/CVE-2008-0415/" source="CVE"/>
		<reference ref_id="CVE-2008-0417" ref_url="https://www.suse.com/security/cve/CVE-2008-0417/" source="CVE"/>
		<reference ref_id="CVE-2008-0418" ref_url="https://www.suse.com/security/cve/CVE-2008-0418/" source="CVE"/>
		<reference ref_id="CVE-2008-0419" ref_url="https://www.suse.com/security/cve/CVE-2008-0419/" source="CVE"/>
		<reference ref_id="CVE-2008-0591" ref_url="https://www.suse.com/security/cve/CVE-2008-0591/" source="CVE"/>
		<reference ref_id="CVE-2008-0592" ref_url="https://www.suse.com/security/cve/CVE-2008-0592/" source="CVE"/>
		<reference ref_id="CVE-2008-0593" ref_url="https://www.suse.com/security/cve/CVE-2008-0593/" source="CVE"/>
		<reference ref_id="CVE-2008-0594" ref_url="https://www.suse.com/security/cve/CVE-2008-0594/" source="CVE"/>
		<reference ref_id="CVE-2008-3836" ref_url="https://www.suse.com/security/cve/CVE-2008-3836/" source="CVE"/>
		<reference ref_id="CVE-2008-4063" ref_url="https://www.suse.com/security/cve/CVE-2008-4063/" source="CVE"/>
		<reference ref_id="CVE-2008-4064" ref_url="https://www.suse.com/security/cve/CVE-2008-4064/" source="CVE"/>
		<reference ref_id="CVE-2008-4070" ref_url="https://www.suse.com/security/cve/CVE-2008-4070/" source="CVE"/>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0352" ref_url="https://www.suse.com/security/cve/CVE-2009-0352/" source="CVE"/>
		<reference ref_id="CVE-2009-0353" ref_url="https://www.suse.com/security/cve/CVE-2009-0353/" source="CVE"/>
		<reference ref_id="CVE-2009-0354" ref_url="https://www.suse.com/security/cve/CVE-2009-0354/" source="CVE"/>
		<reference ref_id="CVE-2009-0355" ref_url="https://www.suse.com/security/cve/CVE-2009-0355/" source="CVE"/>
		<reference ref_id="CVE-2009-0356" ref_url="https://www.suse.com/security/cve/CVE-2009-0356/" source="CVE"/>
		<reference ref_id="CVE-2009-0357" ref_url="https://www.suse.com/security/cve/CVE-2009-0357/" source="CVE"/>
		<reference ref_id="CVE-2009-0358" ref_url="https://www.suse.com/security/cve/CVE-2009-0358/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-1571" ref_url="https://www.suse.com/security/cve/CVE-2009-1571/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2009-3988" ref_url="https://www.suse.com/security/cve/CVE-2009-3988/" source="CVE"/>
		<reference ref_id="CVE-2010-0159" ref_url="https://www.suse.com/security/cve/CVE-2010-0159/" source="CVE"/>
		<reference ref_id="CVE-2010-0160" ref_url="https://www.suse.com/security/cve/CVE-2010-0160/" source="CVE"/>
		<reference ref_id="CVE-2010-0162" ref_url="https://www.suse.com/security/cve/CVE-2010-0162/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0175" ref_url="https://www.suse.com/security/cve/CVE-2010-0175/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0183" ref_url="https://www.suse.com/security/cve/CVE-2010-0183/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2011-3665" ref_url="https://www.suse.com/security/cve/CVE-2011-3665/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-devel-31.7.0esr-0.8.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6077/">CVE-2006-6077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0008/">CVE-2007-0008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0009/">CVE-2007-0009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0078/">CVE-2007-0078</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0079/">CVE-2007-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0775/">CVE-2007-0775</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0776/">CVE-2007-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0777/">CVE-2007-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0780/">CVE-2007-0780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0800/">CVE-2007-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0981/">CVE-2007-0981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0995/">CVE-2007-0995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0996/">CVE-2007-0996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3089/">CVE-2007-3089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3285/">CVE-2007-3285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3656/">CVE-2007-3656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3670/">CVE-2007-3670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3734/">CVE-2007-3734</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3735/">CVE-2007-3735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3736/">CVE-2007-3736</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3737/">CVE-2007-3737</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3738/">CVE-2007-3738</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0412/">CVE-2008-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0414/">CVE-2008-0414</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0415/">CVE-2008-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0417/">CVE-2008-0417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0418/">CVE-2008-0418</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0419/">CVE-2008-0419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0591/">CVE-2008-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0592/">CVE-2008-0592</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-0593/">CVE-2008-0593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0594/">CVE-2008-0594</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3836/">CVE-2008-3836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4063/">CVE-2008-4063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4064/">CVE-2008-4064</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4070/">CVE-2008-4070</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0352/">CVE-2009-0352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0353/">CVE-2009-0353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0354/">CVE-2009-0354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0355/">CVE-2009-0355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0356/">CVE-2009-0356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0357/">CVE-2009-0357</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-0358/">CVE-2009-0358</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1571/">CVE-2009-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3988/">CVE-2009-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0159/">CVE-2010-0159</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0160/">CVE-2010-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0162/">CVE-2010-0162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0175/">CVE-2010-0175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0183/">CVE-2010-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3665/">CVE-2011-3665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110025" comment="MozillaFirefox-devel-31.7.0esr-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36486" version="1" class="patch">
	<metadata>
		<title>NetworkManager-devel-0.7.1_git20090811-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-devel-0.7.1_git20090811-3.28.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145397" comment="NetworkManager-devel-0.7.1_git20090811-3.28.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36487" version="1" class="patch">
	<metadata>
		<title>OpenEXR-32bit-1.6.1-83.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the OpenEXR-32bit-1.6.1-83.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054495" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054516" comment="OpenEXR-devel-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36488" version="1" class="patch">
	<metadata>
		<title>PackageKit-devel-0.3.14-2.30.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-devel-0.3.14-2.30.11 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145398" comment="PackageKit-devel-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145399" comment="hal-devel-0.5.12-23.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145400" comment="libpackagekit-glib10-devel-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145401" comment="libpackagekit-qt10-0.3.14-2.30.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145402" comment="libpackagekit-qt10-devel-0.3.14-2.30.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36489" version="1" class="patch">
	<metadata>
		<title>PolicyKit-devel-0.9-14.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1658" ref_url="https://www.suse.com/security/cve/CVE-2008-1658/" source="CVE"/>
		<description>
These are all security issues fixed in the PolicyKit-devel-0.9-14.43.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1658/">CVE-2008-1658</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145403" comment="PolicyKit-devel-0.9-14.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36490" version="1" class="patch">
	<metadata>
		<title>Xerces-c-2.8.0-29.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<description>
These are all security issues fixed in the Xerces-c-2.8.0-29.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054067" comment="Xerces-c-2.8.0-29.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054068" comment="libXerces-c-devel-2.8.0-29.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054069" comment="libXerces-c28-2.8.0-29.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36491" version="1" class="patch">
	<metadata>
		<title>a2ps-devel-4.13-1326.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>
These are all security issues fixed in the a2ps-devel-4.13-1326.37.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098881" comment="a2ps-devel-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36492" version="1" class="patch">
	<metadata>
		<title>ant-1.7.1-20.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2098" ref_url="https://www.suse.com/security/cve/CVE-2012-2098/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.7.1-20.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2098/">CVE-2012-2098</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143943" comment="ant-1.7.1-20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145404" comment="ant-antlr-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145405" comment="ant-apache-bcel-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145406" comment="ant-apache-bsf-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145407" comment="ant-apache-log4j-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145408" comment="ant-apache-oro-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145409" comment="ant-apache-regexp-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145410" comment="ant-apache-resolver-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145411" comment="ant-commons-logging-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145412" comment="ant-javadoc-1.7.1-20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145413" comment="ant-javamail-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145414" comment="ant-jdepend-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145415" comment="ant-jmf-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145416" comment="ant-junit-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145417" comment="ant-manual-1.7.1-20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145418" comment="ant-nodeps-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145419" comment="ant-scripts-1.7.1-20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145420" comment="ant-swing-1.7.1-16.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143944" comment="ant-trax-1.7.1-16.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36493" version="1" class="patch">
	<metadata>
		<title>apache2-2.2.12-1.51.52.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2003-1418" ref_url="https://www.suse.com/security/cve/CVE-2003-1418/" source="CVE"/>
		<reference ref_id="CVE-2006-3747" ref_url="https://www.suse.com/security/cve/CVE-2006-3747/" source="CVE"/>
		<reference ref_id="CVE-2006-5752" ref_url="https://www.suse.com/security/cve/CVE-2006-5752/" source="CVE"/>
		<reference ref_id="CVE-2007-1862" ref_url="https://www.suse.com/security/cve/CVE-2007-1862/" source="CVE"/>
		<reference ref_id="CVE-2007-1863" ref_url="https://www.suse.com/security/cve/CVE-2007-1863/" source="CVE"/>
		<reference ref_id="CVE-2007-3304" ref_url="https://www.suse.com/security/cve/CVE-2007-3304/" source="CVE"/>
		<reference ref_id="CVE-2007-3847" ref_url="https://www.suse.com/security/cve/CVE-2007-3847/" source="CVE"/>
		<reference ref_id="CVE-2007-4465" ref_url="https://www.suse.com/security/cve/CVE-2007-4465/" source="CVE"/>
		<reference ref_id="CVE-2007-5000" ref_url="https://www.suse.com/security/cve/CVE-2007-5000/" source="CVE"/>
		<reference ref_id="CVE-2007-6388" ref_url="https://www.suse.com/security/cve/CVE-2007-6388/" source="CVE"/>
		<reference ref_id="CVE-2007-6420" ref_url="https://www.suse.com/security/cve/CVE-2007-6420/" source="CVE"/>
		<reference ref_id="CVE-2007-6421" ref_url="https://www.suse.com/security/cve/CVE-2007-6421/" source="CVE"/>
		<reference ref_id="CVE-2007-6422" ref_url="https://www.suse.com/security/cve/CVE-2007-6422/" source="CVE"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2008-0005" ref_url="https://www.suse.com/security/cve/CVE-2008-0005/" source="CVE"/>
		<reference ref_id="CVE-2008-1678" ref_url="https://www.suse.com/security/cve/CVE-2008-1678/" source="CVE"/>
		<reference ref_id="CVE-2008-2364" ref_url="https://www.suse.com/security/cve/CVE-2008-2364/" source="CVE"/>
		<reference ref_id="CVE-2008-2939" ref_url="https://www.suse.com/security/cve/CVE-2008-2939/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3348" ref_url="https://www.suse.com/security/cve/CVE-2011-3348/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-0883" ref_url="https://www.suse.com/security/cve/CVE-2012-0883/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-4557" ref_url="https://www.suse.com/security/cve/CVE-2012-4557/" source="CVE"/>
		<reference ref_id="CVE-2012-4558" ref_url="https://www.suse.com/security/cve/CVE-2012-4558/" source="CVE"/>
		<reference ref_id="CVE-2013-1862" ref_url="https://www.suse.com/security/cve/CVE-2013-1862/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.2.12-1.51.52.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2003-1418/">CVE-2003-1418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-3747/">CVE-2006-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5752/">CVE-2006-5752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1862/">CVE-2007-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1863/">CVE-2007-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3304/">CVE-2007-3304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3847/">CVE-2007-3847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4465/">CVE-2007-4465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5000/">CVE-2007-5000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6388/">CVE-2007-6388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6420/">CVE-2007-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6421/">CVE-2007-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6422/">CVE-2007-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0005/">CVE-2008-0005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1678/">CVE-2008-1678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2364/">CVE-2008-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2939/">CVE-2008-2939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3348/">CVE-2011-3348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0883/">CVE-2012-0883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4557/">CVE-2012-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4558/">CVE-2012-4558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1862/">CVE-2013-1862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108649" comment="apache2-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108643" comment="apache2-devel-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108644" comment="apache2-doc-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108645" comment="apache2-example-pages-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108646" comment="apache2-prefork-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108647" comment="apache2-utils-2.2.12-1.51.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108648" comment="apache2-worker-2.2.12-1.51.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36494" version="1" class="patch">
	<metadata>
		<title>apache2-mod_fcgid-2.2-31.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3872" ref_url="https://www.suse.com/security/cve/CVE-2010-3872/" source="CVE"/>
		<reference ref_id="CVE-2013-4365" ref_url="https://www.suse.com/security/cve/CVE-2013-4365/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_fcgid-2.2-31.27.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3872/">CVE-2010-3872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4365/">CVE-2013-4365</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091357" comment="apache2-mod_fcgid-2.2-31.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36495" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.4-40.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1349" ref_url="https://www.suse.com/security/cve/CVE-2007-1349/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.4-40.24.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1349/">CVE-2007-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143947" comment="apache2-mod_perl-2.0.4-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145421" comment="apache2-mod_perl-devel-2.0.4-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36496" version="1" class="patch">
	<metadata>
		<title>augeas-devel-0.9.0-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-devel-0.9.0-3.15.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099546" comment="augeas-devel-0.9.0-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36497" version="1" class="patch">
	<metadata>
		<title>automake-1.10.1-4.131.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.10.1-4.131.9.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009089841" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36498" version="1" class="patch">
	<metadata>
		<title>avahi-compat-howl-devel-0.6.23-11.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5461" ref_url="https://www.suse.com/security/cve/CVE-2006-5461/" source="CVE"/>
		<reference ref_id="CVE-2006-6870" ref_url="https://www.suse.com/security/cve/CVE-2006-6870/" source="CVE"/>
		<reference ref_id="CVE-2007-3372" ref_url="https://www.suse.com/security/cve/CVE-2007-3372/" source="CVE"/>
		<reference ref_id="CVE-2008-5081" ref_url="https://www.suse.com/security/cve/CVE-2008-5081/" source="CVE"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-compat-howl-devel-0.6.23-11.32.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5461/">CVE-2006-5461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6870/">CVE-2006-6870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3372/">CVE-2007-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5081/">CVE-2008-5081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145422" comment="avahi-compat-howl-devel-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145423" comment="avahi-compat-mDNSResponder-devel-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145424" comment="libavahi-devel-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145425" comment="libhowl0-0.6.23-11.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145426" comment="python-avahi-0.6.23-11.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36499" version="1" class="patch">
	<metadata>
		<title>bind-devel-32bit-9.9.6P1-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2007-2925" ref_url="https://www.suse.com/security/cve/CVE-2007-2925/" source="CVE"/>
		<reference ref_id="CVE-2007-2926" ref_url="https://www.suse.com/security/cve/CVE-2007-2926/" source="CVE"/>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-devel-32bit-9.9.6P1-0.5.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2925/">CVE-2007-2925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2926/">CVE-2007-2926</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106114" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103740" comment="bind-devel-32bit-9.9.6P1-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36500" version="1" class="patch">
	<metadata>
		<title>binutils-devel-2.24-3.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-devel-2.24-3.62 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145427" comment="binutils-devel-2.24-3.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145428" comment="binutils-devel-32bit-2.24-3.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145429" comment="binutils-gold-2.24-3.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145430" comment="cross-ppc-binutils-2.24-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145431" comment="cross-spu-binutils-2.24-3.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36501" version="1" class="patch">
	<metadata>
		<title>boinc-client-6.2.18-4.31.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<description>
These are all security issues fixed in the boinc-client-6.2.18-4.31.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145432" comment="boinc-client-6.2.18-4.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145433" comment="boinc-client-devel-6.2.18-4.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36502" version="1" class="patch">
	<metadata>
		<title>boost-devel-1.36.0-12.6.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0171" ref_url="https://www.suse.com/security/cve/CVE-2008-0171/" source="CVE"/>
		<description>
These are all security issues fixed in the boost-devel-1.36.0-12.6.49 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0171/">CVE-2008-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145434" comment="boost-devel-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145435" comment="boost-devel-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145436" comment="boost-doc-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145437" comment="libboost_date_time1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145438" comment="libboost_date_time1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145439" comment="libboost_filesystem1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145440" comment="libboost_filesystem1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145441" comment="libboost_graph1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145442" comment="libboost_graph1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145443" comment="libboost_iostreams1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145444" comment="libboost_iostreams1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145445" comment="libboost_math1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145446" comment="libboost_math1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145447" comment="libboost_mpi1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143971" comment="libboost_program_options1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145448" comment="libboost_program_options1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145449" comment="libboost_python1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145450" comment="libboost_python1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143972" comment="libboost_regex1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145451" comment="libboost_regex1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145452" comment="libboost_serialization1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145453" comment="libboost_serialization1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145454" comment="libboost_signals1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145455" comment="libboost_system1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145456" comment="libboost_system1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145457" comment="libboost_test1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145458" comment="libboost_test1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143975" comment="libboost_thread1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145459" comment="libboost_thread1_36_0-32bit-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145460" comment="libboost_wave1_36_0-1.36.0-12.6.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145461" comment="libboost_wave1_36_0-32bit-1.36.0-12.6.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36503" version="1" class="patch">
	<metadata>
		<title>build-2011.10.10-0.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4226" ref_url="https://www.suse.com/security/cve/CVE-2010-4226/" source="CVE"/>
		<description>
These are all security issues fixed in the build-2011.10.10-0.7.10 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4226/">CVE-2010-4226</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145462" comment="build-2011.10.10-0.7.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36504" version="1" class="patch">
	<metadata>
		<title>bytefx-data-mysql-2.6.7-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0217" ref_url="https://www.suse.com/security/cve/CVE-2009-0217/" source="CVE"/>
		<reference ref_id="CVE-2010-1459" ref_url="https://www.suse.com/security/cve/CVE-2010-1459/" source="CVE"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<reference ref_id="CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318/" source="CVE"/>
		<reference ref_id="CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319/" source="CVE"/>
		<reference ref_id="CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320/" source="CVE"/>
		<description>
These are all security issues fixed in the bytefx-data-mysql-2.6.7-0.13.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0217/">CVE-2009-0217</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1459/">CVE-2010-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109244" comment="bytefx-data-mysql-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109245" comment="mono-core-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109251" comment="mono-data-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109246" comment="mono-data-firebird-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109247" comment="mono-data-oracle-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109248" comment="mono-data-postgresql-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109249" comment="mono-data-sqlite-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109250" comment="mono-data-sybase-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109252" comment="mono-devel-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109253" comment="mono-extras-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109254" comment="mono-jscript-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109255" comment="mono-locale-extras-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109256" comment="mono-nunit-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109257" comment="mono-wcf-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109258" comment="mono-web-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109259" comment="mono-winforms-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109260" comment="mono-winfxcore-2.6.7-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109261" comment="monodoc-core-2.6.7-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36505" version="1" class="patch">
	<metadata>
		<title>coolkey-devel-1.1.0-22.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-devel-1.1.0-22.24 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145463" comment="coolkey-devel-1.1.0-22.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36506" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.3+r212056-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.3+r212056-2.17 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145464" comment="cpp48-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145465" comment="gcc48-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145466" comment="gcc48-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145467" comment="gcc48-c++-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145468" comment="gcc48-fortran-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145469" comment="gcc48-fortran-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145470" comment="gcc48-info-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145471" comment="gcc48-locale-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145472" comment="libasan0-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145473" comment="libatomic1-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144114" comment="libgfortran3-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145474" comment="libgfortran3-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145475" comment="libitm1-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144117" comment="libquadmath0-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145476" comment="libquadmath0-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145477" comment="libstdc++48-devel-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145478" comment="libstdc++48-devel-32bit-4.8.3+r212056-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145479" comment="libtsan0-4.8.3+r212056-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36507" version="1" class="patch">
	<metadata>
		<title>cscope-15.6-95.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2004-2541" ref_url="https://www.suse.com/security/cve/CVE-2004-2541/" source="CVE"/>
		<reference ref_id="CVE-2006-4262" ref_url="https://www.suse.com/security/cve/CVE-2006-4262/" source="CVE"/>
		<description>
These are all security issues fixed in the cscope-15.6-95.22 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2004-2541/">CVE-2004-2541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4262/">CVE-2006-4262</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145480" comment="cscope-15.6-95.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36508" version="1" class="patch">
	<metadata>
		<title>ctdb-devel-1.0.114.6-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4159" ref_url="https://www.suse.com/security/cve/CVE-2013-4159/" source="CVE"/>
		<description>
These are all security issues fixed in the ctdb-devel-1.0.114.6-0.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4159/">CVE-2013-4159</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098799" comment="ctdb-devel-1.0.114.6-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36509" version="1" class="patch">
	<metadata>
		<title>cups-devel-1.3.9-8.46.56.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-3387" ref_url="https://www.suse.com/security/cve/CVE-2007-3387/" source="CVE"/>
		<reference ref_id="CVE-2007-4351" ref_url="https://www.suse.com/security/cve/CVE-2007-4351/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-0047" ref_url="https://www.suse.com/security/cve/CVE-2008-0047/" source="CVE"/>
		<reference ref_id="CVE-2008-1373" ref_url="https://www.suse.com/security/cve/CVE-2008-1373/" source="CVE"/>
		<reference ref_id="CVE-2008-1693" ref_url="https://www.suse.com/security/cve/CVE-2008-1693/" source="CVE"/>
		<reference ref_id="CVE-2008-1722" ref_url="https://www.suse.com/security/cve/CVE-2008-1722/" source="CVE"/>
		<reference ref_id="CVE-2008-3641" ref_url="https://www.suse.com/security/cve/CVE-2008-3641/" source="CVE"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-0949" ref_url="https://www.suse.com/security/cve/CVE-2009-0949/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0302" ref_url="https://www.suse.com/security/cve/CVE-2010-0302/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-devel-1.3.9-8.46.56.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-3387/">CVE-2007-3387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4351/">CVE-2007-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0047/">CVE-2008-0047</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1373/">CVE-2008-1373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1693/">CVE-2008-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1722/">CVE-2008-1722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3641/">CVE-2008-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0949/">CVE-2009-0949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0302/">CVE-2010-0302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110275" comment="cups-devel-1.3.9-8.46.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36510" version="1" class="patch">
	<metadata>
		<title>cvs-doc-1.12.12-144.23.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-doc-1.12.12-144.23.5.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073074" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36511" version="1" class="patch">
	<metadata>
		<title>cyrus-imapd-devel-2.3.11-60.65.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-imapd-devel-2.3.11-60.65.64.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071590" comment="cyrus-imapd-devel-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071559" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071560" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36512" version="1" class="patch">
	<metadata>
		<title>dbus-1-devel-1.2.10-3.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6107" ref_url="https://www.suse.com/security/cve/CVE-2006-6107/" source="CVE"/>
		<reference ref_id="CVE-2008-0595" ref_url="https://www.suse.com/security/cve/CVE-2008-0595/" source="CVE"/>
		<reference ref_id="CVE-2008-3834" ref_url="https://www.suse.com/security/cve/CVE-2008-3834/" source="CVE"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2009-1189" ref_url="https://www.suse.com/security/cve/CVE-2009-1189/" source="CVE"/>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-devel-1.2.10-3.31.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6107/">CVE-2006-6107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0595/">CVE-2008-0595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3834/">CVE-2008-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1189/">CVE-2009-1189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100697" comment="dbus-1-devel-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100696" comment="dbus-1-devel-doc-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36513" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-devel-0.76-34.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-devel-0.76-34.22.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145481" comment="dbus-1-glib-devel-0.76-34.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36514" version="1" class="patch">
	<metadata>
		<title>derby-10.3.1.4-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2005-4849" ref_url="https://www.suse.com/security/cve/CVE-2005-4849/" source="CVE"/>
		<reference ref_id="CVE-2006-7216" ref_url="https://www.suse.com/security/cve/CVE-2006-7216/" source="CVE"/>
		<reference ref_id="CVE-2006-7217" ref_url="https://www.suse.com/security/cve/CVE-2006-7217/" source="CVE"/>
		<description>
These are all security issues fixed in the derby-10.3.1.4-1.16 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2005-4849/">CVE-2005-4849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7216/">CVE-2006-7216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7217/">CVE-2006-7217</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145482" comment="derby-10.3.1.4-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36515" version="1" class="patch">
	<metadata>
		<title>dhcp-devel-4.2.4.P2-0.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-devel-4.2.4.P2-0.22.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145483" comment="dhcp-devel-4.2.4.P2-0.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36516" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-devel-1.41.9-2.14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5497" ref_url="https://www.suse.com/security/cve/CVE-2007-5497/" source="CVE"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-devel-1.41.9-2.14.3 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5497/">CVE-2007-5497</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145484" comment="e2fsprogs-devel-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145485" comment="libcom_err-devel-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145486" comment="libcom_err-devel-32bit-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145487" comment="libext2fs-devel-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145488" comment="libext2fs-devel-32bit-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145489" comment="libext2fs2-32bit-1.41.9-2.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145490" comment="libext2fs2-x86-1.41.9-2.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36517" version="1" class="patch">
	<metadata>
		<title>emacs-nox-22.3-4.42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5795" ref_url="https://www.suse.com/security/cve/CVE-2007-5795/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-nox-22.3-4.42.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5795/">CVE-2007-5795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109212" comment="emacs-nox-22.3-4.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36518" version="1" class="patch">
	<metadata>
		<title>empathy-2.28.2-0.13.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3635" ref_url="https://www.suse.com/security/cve/CVE-2011-3635/" source="CVE"/>
		<description>
These are all security issues fixed in the empathy-2.28.2-0.13.49 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3635/">CVE-2011-3635</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145491" comment="empathy-2.28.2-0.13.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145492" comment="empathy-devel-2.28.2-0.13.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145493" comment="empathy-lang-2.28.2-0.13.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36519" version="1" class="patch">
	<metadata>
		<title>evince-devel-2.28.2-0.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5864" ref_url="https://www.suse.com/security/cve/CVE-2006-5864/" source="CVE"/>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-devel-2.28.2-0.7.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5864/">CVE-2006-5864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145494" comment="evince-devel-2.28.2-0.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36520" version="1" class="patch">
	<metadata>
		<title>evolution-2.28.2-0.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1108" ref_url="https://www.suse.com/security/cve/CVE-2008-1108/" source="CVE"/>
		<reference ref_id="CVE-2008-1109" ref_url="https://www.suse.com/security/cve/CVE-2008-1109/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-2.28.2-0.30.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1108/">CVE-2008-1108</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1109/">CVE-2008-1109</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145495" comment="evolution-2.28.2-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145496" comment="evolution-devel-2.28.2-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145497" comment="evolution-lang-2.28.2-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36521" version="1" class="patch">
	<metadata>
		<title>evolution-data-server-devel-2.28.2-0.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3257" ref_url="https://www.suse.com/security/cve/CVE-2007-3257/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-data-server-devel-2.28.2-0.32.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3257/">CVE-2007-3257</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102328" comment="evolution-data-server-devel-2.28.2-0.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36522" version="1" class="patch">
	<metadata>
		<title>fastjar-0.95-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>
These are all security issues fixed in the fastjar-0.95-1.24.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091213" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36523" version="1" class="patch">
	<metadata>
		<title>file-devel-4.24-43.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1536" ref_url="https://www.suse.com/security/cve/CVE-2007-1536/" source="CVE"/>
		<reference ref_id="CVE-2007-2799" ref_url="https://www.suse.com/security/cve/CVE-2007-2799/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>
These are all security issues fixed in the file-devel-4.24-43.27.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1536/">CVE-2007-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2799/">CVE-2007-2799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102014" comment="file-devel-4.24-43.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36524" version="1" class="patch">
	<metadata>
		<title>fileshareset-2.0-20.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4569" ref_url="https://www.suse.com/security/cve/CVE-2007-4569/" source="CVE"/>
		<description>
These are all security issues fixed in the fileshareset-2.0-20.31 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4569/">CVE-2007-4569</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145498" comment="fileshareset-2.0-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145499" comment="kdebase3-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145500" comment="kdebase3-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145501" comment="kdebase3-devel-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143640" comment="kdebase3-runtime-32bit-3.5.10-20.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145502" comment="misc-console-font-3.5.10-20.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36525" version="1" class="patch">
	<metadata>
		<title>finch-2.6.6-0.25.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2927" ref_url="https://www.suse.com/security/cve/CVE-2008-2927/" source="CVE"/>
		<reference ref_id="CVE-2008-2955" ref_url="https://www.suse.com/security/cve/CVE-2008-2955/" source="CVE"/>
		<reference ref_id="CVE-2008-3532" ref_url="https://www.suse.com/security/cve/CVE-2008-3532/" source="CVE"/>
		<reference ref_id="CVE-2009-1373" ref_url="https://www.suse.com/security/cve/CVE-2009-1373/" source="CVE"/>
		<reference ref_id="CVE-2009-1374" ref_url="https://www.suse.com/security/cve/CVE-2009-1374/" source="CVE"/>
		<reference ref_id="CVE-2009-1375" ref_url="https://www.suse.com/security/cve/CVE-2009-1375/" source="CVE"/>
		<reference ref_id="CVE-2009-1376" ref_url="https://www.suse.com/security/cve/CVE-2009-1376/" source="CVE"/>
		<reference ref_id="CVE-2009-1889" ref_url="https://www.suse.com/security/cve/CVE-2009-1889/" source="CVE"/>
		<reference ref_id="CVE-2009-2694" ref_url="https://www.suse.com/security/cve/CVE-2009-2694/" source="CVE"/>
		<reference ref_id="CVE-2009-2703" ref_url="https://www.suse.com/security/cve/CVE-2009-2703/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<reference ref_id="CVE-2010-0277" ref_url="https://www.suse.com/security/cve/CVE-2010-0277/" source="CVE"/>
		<reference ref_id="CVE-2010-0420" ref_url="https://www.suse.com/security/cve/CVE-2010-0420/" source="CVE"/>
		<reference ref_id="CVE-2010-0423" ref_url="https://www.suse.com/security/cve/CVE-2010-0423/" source="CVE"/>
		<reference ref_id="CVE-2010-1624" ref_url="https://www.suse.com/security/cve/CVE-2010-1624/" source="CVE"/>
		<reference ref_id="CVE-2010-3711" ref_url="https://www.suse.com/security/cve/CVE-2010-3711/" source="CVE"/>
		<reference ref_id="CVE-2011-1091" ref_url="https://www.suse.com/security/cve/CVE-2011-1091/" source="CVE"/>
		<reference ref_id="CVE-2011-3594" ref_url="https://www.suse.com/security/cve/CVE-2011-3594/" source="CVE"/>
		<reference ref_id="CVE-2011-4601" ref_url="https://www.suse.com/security/cve/CVE-2011-4601/" source="CVE"/>
		<reference ref_id="CVE-2011-4602" ref_url="https://www.suse.com/security/cve/CVE-2011-4602/" source="CVE"/>
		<reference ref_id="CVE-2011-4603" ref_url="https://www.suse.com/security/cve/CVE-2011-4603/" source="CVE"/>
		<reference ref_id="CVE-2012-1178" ref_url="https://www.suse.com/security/cve/CVE-2012-1178/" source="CVE"/>
		<reference ref_id="CVE-2012-2214" ref_url="https://www.suse.com/security/cve/CVE-2012-2214/" source="CVE"/>
		<reference ref_id="CVE-2012-3374" ref_url="https://www.suse.com/security/cve/CVE-2012-3374/" source="CVE"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2013-6489" ref_url="https://www.suse.com/security/cve/CVE-2013-6489/" source="CVE"/>
		<reference ref_id="CVE-2013-6490" ref_url="https://www.suse.com/security/cve/CVE-2013-6490/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the finch-2.6.6-0.25.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2927/">CVE-2008-2927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2955/">CVE-2008-2955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3532/">CVE-2008-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1373/">CVE-2009-1373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1374/">CVE-2009-1374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1375/">CVE-2009-1375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1376/">CVE-2009-1376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1889/">CVE-2009-1889</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2694/">CVE-2009-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2703/">CVE-2009-2703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0277/">CVE-2010-0277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0420/">CVE-2010-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0423/">CVE-2010-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1624/">CVE-2010-1624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3711/">CVE-2010-3711</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1091/">CVE-2011-1091</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3594/">CVE-2011-3594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4601/">CVE-2011-4601</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4602/">CVE-2011-4602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4603/">CVE-2011-4603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1178/">CVE-2012-1178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2214/">CVE-2012-2214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3374/">CVE-2012-3374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6489/">CVE-2013-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6490/">CVE-2013-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102692" comment="finch-2.6.6-0.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102691" comment="finch-devel-2.6.6-0.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102695" comment="libpurple-2.6.6-0.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102693" comment="libpurple-devel-2.6.6-0.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102694" comment="libpurple-lang-2.6.6-0.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102697" comment="pidgin-2.6.6-0.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102696" comment="pidgin-devel-2.6.6-0.25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36526" version="1" class="patch">
	<metadata>
		<title>flac-devel-1.2.1-68.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the flac-devel-1.2.1-68.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102501" comment="flac-devel-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102502" comment="libFLAC++6-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102503" comment="libFLAC++6-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36527" version="1" class="patch">
	<metadata>
		<title>freeradius-server-devel-2.1.1-7.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4474" ref_url="https://www.suse.com/security/cve/CVE-2008-4474/" source="CVE"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-devel-2.1.1-7.18.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4474/">CVE-2008-4474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098917" comment="freeradius-server-devel-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098690" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36528" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.3.7-25.35.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1351" ref_url="https://www.suse.com/security/cve/CVE-2007-1351/" source="CVE"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.3.7-25.35.36.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1351/">CVE-2007-1351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110207" comment="freetype2-devel-2.3.7-25.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110206" comment="freetype2-devel-32bit-2.3.7-25.35.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36529" version="1" class="patch">
	<metadata>
		<title>fuse-devel-2.8.7-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-devel-2.8.7-0.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110281" comment="fuse-devel-2.8.7-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36530" version="1" class="patch">
	<metadata>
		<title>fvwm2-2.5.26-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5969" ref_url="https://www.suse.com/security/cve/CVE-2006-5969/" source="CVE"/>
		<description>
These are all security issues fixed in the fvwm2-2.5.26-1.25 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5969/">CVE-2006-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143559" comment="fvwm2-2.5.26-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36531" version="1" class="patch">
	<metadata>
		<title>gd-devel-2.0.36.RC1-52.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2756" ref_url="https://www.suse.com/security/cve/CVE-2007-2756/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-devel-2.0.36.RC1-52.20.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2756/">CVE-2007-2756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109217" comment="gd-devel-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36532" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-0.22.0-294.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-0.22.0-294.26.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074871" comment="gdk-pixbuf-0.22.0-294.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074870" comment="gdk-pixbuf-32bit-0.22.0-294.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074890" comment="gdk-pixbuf-devel-0.22.0-294.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36533" version="1" class="patch">
	<metadata>
		<title>ghostscript-devel-8.62-32.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0583" ref_url="https://www.suse.com/security/cve/CVE-2009-0583/" source="CVE"/>
		<reference ref_id="CVE-2009-0584" ref_url="https://www.suse.com/security/cve/CVE-2009-0584/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<reference ref_id="CVE-2009-3743" ref_url="https://www.suse.com/security/cve/CVE-2009-3743/" source="CVE"/>
		<reference ref_id="CVE-2010-1869" ref_url="https://www.suse.com/security/cve/CVE-2010-1869/" source="CVE"/>
		<reference ref_id="CVE-2010-4054" ref_url="https://www.suse.com/security/cve/CVE-2010-4054/" source="CVE"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-devel-8.62-32.34.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0583/">CVE-2009-0583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0584/">CVE-2009-0584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3743/">CVE-2009-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1869/">CVE-2010-1869</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4054/">CVE-2010-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075774" comment="ghostscript-devel-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075775" comment="ghostscript-ijs-devel-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075776" comment="libgimpprint-devel-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36534" version="1" class="patch">
	<metadata>
		<title>gimp-2.6.2-3.34.45.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3404" ref_url="https://www.suse.com/security/cve/CVE-2006-3404/" source="CVE"/>
		<reference ref_id="CVE-2007-2356" ref_url="https://www.suse.com/security/cve/CVE-2007-2356/" source="CVE"/>
		<reference ref_id="CVE-2007-2949" ref_url="https://www.suse.com/security/cve/CVE-2007-2949/" source="CVE"/>
		<reference ref_id="CVE-2009-1570" ref_url="https://www.suse.com/security/cve/CVE-2009-1570/" source="CVE"/>
		<reference ref_id="CVE-2010-4540" ref_url="https://www.suse.com/security/cve/CVE-2010-4540/" source="CVE"/>
		<reference ref_id="CVE-2010-4541" ref_url="https://www.suse.com/security/cve/CVE-2010-4541/" source="CVE"/>
		<reference ref_id="CVE-2010-4542" ref_url="https://www.suse.com/security/cve/CVE-2010-4542/" source="CVE"/>
		<reference ref_id="CVE-2010-4543" ref_url="https://www.suse.com/security/cve/CVE-2010-4543/" source="CVE"/>
		<reference ref_id="CVE-2011-1178" ref_url="https://www.suse.com/security/cve/CVE-2011-1178/" source="CVE"/>
		<reference ref_id="CVE-2011-1782" ref_url="https://www.suse.com/security/cve/CVE-2011-1782/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2012-3403" ref_url="https://www.suse.com/security/cve/CVE-2012-3403/" source="CVE"/>
		<reference ref_id="CVE-2012-3481" ref_url="https://www.suse.com/security/cve/CVE-2012-3481/" source="CVE"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2013-1913" ref_url="https://www.suse.com/security/cve/CVE-2013-1913/" source="CVE"/>
		<reference ref_id="CVE-2013-1978" ref_url="https://www.suse.com/security/cve/CVE-2013-1978/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.6.2-3.34.45.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3404/">CVE-2006-3404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2356/">CVE-2007-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2949/">CVE-2007-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1570/">CVE-2009-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4540/">CVE-2010-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4541/">CVE-2010-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4542/">CVE-2010-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4543/">CVE-2010-4543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1178/">CVE-2011-1178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1782/">CVE-2011-1782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3403/">CVE-2012-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3481/">CVE-2012-3481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1913/">CVE-2013-1913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1978/">CVE-2013-1978</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009093459" comment="gimp-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009093456" comment="gimp-devel-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009093457" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009093458" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36535" version="1" class="patch">
	<metadata>
		<title>git-1.7.12.4-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2542" ref_url="https://www.suse.com/security/cve/CVE-2010-2542/" source="CVE"/>
		<reference ref_id="CVE-2010-3906" ref_url="https://www.suse.com/security/cve/CVE-2010-3906/" source="CVE"/>
		<reference ref_id="CVE-2013-0308" ref_url="https://www.suse.com/security/cve/CVE-2013-0308/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<description>
These are all security issues fixed in the git-1.7.12.4-0.9.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2542/">CVE-2010-2542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3906/">CVE-2010-3906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0308/">CVE-2013-0308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105496" comment="git-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105488" comment="git-arch-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105489" comment="git-core-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105490" comment="git-cvs-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105491" comment="git-daemon-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105492" comment="git-email-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105493" comment="git-gui-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105494" comment="git-svn-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105495" comment="git-web-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105497" comment="gitk-1.7.12.4-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36536" version="1" class="patch">
	<metadata>
		<title>glib2-devel-2.22.5-0.8.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2371" ref_url="https://www.suse.com/security/cve/CVE-2008-2371/" source="CVE"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-devel-2.22.5-0.8.14.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2371/">CVE-2008-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145503" comment="glib2-devel-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145504" comment="glib2-devel-32bit-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143991" comment="glib2-doc-2.22.5-0.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145505" comment="libgio-fam-2.22.5-0.8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36537" version="1" class="patch">
	<metadata>
		<title>glibc-html-2.11.3-17.84.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-html-2.11.3-17.84.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144012" comment="glibc-html-2.11.3-17.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144014" comment="glibc-info-2.11.3-17.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36538" version="1" class="patch">
	<metadata>
		<title>gmime-2_4-devel-2.4.8-1.2.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
These are all security issues fixed in the gmime-2_4-devel-2.4.8-1.2.55 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145506" comment="gmime-2_4-devel-2.4.8-1.2.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145507" comment="gmime-devel-2.2.23-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145508" comment="gmime-sharp-2.2.23-1.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36539" version="1" class="patch">
	<metadata>
		<title>gnucash-2.2.7-1.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0007" ref_url="https://www.suse.com/security/cve/CVE-2007-0007/" source="CVE"/>
		<description>
These are all security issues fixed in the gnucash-2.2.7-1.35 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0007/">CVE-2007-0007</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145509" comment="gnucash-2.2.7-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145510" comment="gnucash-devel-2.2.7-1.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145511" comment="gnucash-lang-2.2.7-1.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36540" version="1" class="patch">
	<metadata>
		<title>gstreamer-0_10-plugins-base-devel-0.10.35-5.15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-0_10-plugins-base-devel-0.10.35-5.15.8 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145512" comment="gstreamer-0_10-plugins-base-devel-0.10.35-5.15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36541" version="1" class="patch">
	<metadata>
		<title>gtk2-devel-2.18.9-0.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0010" ref_url="https://www.suse.com/security/cve/CVE-2007-0010/" source="CVE"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-devel-2.18.9-0.23.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0010/">CVE-2007-0010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074873" comment="gtk2-devel-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074891" comment="gtk2-devel-32bit-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36542" version="1" class="patch">
	<metadata>
		<title>ibutils-1.5.7-0.15.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3277" ref_url="https://www.suse.com/security/cve/CVE-2008-3277/" source="CVE"/>
		<reference ref_id="CVE-2013-1894" ref_url="https://www.suse.com/security/cve/CVE-2013-1894/" source="CVE"/>
		<description>
These are all security issues fixed in the ibutils-1.5.7-0.15.22 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3277/">CVE-2008-3277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1894/">CVE-2013-1894</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144033" comment="ibutils-1.5.7-0.15.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144034" comment="ibutils-32bit-1.5.7-0.15.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145513" comment="ibutils-devel-1.5.7-0.15.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145514" comment="ibutils-devel-32bit-1.5.7-0.15.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36543" version="1" class="patch">
	<metadata>
		<title>icu-4.0-7.26.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4770" ref_url="https://www.suse.com/security/cve/CVE-2007-4770/" source="CVE"/>
		<reference ref_id="CVE-2007-4771" ref_url="https://www.suse.com/security/cve/CVE-2007-4771/" source="CVE"/>
		<reference ref_id="CVE-2008-1036" ref_url="https://www.suse.com/security/cve/CVE-2008-1036/" source="CVE"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<description>
These are all security issues fixed in the icu-4.0-7.26.15 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4770/">CVE-2007-4770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4771/">CVE-2007-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1036/">CVE-2008-1036</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076346" comment="icu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076348" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076352" comment="libicu-devel-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076351" comment="libicu-devel-32bit-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36544" version="1" class="patch">
	<metadata>
		<title>imlib-1.9.14-401.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3568" ref_url="https://www.suse.com/security/cve/CVE-2007-3568/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib-1.9.14-401.20 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3568/">CVE-2007-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145515" comment="imlib-1.9.14-401.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145516" comment="imlib-32bit-1.9.14-401.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145517" comment="imlib-config-1.9.14-401.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145518" comment="imlib-devel-1.9.14-401.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145519" comment="imlib-x86-1.9.14-401.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36545" version="1" class="patch">
	<metadata>
		<title>imlib2-1.4.2-2.18.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2426" ref_url="https://www.suse.com/security/cve/CVE-2008-2426/" source="CVE"/>
		<reference ref_id="CVE-2008-5187" ref_url="https://www.suse.com/security/cve/CVE-2008-5187/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib2-1.4.2-2.18.53 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2426/">CVE-2008-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5187/">CVE-2008-5187</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145520" comment="imlib2-1.4.2-2.18.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145521" comment="imlib2-devel-1.4.2-2.18.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145522" comment="imlib2-filters-1.4.2-2.18.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145523" comment="imlib2-loaders-1.4.2-2.18.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36546" version="1" class="patch">
	<metadata>
		<title>inkscape-0.46-62.43.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-5656" ref_url="https://www.suse.com/security/cve/CVE-2012-5656/" source="CVE"/>
		<reference ref_id="CVE-2012-6076" ref_url="https://www.suse.com/security/cve/CVE-2012-6076/" source="CVE"/>
		<description>
These are all security issues fixed in the inkscape-0.46-62.43.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5656/">CVE-2012-5656</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6076/">CVE-2012-6076</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145524" comment="inkscape-0.46-62.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145525" comment="inkscape-extensions-dia-0.46-62.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145526" comment="inkscape-extensions-extra-0.46-62.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145527" comment="inkscape-extensions-fig-0.46-62.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145528" comment="inkscape-extensions-gimp-0.46-62.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145529" comment="inkscape-lang-0.46-62.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36547" version="1" class="patch">
	<metadata>
		<title>java-1_7_1-ibm-devel-1.7.1_sr3.0-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_1-ibm-devel-1.7.1_sr3.0-1.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145530" comment="java-1_7_1-ibm-devel-1.7.1_sr3.0-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36548" version="1" class="patch">
	<metadata>
		<title>kdebase4-workspace-devel-4.3.5-0.12.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>
These are all security issues fixed in the kdebase4-workspace-devel-4.3.5-0.12.18.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098798" comment="kdebase4-workspace-devel-4.3.5-0.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36549" version="1" class="patch">
	<metadata>
		<title>kdelibs3-32bit-3.5.10-23.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3820" ref_url="https://www.suse.com/security/cve/CVE-2007-3820/" source="CVE"/>
		<reference ref_id="CVE-2007-4224" ref_url="https://www.suse.com/security/cve/CVE-2007-4224/" source="CVE"/>
		<reference ref_id="CVE-2007-4225" ref_url="https://www.suse.com/security/cve/CVE-2007-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-1671" ref_url="https://www.suse.com/security/cve/CVE-2008-1671/" source="CVE"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs3-32bit-3.5.10-23.27.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3820/">CVE-2007-3820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4224/">CVE-2007-4224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4225/">CVE-2007-4225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1671/">CVE-2008-1671</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056564" comment="kdelibs3-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056620" comment="kdelibs3-arts-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056618" comment="kdelibs3-arts-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056619" comment="kdelibs3-arts-x86-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056565" comment="kdelibs3-default-style-32bit-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056621" comment="kdelibs3-devel-3.5.10-23.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056622" comment="kdelibs3-doc-3.5.10-23.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36550" version="1" class="patch">
	<metadata>
		<title>kdelibs4-doc-4.3.5-0.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>
These are all security issues fixed in the kdelibs4-doc-4.3.5-0.14.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112898" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112900" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116235" comment="libkde4-devel-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009112902" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116236" comment="libkdecore4-devel-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36551" version="1" class="patch">
	<metadata>
		<title>kernel-docs-3.0.101-63.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007/" source="CVE"/>
		<reference ref_id="CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009/" source="CVE"/>
		<reference ref_id="CVE-2008-0010" ref_url="https://www.suse.com/security/cve/CVE-2008-0010/" source="CVE"/>
		<reference ref_id="CVE-2008-1375" ref_url="https://www.suse.com/security/cve/CVE-2008-1375/" source="CVE"/>
		<reference ref_id="CVE-2008-1669" ref_url="https://www.suse.com/security/cve/CVE-2008-1669/" source="CVE"/>
		<reference ref_id="CVE-2008-1673" ref_url="https://www.suse.com/security/cve/CVE-2008-1673/" source="CVE"/>
		<reference ref_id="CVE-2008-1675" ref_url="https://www.suse.com/security/cve/CVE-2008-1675/" source="CVE"/>
		<reference ref_id="CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528/" source="CVE"/>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<reference ref_id="CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079/" source="CVE"/>
		<reference ref_id="CVE-2008-5182" ref_url="https://www.suse.com/security/cve/CVE-2008-5182/" source="CVE"/>
		<reference ref_id="CVE-2008-5300" ref_url="https://www.suse.com/security/cve/CVE-2008-5300/" source="CVE"/>
		<reference ref_id="CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029/" source="CVE"/>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415/" source="CVE"/>
		<reference ref_id="CVE-2010-0622" ref_url="https://www.suse.com/security/cve/CVE-2010-0622/" source="CVE"/>
		<reference ref_id="CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173/" source="CVE"/>
		<reference ref_id="CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798/" source="CVE"/>
		<reference ref_id="CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943/" source="CVE"/>
		<reference ref_id="CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-2959" ref_url="https://www.suse.com/security/cve/CVE-2010-2959/" source="CVE"/>
		<reference ref_id="CVE-2010-2960" ref_url="https://www.suse.com/security/cve/CVE-2010-2960/" source="CVE"/>
		<reference ref_id="CVE-2010-2962" ref_url="https://www.suse.com/security/cve/CVE-2010-2962/" source="CVE"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3015" ref_url="https://www.suse.com/security/cve/CVE-2010-3015/" source="CVE"/>
		<reference ref_id="CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078/" source="CVE"/>
		<reference ref_id="CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079/" source="CVE"/>
		<reference ref_id="CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437/" source="CVE"/>
		<reference ref_id="CVE-2010-3699" ref_url="https://www.suse.com/security/cve/CVE-2010-3699/" source="CVE"/>
		<reference ref_id="CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705/" source="CVE"/>
		<reference ref_id="CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861/" source="CVE"/>
		<reference ref_id="CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873/" source="CVE"/>
		<reference ref_id="CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874/" source="CVE"/>
		<reference ref_id="CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875/" source="CVE"/>
		<reference ref_id="CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876/" source="CVE"/>
		<reference ref_id="CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877/" source="CVE"/>
		<reference ref_id="CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880/" source="CVE"/>
		<reference ref_id="CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881/" source="CVE"/>
		<reference ref_id="CVE-2010-4072" ref_url="https://www.suse.com/security/cve/CVE-2010-4072/" source="CVE"/>
		<reference ref_id="CVE-2010-4073" ref_url="https://www.suse.com/security/cve/CVE-2010-4073/" source="CVE"/>
		<reference ref_id="CVE-2010-4075" ref_url="https://www.suse.com/security/cve/CVE-2010-4075/" source="CVE"/>
		<reference ref_id="CVE-2010-4076" ref_url="https://www.suse.com/security/cve/CVE-2010-4076/" source="CVE"/>
		<reference ref_id="CVE-2010-4077" ref_url="https://www.suse.com/security/cve/CVE-2010-4077/" source="CVE"/>
		<reference ref_id="CVE-2010-4082" ref_url="https://www.suse.com/security/cve/CVE-2010-4082/" source="CVE"/>
		<reference ref_id="CVE-2010-4083" ref_url="https://www.suse.com/security/cve/CVE-2010-4083/" source="CVE"/>
		<reference ref_id="CVE-2010-4157" ref_url="https://www.suse.com/security/cve/CVE-2010-4157/" source="CVE"/>
		<reference ref_id="CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158/" source="CVE"/>
		<reference ref_id="CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160/" source="CVE"/>
		<reference ref_id="CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162/" source="CVE"/>
		<reference ref_id="CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163/" source="CVE"/>
		<reference ref_id="CVE-2010-4164" ref_url="https://www.suse.com/security/cve/CVE-2010-4164/" source="CVE"/>
		<reference ref_id="CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165/" source="CVE"/>
		<reference ref_id="CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169/" source="CVE"/>
		<reference ref_id="CVE-2010-4175" ref_url="https://www.suse.com/security/cve/CVE-2010-4175/" source="CVE"/>
		<reference ref_id="CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243/" source="CVE"/>
		<reference ref_id="CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251/" source="CVE"/>
		<reference ref_id="CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258/" source="CVE"/>
		<reference ref_id="CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342/" source="CVE"/>
		<reference ref_id="CVE-2010-4529" ref_url="https://www.suse.com/security/cve/CVE-2010-4529/" source="CVE"/>
		<reference ref_id="CVE-2010-4656" ref_url="https://www.suse.com/security/cve/CVE-2010-4656/" source="CVE"/>
		<reference ref_id="CVE-2010-4668" ref_url="https://www.suse.com/security/cve/CVE-2010-4668/" source="CVE"/>
		<reference ref_id="CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521/" source="CVE"/>
		<reference ref_id="CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710/" source="CVE"/>
		<reference ref_id="CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016/" source="CVE"/>
		<reference ref_id="CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160/" source="CVE"/>
		<reference ref_id="CVE-2011-1180" ref_url="https://www.suse.com/security/cve/CVE-2011-1180/" source="CVE"/>
		<reference ref_id="CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182/" source="CVE"/>
		<reference ref_id="CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478/" source="CVE"/>
		<reference ref_id="CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-1593" ref_url="https://www.suse.com/security/cve/CVE-2011-1593/" source="CVE"/>
		<reference ref_id="CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182/" source="CVE"/>
		<reference ref_id="CVE-2011-2183" ref_url="https://www.suse.com/security/cve/CVE-2011-2183/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2011-2479" ref_url="https://www.suse.com/security/cve/CVE-2011-2479/" source="CVE"/>
		<reference ref_id="CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491/" source="CVE"/>
		<reference ref_id="CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494/" source="CVE"/>
		<reference ref_id="CVE-2011-2495" ref_url="https://www.suse.com/security/cve/CVE-2011-2495/" source="CVE"/>
		<reference ref_id="CVE-2011-2496" ref_url="https://www.suse.com/security/cve/CVE-2011-2496/" source="CVE"/>
		<reference ref_id="CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4097" ref_url="https://www.suse.com/security/cve/CVE-2011-4097/" source="CVE"/>
		<reference ref_id="CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127/" source="CVE"/>
		<reference ref_id="CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131/" source="CVE"/>
		<reference ref_id="CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0038" ref_url="https://www.suse.com/security/cve/CVE-2012-0038/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2012-0207" ref_url="https://www.suse.com/security/cve/CVE-2012-0207/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146/" source="CVE"/>
		<reference ref_id="CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179/" source="CVE"/>
		<reference ref_id="CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601/" source="CVE"/>
		<reference ref_id="CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136/" source="CVE"/>
		<reference ref_id="CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137/" source="CVE"/>
		<reference ref_id="CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372/" source="CVE"/>
		<reference ref_id="CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-2663" ref_url="https://www.suse.com/security/cve/CVE-2012-2663/" source="CVE"/>
		<reference ref_id="CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745/" source="CVE"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398/" source="CVE"/>
		<reference ref_id="CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461/" source="CVE"/>
		<reference ref_id="CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-1059" ref_url="https://www.suse.com/security/cve/CVE-2013-1059/" source="CVE"/>
		<reference ref_id="CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767/" source="CVE"/>
		<reference ref_id="CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774/" source="CVE"/>
		<reference ref_id="CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796/" source="CVE"/>
		<reference ref_id="CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797/" source="CVE"/>
		<reference ref_id="CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798/" source="CVE"/>
		<reference ref_id="CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819/" source="CVE"/>
		<reference ref_id="CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848/" source="CVE"/>
		<reference ref_id="CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015/" source="CVE"/>
		<reference ref_id="CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094/" source="CVE"/>
		<reference ref_id="CVE-2013-2148" ref_url="https://www.suse.com/security/cve/CVE-2013-2148/" source="CVE"/>
		<reference ref_id="CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164/" source="CVE"/>
		<reference ref_id="CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206/" source="CVE"/>
		<reference ref_id="CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232/" source="CVE"/>
		<reference ref_id="CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234/" source="CVE"/>
		<reference ref_id="CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851/" source="CVE"/>
		<reference ref_id="CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852/" source="CVE"/>
		<reference ref_id="CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893/" source="CVE"/>
		<reference ref_id="CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897/" source="CVE"/>
		<reference ref_id="CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899/" source="CVE"/>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2013-3301" ref_url="https://www.suse.com/security/cve/CVE-2013-3301/" source="CVE"/>
		<reference ref_id="CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162/" source="CVE"/>
		<reference ref_id="CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163/" source="CVE"/>
		<reference ref_id="CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514/" source="CVE"/>
		<reference ref_id="CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515/" source="CVE"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380/" source="CVE"/>
		<reference ref_id="CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<reference ref_id="CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263/" source="CVE"/>
		<reference ref_id="CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264/" source="CVE"/>
		<reference ref_id="CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265/" source="CVE"/>
		<reference ref_id="CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339/" source="CVE"/>
		<reference ref_id="CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055/" source="CVE"/>
		<reference ref_id="CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077/" source="CVE"/>
		<reference ref_id="CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101/" source="CVE"/>
		<reference ref_id="CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131/" source="CVE"/>
		<reference ref_id="CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155/" source="CVE"/>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444/" source="CVE"/>
		<reference ref_id="CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445/" source="CVE"/>
		<reference ref_id="CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874/" source="CVE"/>
		<reference ref_id="CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309/" source="CVE"/>
		<reference ref_id="CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523/" source="CVE"/>
		<reference ref_id="CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186/" source="CVE"/>
		<reference ref_id="CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601/" source="CVE"/>
		<reference ref_id="CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610/" source="CVE"/>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133/" source="CVE"/>
		<reference ref_id="CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369/" source="CVE"/>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090/" source="CVE"/>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-docs-3.0.101-63.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0010/">CVE-2008-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1375/">CVE-2008-1375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1669/">CVE-2008-1669</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1673/">CVE-2008-1673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1675/">CVE-2008-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5182/">CVE-2008-5182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5300/">CVE-2008-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0622/">CVE-2010-0622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2959/">CVE-2010-2959</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2960/">CVE-2010-2960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2962/">CVE-2010-2962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3015/">CVE-2010-3015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3699/">CVE-2010-3699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4072/">CVE-2010-4072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4073/">CVE-2010-4073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4075/">CVE-2010-4075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4076/">CVE-2010-4076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4077/">CVE-2010-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4082/">CVE-2010-4082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4083/">CVE-2010-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4157/">CVE-2010-4157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4164/">CVE-2010-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4175/">CVE-2010-4175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-4529/">CVE-2010-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4656/">CVE-2010-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4668/">CVE-2010-4668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1180/">CVE-2011-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1593/">CVE-2011-1593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2183/">CVE-2011-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2479/">CVE-2011-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2495/">CVE-2011-2495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2496/">CVE-2011-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4097/">CVE-2011-4097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0038/">CVE-2012-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0207/">CVE-2012-0207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2663/">CVE-2012-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1059/">CVE-2013-1059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2148/">CVE-2013-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3301/">CVE-2013-3301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145531" comment="kernel-docs-3.0.101-63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36552" version="1" class="patch">
	<metadata>
		<title>kopete-devel-4.3.5-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>
These are all security issues fixed in the kopete-devel-4.3.5-0.4.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065203" comment="kopete-devel-4.3.5-0.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36553" version="1" class="patch">
	<metadata>
		<title>krb5-devel-1.6.3-133.49.66.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2006-6143" ref_url="https://www.suse.com/security/cve/CVE-2006-6143/" source="CVE"/>
		<reference ref_id="CVE-2006-6144" ref_url="https://www.suse.com/security/cve/CVE-2006-6144/" source="CVE"/>
		<reference ref_id="CVE-2007-0956" ref_url="https://www.suse.com/security/cve/CVE-2007-0956/" source="CVE"/>
		<reference ref_id="CVE-2007-0957" ref_url="https://www.suse.com/security/cve/CVE-2007-0957/" source="CVE"/>
		<reference ref_id="CVE-2007-1216" ref_url="https://www.suse.com/security/cve/CVE-2007-1216/" source="CVE"/>
		<reference ref_id="CVE-2007-2442" ref_url="https://www.suse.com/security/cve/CVE-2007-2442/" source="CVE"/>
		<reference ref_id="CVE-2007-2443" ref_url="https://www.suse.com/security/cve/CVE-2007-2443/" source="CVE"/>
		<reference ref_id="CVE-2007-2798" ref_url="https://www.suse.com/security/cve/CVE-2007-2798/" source="CVE"/>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<reference ref_id="CVE-2007-4000" ref_url="https://www.suse.com/security/cve/CVE-2007-4000/" source="CVE"/>
		<reference ref_id="CVE-2007-4743" ref_url="https://www.suse.com/security/cve/CVE-2007-4743/" source="CVE"/>
		<reference ref_id="CVE-2007-5894" ref_url="https://www.suse.com/security/cve/CVE-2007-5894/" source="CVE"/>
		<reference ref_id="CVE-2007-5902" ref_url="https://www.suse.com/security/cve/CVE-2007-5902/" source="CVE"/>
		<reference ref_id="CVE-2007-5971" ref_url="https://www.suse.com/security/cve/CVE-2007-5971/" source="CVE"/>
		<reference ref_id="CVE-2007-5972" ref_url="https://www.suse.com/security/cve/CVE-2007-5972/" source="CVE"/>
		<reference ref_id="CVE-2008-0062" ref_url="https://www.suse.com/security/cve/CVE-2008-0062/" source="CVE"/>
		<reference ref_id="CVE-2008-0063" ref_url="https://www.suse.com/security/cve/CVE-2008-0063/" source="CVE"/>
		<reference ref_id="CVE-2008-0947" ref_url="https://www.suse.com/security/cve/CVE-2008-0947/" source="CVE"/>
		<reference ref_id="CVE-2008-0948" ref_url="https://www.suse.com/security/cve/CVE-2008-0948/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0629" ref_url="https://www.suse.com/security/cve/CVE-2010-0629/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-devel-1.6.3-133.49.66.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6143/">CVE-2006-6143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6144/">CVE-2006-6144</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0956/">CVE-2007-0956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0957/">CVE-2007-0957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1216/">CVE-2007-1216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2442/">CVE-2007-2442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2443/">CVE-2007-2443</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2798/">CVE-2007-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4000/">CVE-2007-4000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4743/">CVE-2007-4743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5894/">CVE-2007-5894</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5902/">CVE-2007-5902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5971/">CVE-2007-5971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5972/">CVE-2007-5972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0062/">CVE-2008-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0063/">CVE-2008-0063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0947/">CVE-2008-0947</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-0948/">CVE-2008-0948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0629/">CVE-2010-0629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107537" comment="krb5-devel-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107536" comment="krb5-devel-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107538" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36554" version="1" class="patch">
	<metadata>
		<title>libQtWebKit-devel-4.6.3-5.34.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQtWebKit-devel-4.6.3-5.34.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109993" comment="libQtWebKit-devel-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109994" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109995" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109998" comment="libqt4-devel-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109997" comment="libqt4-devel-doc-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109996" comment="libqt4-devel-doc-data-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109999" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110000" comment="libqt4-sql-mysql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110003" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110001" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110002" comment="libqt4-sql-postgresql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110004" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110005" comment="libqt4-sql-sqlite-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110008" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110006" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110007" comment="libqt4-sql-unixODBC-x86-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36555" version="1" class="patch">
	<metadata>
		<title>libadns-devel-1.4-73.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1447" ref_url="https://www.suse.com/security/cve/CVE-2008-1447/" source="CVE"/>
		<reference ref_id="CVE-2008-4100" ref_url="https://www.suse.com/security/cve/CVE-2008-4100/" source="CVE"/>
		<description>
These are all security issues fixed in the libadns-devel-1.4-73.21 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1447/">CVE-2008-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4100/">CVE-2008-4100</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145532" comment="libadns-devel-1.4-73.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36556" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.3.4-12.22.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.3.4-12.22.23.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144086" comment="libapr-util1-1.3.4-12.22.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145533" comment="libapr-util1-devel-1.3.4-12.22.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145534" comment="libapr-util1-devel-32bit-1.3.4-12.22.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36557" version="1" class="patch">
	<metadata>
		<title>libapr1-1.3.3-11.18.19.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.3.3-11.18.19.8 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144089" comment="libapr1-1.3.3-11.18.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145535" comment="libapr1-devel-1.3.3-11.18.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145536" comment="libapr1-devel-32bit-1.3.3-11.18.19.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36558" version="1" class="patch">
	<metadata>
		<title>libarchive-devel-2.5.5-5.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5680" ref_url="https://www.suse.com/security/cve/CVE-2006-5680/" source="CVE"/>
		<reference ref_id="CVE-2007-3641" ref_url="https://www.suse.com/security/cve/CVE-2007-3641/" source="CVE"/>
		<reference ref_id="CVE-2007-3644" ref_url="https://www.suse.com/security/cve/CVE-2007-3644/" source="CVE"/>
		<reference ref_id="CVE-2007-3645" ref_url="https://www.suse.com/security/cve/CVE-2007-3645/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive-devel-2.5.5-5.19 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5680/">CVE-2006-5680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3641/">CVE-2007-3641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3644/">CVE-2007-3644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3645/">CVE-2007-3645</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145537" comment="libarchive-devel-2.5.5-5.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36559" version="1" class="patch">
	<metadata>
		<title>libasm-devel-0.152-4.9.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the libasm-devel-0.152-4.9.17 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107078" comment="libasm-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107079" comment="libdw-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107080" comment="libebl-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107081" comment="libelf-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107082" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36560" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.19.1-6.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.19.1-6.72.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145538" comment="libblkid-devel-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145539" comment="libblkid-devel-32bit-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145540" comment="libuuid-devel-2.19.1-6.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145541" comment="libuuid-devel-32bit-2.19.1-6.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36561" version="1" class="patch">
	<metadata>
		<title>libbz2-devel-1.0.5-34.253.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1372" ref_url="https://www.suse.com/security/cve/CVE-2008-1372/" source="CVE"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the libbz2-devel-1.0.5-34.253.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1372/">CVE-2008-1372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145542" comment="libbz2-devel-1.0.5-34.253.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36562" version="1" class="patch">
	<metadata>
		<title>libcap-devel-2.11-2.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>
These are all security issues fixed in the libcap-devel-2.11-2.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145543" comment="libcap-devel-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111803" comment="libcap-progs-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36563" version="1" class="patch">
	<metadata>
		<title>libcgroup-devel-0.41.rc1-2.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup-devel-0.41.rc1-2.34 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145544" comment="libcgroup-devel-0.41.rc1-2.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144100" comment="libcgroup1-0.41.rc1-2.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36564" version="1" class="patch">
	<metadata>
		<title>libcurl-devel-7.19.7-1.42.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2011-2192" ref_url="https://www.suse.com/security/cve/CVE-2011-2192/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<description>
These are all security issues fixed in the libcurl-devel-7.19.7-1.42.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2192/">CVE-2011-2192</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109964" comment="libcurl-devel-7.19.7-1.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36565" version="1" class="patch">
	<metadata>
		<title>libdhcp6client-1_0-2-1.0.22-3.21.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>
These are all security issues fixed in the libdhcp6client-1_0-2-1.0.22-3.21.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067210" comment="libdhcp6client-1_0-2-1.0.22-3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067211" comment="libdhcp6client-devel-1.0.22-3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36566" version="1" class="patch">
	<metadata>
		<title>libdrm-devel-2.4.52-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831/" source="CVE"/>
		<description>
These are all security issues fixed in the libdrm-devel-2.4.52-0.7.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145545" comment="libdrm-devel-2.4.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145546" comment="libdrm-devel-32bit-2.4.52-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36567" version="1" class="patch">
	<metadata>
		<title>libevent-devel-1.4.5-24.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-devel-1.4.5-24.24.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116240" comment="libevent-devel-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36568" version="1" class="patch">
	<metadata>
		<title>libexif-devel-0.6.17-2.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6351" ref_url="https://www.suse.com/security/cve/CVE-2007-6351/" source="CVE"/>
		<reference ref_id="CVE-2007-6352" ref_url="https://www.suse.com/security/cve/CVE-2007-6352/" source="CVE"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-devel-0.6.17-2.14.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6351/">CVE-2007-6351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6352/">CVE-2007-6352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075065" comment="libexif-devel-0.6.17-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36569" version="1" class="patch">
	<metadata>
		<title>libexiv2-4-32bit-0.17.1-31.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6353" ref_url="https://www.suse.com/security/cve/CVE-2007-6353/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-4-32bit-0.17.1-31.20 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6353/">CVE-2007-6353</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145547" comment="libexiv2-4-32bit-0.17.1-31.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145548" comment="libexiv2-4-x86-0.17.1-31.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145549" comment="libexiv2-devel-0.17.1-31.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36570" version="1" class="patch">
	<metadata>
		<title>libexpat-devel-2.0.1-88.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>
These are all security issues fixed in the libexpat-devel-2.0.1-88.34.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074697" comment="libexpat-devel-2.0.1-88.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36571" version="1" class="patch">
	<metadata>
		<title>libgadu-1.8.2-1.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4776" ref_url="https://www.suse.com/security/cve/CVE-2008-4776/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu-1.8.2-1.24.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4776/">CVE-2008-4776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098828" comment="libgadu-1.8.2-1.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098827" comment="libgadu-devel-1.8.2-1.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36572" version="1" class="patch">
	<metadata>
		<title>libgcrypt-devel-1.5.0-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-devel-1.5.0-0.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009099940" comment="libgcrypt-devel-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099939" comment="libgcrypt-devel-32bit-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36573" version="1" class="patch">
	<metadata>
		<title>libgnomesu-devel-1.0.0-307.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-devel-1.0.0-307.10.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069324" comment="libgnomesu-devel-1.0.0-307.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36574" version="1" class="patch">
	<metadata>
		<title>libgnutls-devel-2.4.1-24.39.55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4790" ref_url="https://www.suse.com/security/cve/CVE-2006-4790/" source="CVE"/>
		<reference ref_id="CVE-2008-1948" ref_url="https://www.suse.com/security/cve/CVE-2008-1948/" source="CVE"/>
		<reference ref_id="CVE-2008-1949" ref_url="https://www.suse.com/security/cve/CVE-2008-1949/" source="CVE"/>
		<reference ref_id="CVE-2008-1950" ref_url="https://www.suse.com/security/cve/CVE-2008-1950/" source="CVE"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2009-2730" ref_url="https://www.suse.com/security/cve/CVE-2009-2730/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-5138" ref_url="https://www.suse.com/security/cve/CVE-2009-5138/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619/" source="CVE"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnutls-devel-2.4.1-24.39.55.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4790/">CVE-2006-4790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1948/">CVE-2008-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1949/">CVE-2008-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1950/">CVE-2008-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2730/">CVE-2009-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-5138/">CVE-2009-5138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108433" comment="libgnutls-devel-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108434" comment="libgnutls-extra-devel-2.4.1-24.39.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108435" comment="libgnutls-extra26-2.4.1-24.39.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36575" version="1" class="patch">
	<metadata>
		<title>libgpgme-devel-1.1.6-25.32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the libgpgme-devel-1.1.6-25.32.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009099933" comment="libgpgme-devel-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099934" comment="libgpgme11-32bit-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099935" comment="libgpgme11-x86-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36576" version="1" class="patch">
	<metadata>
		<title>libgtop-2_0-7-32bit-2.28.0-1.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0235" ref_url="https://www.suse.com/security/cve/CVE-2007-0235/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtop-2_0-7-32bit-2.28.0-1.13.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0235/">CVE-2007-0235</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145550" comment="libgtop-2_0-7-32bit-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145551" comment="libgtop-2_0-7-x86-2.28.0-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145552" comment="libgtop-devel-2.28.0-1.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36577" version="1" class="patch">
	<metadata>
		<title>libguestfs-devel-1.20.12-0.18.70 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>
These are all security issues fixed in the libguestfs-devel-1.20.12-0.18.70 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145553" comment="libguestfs-devel-1.20.12-0.18.70 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36578" version="1" class="patch">
	<metadata>
		<title>libid3tag-0.15.1b-130.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag-0.15.1b-130.17 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145554" comment="libid3tag-0.15.1b-130.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145555" comment="libid3tag-devel-0.15.1b-130.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36579" version="1" class="patch">
	<metadata>
		<title>libjasper-devel-1.900.1-134.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper-devel-1.900.1-134.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106031" comment="libjasper-devel-1.900.1-134.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36580" version="1" class="patch">
	<metadata>
		<title>libjpeg-devel-32bit-6.2.0-879.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-devel-32bit-6.2.0-879.12.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075214" comment="libjpeg-devel-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075213" comment="libjpeg-devel-32bit-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36581" version="1" class="patch">
	<metadata>
		<title>libksba-devel-1.0.4-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-devel-1.0.4-1.18.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102975" comment="libksba-devel-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36582" version="1" class="patch">
	<metadata>
		<title>liblcms-devel-1.17-77.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the liblcms-devel-1.17-77.16.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091592" comment="liblcms-devel-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091591" comment="liblcms-devel-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091593" comment="python-lcms-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36583" version="1" class="patch">
	<metadata>
		<title>libldb-devel-3.6.3-0.58.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3403" ref_url="https://www.suse.com/security/cve/CVE-2006-3403/" source="CVE"/>
		<reference ref_id="CVE-2007-0452" ref_url="https://www.suse.com/security/cve/CVE-2007-0452/" source="CVE"/>
		<reference ref_id="CVE-2007-2444" ref_url="https://www.suse.com/security/cve/CVE-2007-2444/" source="CVE"/>
		<reference ref_id="CVE-2007-2446" ref_url="https://www.suse.com/security/cve/CVE-2007-2446/" source="CVE"/>
		<reference ref_id="CVE-2007-2447" ref_url="https://www.suse.com/security/cve/CVE-2007-2447/" source="CVE"/>
		<reference ref_id="CVE-2007-4138" ref_url="https://www.suse.com/security/cve/CVE-2007-4138/" source="CVE"/>
		<reference ref_id="CVE-2007-4572" ref_url="https://www.suse.com/security/cve/CVE-2007-4572/" source="CVE"/>
		<reference ref_id="CVE-2007-5398" ref_url="https://www.suse.com/security/cve/CVE-2007-5398/" source="CVE"/>
		<reference ref_id="CVE-2007-6015" ref_url="https://www.suse.com/security/cve/CVE-2007-6015/" source="CVE"/>
		<reference ref_id="CVE-2008-1105" ref_url="https://www.suse.com/security/cve/CVE-2008-1105/" source="CVE"/>
		<reference ref_id="CVE-2008-3789" ref_url="https://www.suse.com/security/cve/CVE-2008-3789/" source="CVE"/>
		<reference ref_id="CVE-2008-4314" ref_url="https://www.suse.com/security/cve/CVE-2008-4314/" source="CVE"/>
		<reference ref_id="CVE-2009-0022" ref_url="https://www.suse.com/security/cve/CVE-2009-0022/" source="CVE"/>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb-devel-3.6.3-0.58.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3403/">CVE-2006-3403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0452/">CVE-2007-0452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2444/">CVE-2007-2444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-2446/">CVE-2007-2446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-2447/">CVE-2007-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4138/">CVE-2007-4138</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4572/">CVE-2007-4572</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5398/">CVE-2007-5398</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6015/">CVE-2007-6015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1105/">CVE-2008-1105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3789/">CVE-2008-3789</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4314/">CVE-2008-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0022/">CVE-2009-0022</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145556" comment="libldb-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145557" comment="libnetapi-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145558" comment="libnetapi0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145559" comment="libsmbclient-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145560" comment="libsmbsharemodes-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145561" comment="libsmbsharemodes0-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145562" comment="libtalloc-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145563" comment="libtdb-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145564" comment="libtevent-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145565" comment="libwbclient-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145566" comment="samba-devel-3.6.3-0.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145567" comment="samba-test-3.6.3-0.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36584" version="1" class="patch">
	<metadata>
		<title>libmikmod-3.1.11a-116.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6720" ref_url="https://www.suse.com/security/cve/CVE-2007-6720/" source="CVE"/>
		<reference ref_id="CVE-2009-0179" ref_url="https://www.suse.com/security/cve/CVE-2009-0179/" source="CVE"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2009-3996" ref_url="https://www.suse.com/security/cve/CVE-2009-3996/" source="CVE"/>
		<description>
These are all security issues fixed in the libmikmod-3.1.11a-116.2.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6720/">CVE-2007-6720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0179/">CVE-2009-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3996/">CVE-2009-3996</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060145" comment="libmikmod-3.1.11a-116.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060144" comment="libmikmod-devel-3.1.11a-116.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36585" version="1" class="patch">
	<metadata>
		<title>libmpfr1-32bit-2.3.2-3.118.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr1-32bit-2.3.2-3.118.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144126" comment="libmpfr1-32bit-2.3.2-3.118.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116243" comment="mpfr-devel-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116244" comment="mpfr-devel-32bit-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36586" version="1" class="patch">
	<metadata>
		<title>libmspack-devel-0.0.20060920alpha-74.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack-devel-0.0.20060920alpha-74.5.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107713" comment="libmspack-devel-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36587" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz-devel-2.1.5-5.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz-devel-2.1.5-5.18 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145568" comment="libmusicbrainz-devel-2.1.5-5.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36588" version="1" class="patch">
	<metadata>
		<title>libmysql55client_r18-32bit-5.5.43-0.7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1861" ref_url="https://www.suse.com/security/cve/CVE-2013-1861/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2013-3783" ref_url="https://www.suse.com/security/cve/CVE-2013-3783/" source="CVE"/>
		<reference ref_id="CVE-2013-3793" ref_url="https://www.suse.com/security/cve/CVE-2013-3793/" source="CVE"/>
		<reference ref_id="CVE-2013-3794" ref_url="https://www.suse.com/security/cve/CVE-2013-3794/" source="CVE"/>
		<reference ref_id="CVE-2013-3795" ref_url="https://www.suse.com/security/cve/CVE-2013-3795/" source="CVE"/>
		<reference ref_id="CVE-2013-3796" ref_url="https://www.suse.com/security/cve/CVE-2013-3796/" source="CVE"/>
		<reference ref_id="CVE-2013-3798" ref_url="https://www.suse.com/security/cve/CVE-2013-3798/" source="CVE"/>
		<reference ref_id="CVE-2013-3801" ref_url="https://www.suse.com/security/cve/CVE-2013-3801/" source="CVE"/>
		<reference ref_id="CVE-2013-3802" ref_url="https://www.suse.com/security/cve/CVE-2013-3802/" source="CVE"/>
		<reference ref_id="CVE-2013-3804" ref_url="https://www.suse.com/security/cve/CVE-2013-3804/" source="CVE"/>
		<reference ref_id="CVE-2013-3805" ref_url="https://www.suse.com/security/cve/CVE-2013-3805/" source="CVE"/>
		<reference ref_id="CVE-2013-3806" ref_url="https://www.suse.com/security/cve/CVE-2013-3806/" source="CVE"/>
		<reference ref_id="CVE-2013-3807" ref_url="https://www.suse.com/security/cve/CVE-2013-3807/" source="CVE"/>
		<reference ref_id="CVE-2013-3808" ref_url="https://www.suse.com/security/cve/CVE-2013-3808/" source="CVE"/>
		<reference ref_id="CVE-2013-3809" ref_url="https://www.suse.com/security/cve/CVE-2013-3809/" source="CVE"/>
		<reference ref_id="CVE-2013-3810" ref_url="https://www.suse.com/security/cve/CVE-2013-3810/" source="CVE"/>
		<reference ref_id="CVE-2013-3811" ref_url="https://www.suse.com/security/cve/CVE-2013-3811/" source="CVE"/>
		<reference ref_id="CVE-2013-3812" ref_url="https://www.suse.com/security/cve/CVE-2013-3812/" source="CVE"/>
		<reference ref_id="CVE-2013-4316" ref_url="https://www.suse.com/security/cve/CVE-2013-4316/" source="CVE"/>
		<reference ref_id="CVE-2013-5860" ref_url="https://www.suse.com/security/cve/CVE-2013-5860/" source="CVE"/>
		<reference ref_id="CVE-2013-5881" ref_url="https://www.suse.com/security/cve/CVE-2013-5881/" source="CVE"/>
		<reference ref_id="CVE-2013-5882" ref_url="https://www.suse.com/security/cve/CVE-2013-5882/" source="CVE"/>
		<reference ref_id="CVE-2013-5891" ref_url="https://www.suse.com/security/cve/CVE-2013-5891/" source="CVE"/>
		<reference ref_id="CVE-2013-5894" ref_url="https://www.suse.com/security/cve/CVE-2013-5894/" source="CVE"/>
		<reference ref_id="CVE-2013-5908" ref_url="https://www.suse.com/security/cve/CVE-2013-5908/" source="CVE"/>
		<reference ref_id="CVE-2014-0001" ref_url="https://www.suse.com/security/cve/CVE-2014-0001/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384/" source="CVE"/>
		<reference ref_id="CVE-2014-0386" ref_url="https://www.suse.com/security/cve/CVE-2014-0386/" source="CVE"/>
		<reference ref_id="CVE-2014-0393" ref_url="https://www.suse.com/security/cve/CVE-2014-0393/" source="CVE"/>
		<reference ref_id="CVE-2014-0401" ref_url="https://www.suse.com/security/cve/CVE-2014-0401/" source="CVE"/>
		<reference ref_id="CVE-2014-0402" ref_url="https://www.suse.com/security/cve/CVE-2014-0402/" source="CVE"/>
		<reference ref_id="CVE-2014-0412" ref_url="https://www.suse.com/security/cve/CVE-2014-0412/" source="CVE"/>
		<reference ref_id="CVE-2014-0420" ref_url="https://www.suse.com/security/cve/CVE-2014-0420/" source="CVE"/>
		<reference ref_id="CVE-2014-0427" ref_url="https://www.suse.com/security/cve/CVE-2014-0427/" source="CVE"/>
		<reference ref_id="CVE-2014-0430" ref_url="https://www.suse.com/security/cve/CVE-2014-0430/" source="CVE"/>
		<reference ref_id="CVE-2014-0431" ref_url="https://www.suse.com/security/cve/CVE-2014-0431/" source="CVE"/>
		<reference ref_id="CVE-2014-0433" ref_url="https://www.suse.com/security/cve/CVE-2014-0433/" source="CVE"/>
		<reference ref_id="CVE-2014-0437" ref_url="https://www.suse.com/security/cve/CVE-2014-0437/" source="CVE"/>
		<reference ref_id="CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419/" source="CVE"/>
		<reference ref_id="CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430/" source="CVE"/>
		<reference ref_id="CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431/" source="CVE"/>
		<reference ref_id="CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432/" source="CVE"/>
		<reference ref_id="CVE-2014-2434" ref_url="https://www.suse.com/security/cve/CVE-2014-2434/" source="CVE"/>
		<reference ref_id="CVE-2014-2435" ref_url="https://www.suse.com/security/cve/CVE-2014-2435/" source="CVE"/>
		<reference ref_id="CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436/" source="CVE"/>
		<reference ref_id="CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438/" source="CVE"/>
		<reference ref_id="CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440/" source="CVE"/>
		<reference ref_id="CVE-2014-2442" ref_url="https://www.suse.com/security/cve/CVE-2014-2442/" source="CVE"/>
		<reference ref_id="CVE-2014-2444" ref_url="https://www.suse.com/security/cve/CVE-2014-2444/" source="CVE"/>
		<reference ref_id="CVE-2014-2450" ref_url="https://www.suse.com/security/cve/CVE-2014-2450/" source="CVE"/>
		<reference ref_id="CVE-2014-2451" ref_url="https://www.suse.com/security/cve/CVE-2014-2451/" source="CVE"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0385" ref_url="https://www.suse.com/security/cve/CVE-2015-0385/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0405" ref_url="https://www.suse.com/security/cve/CVE-2015-0405/" source="CVE"/>
		<reference ref_id="CVE-2015-0409" ref_url="https://www.suse.com/security/cve/CVE-2015-0409/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0423" ref_url="https://www.suse.com/security/cve/CVE-2015-0423/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0438" ref_url="https://www.suse.com/security/cve/CVE-2015-0438/" source="CVE"/>
		<reference ref_id="CVE-2015-0439" ref_url="https://www.suse.com/security/cve/CVE-2015-0439/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0498" ref_url="https://www.suse.com/security/cve/CVE-2015-0498/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0500" ref_url="https://www.suse.com/security/cve/CVE-2015-0500/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0503" ref_url="https://www.suse.com/security/cve/CVE-2015-0503/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-0506" ref_url="https://www.suse.com/security/cve/CVE-2015-0506/" source="CVE"/>
		<reference ref_id="CVE-2015-0507" ref_url="https://www.suse.com/security/cve/CVE-2015-0507/" source="CVE"/>
		<reference ref_id="CVE-2015-0508" ref_url="https://www.suse.com/security/cve/CVE-2015-0508/" source="CVE"/>
		<reference ref_id="CVE-2015-0511" ref_url="https://www.suse.com/security/cve/CVE-2015-0511/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2566" ref_url="https://www.suse.com/security/cve/CVE-2015-2566/" source="CVE"/>
		<reference ref_id="CVE-2015-2567" ref_url="https://www.suse.com/security/cve/CVE-2015-2567/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-2576" ref_url="https://www.suse.com/security/cve/CVE-2015-2576/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysql55client_r18-32bit-5.5.43-0.7.3 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1861/">CVE-2013-1861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3783/">CVE-2013-3783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3793/">CVE-2013-3793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3794/">CVE-2013-3794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3795/">CVE-2013-3795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3796/">CVE-2013-3796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3798/">CVE-2013-3798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3801/">CVE-2013-3801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3802/">CVE-2013-3802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3804/">CVE-2013-3804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3805/">CVE-2013-3805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3806/">CVE-2013-3806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3807/">CVE-2013-3807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3808/">CVE-2013-3808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3809/">CVE-2013-3809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3810/">CVE-2013-3810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3811/">CVE-2013-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3812/">CVE-2013-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4316/">CVE-2013-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5860/">CVE-2013-5860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5881/">CVE-2013-5881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5882/">CVE-2013-5882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5891/">CVE-2013-5891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5894/">CVE-2013-5894</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5908/">CVE-2013-5908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0001/">CVE-2014-0001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0386/">CVE-2014-0386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0393/">CVE-2014-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0401/">CVE-2014-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0402/">CVE-2014-0402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0412/">CVE-2014-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0420/">CVE-2014-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0427/">CVE-2014-0427</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0430/">CVE-2014-0430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0431/">CVE-2014-0431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0433/">CVE-2014-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0437/">CVE-2014-0437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2434/">CVE-2014-2434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2435/">CVE-2014-2435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2442/">CVE-2014-2442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2444/">CVE-2014-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2450/">CVE-2014-2450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2451/">CVE-2014-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0385/">CVE-2015-0385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0405/">CVE-2015-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0409/">CVE-2015-0409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0423/">CVE-2015-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0438/">CVE-2015-0438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0439/">CVE-2015-0439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0498/">CVE-2015-0498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0500/">CVE-2015-0500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0503/">CVE-2015-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0506/">CVE-2015-0506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0507/">CVE-2015-0507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0508/">CVE-2015-0508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0511/">CVE-2015-0511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2566/">CVE-2015-2566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2567/">CVE-2015-2567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2576/">CVE-2015-2576</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109858" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109859" comment="libmysql55client_r18-x86-5.5.43-0.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36589" version="1" class="patch">
	<metadata>
		<title>libmysqlclient-devel-5.0.96-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903/" source="CVE"/>
		<reference ref_id="CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226/" source="CVE"/>
		<reference ref_id="CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227/" source="CVE"/>
		<reference ref_id="CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969/" source="CVE"/>
		<reference ref_id="CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304/" source="CVE"/>
		<reference ref_id="CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079/" source="CVE"/>
		<reference ref_id="CVE-2008-4456" ref_url="https://www.suse.com/security/cve/CVE-2008-4456/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-2446" ref_url="https://www.suse.com/security/cve/CVE-2009-2446/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2009-4484" ref_url="https://www.suse.com/security/cve/CVE-2009-4484/" source="CVE"/>
		<reference ref_id="CVE-2009-5026" ref_url="https://www.suse.com/security/cve/CVE-2009-5026/" source="CVE"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3833" ref_url="https://www.suse.com/security/cve/CVE-2010-3833/" source="CVE"/>
		<reference ref_id="CVE-2010-3834" ref_url="https://www.suse.com/security/cve/CVE-2010-3834/" source="CVE"/>
		<reference ref_id="CVE-2010-3835" ref_url="https://www.suse.com/security/cve/CVE-2010-3835/" source="CVE"/>
		<reference ref_id="CVE-2010-3836" ref_url="https://www.suse.com/security/cve/CVE-2010-3836/" source="CVE"/>
		<reference ref_id="CVE-2010-3837" ref_url="https://www.suse.com/security/cve/CVE-2010-3837/" source="CVE"/>
		<reference ref_id="CVE-2010-3838" ref_url="https://www.suse.com/security/cve/CVE-2010-3838/" source="CVE"/>
		<reference ref_id="CVE-2010-3839" ref_url="https://www.suse.com/security/cve/CVE-2010-3839/" source="CVE"/>
		<reference ref_id="CVE-2010-3840" ref_url="https://www.suse.com/security/cve/CVE-2010-3840/" source="CVE"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient-devel-5.0.96-0.6.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-4456/">CVE-2008-4456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2446/">CVE-2009-2446</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4484/">CVE-2009-4484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5026/">CVE-2009-5026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3833/">CVE-2010-3833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3834/">CVE-2010-3834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3835/">CVE-2010-3835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3836/">CVE-2010-3836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3837/">CVE-2010-3837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3838/">CVE-2010-3838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3839/">CVE-2010-3839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3840/">CVE-2010-3840</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076526" comment="libmysqlclient-devel-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108141" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108142" comment="libmysqlclient_r15-x86-5.0.96-0.6.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36590" version="1" class="patch">
	<metadata>
		<title>libneon-devel-0.29.6-6.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0157" ref_url="https://www.suse.com/security/cve/CVE-2007-0157/" source="CVE"/>
		<reference ref_id="CVE-2008-3746" ref_url="https://www.suse.com/security/cve/CVE-2008-3746/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon-devel-0.29.6-6.7.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-0157/">CVE-2007-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3746/">CVE-2008-3746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145569" comment="libneon-devel-0.29.6-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143744" comment="libneon27-32bit-0.29.6-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36591" version="1" class="patch">
	<metadata>
		<title>libnetpbm-devel-10.26.44-101.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm-devel-10.26.44-101.9.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058601" comment="libnetpbm-devel-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058600" comment="libnetpbm-devel-32bit-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36592" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.10-1.35.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.10-1.35.113 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143746" comment="libnewt0_52-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143747" comment="newt-0.52.10-1.35.113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145570" comment="newt-devel-0.52.10-1.35.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145571" comment="newt-static-0.52.10-1.35.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009143748" comment="python-newt-0.52.10-1.35.113 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36593" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-0.9.8j-0.70.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2937" ref_url="https://www.suse.com/security/cve/CVE-2006-2937/" source="CVE"/>
		<reference ref_id="CVE-2006-2940" ref_url="https://www.suse.com/security/cve/CVE-2006-2940/" source="CVE"/>
		<reference ref_id="CVE-2006-3738" ref_url="https://www.suse.com/security/cve/CVE-2006-3738/" source="CVE"/>
		<reference ref_id="CVE-2006-4339" ref_url="https://www.suse.com/security/cve/CVE-2006-4339/" source="CVE"/>
		<reference ref_id="CVE-2006-4343" ref_url="https://www.suse.com/security/cve/CVE-2006-4343/" source="CVE"/>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2007-3108" ref_url="https://www.suse.com/security/cve/CVE-2007-3108/" source="CVE"/>
		<reference ref_id="CVE-2007-4995" ref_url="https://www.suse.com/security/cve/CVE-2007-4995/" source="CVE"/>
		<reference ref_id="CVE-2007-5135" ref_url="https://www.suse.com/security/cve/CVE-2007-5135/" source="CVE"/>
		<reference ref_id="CVE-2008-0891" ref_url="https://www.suse.com/security/cve/CVE-2008-0891/" source="CVE"/>
		<reference ref_id="CVE-2008-1672" ref_url="https://www.suse.com/security/cve/CVE-2008-1672/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2009-3245" ref_url="https://www.suse.com/security/cve/CVE-2009-3245/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<reference ref_id="CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-4180" ref_url="https://www.suse.com/security/cve/CVE-2010-4180/" source="CVE"/>
		<reference ref_id="CVE-2010-4252" ref_url="https://www.suse.com/security/cve/CVE-2010-4252/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4109" ref_url="https://www.suse.com/security/cve/CVE-2011-4109/" source="CVE"/>
		<reference ref_id="CVE-2011-4354" ref_url="https://www.suse.com/security/cve/CVE-2011-4354/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2131" ref_url="https://www.suse.com/security/cve/CVE-2012-2131/" source="CVE"/>
		<reference ref_id="CVE-2012-2333" ref_url="https://www.suse.com/security/cve/CVE-2012-2333/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-0.9.8j-0.70.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2937/">CVE-2006-2937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2940/">CVE-2006-2940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-3738/">CVE-2006-3738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4339/">CVE-2006-4339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4343/">CVE-2006-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3108/">CVE-2007-3108</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-4995/">CVE-2007-4995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5135/">CVE-2007-5135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0891/">CVE-2008-0891</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-1672/">CVE-2008-1672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3245/">CVE-2009-3245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4180/">CVE-2010-4180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4252/">CVE-2010-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4109/">CVE-2011-4109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4354/">CVE-2011-4354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2131/">CVE-2012-2131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2333/">CVE-2012-2333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107896" comment="libopenssl-devel-0.9.8j-0.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36594" version="1" class="patch">
	<metadata>
		<title>libotr-devel-3.2.0-10.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr-devel-3.2.0-10.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076093" comment="libotr-devel-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36595" version="1" class="patch">
	<metadata>
		<title>libpcp3-3.6.10-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<reference ref_id="CVE-2012-5530" ref_url="https://www.suse.com/security/cve/CVE-2012-5530/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcp3-3.6.10-0.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5530/">CVE-2012-5530</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076437" comment="libpcp3-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076443" comment="pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076438" comment="pcp-devel-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076439" comment="pcp-import-iostat2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076440" comment="pcp-import-mrtg2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076441" comment="pcp-import-sar2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076442" comment="pcp-import-sheet2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076444" comment="perl-PCP-LogImport-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076445" comment="perl-PCP-LogSummary-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076446" comment="perl-PCP-MMV-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076447" comment="perl-PCP-PMDA-3.6.10-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36596" version="1" class="patch">
	<metadata>
		<title>libpixman-1-0-devel-0.24.4-0.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1591" ref_url="https://www.suse.com/security/cve/CVE-2013-1591/" source="CVE"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>
These are all security issues fixed in the libpixman-1-0-devel-0.24.4-0.15.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1591/">CVE-2013-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009092701" comment="libpixman-1-0-devel-0.24.4-0.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36597" version="1" class="patch">
	<metadata>
		<title>libpng-devel-1.2.31-5.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5793" ref_url="https://www.suse.com/security/cve/CVE-2006-5793/" source="CVE"/>
		<reference ref_id="CVE-2008-3964" ref_url="https://www.suse.com/security/cve/CVE-2008-3964/" source="CVE"/>
		<reference ref_id="CVE-2008-5907" ref_url="https://www.suse.com/security/cve/CVE-2008-5907/" source="CVE"/>
		<reference ref_id="CVE-2008-6218" ref_url="https://www.suse.com/security/cve/CVE-2008-6218/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-2042" ref_url="https://www.suse.com/security/cve/CVE-2009-2042/" source="CVE"/>
		<reference ref_id="CVE-2009-5063" ref_url="https://www.suse.com/security/cve/CVE-2009-5063/" source="CVE"/>
		<reference ref_id="CVE-2010-0205" ref_url="https://www.suse.com/security/cve/CVE-2010-0205/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng-devel-1.2.31-5.33.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5793/">CVE-2006-5793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3964/">CVE-2008-3964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5907/">CVE-2008-5907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-6218/">CVE-2008-6218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2042/">CVE-2009-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5063/">CVE-2009-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0205/">CVE-2010-0205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098836" comment="libpng-devel-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098835" comment="libpng-devel-32bit-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36598" version="1" class="patch">
	<metadata>
		<title>libpoppler-devel-0.12.3-1.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0104" ref_url="https://www.suse.com/security/cve/CVE-2007-0104/" source="CVE"/>
		<reference ref_id="CVE-2007-4352" ref_url="https://www.suse.com/security/cve/CVE-2007-4352/" source="CVE"/>
		<reference ref_id="CVE-2007-5392" ref_url="https://www.suse.com/security/cve/CVE-2007-5392/" source="CVE"/>
		<reference ref_id="CVE-2007-5393" ref_url="https://www.suse.com/security/cve/CVE-2007-5393/" source="CVE"/>
		<reference ref_id="CVE-2008-2950" ref_url="https://www.suse.com/security/cve/CVE-2008-2950/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-devel-0.12.3-1.10.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0104/">CVE-2007-0104</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4352/">CVE-2007-4352</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5392/">CVE-2007-5392</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5393/">CVE-2007-5393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2950/">CVE-2008-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098773" comment="libpoppler-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098774" comment="libpoppler-glib-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098775" comment="libpoppler-qt2-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098776" comment="libpoppler-qt3-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098777" comment="libpoppler-qt4-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098335" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36599" version="1" class="patch">
	<metadata>
		<title>libproxy-devel-0.3.1-2.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy-devel-0.3.1-2.6.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076278" comment="libproxy-devel-0.3.1-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36600" version="1" class="patch">
	<metadata>
		<title>libpulse-devel-0.9.23-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-0008" ref_url="https://www.suse.com/security/cve/CVE-2008-0008/" source="CVE"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-devel-0.9.23-0.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0008/">CVE-2008-0008</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145572" comment="libpulse-devel-0.9.23-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36601" version="1" class="patch">
	<metadata>
		<title>libreadline5-5.2-147.27.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the libreadline5-5.2-147.27.35 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009143964" comment="libreadline5-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145573" comment="readline-devel-5.2-147.27.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145574" comment="readline-devel-32bit-5.2-147.27.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36602" version="1" class="patch">
	<metadata>
		<title>libreoffice-4.0.3.3.26-0.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0238" ref_url="https://www.suse.com/security/cve/CVE-2007-0238/" source="CVE"/>
		<reference ref_id="CVE-2007-0239" ref_url="https://www.suse.com/security/cve/CVE-2007-0239/" source="CVE"/>
		<reference ref_id="CVE-2010-0395" ref_url="https://www.suse.com/security/cve/CVE-2010-0395/" source="CVE"/>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2010-3450" ref_url="https://www.suse.com/security/cve/CVE-2010-3450/" source="CVE"/>
		<reference ref_id="CVE-2010-3451" ref_url="https://www.suse.com/security/cve/CVE-2010-3451/" source="CVE"/>
		<reference ref_id="CVE-2010-3452" ref_url="https://www.suse.com/security/cve/CVE-2010-3452/" source="CVE"/>
		<reference ref_id="CVE-2010-3453" ref_url="https://www.suse.com/security/cve/CVE-2010-3453/" source="CVE"/>
		<reference ref_id="CVE-2010-3454" ref_url="https://www.suse.com/security/cve/CVE-2010-3454/" source="CVE"/>
		<reference ref_id="CVE-2010-3689" ref_url="https://www.suse.com/security/cve/CVE-2010-3689/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2010-4253" ref_url="https://www.suse.com/security/cve/CVE-2010-4253/" source="CVE"/>
		<reference ref_id="CVE-2010-4643" ref_url="https://www.suse.com/security/cve/CVE-2010-4643/" source="CVE"/>
		<reference ref_id="CVE-2013-4156" ref_url="https://www.suse.com/security/cve/CVE-2013-4156/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-4.0.3.3.26-0.10.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0238/">CVE-2007-0238</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0239/">CVE-2007-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0395/">CVE-2010-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3450/">CVE-2010-3450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3451/">CVE-2010-3451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3452/">CVE-2010-3452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3453/">CVE-2010-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3454/">CVE-2010-3454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3689/">CVE-2010-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4253/">CVE-2010-4253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4643/">CVE-2010-4643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4156/">CVE-2013-4156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102439" comment="libreoffice-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102366" comment="libreoffice-base-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102364" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102365" comment="libreoffice-base-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102369" comment="libreoffice-calc-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102368" comment="libreoffice-calc-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102371" comment="libreoffice-draw-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102370" comment="libreoffice-draw-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102372" comment="libreoffice-filters-optional-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102373" comment="libreoffice-gnome-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102397" comment="libreoffice-impress-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102396" comment="libreoffice-impress-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102399" comment="libreoffice-kde-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102398" comment="libreoffice-kde4-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102421" comment="libreoffice-l10n-prebuilt-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102431" comment="libreoffice-mailmerge-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102432" comment="libreoffice-math-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102433" comment="libreoffice-mono-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102434" comment="libreoffice-officebean-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102435" comment="libreoffice-pyuno-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102436" comment="libreoffice-sdk-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102438" comment="libreoffice-writer-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102437" comment="libreoffice-writer-extensions-4.0.3.3.26-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36603" version="1" class="patch">
	<metadata>
		<title>libreoffice-branding-upstream-4.0.3.3.26-0.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-branding-upstream-4.0.3.3.26-0.10.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102367" comment="libreoffice-branding-upstream-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102395" comment="libreoffice-icon-themes-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102400" comment="libreoffice-l10n-af-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102401" comment="libreoffice-l10n-ar-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102402" comment="libreoffice-l10n-ca-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102403" comment="libreoffice-l10n-cs-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102404" comment="libreoffice-l10n-da-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102405" comment="libreoffice-l10n-de-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102406" comment="libreoffice-l10n-el-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102407" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102408" comment="libreoffice-l10n-es-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102409" comment="libreoffice-l10n-fi-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102410" comment="libreoffice-l10n-fr-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102411" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102412" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102413" comment="libreoffice-l10n-hu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102414" comment="libreoffice-l10n-it-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102415" comment="libreoffice-l10n-ja-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102416" comment="libreoffice-l10n-ko-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102417" comment="libreoffice-l10n-nb-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102418" comment="libreoffice-l10n-nl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102419" comment="libreoffice-l10n-nn-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102420" comment="libreoffice-l10n-pl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102423" comment="libreoffice-l10n-pt-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102422" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102424" comment="libreoffice-l10n-ru-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102425" comment="libreoffice-l10n-sk-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102426" comment="libreoffice-l10n-sv-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102427" comment="libreoffice-l10n-xh-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102428" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102429" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102430" comment="libreoffice-l10n-zu-4.0.3.3.26-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36604" version="1" class="patch">
	<metadata>
		<title>libreoffice-help-cs-4.0.3.3.26-0.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-help-cs-4.0.3.3.26-0.10.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102374" comment="libreoffice-help-cs-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102375" comment="libreoffice-help-da-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102376" comment="libreoffice-help-de-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102377" comment="libreoffice-help-en-GB-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102378" comment="libreoffice-help-en-US-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102379" comment="libreoffice-help-es-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102380" comment="libreoffice-help-fr-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102381" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102382" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102383" comment="libreoffice-help-hu-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102384" comment="libreoffice-help-it-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102385" comment="libreoffice-help-ja-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102386" comment="libreoffice-help-ko-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102387" comment="libreoffice-help-nl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102388" comment="libreoffice-help-pl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102390" comment="libreoffice-help-pt-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102389" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102391" comment="libreoffice-help-ru-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102392" comment="libreoffice-help-sv-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102393" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102394" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36605" version="1" class="patch">
	<metadata>
		<title>libreoffice-testtool-3.4.5.5-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0238" ref_url="https://www.suse.com/security/cve/CVE-2007-0238/" source="CVE"/>
		<reference ref_id="CVE-2007-0239" ref_url="https://www.suse.com/security/cve/CVE-2007-0239/" source="CVE"/>
		<reference ref_id="CVE-2010-0395" ref_url="https://www.suse.com/security/cve/CVE-2010-0395/" source="CVE"/>
		<reference ref_id="CVE-2010-2935" ref_url="https://www.suse.com/security/cve/CVE-2010-2935/" source="CVE"/>
		<reference ref_id="CVE-2010-2936" ref_url="https://www.suse.com/security/cve/CVE-2010-2936/" source="CVE"/>
		<reference ref_id="CVE-2010-3450" ref_url="https://www.suse.com/security/cve/CVE-2010-3450/" source="CVE"/>
		<reference ref_id="CVE-2010-3451" ref_url="https://www.suse.com/security/cve/CVE-2010-3451/" source="CVE"/>
		<reference ref_id="CVE-2010-3452" ref_url="https://www.suse.com/security/cve/CVE-2010-3452/" source="CVE"/>
		<reference ref_id="CVE-2010-3453" ref_url="https://www.suse.com/security/cve/CVE-2010-3453/" source="CVE"/>
		<reference ref_id="CVE-2010-3454" ref_url="https://www.suse.com/security/cve/CVE-2010-3454/" source="CVE"/>
		<reference ref_id="CVE-2010-3689" ref_url="https://www.suse.com/security/cve/CVE-2010-3689/" source="CVE"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<reference ref_id="CVE-2010-4253" ref_url="https://www.suse.com/security/cve/CVE-2010-4253/" source="CVE"/>
		<reference ref_id="CVE-2010-4643" ref_url="https://www.suse.com/security/cve/CVE-2010-4643/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-testtool-3.4.5.5-0.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0238/">CVE-2007-0238</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0239/">CVE-2007-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0395/">CVE-2010-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2935/">CVE-2010-2935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2936/">CVE-2010-2936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3450/">CVE-2010-3450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3451/">CVE-2010-3451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3452/">CVE-2010-3452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3453/">CVE-2010-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3454/">CVE-2010-3454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3689/">CVE-2010-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4253/">CVE-2010-4253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4643/">CVE-2010-4643</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073546" comment="libreoffice-testtool-3.4.5.5-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36606" version="1" class="patch">
	<metadata>
		<title>librsvg-devel-2.26.0-2.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-devel-2.26.0-2.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070840" comment="librsvg-devel-2.26.0-2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36607" version="1" class="patch">
	<metadata>
		<title>libsamplerate-devel-0.1.4-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5008" ref_url="https://www.suse.com/security/cve/CVE-2008-5008/" source="CVE"/>
		<description>
These are all security issues fixed in the libsamplerate-devel-0.1.4-1.15 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5008/">CVE-2008-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145575" comment="libsamplerate-devel-0.1.4-1.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36608" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.5-2.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.5-2.7.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065586" comment="libsmi-0.4.5-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36609" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.0.20-2.6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4974" ref_url="https://www.suse.com/security/cve/CVE-2007-4974/" source="CVE"/>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.0.20-2.6.5 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4974/">CVE-2007-4974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105657" comment="libsndfile-devel-1.0.20-2.6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36610" version="1" class="patch">
	<metadata>
		<title>libsnmp15-32bit-5.4.2.1-8.12.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4309" ref_url="https://www.suse.com/security/cve/CVE-2008-4309/" source="CVE"/>
		<reference ref_id="CVE-2008-6123" ref_url="https://www.suse.com/security/cve/CVE-2008-6123/" source="CVE"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp15-32bit-5.4.2.1-8.12.22.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4309/">CVE-2008-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6123/">CVE-2008-6123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100005" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100015" comment="net-snmp-devel-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100014" comment="net-snmp-devel-32bit-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36611" version="1" class="patch">
	<metadata>
		<title>libsoup-devel-2.32.2-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-5876" ref_url="https://www.suse.com/security/cve/CVE-2006-5876/" source="CVE"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<reference ref_id="CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-devel-2.32.2-4.13.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-5876/">CVE-2006-5876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145576" comment="libsoup-devel-2.32.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145577" comment="libsoup-devel-32bit-2.32.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36612" version="1" class="patch">
	<metadata>
		<title>libssh2-0.2-5.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4562" ref_url="https://www.suse.com/security/cve/CVE-2012-4562/" source="CVE"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-0.2-5.20.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4562/">CVE-2012-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098837" comment="libssh2-0.2-5.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36613" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.2.9-4.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.2.9-4.2.4.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108442" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108440" comment="libssh2-1-32bit-1.2.9-4.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108441" comment="libssh2-1-x86-1.2.9-4.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108443" comment="libssh2-devel-1.2.9-4.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36614" version="1" class="patch">
	<metadata>
		<title>libsss_idmap-devel-1.9.4-0.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libsss_idmap-devel-1.9.4-0.16.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145578" comment="libsss_idmap-devel-1.9.4-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145579" comment="libsss_sudo-devel-1.9.4-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36615" version="1" class="patch">
	<metadata>
		<title>libtasn1-devel-1.5-1.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-devel-1.5-1.30.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109682" comment="libtasn1-devel-1.5-1.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36616" version="1" class="patch">
	<metadata>
		<title>libthai-0.1.9-9.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-0.1.9-9.19.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145580" comment="libthai-0.1.9-9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145581" comment="libthai-devel-0.1.9-9.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36617" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-3.8.2-141.154.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1586" ref_url="https://www.suse.com/security/cve/CVE-2008-1586/" source="CVE"/>
		<reference ref_id="CVE-2008-2327" ref_url="https://www.suse.com/security/cve/CVE-2008-2327/" source="CVE"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-1411" ref_url="https://www.suse.com/security/cve/CVE-2010-1411/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0191" ref_url="https://www.suse.com/security/cve/CVE-2011-0191/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2088" ref_url="https://www.suse.com/security/cve/CVE-2012-2088/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-3.8.2-141.154.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1586/">CVE-2008-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2327/">CVE-2008-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1411/">CVE-2010-1411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0191/">CVE-2011-0191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2088/">CVE-2012-2088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091282" comment="libtiff-devel-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091281" comment="libtiff-devel-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36618" version="1" class="patch">
	<metadata>
		<title>libtirpc-devel-0.2.1-1.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3999" ref_url="https://www.suse.com/security/cve/CVE-2007-3999/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-devel-0.2.1-1.7.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-3999/">CVE-2007-3999</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145582" comment="libtirpc-devel-0.2.1-1.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36619" version="1" class="patch">
	<metadata>
		<title>libtool-2.2.6-2.131.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libtool-2.2.6-2.131.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057094" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057092" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36620" version="1" class="patch">
	<metadata>
		<title>libtunepimp-0.5.3-126.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3600" ref_url="https://www.suse.com/security/cve/CVE-2006-3600/" source="CVE"/>
		<description>
These are all security issues fixed in the libtunepimp-0.5.3-126.25 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3600/">CVE-2006-3600</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145583" comment="libtunepimp-0.5.3-126.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145584" comment="libtunepimp-devel-0.5.3-126.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145585" comment="libtunepimp5-0.5.3-126.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36621" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.6.2-0.2.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.6.2-0.2.4.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075498" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075500" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075501" comment="nut-cgi-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075499" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075502" comment="nut-devel-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36622" version="1" class="patch">
	<metadata>
		<title>libvirt-devel-1.2.5-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5086" ref_url="https://www.suse.com/security/cve/CVE-2008-5086/" source="CVE"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2012-4423" ref_url="https://www.suse.com/security/cve/CVE-2012-4423/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-4291" ref_url="https://www.suse.com/security/cve/CVE-2013-4291/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-5651" ref_url="https://www.suse.com/security/cve/CVE-2013-5651/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-devel-1.2.5-3.76 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5086/">CVE-2008-5086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4423/">CVE-2012-4423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4291/">CVE-2013-4291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5651/">CVE-2013-5651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145586" comment="libvirt-devel-1.2.5-3.76 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145587" comment="libvirt-devel-32bit-1.2.5-3.76 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36623" version="1" class="patch">
	<metadata>
		<title>libvorbis-devel-1.2.0-79.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-3106" ref_url="https://www.suse.com/security/cve/CVE-2007-3106/" source="CVE"/>
		<reference ref_id="CVE-2008-1419" ref_url="https://www.suse.com/security/cve/CVE-2008-1419/" source="CVE"/>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2008-1423" ref_url="https://www.suse.com/security/cve/CVE-2008-1423/" source="CVE"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-devel-1.2.0-79.20.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3106/">CVE-2007-3106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1419/">CVE-2008-1419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1423/">CVE-2008-1423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073167" comment="libvorbis-devel-1.2.0-79.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36624" version="1" class="patch">
	<metadata>
		<title>libwebkit-1_0-1-1.0.1-0.1.141 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3632" ref_url="https://www.suse.com/security/cve/CVE-2008-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebkit-1_0-1-1.0.1-0.1.141 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3632/">CVE-2008-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145588" comment="libwebkit-1_0-1-1.0.1-0.1.141 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36625" version="1" class="patch">
	<metadata>
		<title>libwebkit-1_0-2-1.2.7-0.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-3632" ref_url="https://www.suse.com/security/cve/CVE-2008-3632/" source="CVE"/>
		<reference ref_id="CVE-2010-4040" ref_url="https://www.suse.com/security/cve/CVE-2010-4040/" source="CVE"/>
		<reference ref_id="CVE-2011-1290" ref_url="https://www.suse.com/security/cve/CVE-2011-1290/" source="CVE"/>
		<reference ref_id="CVE-2011-1344" ref_url="https://www.suse.com/security/cve/CVE-2011-1344/" source="CVE"/>
		<reference ref_id="CVE-2011-1774" ref_url="https://www.suse.com/security/cve/CVE-2011-1774/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebkit-1_0-2-1.2.7-0.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3632/">CVE-2008-3632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4040/">CVE-2010-4040</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-1290/">CVE-2011-1290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1344/">CVE-2011-1344</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1774/">CVE-2011-1774</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145589" comment="libwebkit-1_0-2-1.2.7-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145590" comment="libwebkit-devel-1.2.7-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145591" comment="libwebkit-lang-1.2.7-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36626" version="1" class="patch">
	<metadata>
		<title>libwmf-0.2.8.4-206.27.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3376" ref_url="https://www.suse.com/security/cve/CVE-2006-3376/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0.2.8.4-206.27.4 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-3376/">CVE-2006-3376</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052853" comment="libwmf-0.2.8.4-206.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052847" comment="libwmf-32bit-0.2.8.4-206.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052848" comment="libwmf-devel-0.2.8.4-206.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052851" comment="libwmf-gnome-0.2.8.4-206.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052849" comment="libwmf-gnome-32bit-0.2.8.4-206.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052850" comment="libwmf-gnome-x86-0.2.8.4-206.27.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052852" comment="libwmf-x86-0.2.8.4-206.27.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36627" version="1" class="patch">
	<metadata>
		<title>libwpd-0_8-8-0.8.14-4.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-0002" ref_url="https://www.suse.com/security/cve/CVE-2007-0002/" source="CVE"/>
		<description>
These are all security issues fixed in the libwpd-0_8-8-0.8.14-4.33 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-0002/">CVE-2007-0002</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145592" comment="libwpd-0_8-8-0.8.14-4.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145593" comment="libwpd-devel-0.8.14-4.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145594" comment="libwpd-devel-doc-0.8.14-4.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36628" version="1" class="patch">
	<metadata>
		<title>libwsman-devel-2.2.3-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the libwsman-devel-2.2.3-0.8.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009101878" comment="libwsman-devel-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101879" comment="openwsman-python-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36629" version="1" class="patch">
	<metadata>
		<title>libxcrypt-devel-3.0.3-0.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcrypt-devel-3.0.3-0.6.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070142" comment="libxcrypt-devel-3.0.3-0.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36630" version="1" class="patch">
	<metadata>
		<title>libxine-devel-1.1.15-23.3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-1664" ref_url="https://www.suse.com/security/cve/CVE-2006-1664/" source="CVE"/>
		<reference ref_id="CVE-2006-4799" ref_url="https://www.suse.com/security/cve/CVE-2006-4799/" source="CVE"/>
		<reference ref_id="CVE-2006-4800" ref_url="https://www.suse.com/security/cve/CVE-2006-4800/" source="CVE"/>
		<reference ref_id="CVE-2007-1387" ref_url="https://www.suse.com/security/cve/CVE-2007-1387/" source="CVE"/>
		<reference ref_id="CVE-2008-0073" ref_url="https://www.suse.com/security/cve/CVE-2008-0073/" source="CVE"/>
		<reference ref_id="CVE-2008-0225" ref_url="https://www.suse.com/security/cve/CVE-2008-0225/" source="CVE"/>
		<reference ref_id="CVE-2008-0486" ref_url="https://www.suse.com/security/cve/CVE-2008-0486/" source="CVE"/>
		<reference ref_id="CVE-2008-1482" ref_url="https://www.suse.com/security/cve/CVE-2008-1482/" source="CVE"/>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2008-1878" ref_url="https://www.suse.com/security/cve/CVE-2008-1878/" source="CVE"/>
		<reference ref_id="CVE-2008-3231" ref_url="https://www.suse.com/security/cve/CVE-2008-3231/" source="CVE"/>
		<reference ref_id="CVE-2008-5234" ref_url="https://www.suse.com/security/cve/CVE-2008-5234/" source="CVE"/>
		<reference ref_id="CVE-2008-5236" ref_url="https://www.suse.com/security/cve/CVE-2008-5236/" source="CVE"/>
		<reference ref_id="CVE-2008-5237" ref_url="https://www.suse.com/security/cve/CVE-2008-5237/" source="CVE"/>
		<reference ref_id="CVE-2008-5239" ref_url="https://www.suse.com/security/cve/CVE-2008-5239/" source="CVE"/>
		<reference ref_id="CVE-2008-5240" ref_url="https://www.suse.com/security/cve/CVE-2008-5240/" source="CVE"/>
		<reference ref_id="CVE-2008-5243" ref_url="https://www.suse.com/security/cve/CVE-2008-5243/" source="CVE"/>
		<reference ref_id="CVE-2009-1274" ref_url="https://www.suse.com/security/cve/CVE-2009-1274/" source="CVE"/>
		<description>
These are all security issues fixed in the libxine-devel-1.1.15-23.3.9 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-1664/">CVE-2006-1664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4799/">CVE-2006-4799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4800/">CVE-2006-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1387/">CVE-2007-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0073/">CVE-2008-0073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0225/">CVE-2008-0225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0486/">CVE-2008-0486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1482/">CVE-2008-1482</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1878/">CVE-2008-1878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3231/">CVE-2008-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5234/">CVE-2008-5234</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5236/">CVE-2008-5236</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5237/">CVE-2008-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5239/">CVE-2008-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5240/">CVE-2008-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5243/">CVE-2008-5243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1274/">CVE-2009-1274</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145595" comment="libxine-devel-1.1.15-23.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145596" comment="libxine1-1.1.15-23.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145597" comment="libxine1-32bit-1.1.15-23.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145598" comment="libxine1-gnome-vfs-1.1.15-23.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145599" comment="libxine1-pulse-1.1.15-23.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36631" version="1" class="patch">
	<metadata>
		<title>libxml-1.8.17-481.19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml-1.8.17-481.19.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145600" comment="libxml-1.8.17-481.19.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054822" comment="libxml-32bit-1.8.17-481.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145601" comment="libxml-devel-1.8.17-481.19.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36632" version="1" class="patch">
	<metadata>
		<title>libxml2-devel-2.7.6-0.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-6284" ref_url="https://www.suse.com/security/cve/CVE-2007-6284/" source="CVE"/>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2009-2414" ref_url="https://www.suse.com/security/cve/CVE-2009-2414/" source="CVE"/>
		<reference ref_id="CVE-2009-2416" ref_url="https://www.suse.com/security/cve/CVE-2009-2416/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2011-2821" ref_url="https://www.suse.com/security/cve/CVE-2011-2821/" source="CVE"/>
		<reference ref_id="CVE-2011-3102" ref_url="https://www.suse.com/security/cve/CVE-2011-3102/" source="CVE"/>
		<reference ref_id="CVE-2011-3919" ref_url="https://www.suse.com/security/cve/CVE-2011-3919/" source="CVE"/>
		<reference ref_id="CVE-2012-0841" ref_url="https://www.suse.com/security/cve/CVE-2012-0841/" source="CVE"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-devel-2.7.6-0.31.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6284/">CVE-2007-6284</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2414/">CVE-2009-2414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2416/">CVE-2009-2416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2821/">CVE-2011-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3102/">CVE-2011-3102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3919/">CVE-2011-3919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0841/">CVE-2012-0841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009101773" comment="libxml2-devel-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101772" comment="libxml2-devel-32bit-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36633" version="1" class="patch">
	<metadata>
		<title>libxslt-devel-1.1.24-19.23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1767" ref_url="https://www.suse.com/security/cve/CVE-2008-1767/" source="CVE"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<reference ref_id="CVE-2013-4520" ref_url="https://www.suse.com/security/cve/CVE-2013-4520/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-devel-1.1.24-19.23.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1767/">CVE-2008-1767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4520/">CVE-2013-4520</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009091336" comment="libxslt-devel-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009091335" comment="libxslt-devel-32bit-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36634" version="1" class="patch">
	<metadata>
		<title>libyaml-devel-0.1.3-0.10.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-devel-0.1.3-0.10.16.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105487" comment="libyaml-devel-0.1.3-0.10.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36635" version="1" class="patch">
	<metadata>
		<title>lighttpd-1.4.20-2.54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1869" ref_url="https://www.suse.com/security/cve/CVE-2007-1869/" source="CVE"/>
		<reference ref_id="CVE-2007-1870" ref_url="https://www.suse.com/security/cve/CVE-2007-1870/" source="CVE"/>
		<reference ref_id="CVE-2008-0983" ref_url="https://www.suse.com/security/cve/CVE-2008-0983/" source="CVE"/>
		<reference ref_id="CVE-2008-1111" ref_url="https://www.suse.com/security/cve/CVE-2008-1111/" source="CVE"/>
		<reference ref_id="CVE-2008-1270" ref_url="https://www.suse.com/security/cve/CVE-2008-1270/" source="CVE"/>
		<reference ref_id="CVE-2008-1531" ref_url="https://www.suse.com/security/cve/CVE-2008-1531/" source="CVE"/>
		<reference ref_id="CVE-2010-0295" ref_url="https://www.suse.com/security/cve/CVE-2010-0295/" source="CVE"/>
		<reference ref_id="CVE-2011-1473" ref_url="https://www.suse.com/security/cve/CVE-2011-1473/" source="CVE"/>
		<reference ref_id="CVE-2011-4362" ref_url="https://www.suse.com/security/cve/CVE-2011-4362/" source="CVE"/>
		<reference ref_id="CVE-2014-2323" ref_url="https://www.suse.com/security/cve/CVE-2014-2323/" source="CVE"/>
		<reference ref_id="CVE-2014-2324" ref_url="https://www.suse.com/security/cve/CVE-2014-2324/" source="CVE"/>
		<description>
These are all security issues fixed in the lighttpd-1.4.20-2.54.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1869/">CVE-2007-1869</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1870/">CVE-2007-1870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0983/">CVE-2008-0983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1111/">CVE-2008-1111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1270/">CVE-2008-1270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1531/">CVE-2008-1531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0295/">CVE-2010-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1473/">CVE-2011-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4362/">CVE-2011-4362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2323/">CVE-2014-2323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2324/">CVE-2014-2324</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098929" comment="lighttpd-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098923" comment="lighttpd-mod_cml-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098924" comment="lighttpd-mod_magnet-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098925" comment="lighttpd-mod_mysql_vhost-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098926" comment="lighttpd-mod_rrdtool-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098927" comment="lighttpd-mod_trigger_b4_dl-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098928" comment="lighttpd-mod_webdav-1.4.20-2.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36636" version="1" class="patch">
	<metadata>
		<title>lxc-0.8.0-0.23.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>
These are all security issues fixed in the lxc-0.8.0-0.23.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144173" comment="lxc-0.8.0-0.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145602" comment="lxc-devel-0.8.0-0.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36637" version="1" class="patch">
	<metadata>
		<title>lynx-2.8.6-143.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7234" ref_url="https://www.suse.com/security/cve/CVE-2006-7234/" source="CVE"/>
		<reference ref_id="CVE-2008-4690" ref_url="https://www.suse.com/security/cve/CVE-2008-4690/" source="CVE"/>
		<description>
These are all security issues fixed in the lynx-2.8.6-143.19 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7234/">CVE-2006-7234</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4690/">CVE-2008-4690</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145603" comment="lynx-2.8.6-143.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36638" version="1" class="patch">
	<metadata>
		<title>lzo-devel-2.03-12.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the lzo-devel-2.03-12.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098943" comment="lzo-devel-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098942" comment="lzo-devel-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36639" version="1" class="patch">
	<metadata>
		<title>memcached-1.2.6-5.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-1494" ref_url="https://www.suse.com/security/cve/CVE-2009-1494/" source="CVE"/>
		<reference ref_id="CVE-2009-2415" ref_url="https://www.suse.com/security/cve/CVE-2009-2415/" source="CVE"/>
		<reference ref_id="CVE-2010-1152" ref_url="https://www.suse.com/security/cve/CVE-2010-1152/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.2.6-5.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1494/">CVE-2009-1494</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-2415/">CVE-2009-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1152/">CVE-2010-1152</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060499" comment="memcached-1.2.6-5.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36640" version="1" class="patch">
	<metadata>
		<title>mercurial-2.3.2-0.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2942" ref_url="https://www.suse.com/security/cve/CVE-2008-2942/" source="CVE"/>
		<reference ref_id="CVE-2014-9462" ref_url="https://www.suse.com/security/cve/CVE-2014-9462/" source="CVE"/>
		<description>
These are all security issues fixed in the mercurial-2.3.2-0.9.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2942/">CVE-2008-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9462/">CVE-2014-9462</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109208" comment="mercurial-2.3.2-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36641" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-devel-4.10.7-0.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-devel-4.10.7-0.3.3 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009101255" comment="mozilla-nspr-devel-4.10.7-0.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36642" version="1" class="patch">
	<metadata>
		<title>mozilla-nss-devel-3.17.3-0.8.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-2566" ref_url="https://www.suse.com/security/cve/CVE-2013-2566/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nss-devel-3.17.3-0.8.11 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2566/">CVE-2013-2566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107498" comment="mozilla-nss-devel-3.17.3-0.8.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36643" version="1" class="patch">
	<metadata>
		<title>mozilla-xulrunner192-devel-1.9.2.27-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0179" ref_url="https://www.suse.com/security/cve/CVE-2010-0179/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-1585" ref_url="https://www.suse.com/security/cve/CVE-2010-1585/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2010-3766" ref_url="https://www.suse.com/security/cve/CVE-2010-3766/" source="CVE"/>
		<reference ref_id="CVE-2010-3767" ref_url="https://www.suse.com/security/cve/CVE-2010-3767/" source="CVE"/>
		<reference ref_id="CVE-2010-3768" ref_url="https://www.suse.com/security/cve/CVE-2010-3768/" source="CVE"/>
		<reference ref_id="CVE-2010-3769" ref_url="https://www.suse.com/security/cve/CVE-2010-3769/" source="CVE"/>
		<reference ref_id="CVE-2010-3770" ref_url="https://www.suse.com/security/cve/CVE-2010-3770/" source="CVE"/>
		<reference ref_id="CVE-2010-3771" ref_url="https://www.suse.com/security/cve/CVE-2010-3771/" source="CVE"/>
		<reference ref_id="CVE-2010-3772" ref_url="https://www.suse.com/security/cve/CVE-2010-3772/" source="CVE"/>
		<reference ref_id="CVE-2010-3773" ref_url="https://www.suse.com/security/cve/CVE-2010-3773/" source="CVE"/>
		<reference ref_id="CVE-2010-3775" ref_url="https://www.suse.com/security/cve/CVE-2010-3775/" source="CVE"/>
		<reference ref_id="CVE-2010-3776" ref_url="https://www.suse.com/security/cve/CVE-2010-3776/" source="CVE"/>
		<reference ref_id="CVE-2010-3777" ref_url="https://www.suse.com/security/cve/CVE-2010-3777/" source="CVE"/>
		<reference ref_id="CVE-2010-3778" ref_url="https://www.suse.com/security/cve/CVE-2010-3778/" source="CVE"/>
		<reference ref_id="CVE-2011-0051" ref_url="https://www.suse.com/security/cve/CVE-2011-0051/" source="CVE"/>
		<reference ref_id="CVE-2011-0053" ref_url="https://www.suse.com/security/cve/CVE-2011-0053/" source="CVE"/>
		<reference ref_id="CVE-2011-0054" ref_url="https://www.suse.com/security/cve/CVE-2011-0054/" source="CVE"/>
		<reference ref_id="CVE-2011-0055" ref_url="https://www.suse.com/security/cve/CVE-2011-0055/" source="CVE"/>
		<reference ref_id="CVE-2011-0056" ref_url="https://www.suse.com/security/cve/CVE-2011-0056/" source="CVE"/>
		<reference ref_id="CVE-2011-0057" ref_url="https://www.suse.com/security/cve/CVE-2011-0057/" source="CVE"/>
		<reference ref_id="CVE-2011-0059" ref_url="https://www.suse.com/security/cve/CVE-2011-0059/" source="CVE"/>
		<reference ref_id="CVE-2011-0061" ref_url="https://www.suse.com/security/cve/CVE-2011-0061/" source="CVE"/>
		<reference ref_id="CVE-2011-0062" ref_url="https://www.suse.com/security/cve/CVE-2011-0062/" source="CVE"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0083" ref_url="https://www.suse.com/security/cve/CVE-2011-0083/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-0085" ref_url="https://www.suse.com/security/cve/CVE-2011-0085/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2362" ref_url="https://www.suse.com/security/cve/CVE-2011-2362/" source="CVE"/>
		<reference ref_id="CVE-2011-2363" ref_url="https://www.suse.com/security/cve/CVE-2011-2363/" source="CVE"/>
		<reference ref_id="CVE-2011-2364" ref_url="https://www.suse.com/security/cve/CVE-2011-2364/" source="CVE"/>
		<reference ref_id="CVE-2011-2365" ref_url="https://www.suse.com/security/cve/CVE-2011-2365/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2376" ref_url="https://www.suse.com/security/cve/CVE-2011-2376/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2378" ref_url="https://www.suse.com/security/cve/CVE-2011-2378/" source="CVE"/>
		<reference ref_id="CVE-2011-2980" ref_url="https://www.suse.com/security/cve/CVE-2011-2980/" source="CVE"/>
		<reference ref_id="CVE-2011-2981" ref_url="https://www.suse.com/security/cve/CVE-2011-2981/" source="CVE"/>
		<reference ref_id="CVE-2011-2982" ref_url="https://www.suse.com/security/cve/CVE-2011-2982/" source="CVE"/>
		<reference ref_id="CVE-2011-2983" ref_url="https://www.suse.com/security/cve/CVE-2011-2983/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2999" ref_url="https://www.suse.com/security/cve/CVE-2011-2999/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3647" ref_url="https://www.suse.com/security/cve/CVE-2011-3647/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3666" ref_url="https://www.suse.com/security/cve/CVE-2011-3666/" source="CVE"/>
		<reference ref_id="CVE-2011-3670" ref_url="https://www.suse.com/security/cve/CVE-2011-3670/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-xulrunner192-devel-1.9.2.27-0.2.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0179/">CVE-2010-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1585/">CVE-2010-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3766/">CVE-2010-3766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3767/">CVE-2010-3767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3768/">CVE-2010-3768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3769/">CVE-2010-3769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3770/">CVE-2010-3770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3771/">CVE-2010-3771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3772/">CVE-2010-3772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3773/">CVE-2010-3773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3775/">CVE-2010-3775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3776/">CVE-2010-3776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3777/">CVE-2010-3777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3778/">CVE-2010-3778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0051/">CVE-2011-0051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0053/">CVE-2011-0053</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0054/">CVE-2011-0054</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0055/">CVE-2011-0055</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0056/">CVE-2011-0056</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0057/">CVE-2011-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0059/">CVE-2011-0059</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0061/">CVE-2011-0061</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0062/">CVE-2011-0062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0083/">CVE-2011-0083</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0085/">CVE-2011-0085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2362/">CVE-2011-2362</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2363/">CVE-2011-2363</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2364/">CVE-2011-2364</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2365/">CVE-2011-2365</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2376/">CVE-2011-2376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2378/">CVE-2011-2378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2980/">CVE-2011-2980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2981/">CVE-2011-2981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2982/">CVE-2011-2982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2983/">CVE-2011-2983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2999/">CVE-2011-2999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3647/">CVE-2011-3647</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3666/">CVE-2011-3666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3670/">CVE-2011-3670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073046" comment="mozilla-xulrunner192-devel-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073047" comment="mozilla-xulrunner192-gnome-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073053" comment="mozilla-xulrunner192-translations-32bit-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36644" version="1" class="patch">
	<metadata>
		<title>nagios-3.0.6-1.25.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5803" ref_url="https://www.suse.com/security/cve/CVE-2007-5803/" source="CVE"/>
		<reference ref_id="CVE-2011-1523" ref_url="https://www.suse.com/security/cve/CVE-2011-1523/" source="CVE"/>
		<reference ref_id="CVE-2012-6096" ref_url="https://www.suse.com/security/cve/CVE-2012-6096/" source="CVE"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>
These are all security issues fixed in the nagios-3.0.6-1.25.36.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5803/">CVE-2007-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1523/">CVE-2011-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6096/">CVE-2012-6096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098667" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098907" comment="nagios-devel-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098666" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36645" version="1" class="patch">
	<metadata>
		<title>netatalk-2.0.3-249.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-5718" ref_url="https://www.suse.com/security/cve/CVE-2008-5718/" source="CVE"/>
		<description>
These are all security issues fixed in the netatalk-2.0.3-249.21.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5718/">CVE-2008-5718</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145604" comment="netatalk-2.0.3-249.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145605" comment="netatalk-devel-2.0.3-249.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36646" version="1" class="patch">
	<metadata>
		<title>novell-ipsec-tools-0.7.1-2.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1841" ref_url="https://www.suse.com/security/cve/CVE-2007-1841/" source="CVE"/>
		<reference ref_id="CVE-2009-1632" ref_url="https://www.suse.com/security/cve/CVE-2009-1632/" source="CVE"/>
		<description>
These are all security issues fixed in the novell-ipsec-tools-0.7.1-2.29.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1841/">CVE-2007-1841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1632/">CVE-2009-1632</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052958" comment="novell-ipsec-tools-0.7.1-2.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052957" comment="novell-ipsec-tools-devel-0.7.1-2.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36647" version="1" class="patch">
	<metadata>
		<title>obex-data-server-0.4.6-2.7.90 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2374" ref_url="https://www.suse.com/security/cve/CVE-2008-2374/" source="CVE"/>
		<description>
These are all security issues fixed in the obex-data-server-0.4.6-2.7.90 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2374/">CVE-2008-2374</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145606" comment="obex-data-server-0.4.6-2.7.90 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36648" version="1" class="patch">
	<metadata>
		<title>ofed-devel-1.5.4.1-20.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1693" ref_url="https://www.suse.com/security/cve/CVE-2010-1693/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<reference ref_id="CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649/" source="CVE"/>
		<reference ref_id="CVE-2011-3345" ref_url="https://www.suse.com/security/cve/CVE-2011-3345/" source="CVE"/>
		<description>
These are all security issues fixed in the ofed-devel-1.5.4.1-20.26 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1693/">CVE-2010-1693</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3345/">CVE-2011-3345</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145607" comment="ofed-devel-1.5.4.1-20.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36649" version="1" class="patch">
	<metadata>
		<title>openCryptoki-3.2-0.11.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-4454" ref_url="https://www.suse.com/security/cve/CVE-2012-4454/" source="CVE"/>
		<reference ref_id="CVE-2012-4455" ref_url="https://www.suse.com/security/cve/CVE-2012-4455/" source="CVE"/>
		<description>
These are all security issues fixed in the openCryptoki-3.2-0.11.26 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4454/">CVE-2012-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4455/">CVE-2012-4455</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144186" comment="openCryptoki-3.2-0.11.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145608" comment="openCryptoki-devel-3.2-0.11.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36650" version="1" class="patch">
	<metadata>
		<title>openldap2-2.4.26-0.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1164" ref_url="https://www.suse.com/security/cve/CVE-2012-1164/" source="CVE"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<description>
These are all security issues fixed in the openldap2-2.4.26-0.30.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1164/">CVE-2012-1164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109622" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109619" comment="openldap2-back-perl-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109621" comment="openldap2-devel-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109620" comment="openldap2-devel-32bit-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36651" version="1" class="patch">
	<metadata>
		<title>opensc-devel-0.11.6-5.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2235" ref_url="https://www.suse.com/security/cve/CVE-2008-2235/" source="CVE"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-devel-0.11.6-5.27.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2235/">CVE-2008-2235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065557" comment="opensc-devel-0.11.6-5.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36652" version="1" class="patch">
	<metadata>
		<title>openslp-devel-1.2.0-172.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-devel-1.2.0-172.24.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109697" comment="openslp-devel-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109698" comment="openslp-server-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36653" version="1" class="patch">
	<metadata>
		<title>opie-2.4-662.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-662.18.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069566" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069564" comment="opie-32bit-2.4-662.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36654" version="1" class="patch">
	<metadata>
		<title>osc-0.139.2-0.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1095" ref_url="https://www.suse.com/security/cve/CVE-2012-1095/" source="CVE"/>
		<description>
These are all security issues fixed in the osc-0.139.2-0.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1095/">CVE-2012-1095</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145609" comment="osc-0.139.2-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36655" version="1" class="patch">
	<metadata>
		<title>pam-devel-1.1.5-0.15.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0579" ref_url="https://www.suse.com/security/cve/CVE-2009-0579/" source="CVE"/>
		<reference ref_id="CVE-2009-0887" ref_url="https://www.suse.com/security/cve/CVE-2009-0887/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-devel-1.1.5-0.15.9 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0579/">CVE-2009-0579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0887/">CVE-2009-0887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145610" comment="pam-devel-1.1.5-0.15.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145611" comment="pam-devel-32bit-1.1.5-0.15.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36656" version="1" class="patch">
	<metadata>
		<title>pango-devel-1.26.2-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the pango-devel-1.26.2-1.3.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066427" comment="pango-devel-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066426" comment="pango-devel-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066422" comment="pango-doc-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36657" version="1" class="patch">
	<metadata>
		<title>pcsc-lite-devel-1.4.102-1.37.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-lite-devel-1.4.102-1.37.3 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065698" comment="pcsc-lite-devel-1.4.102-1.37.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36658" version="1" class="patch">
	<metadata>
		<title>perl-DBD-Pg-2.10.3-1.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1151" ref_url="https://www.suse.com/security/cve/CVE-2012-1151/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBD-Pg-2.10.3-1.20.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1151/">CVE-2012-1151</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074786" comment="perl-DBD-Pg-2.10.3-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36659" version="1" class="patch">
	<metadata>
		<title>perl-Tk-devel-804.028-50.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-devel-804.028-50.24 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145612" comment="perl-Tk-devel-804.028-50.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36660" version="1" class="patch">
	<metadata>
		<title>perl-base-32bit-5.10.0-64.72.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-5116" ref_url="https://www.suse.com/security/cve/CVE-2007-5116/" source="CVE"/>
		<reference ref_id="CVE-2010-1168" ref_url="https://www.suse.com/security/cve/CVE-2010-1168/" source="CVE"/>
		<reference ref_id="CVE-2010-1447" ref_url="https://www.suse.com/security/cve/CVE-2010-1447/" source="CVE"/>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2011-1487" ref_url="https://www.suse.com/security/cve/CVE-2011-1487/" source="CVE"/>
		<reference ref_id="CVE-2011-2728" ref_url="https://www.suse.com/security/cve/CVE-2011-2728/" source="CVE"/>
		<reference ref_id="CVE-2012-5526" ref_url="https://www.suse.com/security/cve/CVE-2012-5526/" source="CVE"/>
		<reference ref_id="CVE-2012-6329" ref_url="https://www.suse.com/security/cve/CVE-2012-6329/" source="CVE"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-base-32bit-5.10.0-64.72.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5116/">CVE-2007-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1168/">CVE-2010-1168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1447/">CVE-2010-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1487/">CVE-2011-1487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2728/">CVE-2011-2728</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5526/">CVE-2012-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6329/">CVE-2012-6329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145613" comment="perl-base-32bit-5.10.0-64.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36661" version="1" class="patch">
	<metadata>
		<title>php53-devel-5.3.17-0.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2007-4783" ref_url="https://www.suse.com/security/cve/CVE-2007-4783/" source="CVE"/>
		<reference ref_id="CVE-2007-4840" ref_url="https://www.suse.com/security/cve/CVE-2007-4840/" source="CVE"/>
		<reference ref_id="CVE-2007-4887" ref_url="https://www.suse.com/security/cve/CVE-2007-4887/" source="CVE"/>
		<reference ref_id="CVE-2008-0599" ref_url="https://www.suse.com/security/cve/CVE-2008-0599/" source="CVE"/>
		<reference ref_id="CVE-2010-2225" ref_url="https://www.suse.com/security/cve/CVE-2010-2225/" source="CVE"/>
		<reference ref_id="CVE-2010-2950" ref_url="https://www.suse.com/security/cve/CVE-2010-2950/" source="CVE"/>
		<reference ref_id="CVE-2010-3436" ref_url="https://www.suse.com/security/cve/CVE-2010-3436/" source="CVE"/>
		<reference ref_id="CVE-2010-3709" ref_url="https://www.suse.com/security/cve/CVE-2010-3709/" source="CVE"/>
		<reference ref_id="CVE-2010-3710" ref_url="https://www.suse.com/security/cve/CVE-2010-3710/" source="CVE"/>
		<reference ref_id="CVE-2010-4150" ref_url="https://www.suse.com/security/cve/CVE-2010-4150/" source="CVE"/>
		<reference ref_id="CVE-2010-4645" ref_url="https://www.suse.com/security/cve/CVE-2010-4645/" source="CVE"/>
		<reference ref_id="CVE-2011-0420" ref_url="https://www.suse.com/security/cve/CVE-2011-0420/" source="CVE"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2011-0708" ref_url="https://www.suse.com/security/cve/CVE-2011-0708/" source="CVE"/>
		<reference ref_id="CVE-2011-1092" ref_url="https://www.suse.com/security/cve/CVE-2011-1092/" source="CVE"/>
		<reference ref_id="CVE-2011-1153" ref_url="https://www.suse.com/security/cve/CVE-2011-1153/" source="CVE"/>
		<reference ref_id="CVE-2011-1398" ref_url="https://www.suse.com/security/cve/CVE-2011-1398/" source="CVE"/>
		<reference ref_id="CVE-2011-1466" ref_url="https://www.suse.com/security/cve/CVE-2011-1466/" source="CVE"/>
		<reference ref_id="CVE-2011-2202" ref_url="https://www.suse.com/security/cve/CVE-2011-2202/" source="CVE"/>
		<reference ref_id="CVE-2011-3379" ref_url="https://www.suse.com/security/cve/CVE-2011-3379/" source="CVE"/>
		<reference ref_id="CVE-2011-4153" ref_url="https://www.suse.com/security/cve/CVE-2011-4153/" source="CVE"/>
		<reference ref_id="CVE-2011-4388" ref_url="https://www.suse.com/security/cve/CVE-2011-4388/" source="CVE"/>
		<reference ref_id="CVE-2011-4566" ref_url="https://www.suse.com/security/cve/CVE-2011-4566/" source="CVE"/>
		<reference ref_id="CVE-2011-4885" ref_url="https://www.suse.com/security/cve/CVE-2011-4885/" source="CVE"/>
		<reference ref_id="CVE-2012-0057" ref_url="https://www.suse.com/security/cve/CVE-2012-0057/" source="CVE"/>
		<reference ref_id="CVE-2012-0781" ref_url="https://www.suse.com/security/cve/CVE-2012-0781/" source="CVE"/>
		<reference ref_id="CVE-2012-0788" ref_url="https://www.suse.com/security/cve/CVE-2012-0788/" source="CVE"/>
		<reference ref_id="CVE-2012-0789" ref_url="https://www.suse.com/security/cve/CVE-2012-0789/" source="CVE"/>
		<reference ref_id="CVE-2012-0807" ref_url="https://www.suse.com/security/cve/CVE-2012-0807/" source="CVE"/>
		<reference ref_id="CVE-2012-0830" ref_url="https://www.suse.com/security/cve/CVE-2012-0830/" source="CVE"/>
		<reference ref_id="CVE-2012-0831" ref_url="https://www.suse.com/security/cve/CVE-2012-0831/" source="CVE"/>
		<reference ref_id="CVE-2012-1172" ref_url="https://www.suse.com/security/cve/CVE-2012-1172/" source="CVE"/>
		<reference ref_id="CVE-2012-1823" ref_url="https://www.suse.com/security/cve/CVE-2012-1823/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2311" ref_url="https://www.suse.com/security/cve/CVE-2012-2311/" source="CVE"/>
		<reference ref_id="CVE-2012-2335" ref_url="https://www.suse.com/security/cve/CVE-2012-2335/" source="CVE"/>
		<reference ref_id="CVE-2012-2336" ref_url="https://www.suse.com/security/cve/CVE-2012-2336/" source="CVE"/>
		<reference ref_id="CVE-2012-2386" ref_url="https://www.suse.com/security/cve/CVE-2012-2386/" source="CVE"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<reference ref_id="CVE-2013-1635" ref_url="https://www.suse.com/security/cve/CVE-2013-1635/" source="CVE"/>
		<reference ref_id="CVE-2013-1643" ref_url="https://www.suse.com/security/cve/CVE-2013-1643/" source="CVE"/>
		<reference ref_id="CVE-2013-4113" ref_url="https://www.suse.com/security/cve/CVE-2013-4113/" source="CVE"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-4635" ref_url="https://www.suse.com/security/cve/CVE-2013-4635/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<description>
These are all security issues fixed in the php53-devel-5.3.17-0.41.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4783/">CVE-2007-4783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4840/">CVE-2007-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4887/">CVE-2007-4887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0599/">CVE-2008-0599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2225/">CVE-2010-2225</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2950/">CVE-2010-2950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3436/">CVE-2010-3436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3709/">CVE-2010-3709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3710/">CVE-2010-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4150/">CVE-2010-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4645/">CVE-2010-4645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0420/">CVE-2011-0420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0708/">CVE-2011-0708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1092/">CVE-2011-1092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1153/">CVE-2011-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1398/">CVE-2011-1398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1466/">CVE-2011-1466</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2202/">CVE-2011-2202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3379/">CVE-2011-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4153/">CVE-2011-4153</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4388/">CVE-2011-4388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4566/">CVE-2011-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4885/">CVE-2011-4885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0057/">CVE-2012-0057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0781/">CVE-2012-0781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0788/">CVE-2012-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0789/">CVE-2012-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0807/">CVE-2012-0807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0830/">CVE-2012-0830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0831/">CVE-2012-0831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1172/">CVE-2012-1172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1823/">CVE-2012-1823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-2311/">CVE-2012-2311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2335/">CVE-2012-2335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2336/">CVE-2012-2336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2386/">CVE-2012-2386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1635/">CVE-2013-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1643/">CVE-2013-1643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4113/">CVE-2013-4113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4635/">CVE-2013-4635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110212" comment="php53-devel-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110213" comment="php53-imap-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110214" comment="php53-posix-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110215" comment="php53-readline-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110216" comment="php53-sockets-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110217" comment="php53-sqlite-5.3.17-0.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110218" comment="php53-tidy-5.3.17-0.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36662" version="1" class="patch">
	<metadata>
		<title>popt-devel-1.7-37.63.64.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the popt-devel-1.7-37.63.64.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145614" comment="popt-devel-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145615" comment="popt-devel-32bit-1.7-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144206" comment="rpm-32bit-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145616" comment="rpm-devel-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145617" comment="rpm-devel-32bit-4.4.2.3-37.63.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144207" comment="rpm-x86-4.4.2.3-37.63.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36663" version="1" class="patch">
	<metadata>
		<title>postgresql-devel-8.3.23-0.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-0442" ref_url="https://www.suse.com/security/cve/CVE-2010-0442/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2010-4014" ref_url="https://www.suse.com/security/cve/CVE-2010-4014/" source="CVE"/>
		<reference ref_id="CVE-2010-4015" ref_url="https://www.suse.com/security/cve/CVE-2010-4015/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-devel-8.3.23-0.4.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0442/">CVE-2010-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4014/">CVE-2010-4014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4015/">CVE-2010-4015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145618" comment="postgresql-devel-8.3.23-0.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36664" version="1" class="patch">
	<metadata>
		<title>postgresql94-devel-9.4.4-0.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-4769" ref_url="https://www.suse.com/security/cve/CVE-2007-4769/" source="CVE"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6067" ref_url="https://www.suse.com/security/cve/CVE-2007-6067/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2007-6601" ref_url="https://www.suse.com/security/cve/CVE-2007-6601/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql94-devel-9.4.4-0.6.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4769/">CVE-2007-4769</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6067/">CVE-2007-6067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6601/">CVE-2007-6601</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145619" comment="postgresql94-devel-9.4.4-0.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36665" version="1" class="patch">
	<metadata>
		<title>ppp-devel-2.4.5.git-2.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-devel-2.4.5.git-2.29.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009099942" comment="ppp-devel-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36666" version="1" class="patch">
	<metadata>
		<title>pwlib-1.10.10-120.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1864" ref_url="https://www.suse.com/security/cve/CVE-2013-1864/" source="CVE"/>
		<description>
These are all security issues fixed in the pwlib-1.10.10-120.35.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1864/">CVE-2013-1864</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009093472" comment="pwlib-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009093471" comment="pwlib-devel-1.10.10-120.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36667" version="1" class="patch">
	<metadata>
		<title>python-32bit-2.6.9-0.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2052" ref_url="https://www.suse.com/security/cve/CVE-2007-2052/" source="CVE"/>
		<reference ref_id="CVE-2008-1721" ref_url="https://www.suse.com/security/cve/CVE-2008-1721/" source="CVE"/>
		<reference ref_id="CVE-2008-2315" ref_url="https://www.suse.com/security/cve/CVE-2008-2315/" source="CVE"/>
		<reference ref_id="CVE-2008-2316" ref_url="https://www.suse.com/security/cve/CVE-2008-2316/" source="CVE"/>
		<reference ref_id="CVE-2008-3142" ref_url="https://www.suse.com/security/cve/CVE-2008-3142/" source="CVE"/>
		<reference ref_id="CVE-2008-3143" ref_url="https://www.suse.com/security/cve/CVE-2008-3143/" source="CVE"/>
		<reference ref_id="CVE-2008-3144" ref_url="https://www.suse.com/security/cve/CVE-2008-3144/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-32bit-2.6.9-0.35.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2052/">CVE-2007-2052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1721/">CVE-2008-1721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2315/">CVE-2008-2315</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2316/">CVE-2008-2316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3142/">CVE-2008-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3143/">CVE-2008-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3144/">CVE-2008-3144</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009144213" comment="python-32bit-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144215" comment="python-demo-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144216" comment="python-gdbm-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144217" comment="python-idle-2.6.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009144218" comment="python-tk-2.6.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36668" version="1" class="patch">
	<metadata>
		<title>python-crypto-2.0.1-28.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-0544" ref_url="https://www.suse.com/security/cve/CVE-2009-0544/" source="CVE"/>
		<reference ref_id="CVE-2012-2417" ref_url="https://www.suse.com/security/cve/CVE-2012-2417/" source="CVE"/>
		<description>
These are all security issues fixed in the python-crypto-2.0.1-28.20.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0544/">CVE-2009-0544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2417/">CVE-2012-2417</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107377" comment="python-crypto-2.0.1-28.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36669" version="1" class="patch">
	<metadata>
		<title>python-devel-2.6.9-0.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>
These are all security issues fixed in the python-devel-2.6.9-0.35.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145620" comment="python-devel-2.6.9-0.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36670" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.6-168.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.6-168.34.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098685" comment="python-imaging-1.1.6-168.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098909" comment="python-imaging-sane-1.1.6-168.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36671" version="1" class="patch">
	<metadata>
		<title>python-logilab-common-0.56.2-1.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-1838" ref_url="https://www.suse.com/security/cve/CVE-2014-1838/" source="CVE"/>
		<reference ref_id="CVE-2014-1839" ref_url="https://www.suse.com/security/cve/CVE-2014-1839/" source="CVE"/>
		<description>
These are all security issues fixed in the python-logilab-common-0.56.2-1.9.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1838/">CVE-2014-1838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1839/">CVE-2014-1839</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009093641" comment="python-logilab-common-0.56.2-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36672" version="1" class="patch">
	<metadata>
		<title>python-lxml-2.3.6-0.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>
These are all security issues fixed in the python-lxml-2.3.6-0.13.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009100957" comment="python-lxml-2.3.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009100969" comment="python-lxml-doc-2.3.6-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36673" version="1" class="patch">
	<metadata>
		<title>python-setuptools-0.6c11-5.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1633" ref_url="https://www.suse.com/security/cve/CVE-2013-1633/" source="CVE"/>
		<description>
These are all security issues fixed in the python-setuptools-0.6c11-5.2.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1633/">CVE-2013-1633</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145621" comment="python-setuptools-0.6c11-5.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36674" version="1" class="patch">
	<metadata>
		<title>qemu-0.10.1-0.5.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2009-3616" ref_url="https://www.suse.com/security/cve/CVE-2009-3616/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-0.10.1-0.5.7.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3616/">CVE-2009-3616</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075758" comment="qemu-0.10.1-0.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36675" version="1" class="patch">
	<metadata>
		<title>qt3-devel-3.3.8b-88.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-4811" ref_url="https://www.suse.com/security/cve/CVE-2006-4811/" source="CVE"/>
		<reference ref_id="CVE-2007-0242" ref_url="https://www.suse.com/security/cve/CVE-2007-0242/" source="CVE"/>
		<reference ref_id="CVE-2007-3388" ref_url="https://www.suse.com/security/cve/CVE-2007-3388/" source="CVE"/>
		<reference ref_id="CVE-2007-4137" ref_url="https://www.suse.com/security/cve/CVE-2007-4137/" source="CVE"/>
		<description>
These are all security issues fixed in the qt3-devel-3.3.8b-88.21 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4811/">CVE-2006-4811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0242/">CVE-2007-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3388/">CVE-2007-3388</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4137/">CVE-2007-4137</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145622" comment="qt3-devel-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145623" comment="qt3-devel-32bit-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145624" comment="qt3-devel-doc-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145625" comment="qt3-devel-tools-3.3.8b-88.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145626" comment="qt3-devel-tools-32bit-3.3.8b-88.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36676" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.15-0.14.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-2223" ref_url="https://www.suse.com/security/cve/CVE-2006-2223/" source="CVE"/>
		<reference ref_id="CVE-2007-1995" ref_url="https://www.suse.com/security/cve/CVE-2007-1995/" source="CVE"/>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2010-2948" ref_url="https://www.suse.com/security/cve/CVE-2010-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-2949" ref_url="https://www.suse.com/security/cve/CVE-2010-2949/" source="CVE"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.15-0.14.11 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-2223/">CVE-2006-2223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1995/">CVE-2007-1995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2948/">CVE-2010-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2949/">CVE-2010-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103900" comment="quagga-0.99.15-0.14.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009090611" comment="quagga-devel-0.99.15-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36677" version="1" class="patch">
	<metadata>
		<title>ruby-devel-1.8.7.p357-0.9.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-3694" ref_url="https://www.suse.com/security/cve/CVE-2006-3694/" source="CVE"/>
		<reference ref_id="CVE-2006-5467" ref_url="https://www.suse.com/security/cve/CVE-2006-5467/" source="CVE"/>
		<reference ref_id="CVE-2006-6303" ref_url="https://www.suse.com/security/cve/CVE-2006-6303/" source="CVE"/>
		<reference ref_id="CVE-2007-5162" ref_url="https://www.suse.com/security/cve/CVE-2007-5162/" source="CVE"/>
		<reference ref_id="CVE-2007-5770" ref_url="https://www.suse.com/security/cve/CVE-2007-5770/" source="CVE"/>
		<reference ref_id="CVE-2008-1145" ref_url="https://www.suse.com/security/cve/CVE-2008-1145/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0188" ref_url="https://www.suse.com/security/cve/CVE-2011-0188/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<reference ref_id="CVE-2012-4466" ref_url="https://www.suse.com/security/cve/CVE-2012-4466/" source="CVE"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-devel-1.8.7.p357-0.9.17.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-3694/">CVE-2006-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5467/">CVE-2006-5467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6303/">CVE-2006-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5162/">CVE-2007-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5770/">CVE-2007-5770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1145/">CVE-2008-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0188/">CVE-2011-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4466/">CVE-2012-4466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105480" comment="ruby-devel-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105481" comment="ruby-doc-html-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105482" comment="ruby-doc-ri-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105483" comment="ruby-examples-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105484" comment="ruby-test-suite-1.8.7.p357-0.9.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105485" comment="ruby-tk-1.8.7.p357-0.9.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36678" version="1" class="patch">
	<metadata>
		<title>rubygem-actionmailer-3_2-3.2.12-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0276" ref_url="https://www.suse.com/security/cve/CVE-2013-0276/" source="CVE"/>
		<reference ref_id="CVE-2013-4389" ref_url="https://www.suse.com/security/cve/CVE-2013-4389/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-actionmailer-3_2-3.2.12-0.9.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0276/">CVE-2013-0276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4389/">CVE-2013-4389</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145627" comment="rubygem-actionmailer-3_2-3.2.12-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36679" version="1" class="patch">
	<metadata>
		<title>rubygem-actionpack-3_2-3.2.12-0.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2660" ref_url="https://www.suse.com/security/cve/CVE-2012-2660/" source="CVE"/>
		<reference ref_id="CVE-2012-2694" ref_url="https://www.suse.com/security/cve/CVE-2012-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-3424" ref_url="https://www.suse.com/security/cve/CVE-2012-3424/" source="CVE"/>
		<reference ref_id="CVE-2012-3463" ref_url="https://www.suse.com/security/cve/CVE-2012-3463/" source="CVE"/>
		<reference ref_id="CVE-2012-3464" ref_url="https://www.suse.com/security/cve/CVE-2012-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3465" ref_url="https://www.suse.com/security/cve/CVE-2012-3465/" source="CVE"/>
		<reference ref_id="CVE-2013-0155" ref_url="https://www.suse.com/security/cve/CVE-2013-0155/" source="CVE"/>
		<reference ref_id="CVE-2013-0276" ref_url="https://www.suse.com/security/cve/CVE-2013-0276/" source="CVE"/>
		<reference ref_id="CVE-2013-1855" ref_url="https://www.suse.com/security/cve/CVE-2013-1855/" source="CVE"/>
		<reference ref_id="CVE-2013-1857" ref_url="https://www.suse.com/security/cve/CVE-2013-1857/" source="CVE"/>
		<reference ref_id="CVE-2013-4389" ref_url="https://www.suse.com/security/cve/CVE-2013-4389/" source="CVE"/>
		<reference ref_id="CVE-2013-4491" ref_url="https://www.suse.com/security/cve/CVE-2013-4491/" source="CVE"/>
		<reference ref_id="CVE-2013-6414" ref_url="https://www.suse.com/security/cve/CVE-2013-6414/" source="CVE"/>
		<reference ref_id="CVE-2013-6415" ref_url="https://www.suse.com/security/cve/CVE-2013-6415/" source="CVE"/>
		<reference ref_id="CVE-2013-6417" ref_url="https://www.suse.com/security/cve/CVE-2013-6417/" source="CVE"/>
		<reference ref_id="CVE-2014-0081" ref_url="https://www.suse.com/security/cve/CVE-2014-0081/" source="CVE"/>
		<reference ref_id="CVE-2014-0082" ref_url="https://www.suse.com/security/cve/CVE-2014-0082/" source="CVE"/>
		<reference ref_id="CVE-2014-0130" ref_url="https://www.suse.com/security/cve/CVE-2014-0130/" source="CVE"/>
		<reference ref_id="CVE-2014-7818" ref_url="https://www.suse.com/security/cve/CVE-2014-7818/" source="CVE"/>
		<reference ref_id="CVE-2014-7829" ref_url="https://www.suse.com/security/cve/CVE-2014-7829/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-actionpack-3_2-3.2.12-0.19.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2660/">CVE-2012-2660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2694/">CVE-2012-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3424/">CVE-2012-3424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3463/">CVE-2012-3463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3464/">CVE-2012-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3465/">CVE-2012-3465</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0155/">CVE-2013-0155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0276/">CVE-2013-0276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1855/">CVE-2013-1855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1857/">CVE-2013-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4389/">CVE-2013-4389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4491/">CVE-2013-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6414/">CVE-2013-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6415/">CVE-2013-6415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6417/">CVE-2013-6417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0081/">CVE-2014-0081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0082/">CVE-2014-0082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0130/">CVE-2014-0130</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7818/">CVE-2014-7818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7829/">CVE-2014-7829</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145628" comment="rubygem-actionpack-3_2-3.2.12-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36680" version="1" class="patch">
	<metadata>
		<title>rubygem-activemodel-3_2-3.2.12-0.5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0276" ref_url="https://www.suse.com/security/cve/CVE-2013-0276/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-activemodel-3_2-3.2.12-0.5.8 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0276/">CVE-2013-0276</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145629" comment="rubygem-activemodel-3_2-3.2.12-0.5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145630" comment="rubygem-activeresource-3_2-3.2.12-0.5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145631" comment="rubygem-rails-3_2-3.2.12-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145632" comment="rubygem-railties-3_2-3.2.12-0.7.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36681" version="1" class="patch">
	<metadata>
		<title>rubygem-activerecord-3_2-3.2.12-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-2661" ref_url="https://www.suse.com/security/cve/CVE-2012-2661/" source="CVE"/>
		<reference ref_id="CVE-2012-2695" ref_url="https://www.suse.com/security/cve/CVE-2012-2695/" source="CVE"/>
		<reference ref_id="CVE-2012-5664" ref_url="https://www.suse.com/security/cve/CVE-2012-5664/" source="CVE"/>
		<reference ref_id="CVE-2013-0155" ref_url="https://www.suse.com/security/cve/CVE-2013-0155/" source="CVE"/>
		<reference ref_id="CVE-2013-0276" ref_url="https://www.suse.com/security/cve/CVE-2013-0276/" source="CVE"/>
		<reference ref_id="CVE-2013-1854" ref_url="https://www.suse.com/security/cve/CVE-2013-1854/" source="CVE"/>
		<reference ref_id="CVE-2014-3482" ref_url="https://www.suse.com/security/cve/CVE-2014-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-activerecord-3_2-3.2.12-0.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2661/">CVE-2012-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2695/">CVE-2012-2695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5664/">CVE-2012-5664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0155/">CVE-2013-0155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0276/">CVE-2013-0276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1854/">CVE-2013-1854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3482/">CVE-2014-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145633" comment="rubygem-activerecord-3_2-3.2.12-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36682" version="1" class="patch">
	<metadata>
		<title>rubygem-activesupport-3_2-3.2.12-0.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0156" ref_url="https://www.suse.com/security/cve/CVE-2013-0156/" source="CVE"/>
		<reference ref_id="CVE-2013-0276" ref_url="https://www.suse.com/security/cve/CVE-2013-0276/" source="CVE"/>
		<reference ref_id="CVE-2013-4389" ref_url="https://www.suse.com/security/cve/CVE-2013-4389/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-activesupport-3_2-3.2.12-0.9.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0156/">CVE-2013-0156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0276/">CVE-2013-0276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4389/">CVE-2013-4389</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009116288" comment="rubygem-activesupport-3_2-3.2.12-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36683" version="1" class="patch">
	<metadata>
		<title>rubygem-bundler-1.7.0-0.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0334" ref_url="https://www.suse.com/security/cve/CVE-2013-0334/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-bundler-1.7.0-0.7.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0334/">CVE-2013-0334</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109143" comment="rubygem-bundler-1.7.0-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36684" version="1" class="patch">
	<metadata>
		<title>rubygem-i18n-0_6-0.6.0-0.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-4492" ref_url="https://www.suse.com/security/cve/CVE-2013-4492/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-i18n-0_6-0.6.0-0.8.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4492/">CVE-2013-4492</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009094589" comment="rubygem-i18n-0_6-0.6.0-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36685" version="1" class="patch">
	<metadata>
		<title>rubygem-json_pure-1.2.0-0.4.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0269" ref_url="https://www.suse.com/security/cve/CVE-2013-0269/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-json_pure-1.2.0-0.4.4 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0269/">CVE-2013-0269</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077065" comment="rubygem-json_pure-1.2.0-0.4.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36686" version="1" class="patch">
	<metadata>
		<title>rubygem-rack-1_4-1.4.5-0.5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-6109" ref_url="https://www.suse.com/security/cve/CVE-2012-6109/" source="CVE"/>
		<reference ref_id="CVE-2013-0183" ref_url="https://www.suse.com/security/cve/CVE-2013-0183/" source="CVE"/>
		<reference ref_id="CVE-2013-0184" ref_url="https://www.suse.com/security/cve/CVE-2013-0184/" source="CVE"/>
		<reference ref_id="CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262/" source="CVE"/>
		<reference ref_id="CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-rack-1_4-1.4.5-0.5.8 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6109/">CVE-2012-6109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0183/">CVE-2013-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0184/">CVE-2013-0184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077210" comment="rubygem-rack-1_4-1.4.5-0.5.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36687" version="1" class="patch">
	<metadata>
		<title>rubygem-rack-ssl-1.3.2-0.12.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-2538" ref_url="https://www.suse.com/security/cve/CVE-2014-2538/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-rack-ssl-1.3.2-0.12.5.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2538/">CVE-2014-2538</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098930" comment="rubygem-rack-ssl-1.3.2-0.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36688" version="1" class="patch">
	<metadata>
		<title>rubygem-rdoc-3.9.1-0.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-0256" ref_url="https://www.suse.com/security/cve/CVE-2013-0256/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-rdoc-3.9.1-0.8.3 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0256/">CVE-2013-0256</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076717" comment="rubygem-rdoc-3.9.1-0.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36689" version="1" class="patch">
	<metadata>
		<title>rubygem-sprockets-2_2-2.2.1-0.7.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-7819" ref_url="https://www.suse.com/security/cve/CVE-2014-7819/" source="CVE"/>
		<description>
These are all security issues fixed in the rubygem-sprockets-2_2-2.2.1-0.7.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7819/">CVE-2014-7819</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145634" comment="rubygem-sprockets-2_2-2.2.1-0.7.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36690" version="1" class="patch">
	<metadata>
		<title>rxvt-unicode-9.05-1.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1142" ref_url="https://www.suse.com/security/cve/CVE-2008-1142/" source="CVE"/>
		<reference ref_id="CVE-2014-3121" ref_url="https://www.suse.com/security/cve/CVE-2014-3121/" source="CVE"/>
		<description>
These are all security issues fixed in the rxvt-unicode-9.05-1.19.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1142/">CVE-2008-1142</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3121/">CVE-2014-3121</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098933" comment="rxvt-unicode-9.05-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36691" version="1" class="patch">
	<metadata>
		<title>sendmail-8.14.3-50.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>
These are all security issues fixed in the sendmail-8.14.3-50.24.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098750" comment="sendmail-8.14.3-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098941" comment="sendmail-devel-8.14.3-50.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36692" version="1" class="patch">
	<metadata>
		<title>silc-toolkit-1.1.7-7.23.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-1227" ref_url="https://www.suse.com/security/cve/CVE-2008-1227/" source="CVE"/>
		<description>
These are all security issues fixed in the silc-toolkit-1.1.7-7.23.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1227/">CVE-2008-1227</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054843" comment="silc-toolkit-1.1.7-7.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054842" comment="silc-toolkit-devel-1.1.7-7.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36693" version="1" class="patch">
	<metadata>
		<title>struts-1.2.9-162.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-2025" ref_url="https://www.suse.com/security/cve/CVE-2008-2025/" source="CVE"/>
		<reference ref_id="CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114/" source="CVE"/>
		<reference ref_id="CVE-2015-0899" ref_url="https://www.suse.com/security/cve/CVE-2015-0899/" source="CVE"/>
		<description>
These are all security issues fixed in the struts-1.2.9-162.37.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2025/">CVE-2008-2025</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0899/">CVE-2015-0899</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109634" comment="struts-1.2.9-162.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109632" comment="struts-javadoc-1.2.9-162.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109633" comment="struts-manual-1.2.9-162.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36694" version="1" class="patch">
	<metadata>
		<title>subversion-1.6.17-1.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-2448" ref_url="https://www.suse.com/security/cve/CVE-2007-2448/" source="CVE"/>
		<reference ref_id="CVE-2009-2411" ref_url="https://www.suse.com/security/cve/CVE-2009-2411/" source="CVE"/>
		<reference ref_id="CVE-2010-3315" ref_url="https://www.suse.com/security/cve/CVE-2010-3315/" source="CVE"/>
		<reference ref_id="CVE-2010-4539" ref_url="https://www.suse.com/security/cve/CVE-2010-4539/" source="CVE"/>
		<reference ref_id="CVE-2010-4644" ref_url="https://www.suse.com/security/cve/CVE-2010-4644/" source="CVE"/>
		<reference ref_id="CVE-2011-0715" ref_url="https://www.suse.com/security/cve/CVE-2011-0715/" source="CVE"/>
		<reference ref_id="CVE-2011-1752" ref_url="https://www.suse.com/security/cve/CVE-2011-1752/" source="CVE"/>
		<reference ref_id="CVE-2011-1783" ref_url="https://www.suse.com/security/cve/CVE-2011-1783/" source="CVE"/>
		<reference ref_id="CVE-2011-1921" ref_url="https://www.suse.com/security/cve/CVE-2011-1921/" source="CVE"/>
		<reference ref_id="CVE-2013-1845" ref_url="https://www.suse.com/security/cve/CVE-2013-1845/" source="CVE"/>
		<reference ref_id="CVE-2013-1846" ref_url="https://www.suse.com/security/cve/CVE-2013-1846/" source="CVE"/>
		<reference ref_id="CVE-2013-1847" ref_url="https://www.suse.com/security/cve/CVE-2013-1847/" source="CVE"/>
		<reference ref_id="CVE-2013-1849" ref_url="https://www.suse.com/security/cve/CVE-2013-1849/" source="CVE"/>
		<reference ref_id="CVE-2013-1968" ref_url="https://www.suse.com/security/cve/CVE-2013-1968/" source="CVE"/>
		<reference ref_id="CVE-2013-2112" ref_url="https://www.suse.com/security/cve/CVE-2013-2112/" source="CVE"/>
		<reference ref_id="CVE-2013-4277" ref_url="https://www.suse.com/security/cve/CVE-2013-4277/" source="CVE"/>
		<reference ref_id="CVE-2013-4505" ref_url="https://www.suse.com/security/cve/CVE-2013-4505/" source="CVE"/>
		<reference ref_id="CVE-2013-4558" ref_url="https://www.suse.com/security/cve/CVE-2013-4558/" source="CVE"/>
		<reference ref_id="CVE-2014-0032" ref_url="https://www.suse.com/security/cve/CVE-2014-0032/" source="CVE"/>
		<reference ref_id="CVE-2014-3528" ref_url="https://www.suse.com/security/cve/CVE-2014-3528/" source="CVE"/>
		<reference ref_id="CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580/" source="CVE"/>
		<reference ref_id="CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108/" source="CVE"/>
		<reference ref_id="CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248/" source="CVE"/>
		<reference ref_id="CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251/" source="CVE"/>
		<description>
These are all security issues fixed in the subversion-1.6.17-1.33.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2448/">CVE-2007-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2411/">CVE-2009-2411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3315/">CVE-2010-3315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4539/">CVE-2010-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4644/">CVE-2010-4644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0715/">CVE-2011-0715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1752/">CVE-2011-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1783/">CVE-2011-1783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1921/">CVE-2011-1921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1845/">CVE-2013-1845</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1846/">CVE-2013-1846</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1847/">CVE-2013-1847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1849/">CVE-2013-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1968/">CVE-2013-1968</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2112/">CVE-2013-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4277/">CVE-2013-4277</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4505/">CVE-2013-4505</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4558/">CVE-2013-4558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0032/">CVE-2014-0032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3528/">CVE-2014-3528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108673" comment="subversion-1.6.17-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108668" comment="subversion-devel-1.6.17-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108669" comment="subversion-perl-1.6.17-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108670" comment="subversion-python-1.6.17-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108671" comment="subversion-server-1.6.17-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108672" comment="subversion-tools-1.6.17-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36695" version="1" class="patch">
	<metadata>
		<title>t1lib-devel-5.1.1-100.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>
These are all security issues fixed in the t1lib-devel-5.1.1-100.21.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074607" comment="t1lib-devel-5.1.1-100.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36696" version="1" class="patch">
	<metadata>
		<title>taglib-devel-1.5-19.23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>
These are all security issues fixed in the taglib-devel-1.5-19.23.4 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074619" comment="taglib-devel-1.5-19.23.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36697" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble-0.7.10-2.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1769" ref_url="https://www.suse.com/security/cve/CVE-2013-1769/" source="CVE"/>
		<description>
These are all security issues fixed in the telepathy-gabble-0.7.10-2.19.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1769/">CVE-2013-1769</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077038" comment="telepathy-gabble-0.7.10-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36698" version="1" class="patch">
	<metadata>
		<title>texlive-2007-219.34.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-1440" ref_url="https://www.suse.com/security/cve/CVE-2010-1440/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-2007-219.34.6 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1440/">CVE-2010-1440</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145635" comment="texlive-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145636" comment="texlive-arab-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145637" comment="texlive-bin-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145638" comment="texlive-bin-cjk-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145639" comment="texlive-bin-devel-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145640" comment="texlive-bin-dvilj-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145641" comment="texlive-bin-jadetex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145642" comment="texlive-bin-latex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145643" comment="texlive-bin-metapost-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145644" comment="texlive-bin-musictex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145645" comment="texlive-bin-omega-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145646" comment="texlive-bin-tex4ht-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145647" comment="texlive-bin-tools-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145648" comment="texlive-bin-xetex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145649" comment="texlive-bin-xmltex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145650" comment="texlive-cjk-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145651" comment="texlive-context-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145652" comment="texlive-devel-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145653" comment="texlive-doc-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145654" comment="texlive-dvilj-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145655" comment="texlive-jadetex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145656" comment="texlive-latex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145657" comment="texlive-latex-doc-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145658" comment="texlive-metapost-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145659" comment="texlive-musictex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145660" comment="texlive-omega-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145661" comment="texlive-ppower4-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145662" comment="texlive-tex4ht-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145663" comment="texlive-tools-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145664" comment="texlive-xetex-2007-219.34.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145665" comment="texlive-xmltex-2007-219.34.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36699" version="1" class="patch">
	<metadata>
		<title>trousers-devel-0.3.10-0.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698/" source="CVE"/>
		<description>
These are all security issues fixed in the trousers-devel-0.3.10-0.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145666" comment="trousers-devel-0.3.10-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36700" version="1" class="patch">
	<metadata>
		<title>unixODBC_23-devel-2.3.1-0.9.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC_23-devel-2.3.1-0.9.40 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145667" comment="unixODBC_23-devel-2.3.1-0.9.40 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36701" version="1" class="patch">
	<metadata>
		<title>valgrind-3.8.1-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4865" ref_url="https://www.suse.com/security/cve/CVE-2008-4865/" source="CVE"/>
		<description>
These are all security issues fixed in the valgrind-3.8.1-0.5.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4865/">CVE-2008-4865</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145668" comment="valgrind-3.8.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145669" comment="valgrind-devel-3.8.1-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36702" version="1" class="patch">
	<metadata>
		<title>vte-devel-0.22.5-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>
These are all security issues fixed in the vte-devel-0.22.5-0.2.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061712" comment="vte-devel-0.22.5-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36703" version="1" class="patch">
	<metadata>
		<title>wireshark-1.10.13-0.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-1932" ref_url="https://www.suse.com/security/cve/CVE-2006-1932/" source="CVE"/>
		<reference ref_id="CVE-2006-4574" ref_url="https://www.suse.com/security/cve/CVE-2006-4574/" source="CVE"/>
		<reference ref_id="CVE-2006-4805" ref_url="https://www.suse.com/security/cve/CVE-2006-4805/" source="CVE"/>
		<reference ref_id="CVE-2006-5468" ref_url="https://www.suse.com/security/cve/CVE-2006-5468/" source="CVE"/>
		<reference ref_id="CVE-2006-5469" ref_url="https://www.suse.com/security/cve/CVE-2006-5469/" source="CVE"/>
		<reference ref_id="CVE-2006-5740" ref_url="https://www.suse.com/security/cve/CVE-2006-5740/" source="CVE"/>
		<reference ref_id="CVE-2007-0456" ref_url="https://www.suse.com/security/cve/CVE-2007-0456/" source="CVE"/>
		<reference ref_id="CVE-2007-0457" ref_url="https://www.suse.com/security/cve/CVE-2007-0457/" source="CVE"/>
		<reference ref_id="CVE-2007-0458" ref_url="https://www.suse.com/security/cve/CVE-2007-0458/" source="CVE"/>
		<reference ref_id="CVE-2007-0459" ref_url="https://www.suse.com/security/cve/CVE-2007-0459/" source="CVE"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-2560" ref_url="https://www.suse.com/security/cve/CVE-2009-2560/" source="CVE"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<reference ref_id="CVE-2009-3549" ref_url="https://www.suse.com/security/cve/CVE-2009-3549/" source="CVE"/>
		<reference ref_id="CVE-2009-3550" ref_url="https://www.suse.com/security/cve/CVE-2009-3550/" source="CVE"/>
		<reference ref_id="CVE-2009-3829" ref_url="https://www.suse.com/security/cve/CVE-2009-3829/" source="CVE"/>
		<reference ref_id="CVE-2009-4377" ref_url="https://www.suse.com/security/cve/CVE-2009-4377/" source="CVE"/>
		<reference ref_id="CVE-2010-0304" ref_url="https://www.suse.com/security/cve/CVE-2010-0304/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2992" ref_url="https://www.suse.com/security/cve/CVE-2010-2992/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-2994" ref_url="https://www.suse.com/security/cve/CVE-2010-2994/" source="CVE"/>
		<reference ref_id="CVE-2010-2995" ref_url="https://www.suse.com/security/cve/CVE-2010-2995/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-1593" ref_url="https://www.suse.com/security/cve/CVE-2012-1593/" source="CVE"/>
		<reference ref_id="CVE-2012-1595" ref_url="https://www.suse.com/security/cve/CVE-2012-1595/" source="CVE"/>
		<reference ref_id="CVE-2012-1596" ref_url="https://www.suse.com/security/cve/CVE-2012-1596/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074/" source="CVE"/>
		<reference ref_id="CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075/" source="CVE"/>
		<reference ref_id="CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076/" source="CVE"/>
		<reference ref_id="CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077/" source="CVE"/>
		<reference ref_id="CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078/" source="CVE"/>
		<reference ref_id="CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079/" source="CVE"/>
		<reference ref_id="CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080/" source="CVE"/>
		<reference ref_id="CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081/" source="CVE"/>
		<reference ref_id="CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421/" source="CVE"/>
		<reference ref_id="CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.10.13-0.2.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-1932/">CVE-2006-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4574/">CVE-2006-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4805/">CVE-2006-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5468/">CVE-2006-5468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5469/">CVE-2006-5469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-5740/">CVE-2006-5740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0456/">CVE-2007-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0457/">CVE-2007-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0458/">CVE-2007-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-0459/">CVE-2007-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2560/">CVE-2009-2560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3549/">CVE-2009-3549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3550/">CVE-2009-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3829/">CVE-2009-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4377/">CVE-2009-4377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0304/">CVE-2010-0304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2992/">CVE-2010-2992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2994/">CVE-2010-2994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2995/">CVE-2010-2995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1593/">CVE-2012-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1595/">CVE-2012-1595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1596/">CVE-2012-1596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009112696" comment="wireshark-1.10.13-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117365" comment="wireshark-devel-1.10.13-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36704" version="1" class="patch">
	<metadata>
		<title>xalan-j2-demo-2.7.0-217.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-demo-2.7.0-217.26.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009098849" comment="xalan-j2-demo-2.7.0-217.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098850" comment="xalan-j2-javadoc-2.7.0-217.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009098851" comment="xalan-j2-manual-2.7.0-217.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36705" version="1" class="patch">
	<metadata>
		<title>xen-devel-4.4.2_08-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2007-1320" ref_url="https://www.suse.com/security/cve/CVE-2007-1320/" source="CVE"/>
		<reference ref_id="CVE-2007-1321" ref_url="https://www.suse.com/security/cve/CVE-2007-1321/" source="CVE"/>
		<reference ref_id="CVE-2007-1322" ref_url="https://www.suse.com/security/cve/CVE-2007-1322/" source="CVE"/>
		<reference ref_id="CVE-2007-1323" ref_url="https://www.suse.com/security/cve/CVE-2007-1323/" source="CVE"/>
		<reference ref_id="CVE-2007-1366" ref_url="https://www.suse.com/security/cve/CVE-2007-1366/" source="CVE"/>
		<reference ref_id="CVE-2007-3919" ref_url="https://www.suse.com/security/cve/CVE-2007-3919/" source="CVE"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<reference ref_id="CVE-2014-9065" ref_url="https://www.suse.com/security/cve/CVE-2014-9065/" source="CVE"/>
		<reference ref_id="CVE-2014-9066" ref_url="https://www.suse.com/security/cve/CVE-2014-9066/" source="CVE"/>
		<reference ref_id="CVE-2015-0361" ref_url="https://www.suse.com/security/cve/CVE-2015-0361/" source="CVE"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-2752" ref_url="https://www.suse.com/security/cve/CVE-2015-2752/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-devel-4.4.2_08-1.7 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1320/">CVE-2007-1320</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1321/">CVE-2007-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1322/">CVE-2007-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1323/">CVE-2007-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-1366/">CVE-2007-1366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-3919/">CVE-2007-3919</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9065/">CVE-2014-9065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9066/">CVE-2014-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0361/">CVE-2015-0361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2752/">CVE-2015-2752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145670" comment="xen-devel-4.4.2_08-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36706" version="1" class="patch">
	<metadata>
		<title>xorg-x11-devel-32bit-7.4-8.26.44.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-devel-32bit-7.4-8.26.44.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009108445" comment="xorg-x11-devel-7.4-8.26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108444" comment="xorg-x11-devel-32bit-7.4-8.26.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36707" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libX11-devel-32bit-7.4-5.11.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libX11-devel-32bit-7.4-5.11.11.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077487" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077525" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36708" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXext-devel-32bit-7.4-1.18.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXext-devel-32bit-7.4-1.18.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077747" comment="xorg-x11-libXext-devel-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077746" comment="xorg-x11-libXext-devel-32bit-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36709" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXfixes-devel-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXfixes-devel-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077749" comment="xorg-x11-libXfixes-devel-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077748" comment="xorg-x11-libXfixes-devel-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36710" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXp-devel-32bit-7.4-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXp-devel-32bit-7.4-1.18.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077510" comment="xorg-x11-libXp-devel-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077534" comment="xorg-x11-libXp-devel-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36711" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXrender-devel-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXrender-devel-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077753" comment="xorg-x11-libXrender-devel-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077752" comment="xorg-x11-libXrender-devel-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36712" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXt-devel-32bit-7.4-1.19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXt-devel-32bit-7.4-1.19.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077757" comment="xorg-x11-libXt-devel-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077756" comment="xorg-x11-libXt-devel-32bit-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36713" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libXv-devel-32bit-7.4-1.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libXv-devel-32bit-7.4-1.16.2 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077755" comment="xorg-x11-libXv-devel-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077754" comment="xorg-x11-libXv-devel-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36714" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libxcb-devel-32bit-7.4-1.29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libxcb-devel-32bit-7.4-1.29.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009145671" comment="xorg-x11-libxcb-devel-7.4-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145672" comment="xorg-x11-libxcb-devel-32bit-7.4-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36715" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-sdk-7.4-27.105.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2006-6101" ref_url="https://www.suse.com/security/cve/CVE-2006-6101/" source="CVE"/>
		<reference ref_id="CVE-2006-6102" ref_url="https://www.suse.com/security/cve/CVE-2006-6102/" source="CVE"/>
		<reference ref_id="CVE-2006-6103" ref_url="https://www.suse.com/security/cve/CVE-2006-6103/" source="CVE"/>
		<reference ref_id="CVE-2007-1003" ref_url="https://www.suse.com/security/cve/CVE-2007-1003/" source="CVE"/>
		<reference ref_id="CVE-2007-5760" ref_url="https://www.suse.com/security/cve/CVE-2007-5760/" source="CVE"/>
		<reference ref_id="CVE-2007-6427" ref_url="https://www.suse.com/security/cve/CVE-2007-6427/" source="CVE"/>
		<reference ref_id="CVE-2007-6428" ref_url="https://www.suse.com/security/cve/CVE-2007-6428/" source="CVE"/>
		<reference ref_id="CVE-2007-6429" ref_url="https://www.suse.com/security/cve/CVE-2007-6429/" source="CVE"/>
		<reference ref_id="CVE-2008-0006" ref_url="https://www.suse.com/security/cve/CVE-2008-0006/" source="CVE"/>
		<reference ref_id="CVE-2008-1377" ref_url="https://www.suse.com/security/cve/CVE-2008-1377/" source="CVE"/>
		<reference ref_id="CVE-2008-1379" ref_url="https://www.suse.com/security/cve/CVE-2008-1379/" source="CVE"/>
		<reference ref_id="CVE-2008-2360" ref_url="https://www.suse.com/security/cve/CVE-2008-2360/" source="CVE"/>
		<reference ref_id="CVE-2008-2361" ref_url="https://www.suse.com/security/cve/CVE-2008-2361/" source="CVE"/>
		<reference ref_id="CVE-2008-2362" ref_url="https://www.suse.com/security/cve/CVE-2008-2362/" source="CVE"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-sdk-7.4-27.105.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6101/">CVE-2006-6101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2006-6102/">CVE-2006-6102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-6103/">CVE-2006-6103</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-1003/">CVE-2007-1003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-5760/">CVE-2007-5760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6427/">CVE-2007-6427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6428/">CVE-2007-6428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6429/">CVE-2007-6429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-0006/">CVE-2008-0006</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1377/">CVE-2008-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1379/">CVE-2008-1379</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2360/">CVE-2008-2360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-2361/">CVE-2008-2361</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2362/">CVE-2008-2362</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110271" comment="xorg-x11-server-sdk-7.4-27.105.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36716" version="1" class="patch">
	<metadata>
		<title>yast2-core-devel-2.17.46-0.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-devel-2.17.46-0.5.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145673" comment="yast2-core-devel-2.17.46-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36717" version="1" class="patch">
	<metadata>
		<title>yast2-devel-doc-2.17.140-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-devel-doc-2.17.140-1.1 package on the GA media of SUSE Linux Enterprise Software Development Kit 11 SP4.		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009145674" comment="yast2-devel-doc-2.17.140-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36718" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-PUBCLOUD</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-PUBCLOUD is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562788" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36719" version="1" class="patch">
	<metadata>
		<title>Security update for python-azure-agent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-PUBCLOUD</platform>
		</affected>
		<reference ref_id="1061584" ref_url="https://bugzilla.suse.com/1061584" source="BUGZILLA"/>
		<reference ref_id="1074865" ref_url="https://bugzilla.suse.com/1074865" source="BUGZILLA"/>
		<reference ref_id="1087764" ref_url="https://bugzilla.suse.com/1087764" source="BUGZILLA"/>
		<reference ref_id="1092831" ref_url="https://bugzilla.suse.com/1092831" source="BUGZILLA"/>
		<reference ref_id="1094420" ref_url="https://bugzilla.suse.com/1094420" source="BUGZILLA"/>
		<reference ref_id="1119542" ref_url="https://bugzilla.suse.com/1119542" source="BUGZILLA"/>
		<reference ref_id="1127838" ref_url="https://bugzilla.suse.com/1127838" source="BUGZILLA"/>
		<reference ref_id="1167601" ref_url="https://bugzilla.suse.com/1167601" source="BUGZILLA"/>
		<reference ref_id="1167602" ref_url="https://bugzilla.suse.com/1167602" source="BUGZILLA"/>
		<reference ref_id="1173866" ref_url="https://bugzilla.suse.com/1173866" source="BUGZILLA"/>
		<reference ref_id="1175130" ref_url="https://bugzilla.suse.com/1175130" source="BUGZILLA"/>
		<reference ref_id="997614" ref_url="https://bugzilla.suse.com/997614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0804" ref_url="https://www.suse.com/security/cve/CVE-2019-0804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007274.html" source="SUSE-SU"/>
		<description>
This update for python-azure-agent fixes the following issues:

+ Properly set the dhcp configuration to push the hostname to the DHCP
  server (bsc#1173866)
+ Do not bring the interface down to push the hostname, just use ifup
+ Set the hostname using hostnamectl to ensure setting is properly applied
  (bsc#1167601, bsc#1167602)

Update to version 2.2.45 (jsc#ECO-80)

+ Add support for Gen2 VM resource disks
+ Use alternate systemd detection
+ Fix /proc/net/route requirement that causes errors on FreeBSD
+ Add cloud-init auto-detect to prevent multiple provisioning mechanisms
  from relying on configuration for coordination
+ Disable cgroups when daemon is setup incorrectly
+ Remove upgrade extension loop for the same goal state
+ Add container id for extension telemetry events
+ Be more exact when detecting IMDS service health
+ Changing add_event to start sending missing fields

		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061584">SUSE bug 1061584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074865">SUSE bug 1074865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087764">SUSE bug 1087764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092831">SUSE bug 1092831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094420">SUSE bug 1094420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119542">SUSE bug 1119542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127838">SUSE bug 1127838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167601">SUSE bug 1167601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167602">SUSE bug 1167602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173866">SUSE bug 1173866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175130">SUSE bug 1175130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997614">SUSE bug 997614</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0804/">CVE-2019-0804</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-PUBCLOUD is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562789" comment="python-azure-agent-2.2.45-28.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36720" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="773612" ref_url="https://bugzilla.suse.com/773612" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>

GraphicsMagick was updated to fix an integer overflow (CVE-2012-3438).

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-19"/>
	<updated date="2013-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562790" comment="GraphicsMagick-1.2.5-4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562791" comment="libGraphicsMagick2-1.2.5-4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562792" comment="perl-GraphicsMagick-1.2.5-4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36721" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="754481" ref_url="https://bugzilla.suse.com/754481" source="BUGZILLA"/>
		<reference ref_id="773612" ref_url="https://bugzilla.suse.com/773612" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>

ImageMagick has been updated to fix an integer overflow (CVE-2012-3438).

Also a slowness in 'convert' when resizing JPEG images has been addressed 
(bnc#754481).

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-20"/>
	<updated date="2013-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/754481">SUSE bug 754481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562793" comment="ImageMagick-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562794" comment="ImageMagick-devel-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562795" comment="libMagick++-devel-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562796" comment="libMagick++1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562797" comment="libMagickWand1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562798" comment="libMagickWand1-32bit-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562799" comment="perl-PerlMagick-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36722" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821855" ref_url="https://bugzilla.suse.com/821855" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>

This update of Mesa fixes multiple integer overflows.

Security Issue reference:

    * CVE-2013-1993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562800" comment="Mesa-devel-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562801" comment="Mesa-devel-32bit-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36723" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_fcgid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="844935" ref_url="https://bugzilla.suse.com/844935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4365" ref_url="https://www.suse.com/security/cve/CVE-2013-4365/" source="CVE"/>
		<description>

A heap overflow in the apache2-mod_fcgid module has been fixed that could 
have been used by remote attackers to crash the server instance. 
(CVE-2013-4365)

Security Issue reference:

    * CVE-2013-4365
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4365&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/844935">SUSE bug 844935</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4365/">CVE-2013-4365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562802" comment="apache2-mod_fcgid-2.2-31.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36724" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="837746" ref_url="https://bugzilla.suse.com/837746" source="BUGZILLA"/>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<description>

This update fixes the following issues:

    * memory corruption in openssl_parse_x509 (CVE-2013-6420)
    * man-in-the-middle attacks by specially crafting certificates
      (CVE-2013-4248)

Security Issue references:

    * CVE-2013-6420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420&gt;
    * CVE-2013-4248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/837746">SUSE bug 837746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562803" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562804" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562805" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562806" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562807" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562808" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562809" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562810" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562811" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562812" comment="php5-devel-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562813" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562814" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562815" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562816" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562817" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562818" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562819" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562820" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562821" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562822" comment="php5-imap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562823" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562824" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562825" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562826" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562827" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562828" comment="php5-ncurses-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562829" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562830" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562831" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562832" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562833" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562834" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562835" comment="php5-posix-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562836" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562837" comment="php5-readline-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562838" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562839" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562840" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562841" comment="php5-sockets-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562842" comment="php5-sqlite-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562843" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562844" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562845" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562846" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562847" comment="php5-tidy-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562848" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562849" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562850" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562851" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562852" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562853" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562854" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562855" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36725" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<description>

This update fixes the following issues:

    * memory corruption in openssl_parse_x509 (CVE-2013-6420)
    * Heap buffer over-read in DateInterval (CVE-2013-6712)
    * man-in-the-middle attacks by specially crafting certificates
      (CVE-2013-4248)

Security Issue references:

    * CVE-2013-6420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420&gt;
    * CVE-2013-6712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712&gt;
    * CVE-2013-4248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562856" comment="php53-devel-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562857" comment="php53-imap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562858" comment="php53-posix-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562859" comment="php53-readline-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562860" comment="php53-sockets-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562861" comment="php53-sqlite-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562862" comment="php53-tidy-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36726" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_security2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="822664" ref_url="https://bugzilla.suse.com/822664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<description>

This update of mod_security2 fixed a NULL pointer dereference crash 
(CVE-2013-2765) and a memory issue (double free()) (bnc#822664).

Security Issue reference:

    * CVE-2013-2765
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-02"/>
	<updated date="2013-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/822664">SUSE bug 822664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562863" comment="apache2-mod_security2-2.7.1-0.2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36727" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck' 
(CVE-2012-3386).

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue reference:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562864" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36728" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562865" comment="bind-devel-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562866" comment="bind-devel-32bit-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36729" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="769799" ref_url="https://bugzilla.suse.com/769799" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>

Mono was updated to fix a cross site scripting attack in the System.Web 
class 'forbidden extensions' filtering has been fixed. (CVE-2012-3382)

Security Issue reference:

    * CVE-2012-3382
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-13"/>
	<updated date="2012-07-13"/>
	<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562867" comment="bytefx-data-mysql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562868" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562869" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562870" comment="mono-data-firebird-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562871" comment="mono-data-oracle-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562872" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562873" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562874" comment="mono-data-sybase-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562875" comment="mono-devel-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562876" comment="mono-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562877" comment="mono-jscript-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562878" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562879" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562880" comment="mono-wcf-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562881" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562882" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562883" comment="mono-winfxcore-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562884" comment="monodoc-core-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36730" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="817880" ref_url="https://bugzilla.suse.com/817880" source="BUGZILLA"/>
		<reference ref_id="838472" ref_url="https://bugzilla.suse.com/838472" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849226" ref_url="https://bugzilla.suse.com/849226" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="854520" ref_url="https://bugzilla.suse.com/854520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<description>

This update fixes the following security issues with Samba:

    * bnc#844720: DCERPC frag_len not checked (CVE-2013-4408)
    * bnc#853347: winbind pam security problem (CVE-2012-6150)
    * bnc#848101: No access check verification on stream files
      (CVE-2013-4475)

And fixes the following non-security issues:

    * bnc#853021: libsmbclient0 package description contains comments
    * bnc#817880: rpcclient adddriver and setdrive do not set all needed
      registry entries
    * bnc#838472: Client trying to delete print job fails: Samba returns:
      WERR_INVALID_PRINTER_NAME
    * bnc#854520 and bnc#849226: various upstream fixes

Security Issue references:

    * CVE-2012-6150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150&gt;
    * CVE-2013-4408
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408&gt;
    * CVE-2013-4475
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/817880">SUSE bug 817880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838472">SUSE bug 838472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849226">SUSE bug 849226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854520">SUSE bug 854520</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562885" comment="libldb-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562886" comment="libnetapi-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562887" comment="libnetapi0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562888" comment="libsmbclient-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562889" comment="libsmbsharemodes-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562890" comment="libsmbsharemodes0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562891" comment="libtalloc-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562892" comment="libtdb-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562893" comment="libtevent-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562894" comment="libwbclient-devel-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562895" comment="samba-devel-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36731" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<description>

The following security issue has been fixed in the CUPS print daemon 
CVE-2012-5519:

The patch adds better default protection against misuse of privileges by 
normal users who have been specifically allowed by root to do cupsd 
configuration changes

The new ConfigurationChangeRestriction cupsd.conf directive specifies the 
level of restriction for cupsd.conf changes that happen via HTTP/IPP 
requests to the running cupsd (e.g. via CUPS web interface or via the 
cupsctl command).

By default certain cupsd.conf directives that deal with filenames, paths, 
and users can no longer be changed via requests to the running cupsd but 
only by manual editing the cupsd.conf file and its default file permissions 
permit only root to write the cupsd.conf file.

Those directives are: ConfigurationChangeRestriction, AccessLog, 
BrowseLDAPCACertFile, CacheDir, ConfigFilePerm, DataDir, DocumentRoot, 
ErrorLog, FileDevice, FontPath, Group, LogFilePerm, PageLog, Printcap, 
PrintcapFormat, PrintcapGUI, RemoteRoot, RequestRoot, ServerBin, 
ServerCertificate, ServerKey, ServerRoot, StateDir, SystemGroup, 
SystemGroupAuthKey, TempDir, User.

The default group of users who are allowed to do cupsd configuration 
changes
via requests to the running cupsd (i.e. the SystemGroup directive in 
cupsd.conf) is set to 'root' only.

Additionally the following bug has been fixed:

    * strip trailing '@REALM' from username for Kerberos authentication
      (CUPS STR#3972 bnc#827109)

Security Issue reference:

    * CVE-2012-5519
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562896" comment="cups-devel-1.3.9-8.46.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36732" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<description>

This update fixes the re-use of wrong HTTP NTLM connections in libcurl. 
(CVE-2014-0015)

Security Issue reference:

    * CVE-2014-0015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-18"/>
	<updated date="2014-01-18"/>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562897" comment="libcurl-devel-7.19.7-1.20.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36733" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="783002" ref_url="https://bugzilla.suse.com/783002" source="BUGZILLA"/>
		<reference ref_id="811934" ref_url="https://bugzilla.suse.com/811934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>

The ISC DHCP server had a denial of service issue in handling specific DDNS 
requests which could cause a out of memory usage situation. (CVE-2013-2266)

This update also adds a dhcp6-server service template for SuSEfirewall2 
(bnc#783002)

Security Issues:

    * CVE-2013-2266
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-27"/>
	<updated date="2013-03-27"/>
	<bugzilla href="https://bugzilla.suse.com/783002">SUSE bug 783002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562898" comment="dhcp-devel-4.2.4.P2-0.11.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36734" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562899" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36735" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="804742" ref_url="https://bugzilla.suse.com/804742" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<description>

pidgin was updated to fix 4 security issues:

    * Fixed a crash when receiving UPnP responses with abnormally long
      values. (CVE-2013-0274, bnc#804742)
    * Fixed a crash in Sametime protocol when a malicious server sends us
      an abnormally long user ID. (CVE-2013-0273, bnc#804742)
    * Fixed a bug where the MXit server or a man-in-the-middle could
      potentially send specially crafted data that could overflow a buffer
      and lead to a crash or remote code execution.(CVE-2013-0272,
      bnc#804742)
    * Fixed a bug where a remote MXit user could possibly specify a local
      file path to be written to. (CVE-2013-0271, bnc#804742)

Security Issue references:

    * CVE-2013-0271
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271&gt;
    * CVE-2013-0272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272&gt;
    * CVE-2013-0273
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273&gt;
    * CVE-2013-0274
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-27"/>
	<updated date="2013-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562900" comment="finch-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562901" comment="finch-devel-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562902" comment="libpurple-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562903" comment="libpurple-devel-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562904" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562905" comment="pidgin-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562906" comment="pidgin-devel-2.6.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36736" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562907" comment="mozilla-nspr-devel-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562908" comment="mozilla-nss-devel-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36737" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issue has been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562909" comment="mozilla-nspr-devel-4.9.3-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36738" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562910" comment="mozilla-nss-devel-3.14-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36739" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562911" comment="mozilla-nspr-devel-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562912" comment="mozilla-nss-devel-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36740" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="804248" ref_url="https://bugzilla.suse.com/804248" source="BUGZILLA"/>
		<reference ref_id="806669" ref_url="https://bugzilla.suse.com/806669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.3ESR release.

Important: due to compatibility issues, the Beagle plug-in for 
MozillaFirefox is temporarily disabled by this update.

Besides the major version update from the 10ESR stable release line to the 
17ESR stable release line, this update brings critical security and 
bugfixes:

    * 

      MFSA 2013-28: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and buffer
      overflow problems rated as low to critical security issues in shipped
      software. Some of these issues are potentially exploitable, allowing
      for remote code execution. We would also like to thank Abhishek for
      reporting four additional use-after-free and out of bounds write
      flaws introduced during Firefox development that were fixed before
      general release.

    * 

      The following issues have been fixed in Firefox 19 and ESR 17.0.3:

          o Heap-use-after-free in nsOverflowContinuationTracker::Finish,
            with -moz-columns (CVE-2013-0780)
          o Heap-buffer-overflow WRITE in
            nsSaveAsCharset::DoCharsetConversion (CVE-2013-0782)
    * 

      MFSA 2013-27 / CVE-2013-0776: Google security researcher Michal
      Zalewski reported an issue where the browser displayed the content of
      a proxy's 407 response if a user canceled the proxy's authentication
      prompt. In this circumstance, the addressbar will continue to show
      the requested site's address, including HTTPS addresses that appear
      to be secure. This spoofing of addresses can be used for phishing
      attacks by fooling users into entering credentials, for example.

    * 

      MFSA 2013-26 / CVE-2013-0775: Security researcher Nils reported a
      use-after-free in nsImageLoadingContent when content script is
      executed. This could allow for arbitrary code execution.

    * 

      MFSA 2013-25 / CVE-2013-0774: Mozilla security researcher Frederik
      Braun discovered that since Firefox 15 the file system location of
      the active browser profile was available to JavaScript workers. While
      not dangerous by itself, this could potentially be combined with
      other vulnerabilities to target the profile in an attack.

    * 

      MFSA 2013-24 / CVE-2013-0773: Mozilla developer Bobby Holley
      discovered that it was possible to bypass some protections in Chrome
      Object Wrappers (COW) and System Only Wrappers (SOW), making their
      prototypes mutable by web content. This could be used leak
      information from chrome objects and possibly allow for arbitrary code
      execution.

    * 

      MFSA 2013-23 / CVE-2013-0765: Mozilla developer Boris Zbarsky
      reported that in some circumstances a wrapped WebIDL object can be
      wrapped multiple times, overwriting the existing wrapped state. This
      could lead to an exploitable condition in rare cases.

    * 

      MFSA 2013-22 / CVE-2013-0772: Using the Address Sanitizer tool,
      security researcher Atte Kettunen from OUSPG found an out-of-bounds
      read while rendering GIF format images. This could cause a
      non-exploitable crash and could also attempt to render normally
      inaccesible data as part of the image.

    * 

      MFSA 2013-21: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew
      McCreight, Joe Drew, and Wayne Mery reported memory safety problems
      and crashes that affect Firefox ESR 17, and Firefox 18.

    * 

      Memory safety bugs fixed in Firefox ESR 17.0.3, and Firefox 19
      (CVE-2013-0783).

Security Issue references:

    * CVE-2013-0780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780&gt;
    * CVE-2013-0782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782&gt;
    * CVE-2013-0776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776&gt;
    * CVE-2013-0775
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775&gt;
    * CVE-2013-0774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774&gt;
    * CVE-2013-0773
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773&gt;
    * CVE-2013-0765
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765&gt;
    * CVE-2013-0772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772&gt;
    * CVE-2013-0783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-05"/>
	<updated date="2013-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806669">SUSE bug 806669</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562913" comment="beagle-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562914" comment="beagle-devel-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562915" comment="beagle-lang-0.3.8-56.44.45.129 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562916" comment="mozilla-nspr-devel-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562917" comment="mozilla-nss-devel-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36741" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android

    * 

      (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562918" comment="mozilla-nspr-devel-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562919" comment="mozilla-nss-devel-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36742" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="791666" ref_url="https://bugzilla.suse.com/791666" source="BUGZILLA"/>
		<reference ref_id="797313" ref_url="https://bugzilla.suse.com/797313" source="BUGZILLA"/>
		<reference ref_id="797515" ref_url="https://bugzilla.suse.com/797515" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<description>

This update for freeradius-server provides the following fixes and 
improvements:

    * Increase the vendor IDs limit from 32767 to 65535 (bnc#791666)
    * Fix issues with escaping special characters in password (bnc#797515)
    * Respect expired passwords and accounts when using the unix module
      (bnc#797313, CVE-2011-4966).

Security Issue reference:

    * CVE-2011-4966
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4966&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-23"/>
	<updated date="2013-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/791666">SUSE bug 791666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797313">SUSE bug 797313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797515">SUSE bug 797515</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562920" comment="freeradius-server-devel-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562921" comment="freeradius-server-libs-2.1.1-7.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36743" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="795826" ref_url="https://bugzilla.suse.com/795826" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<description>

This update fixes:

    * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668
      and CVE-2012-5669)

As well as the following non-security bugs:

    * [bdf] Savannah bug #37905.
          o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero
            in case of allocation error; this value gets used in a loop in
    * [bdf] Fix Savannah bug #37906.
          o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size
            for checking `glyph_enc'.

Security Issue references:

    * CVE-2012-5668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668&gt;
    * CVE-2012-5669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-15"/>
	<updated date="2013-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562922" comment="freetype2-devel-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562923" comment="freetype2-devel-32bit-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36744" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="779700" ref_url="https://bugzilla.suse.com/779700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>

This update fixes an array index error leading to a heap-based buffer 
overflow in ghostscript-library. CVE-2012-4405 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-4405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-12"/>
	<updated date="2012-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562924" comment="ghostscript-devel-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562925" comment="ghostscript-ijs-devel-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562926" comment="libgimpprint-devel-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36745" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="791928" ref_url="https://bugzilla.suse.com/791928" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="811979" ref_url="https://bugzilla.suse.com/811979" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="818628" ref_url="https://bugzilla.suse.com/818628" source="BUGZILLA"/>
		<reference ref_id="819347" ref_url="https://bugzilla.suse.com/819347" source="BUGZILLA"/>
		<reference ref_id="822210" ref_url="https://bugzilla.suse.com/822210" source="BUGZILLA"/>
		<reference ref_id="827811" ref_url="https://bugzilla.suse.com/827811" source="BUGZILLA"/>
		<reference ref_id="828235" ref_url="https://bugzilla.suse.com/828235" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<description>

This update for glibc contains the following fixes:

    * Fix integer overflows in malloc (CVE-2013-4332, bnc#839870)
    * Fix buffer overflow in glob (bnc#691365)
    * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320)
    * Update mount flags in &lt;sys/mount.h&gt; (bnc#791928)
    * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246)
    * Fix memory leaks in dlopen (bnc#811979)
    * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914,
      bnc#813121)
    * Fix check for XEN build in glibc_post_upgrade that causes missing
      init re-exec (bnc#818628)
    * Don't raise UNDERFLOW in tan/tanf for small but normal argument
      (bnc#819347)
    * Properly cross page boundary in SSE4.2 implementation of strcmp
      (bnc#822210)
    * Fix robust mutex handling after fork (bnc#827811)
    * Fix missing character in IBM-943 charset (bnc#828235)
    * Fix use of alloca in gaih_inet (bnc#828637)
    * Initialize pointer guard also in static executables (CVE-2013-4788,
      bnc#830268)
    * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).

Security Issues:

    * CVE-2012-4412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412&gt;
    * CVE-2013-0242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242&gt;
    * CVE-2013-1914
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914&gt;
    * CVE-2013-4237
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237&gt;
    * CVE-2013-4332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332&gt;
    * CVE-2013-4788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-13"/>
	<updated date="2013-09-13"/>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791928">SUSE bug 791928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811979">SUSE bug 811979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818628">SUSE bug 818628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819347">SUSE bug 819347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822210">SUSE bug 822210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827811">SUSE bug 827811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828235">SUSE bug 828235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562927" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562928" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36746" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<description>

This update of GnuTLS fixes a regression introduced by the previous update 
that could have resulted in a Denial of Service (application crash).

Security Issue reference:

    * CVE-2013-2116
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-28"/>
	<updated date="2013-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562929" comment="libgnutls-devel-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562930" comment="libgnutls-extra-devel-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36747" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562932" comment="gtk2-devel-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562933" comment="gtk2-devel-32bit-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36748" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<description>

This update is rereleased because some architectures were missed on the 
first try. It fixes the following security issues:

    * Specially crafted strings could cause a buffer overflow in icu (
      CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt; )
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-19"/>
	<updated date="2012-12-19"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562934" comment="icu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562935" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562936" comment="libicu-devel-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562937" comment="libicu-devel-32bit-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36749" version="1" class="patch">
	<metadata>
		<title>Security update for inkscape</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="794958" ref_url="https://bugzilla.suse.com/794958" source="BUGZILLA"/>
		<reference ref_id="796306" ref_url="https://bugzilla.suse.com/796306" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5656" ref_url="https://www.suse.com/security/cve/CVE-2012-5656/" source="CVE"/>
		<reference ref_id="CVE-2012-6076" ref_url="https://www.suse.com/security/cve/CVE-2012-6076/" source="CVE"/>
		<description>

inkscape was updated to fix a XXE (Xml eXternal Entity) attack during 
rasterization of SVG images (CVE-2012-5656), where the rendering of 
malicious SVG images could have connected from inkscape to internal hosts.

Also inkscape would have loaded .EPS files from untrusted /tmp occasionaly 
instead from the current directory. (CVE-2012-6076)

Security Issue references:

    * CVE-2012-6076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6076&gt;
    * CVE-2012-5656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-20"/>
	<updated date="2013-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/794958">SUSE bug 794958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796306">SUSE bug 796306</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5656/">CVE-2012-5656</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6076/">CVE-2012-6076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562938" comment="inkscape-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562939" comment="inkscape-extensions-dia-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562940" comment="inkscape-extensions-extra-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562941" comment="inkscape-extensions-fig-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562942" comment="inkscape-extensions-gimp-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562943" comment="inkscape-lang-0.46-62.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36750" version="1" class="patch">
	<metadata>
		<title>Security update for inn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="776967" ref_url="https://bugzilla.suse.com/776967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3523" ref_url="https://www.suse.com/security/cve/CVE-2012-3523/" source="CVE"/>
		<description>

A STARTTLS injection issue has been fixed in inn. CVE-2012-3523 was 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-05"/>
	<updated date="2012-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/776967">SUSE bug 776967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3523/">CVE-2012-3523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562944" comment="inn-2.4.2-170.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562945" comment="inn-devel-2.4.2-170.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36751" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_4_2-ibm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<description>

IBM Java 1.4.2 was updated to SR13-FP18 to fix bugs and security issues.

Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Also the following bug has been fixed:

    * mark files in jre/bin and bin/ as executable (bnc#823034)

Security Issue references:

    * CVE-2013-3009
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009&gt;
    * CVE-2013-3011
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011&gt;
    * CVE-2013-3012
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012&gt;
    * CVE-2013-2469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469&gt;
    * CVE-2013-2465
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465&gt;
    * CVE-2013-2464
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464&gt;
    * CVE-2013-2463
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463&gt;
    * CVE-2013-2473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473&gt;
    * CVE-2013-2472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472&gt;
    * CVE-2013-2471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471&gt;
    * CVE-2013-2470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470&gt;
    * CVE-2013-2459
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459&gt;
    * CVE-2013-2456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456&gt;
    * CVE-2013-2447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447&gt;
    * CVE-2013-2452
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452&gt;
    * CVE-2013-2446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446&gt;
    * CVE-2013-2450
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450&gt;
    * CVE-2013-1500
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-23"/>
	<updated date="2013-07-23"/>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562946" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562947" comment="java-1_4_2-ibm-devel-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36752" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<description>

IBM Java 6 SR15 has been released and fixes lots of bugs and security 
issues.

More information can be found on: 
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2013-5458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458&gt;
    * CVE-2013-5456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456&gt;
    * CVE-2013-5457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457&gt;
    * CVE-2013-4041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041&gt;
    * CVE-2013-5375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375&gt;
    * CVE-2013-5372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372&gt;
    * CVE-2013-5843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843&gt;
    * CVE-2013-5789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787&gt;
    * CVE-2013-5788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788&gt;
    * CVE-2013-5824
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5832
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;
    * CVE-2013-5831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819&gt;
    * CVE-2013-5818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818&gt;
    * CVE-2013-5848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848&gt;
    * CVE-2013-5776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-15"/>
	<updated date="2013-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562948" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562949" comment="java-1_6_0-ibm-devel-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562950" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36753" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 7</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<description>

IBM Java 7 SR6 has been released and fixes lots of bugs and security 
issues.

More information can be found on: 
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2013-5458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458&gt;
    * CVE-2013-5456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456&gt;
    * CVE-2013-5457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457&gt;
    * CVE-2013-4041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041&gt;
    * CVE-2013-5375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375&gt;
    * CVE-2013-5372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372&gt;
    * CVE-2013-5843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843&gt;
    * CVE-2013-5789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787&gt;
    * CVE-2013-5788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788&gt;
    * CVE-2013-5824
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5832
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;
    * CVE-2013-5831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819&gt;
    * CVE-2013-5818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818&gt;
    * CVE-2013-5848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848&gt;
    * CVE-2013-5776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-19"/>
	<updated date="2013-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562951" comment="java-1_7_0-ibm-devel-1.7.0_sr6.0-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36754" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This kdelibs4 update fixes several security issues related to 
khtml/konqueror.

    * Fix security issues and null pointer references in khtml/konqueror
      (bnc#787520) (CVE-2012-4512, CVE-2012-4513, CVE-2012-4515)

Security Issue references:

    * CVE-2012-4512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512&gt;
    * CVE-2012-4513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513&gt;
    * CVE-2012-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-01"/>
	<updated date="2013-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562952" comment="kdelibs4-doc-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562954" comment="libkde4-devel-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562956" comment="libkdecore4-devel-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36755" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

    * If a KDC serves multiple realms, certain requests could cause
      setup_server_realm() to dereference a null pointer, crashing the KDC.
      (CVE-2013-1418)

Security Issues:

    * CVE-2013-1418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-08"/>
	<updated date="2013-11-08"/>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562957" comment="krb5-devel-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562958" comment="krb5-devel-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562959" comment="krb5-server-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36756" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562960" comment="liblcms-devel-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562961" comment="liblcms-devel-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562962" comment="python-lcms-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36757" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="757576" ref_url="https://bugzilla.suse.com/757576" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<description>

This update of Samba fixes one security issue and several bugs.

The security fix is:

    * Ensure that users cannot hand out their own privileges to everyone,
      only administrators are allowed to do that. (CVE-2012-2111
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111&gt; )

The non-security bug fixes merged from upstream Samba are:

    * Fix default name resolve order. (docs-xml, bso#7564).
    * Fix a segfault in vfs_aio_fork. (s3-aio-fork, bso#8836).
    * Remove whitespace in example samba.ldif. (docs, bso#8789)
    * Move print_backend_init() behind init_system_info(). (s3-smbd,
      bso#8845)
    * Prepend '/' to filename argument. (s3-docs, bso#8826)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562963" comment="libldb-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562964" comment="libnetapi-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562965" comment="libnetapi0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562966" comment="libsmbclient-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562967" comment="libsmbsharemodes-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562968" comment="libsmbsharemodes0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562969" comment="libtalloc-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562970" comment="libtdb-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562971" comment="libtevent-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562972" comment="libwbclient-devel-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562973" comment="samba-devel-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36758" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="784197" ref_url="https://bugzilla.suse.com/784197" source="BUGZILLA"/>
		<reference ref_id="797006" ref_url="https://bugzilla.suse.com/797006" source="BUGZILLA"/>
		<reference ref_id="802634" ref_url="https://bugzilla.suse.com/802634" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>

libqt4 has been updated to fix several security issues.

    * An information disclosure via QSharedMemory was fixed which allowed
      local attackers to read information (e.g. bitmap content) from the
      attacked user (CVE-2013-0254).
    * openssl-incompatibility-fix.diff: Fix wrong error reporting when
      using a binary incompatible version of openSSL (bnc#797006,
      CVE-2012-6093)
    * Various compromised SSL root certificates were blacklisted.

Also a non-security bugfix has been applied:

    * Add fix for qdbusviewer not matching args (bnc#784197)

Security Issue reference:

    * CVE-2013-0254
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/784197">SUSE bug 784197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562974" comment="libQtWebKit-devel-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562975" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562976" comment="libQtWebKit4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562977" comment="libqt4-devel-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562978" comment="libqt4-devel-doc-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562979" comment="libqt4-devel-doc-data-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562980" comment="libqt4-sql-mysql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562981" comment="libqt4-sql-mysql-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562982" comment="libqt4-sql-postgresql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562983" comment="libqt4-sql-postgresql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562984" comment="libqt4-sql-postgresql-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562985" comment="libqt4-sql-sqlite-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562986" comment="libqt4-sql-sqlite-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562987" comment="libqt4-sql-unixODBC-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562988" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562989" comment="libqt4-sql-unixODBC-x86-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36759" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="812525" ref_url="https://bugzilla.suse.com/812525" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>

This update to version 9.1.9 fixes:

    * CVE-2013-1899: Fix insecure parsing of server command-line switches.
    * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster
      child process.
    * CVE-2013-1901: Make REPLICATION privilege checks test current user
      not authenticated user.

Security Issue references:

    * CVE-2013-1899
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899&gt;
    * CVE-2013-1900
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900&gt;
    * CVE-2013-1901
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-02"/>
	<updated date="2013-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562990" comment="postgresql91-devel-9.1.9-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36760" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562991" comment="libgcrypt-devel-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562992" comment="libgcrypt-devel-32bit-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36761" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="792444" ref_url="https://bugzilla.suse.com/792444" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<description>

A stack-based buffer overflow in MySQL has been fixed that could have 
caused a Denial of Service or potentially allowed the execution of 
arbitrary code (CVE-2012-5611).

Security Issue references:

    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613&gt;
    * CVE-2012-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612&gt;
    * CVE-2012-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-27"/>
	<updated date="2012-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562993" comment="libmysqlclient-devel-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562994" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562995" comment="libmysqlclient_r15-x86-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36762" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="802648" ref_url="https://bugzilla.suse.com/802648" source="BUGZILLA"/>
		<reference ref_id="802746" ref_url="https://bugzilla.suse.com/802746" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<description>

OpenSSL has been updated to fix several security issues:

    * CVE-2012-4929: Avoid the openssl CRIME attack by disabling SSL
      compression by default. Setting the environment variable
      'OPENSSL_NO_DEFAULT_ZLIB' to 'no' enables compression again.
    * CVE-2013-0169: Timing attacks against TLS could be used by physically
      local attackers to gain access to transmitted plain text or private
      keymaterial. This issue is also known as the 'Lucky-13' issue.
    * CVE-2013-0166: A OCSP invalid key denial of service issue was fixed.

Security Issue references:

    * CVE-2013-0169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169&gt;
    * CVE-2013-0166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-25"/>
	<updated date="2013-03-25"/>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562996" comment="libopenssl-devel-0.9.8j-0.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36763" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562997" comment="libotr-devel-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36764" version="1" class="patch">
	<metadata>
		<title>Security update for pcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="732763" ref_url="https://bugzilla.suse.com/732763" source="BUGZILLA"/>
		<reference ref_id="775009" ref_url="https://bugzilla.suse.com/775009" source="BUGZILLA"/>
		<reference ref_id="775010" ref_url="https://bugzilla.suse.com/775010" source="BUGZILLA"/>
		<reference ref_id="775011" ref_url="https://bugzilla.suse.com/775011" source="BUGZILLA"/>
		<reference ref_id="775013" ref_url="https://bugzilla.suse.com/775013" source="BUGZILLA"/>
		<reference ref_id="782967" ref_url="https://bugzilla.suse.com/782967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<description>

pcp was updated to version 3.6.10 which fixes security issues and also 
brings a lot of new features.

    * 

      Update to pcp-3.6.10.

          o Transition daemons to run under an unprivileged account.
          o Fixes for security advisory CVE-2012-5530: tmpfile flaws;
            (bnc#782967).
          o Fix pcp(1) command short-form pmlogger reporting.
          o Fix pmdalogger error handling for directory files.
          o Fix pmstat handling of odd corner case in CPU metrics.
          o Correct the python ctype used for pmAtomValue 32bit ints.
          o Add missing RPM spec dependency for python-ctypes.
          o Corrections to pmdamysql metrics units.
          o Add pmdamysql slave status metrics.
          o Improve pmcollectl error messages.
          o Parameterize pmcollectl CPU counts in interrupt subsys.
          o Fix generic RPM packaging for powerpc builds.
          o Fix python API use of reentrant libpcp string routines.
          o Python code backporting for RHEL5 in qa and pmcollectl.
          o Fix edge cases in capturing interrupt error counts.
    * 

      Update to pcp-3.6.9.

          o Python wrapper for the pmimport API
          o Make sar2pcp work with the sysstat versions from RHEL5, RHEL6,
            and all recent Fedora versions (which is almost all current
            versions of sysstat verified).
          o Added a number of additional metrics into the importer for
            people starting to use it to analyse sar data from real
            customer incidents.
          o Rework use of C99 'restrict' keyword in pmdalogger (Debian bug:
            689552)
          o Alot of work on the PCP QA suite, special thanks to Tomas
            Dohnalek for all his efforts there.
          o Win32 build updates
          o Add 'raw' disk active metrics so that existing tools like
            iostat can be emulated
          o Allow sar2pcp to accept XML input directly (.xml suffix),
            allowing it to not have to run on the same platform as the
            sadc/sadf that originally generated it.
          o Add PMI error codes into the PCP::LogImport perl module.
          o Fix a typo in pmiUnits man page synopsis section
          o Resolve pmdalinux ordering issue in NUMA/CPU indom setup
            (Redhat bug: 858384)
          o Remove unused pmcollectl imports (Redhat bug: 863210)
          o Allow event traces to be used in libpcp interpolate mode
    * 

      Update to pcp-3.6.8.

          o Corrects the disk/partition identification for the MMC driver,
            which makes disk indom handling correct on the Raspberry Pi
            (http://www.raspberrypi.org/)
          o Several minor/basic fixes for pmdaoracle.
          o Improve pmcollectl compatibility.
          o Make a few clarifications to pmcollectl.1.
          o Improve python API test coverage.
          o Numerous updates to the test suite in general.
          o Allow pmda Install scripts to specify own dso name again.
          o Reconcile spec file differences between PCP flavours.
          o Fix handling of multiple contexts with a remote namespace.
          o Core socket interface abstractions to support NSS (later).
          o Fix man page SYNOPSIS section for pmUnpackEventRecords.
          o Add --disable-shared build option for static builds.
    * 

      Update to pcp-3.6.6.

          o Added the python PMAPI bindings and an initial python client in
            pmcollectl. Separate, new package exists for python libs for
            those platforms that split out packages (rpm, deb).
          o Added a pcp-testsuite package for those platforms that might
            want this (rpm, deb again, mainly)
          o Re-introduced the pcp/qa subdirectory in pcp and deprecated the
            external pcpqa git tree.
          o Fix potential buffer overflow in pmlogger host name handling.
          o Reworked the configure --prefix handling to be more like the
            rest of the open source world.
          o Ensure the __pmDecodeText ident parameter is always set
            Resolves Red Hat bugzilla bug #841306.

Security Issue references:

    * CVE-2012-3418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418&gt;
    * CVE-2012-3419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419&gt;
    * CVE-2012-3420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420&gt;
    * CVE-2012-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/732763">SUSE bug 732763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775010">SUSE bug 775010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775011">SUSE bug 775011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775013">SUSE bug 775013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782967">SUSE bug 782967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562998" comment="libpcp3-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562999" comment="pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563000" comment="pcp-devel-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563001" comment="pcp-import-iostat2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563002" comment="pcp-import-mrtg2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563003" comment="pcp-import-sar2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563004" comment="pcp-import-sheet2pcp-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563005" comment="perl-PCP-LogImport-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563006" comment="perl-PCP-LogSummary-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563007" comment="perl-PCP-MMV-3.6.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563008" comment="perl-PCP-PMDA-3.6.10-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36765" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563009" comment="libpixman-1-0-devel-0.16.0-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36766" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="806793" ref_url="https://bugzilla.suse.com/806793" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>

This update of poppler fixes the following vulnerabilities:

    * CVE-2013-1788: Various invalid memory issues could be used by
      attackers supplying PDFs to crash the PDF viewer or potentially
      execute code.
    * CVE-2013-1789: A crash in poppler could be used by attackers
      providing PDFs to crash the PDF viewer.
    * CVE-2013-1790: An uninitialized memory read could be used by
      attackers providing PDFs to crash the PDF viewer.

Security Issue references:

    * CVE-2013-1788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788&gt;
    * CVE-2013-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789&gt;
    * CVE-2013-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-26"/>
	<updated date="2013-03-26"/>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563010" comment="libpoppler-devel-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563011" comment="libpoppler-glib-devel-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563012" comment="libpoppler-qt2-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563013" comment="libpoppler-qt3-devel-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563014" comment="libpoppler-qt4-devel-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563015" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36767" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could have 
allowed remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

Security Issue reference:

    * CVE-2012-4505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563016" comment="libproxy-devel-0.3.1-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36768" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="719988" ref_url="https://bugzilla.suse.com/719988" source="BUGZILLA"/>
		<reference ref_id="734733" ref_url="https://bugzilla.suse.com/734733" source="BUGZILLA"/>
		<reference ref_id="741480" ref_url="https://bugzilla.suse.com/741480" source="BUGZILLA"/>
		<reference ref_id="744510" ref_url="https://bugzilla.suse.com/744510" source="BUGZILLA"/>
		<reference ref_id="757602" ref_url="https://bugzilla.suse.com/757602" source="BUGZILLA"/>
		<reference ref_id="758565" ref_url="https://bugzilla.suse.com/758565" source="BUGZILLA"/>
		<reference ref_id="759172" ref_url="https://bugzilla.suse.com/759172" source="BUGZILLA"/>
		<reference ref_id="759180" ref_url="https://bugzilla.suse.com/759180" source="BUGZILLA"/>
		<reference ref_id="760019" ref_url="https://bugzilla.suse.com/760019" source="BUGZILLA"/>
		<reference ref_id="760997" ref_url="https://bugzilla.suse.com/760997" source="BUGZILLA"/>
		<reference ref_id="768027" ref_url="https://bugzilla.suse.com/768027" source="BUGZILLA"/>
		<reference ref_id="770708" ref_url="https://bugzilla.suse.com/770708" source="BUGZILLA"/>
		<reference ref_id="772094" ref_url="https://bugzilla.suse.com/772094" source="BUGZILLA"/>
		<reference ref_id="773048" ref_url="https://bugzilla.suse.com/773048" source="BUGZILLA"/>
		<reference ref_id="773061" ref_url="https://bugzilla.suse.com/773061" source="BUGZILLA"/>
		<reference ref_id="773515" ref_url="https://bugzilla.suse.com/773515" source="BUGZILLA"/>
		<reference ref_id="774167" ref_url="https://bugzilla.suse.com/774167" source="BUGZILLA"/>
		<reference ref_id="774681" ref_url="https://bugzilla.suse.com/774681" source="BUGZILLA"/>
		<reference ref_id="774921" ref_url="https://bugzilla.suse.com/774921" source="BUGZILLA"/>
		<reference ref_id="775899" ref_url="https://bugzilla.suse.com/775899" source="BUGZILLA"/>
		<reference ref_id="775906" ref_url="https://bugzilla.suse.com/775906" source="BUGZILLA"/>
		<reference ref_id="777181" ref_url="https://bugzilla.suse.com/777181" source="BUGZILLA"/>
		<reference ref_id="778669" ref_url="https://bugzilla.suse.com/778669" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4233" ref_url="https://www.suse.com/security/cve/CVE-2012-4233/" source="CVE"/>
		<description>

LibreOffice was updated to SUSE 3.5 bugfix release 13 (based on upstream 
3.5.6-rc2) which fixes a lot of bugs.

The following bugs have been fixed:

    * polygon fill rule (bnc#759172)
    * open XML in Writer (bnc#777181)
    * undo in text objects (fdo#36138)
    * broken numbering level (bnc#760019)
    * better MathML detection (bnc#774921)
    * pictures in DOCX import (bnc#772094)
    * collapsing border painting (fdo#39415)
    * better DOCX text box export (fdo#45724)
    * hidden text in PPTX import (bnc#759180)
    * slide notes in PPTX import (bnc#768027)
    * RTL paragraphs in DOC import (fdo#43398)
    * better vertical text imports (bnc#744510)
    * HYPERLINK field in DOCX import (fdo#51034)
    * shadow color on partial redraw (bnc#773515)
    * floating objects in DOCX import (bnc#775899)
    * graphite2 hyphenation regression (fdo#49486)
    * missing shape position and size (bnc#760997)
    * page style attributes in ODF import (fdo#38056)
    * browsing in Template dialog crasher (fdo#46249)
    * wrong master slide shape being used (bnc#758565)
    * page borders regression in ODT import (fdo#38056)
    * invalidate bound rect after drag&amp;drop (fdo#44534)
    * rotated shape margins in PPTX import (bnc#773048)
    * pasting into more than 1 sheet crasher (fdo#47311)
    * crashers in PPT/PPTX import (bnc#768027, bnc#774167
    * missing footnote in DOCX/DOC/RTF export (fdo#46020)
    * checkbox no-label behaviour (fdo#51336, bnc#757602)
    * try somewhat harder to read w:position (bnc#773061)
    * FormatNumber can handle sal_uInt32 values (fdo#51793)
    * rectangle-paragraph tables in DOCX import (bnc#775899)
    * header and bullet in slideshow transition (bnc#759172)
    * default background color in DOC/DOCX export (fdo#45724)
    * font name / size attributes in DOCX import (bnc#774681)
    * zero rect. size causing wrong line positions (fdo#47434)
    * adjusted display of Bracket/BracePair in PPT (bnc#741480)
    * use Unicode functions for QuickStarter tooltip (fdo#52143)
    * TabRatio API and detect macro at group shape fixes (bnc#770708)
    * indented text in DOCX file does not wrap correctly (bnc#775906)
    * undocked toolbars do not show all icons in special ratio (fdo#47071)
    * cross-reference text when Caption order is Numbering first
      (fdo#50801)
    * bullet color same as following text by default (bnc#719988,
      bnc#734733)
    * misc RTF import fixes (rhbz#819304, fdo#49666, bnc#774681, fdo#51772,
      fdo#48033, fdo#52066, fdo#48335, fdo#48446, fdo#49892, fdo#46966)
    * libvisio was updated to 0.0.19:
    * file displays as blank page in Draw (fdo#50990)
    * Use the vendor SUSE instead of Novell, Inc.
    * Some NULL pointer dereferences were fixed. (CVE-2012-4233)

Security Issue reference:

    * CVE-2012-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4233&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-10"/>
	<updated date="2012-09-10"/>
	<bugzilla href="https://bugzilla.suse.com/719988">SUSE bug 719988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734733">SUSE bug 734733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741480">SUSE bug 741480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744510">SUSE bug 744510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757602">SUSE bug 757602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758565">SUSE bug 758565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759172">SUSE bug 759172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759180">SUSE bug 759180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760019">SUSE bug 760019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760997">SUSE bug 760997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768027">SUSE bug 768027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770708">SUSE bug 770708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772094">SUSE bug 772094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773048">SUSE bug 773048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773061">SUSE bug 773061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773515">SUSE bug 773515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774167">SUSE bug 774167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774681">SUSE bug 774681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774921">SUSE bug 774921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775899">SUSE bug 775899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775906">SUSE bug 775906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777181">SUSE bug 777181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778669">SUSE bug 778669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4233/">CVE-2012-4233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563017" comment="libreoffice-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563018" comment="libreoffice-base-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563019" comment="libreoffice-base-drivers-postgresql-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563020" comment="libreoffice-base-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563021" comment="libreoffice-branding-upstream-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563022" comment="libreoffice-calc-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563023" comment="libreoffice-calc-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563024" comment="libreoffice-draw-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563025" comment="libreoffice-draw-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563026" comment="libreoffice-filters-optional-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563027" comment="libreoffice-gnome-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563028" comment="libreoffice-help-cs-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563029" comment="libreoffice-help-da-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563030" comment="libreoffice-help-de-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563031" comment="libreoffice-help-en-GB-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563032" comment="libreoffice-help-en-US-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563033" comment="libreoffice-help-es-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563034" comment="libreoffice-help-fr-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563035" comment="libreoffice-help-gu-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563036" comment="libreoffice-help-hi-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563037" comment="libreoffice-help-hu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563038" comment="libreoffice-help-it-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563039" comment="libreoffice-help-ja-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563040" comment="libreoffice-help-ko-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563041" comment="libreoffice-help-nl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563042" comment="libreoffice-help-pl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563043" comment="libreoffice-help-pt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563044" comment="libreoffice-help-pt-BR-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563045" comment="libreoffice-help-ru-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563046" comment="libreoffice-help-sv-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563047" comment="libreoffice-help-zh-CN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563048" comment="libreoffice-help-zh-TW-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563049" comment="libreoffice-icon-themes-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563050" comment="libreoffice-impress-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563051" comment="libreoffice-impress-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563052" comment="libreoffice-kde-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563053" comment="libreoffice-kde4-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563054" comment="libreoffice-l10n-af-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563055" comment="libreoffice-l10n-ar-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563056" comment="libreoffice-l10n-ca-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563057" comment="libreoffice-l10n-cs-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563058" comment="libreoffice-l10n-da-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563059" comment="libreoffice-l10n-de-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563060" comment="libreoffice-l10n-el-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563061" comment="libreoffice-l10n-en-GB-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563062" comment="libreoffice-l10n-es-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563063" comment="libreoffice-l10n-fi-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563064" comment="libreoffice-l10n-fr-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563065" comment="libreoffice-l10n-gu-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563066" comment="libreoffice-l10n-hi-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563067" comment="libreoffice-l10n-hu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563068" comment="libreoffice-l10n-it-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563069" comment="libreoffice-l10n-ja-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563070" comment="libreoffice-l10n-ko-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563071" comment="libreoffice-l10n-nb-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563072" comment="libreoffice-l10n-nl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563073" comment="libreoffice-l10n-nn-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563074" comment="libreoffice-l10n-pl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563075" comment="libreoffice-l10n-prebuilt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563076" comment="libreoffice-l10n-pt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563077" comment="libreoffice-l10n-pt-BR-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563078" comment="libreoffice-l10n-ru-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563079" comment="libreoffice-l10n-sk-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563080" comment="libreoffice-l10n-sv-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563081" comment="libreoffice-l10n-xh-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563082" comment="libreoffice-l10n-zh-CN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563083" comment="libreoffice-l10n-zh-TW-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563084" comment="libreoffice-l10n-zu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563085" comment="libreoffice-mailmerge-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563086" comment="libreoffice-math-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563087" comment="libreoffice-mono-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563088" comment="libreoffice-officebean-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563089" comment="libreoffice-pyuno-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563090" comment="libreoffice-sdk-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563091" comment="libreoffice-writer-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563092" comment="libreoffice-writer-extensions-3.5.4.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36769" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="789827" ref_url="https://bugzilla.suse.com/789827" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4562" ref_url="https://www.suse.com/security/cve/CVE-2012-4562/" source="CVE"/>
		<description>

This update of libssh fixes multiple integer overflows. CVE-2012-4562 has 
been assigned to this issue.

Security Issue reference:

    * CVE-2012-4562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-20"/>
	<updated date="2012-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4562/">CVE-2012-4562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563093" comment="libssh2-0.2-5.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36770" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563094" comment="libtiff-devel-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563095" comment="libtiff-devel-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36771" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="817008" ref_url="https://bugzilla.suse.com/817008" source="BUGZILLA"/>
		<reference ref_id="838638" ref_url="https://bugzilla.suse.com/838638" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<description>

This libvirt update fixes a security issue.

    * bnc#838638: CVE-2013-4296: EMBARGOED: libvirt: Fix crash in
      remoteDispatchDomainMemoryStats
    * bnc#817008: Regression: vm-install fails to display on SLES 11 SP2
      UV2000

Security Issue reference:

    * CVE-2013-4296
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-23"/>
	<updated date="2013-09-23"/>
	<bugzilla href="https://bugzilla.suse.com/817008">SUSE bug 817008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563096" comment="libvirt-devel-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563097" comment="libvirt-devel-32bit-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36772" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="772586" ref_url="https://bugzilla.suse.com/772586" source="BUGZILLA"/>
		<reference ref_id="773621" ref_url="https://bugzilla.suse.com/773621" source="BUGZILLA"/>
		<reference ref_id="773626" ref_url="https://bugzilla.suse.com/773626" source="BUGZILLA"/>
		<reference ref_id="780432" ref_url="https://bugzilla.suse.com/780432" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

libvirt received security and bugfixes:

    * CVE-2012-4423: Fixed a libvirt remote denial of service (crash)
      problem.

The following bugs have been fixed:

    * qemu: Fix probing for guest capabilities
    * xen-xm: Generate UUID if not specified
    * xenParseXM: don't dereference NULL pointer when script is empty

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/772586">SUSE bug 772586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773621">SUSE bug 773621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773626">SUSE bug 773626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780432">SUSE bug 780432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563098" comment="libvirt-devel-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563099" comment="libvirt-devel-32bit-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36773" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in libxml2. CVE-2013-2877 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-2877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-06"/>
	<updated date="2014-01-06"/>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563100" comment="libxml2-devel-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563101" comment="libxml2-devel-32bit-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36774" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563102" comment="libxslt-devel-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563103" comment="libxslt-devel-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563104" comment="libxslt-python-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36775" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="801071" ref_url="https://bugzilla.suse.com/801071" source="BUGZILLA"/>
		<reference ref_id="850468" ref_url="https://bugzilla.suse.com/850468" source="BUGZILLA"/>
		<reference ref_id="850469" ref_url="https://bugzilla.suse.com/850469" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4560" ref_url="https://www.suse.com/security/cve/CVE-2013-4560/" source="CVE"/>
		<description>

lighthttpd received fixes for the following security issues:

    * 

      CVE-2013-4559: lighttpd did not check the return value of the (1)
      setuid, (2) setgid, or (3) setgroups functions, which might have
      caused lighttpd to run as root if it is restarted and allowed remote
      attackers to gain privileges, as demonstrated by multiple calls to
      the clone function that cause setuid to fail when the user process
      limit is reached.

    * 

      CVE-2013-4560: Use-after-free vulnerability in lighttpd allowed
      remote attackers to cause a denial of service (segmentation fault and
      crash) via unspecified vectors that trigger FAMMonitorDirectory
      failures.

    * 

      CVE-2011-1473: Added support for disabling client side initiated
      renegotiation to avoid potential computational denial of service
      (unbalanced computation efforts server vs client).

Security Issues:

    * CVE-2013-4559
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4559&gt;
    * CVE-2013-4560
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4560&gt;
    * CVE-2011-1473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1473&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/801071">SUSE bug 801071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850468">SUSE bug 850468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850469">SUSE bug 850469</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4560/">CVE-2013-4560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563105" comment="lighttpd-1.4.20-2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563106" comment="lighttpd-mod_cml-1.4.20-2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563107" comment="lighttpd-mod_magnet-1.4.20-2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563108" comment="lighttpd-mod_mysql_vhost-1.4.20-2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563109" comment="lighttpd-mod_rrdtool-1.4.20-2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563110" comment="lighttpd-mod_trigger_b4_dl-1.4.20-2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563111" comment="lighttpd-mod_webdav-1.4.20-2.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36776" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-28"/>
	<updated date="2013-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563112" comment="mozilla-nspr-devel-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563113" comment="mozilla-nss-devel-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36777" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="856837" ref_url="https://bugzilla.suse.com/856837" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in process_cgivars() of the nagios 
package. CVE-2013-7108 has been assigned to this issue.

Security Issue reference:

    * CVE-2013-7108
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/856837">SUSE bug 856837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563114" comment="nagios-3.0.6-1.25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563115" comment="nagios-devel-3.0.6-1.25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563116" comment="nagios-www-3.0.6-1.25.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36778" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563117" comment="mozilla-nspr-devel-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563118" comment="mozilla-nss-devel-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36779" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS has been updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was abused to create man in 
the middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563119" comment="mozilla-nss-devel-3.15.3.1-0.4.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36780" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="789994" ref_url="https://bugzilla.suse.com/789994" source="BUGZILLA"/>
		<reference ref_id="796014" ref_url="https://bugzilla.suse.com/796014" source="BUGZILLA"/>
		<reference ref_id="797060" ref_url="https://bugzilla.suse.com/797060" source="BUGZILLA"/>
		<reference ref_id="804415" ref_url="https://bugzilla.suse.com/804415" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>

This update of Perl 5 fixes the following security issues:

    * fix rehash DoS [bnc#804415] [CVE-2013-1667]
    * improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
    * fix glob denial of service [bnc#796014] [CVE-2011-2728]
    * sanitize input in Maketext.pm [bnc#797060] [CVE-2012-6329]

Security Issue references:

    * CVE-2013-1667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563120" comment="perl-base-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563121" comment="perl-base-x86-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36781" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563122" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563123" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563124" comment="python-devel-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563125" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563126" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36782" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="818100" ref_url="https://bugzilla.suse.com/818100" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2037" ref_url="https://www.suse.com/security/cve/CVE-2013-2037/" source="CVE"/>
		<description>

This patch fixes a SSL certificate verification issue in python-httplib2, 
where remote server certificates would not have validated against the known 
good root certificates.

Security Issue reference:

    * CVE-2013-2037
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2037&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-29"/>
	<updated date="2013-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/818100">SUSE bug 818100</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2037/">CVE-2013-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563128" comment="python-httplib2-0.7.4-0.7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36783" version="1" class="patch">
	<metadata>
		<title>Security update for qemu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

The qemu vt100 emulation is affected by a problem where specific vt100 
sequences could have been used by guest users to affect the host. 
(CVE-2012-3515 aka XSA-17).

Security Issue references:

    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-03"/>
	<updated date="2012-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563129" comment="qemu-0.10.1-0.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36784" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets could have caused the
      routing table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563130" comment="quagga-0.99.15-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563131" comment="quagga-devel-0.99.15-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36785" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="798452" ref_url="https://bugzilla.suse.com/798452" source="BUGZILLA"/>
		<reference ref_id="802794" ref_url="https://bugzilla.suse.com/802794" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6109" ref_url="https://www.suse.com/security/cve/CVE-2012-6109/" source="CVE"/>
		<reference ref_id="CVE-2013-0183" ref_url="https://www.suse.com/security/cve/CVE-2013-0183/" source="CVE"/>
		<reference ref_id="CVE-2013-0184" ref_url="https://www.suse.com/security/cve/CVE-2013-0184/" source="CVE"/>
		<description>

3 denial of service conditions in the Rack 1.3 rubygem have been fixed.

    * 

      Rack was updated to 1.3.10:

          o Fix CVE-2013-0263, timing attack against Rack::Session::Cookie
    * 

      Rack was updated to 1.3.9.

          o Rack::Auth::AbstractRequest no longer symbolizes arbitrary
            strings (CVE-2013-0184)
          o Security: Prevent unbounded reads in large multipart boundaries
            (CVE-2013-0183)
    * 

      Changes from 1.3.7 (CVE-2012-6109)

          o Add warnings when users do not provide a session secret
          o Fix parsing performance for unquoted filenames
          o Updated URI backports
          o Fix URI backport version matching, and silence constant
            warnings
          o Correct parameter parsing with empty values
          o Correct rackup '-I' flag, to allow multiple uses
          o Correct rackup pidfile handling
          o Report rackup line numbers correctly
          o Fix request loops caused by non-stale nonces with time limits
          o Prevent infinite recursions from Response#to_ary
          o Various middleware better conforms to the body close
            specification
          o Updated language for the body close specification
          o Additional notes regarding ECMA escape compatibility issues
          o Fix the parsing of multiple ranges in range headers

Security Issue references:

    * CVE-2013-0184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0184&gt;
    * CVE-2013-0183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0183&gt;
    * CVE-2012-6109
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-21"/>
	<updated date="2013-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/798452">SUSE bug 798452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802794">SUSE bug 802794</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6109/">CVE-2012-6109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0183/">CVE-2013-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0184/">CVE-2013-0184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563132" comment="rubygem-rack-1_3-1.3.10-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36786" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="798452" ref_url="https://bugzilla.suse.com/798452" source="BUGZILLA"/>
		<reference ref_id="802794" ref_url="https://bugzilla.suse.com/802794" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6109" ref_url="https://www.suse.com/security/cve/CVE-2012-6109/" source="CVE"/>
		<reference ref_id="CVE-2013-0183" ref_url="https://www.suse.com/security/cve/CVE-2013-0183/" source="CVE"/>
		<reference ref_id="CVE-2013-0184" ref_url="https://www.suse.com/security/cve/CVE-2013-0184/" source="CVE"/>
		<description>

Denial of service conditions in the Rack 1.1 rubygem have been fixed.

Rack has been updated to 1.1.6:

    * Fix CVE-2013-0263, timing attack against Rack::Session::Cookie

Rack has been updated to 1.1.5:

    * Rack::Auth::AbstractRequest no longer symbolizes arbitrary strings
      (CVE-2013-0184)
    * Add warnings when users do not provide a session secret
    * Security fix. http://www.ocert.org/advisories/ocert-2011-003.html
      Further information here: http://jruby.org/2011/12/27/jruby-1-6-5-1

Security Issue references:

    * CVE-2013-0184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0184&gt;
    * CVE-2013-0183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0183&gt;
    * CVE-2012-6109
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-21"/>
	<updated date="2013-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/798452">SUSE bug 798452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802794">SUSE bug 802794</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6109/">CVE-2012-6109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0183/">CVE-2013-0183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0184/">CVE-2013-0184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563133" comment="rubygem-rack-1.1.6-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36787" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * CVE-2013-4164: heap overflow in float point parsing

Security Issue references:

    * CVE-2013-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164&gt;
    * CVE-2009-0689
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563134" comment="ruby-devel-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563136" comment="ruby-doc-ri-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563137" comment="ruby-examples-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563138" comment="ruby-test-suite-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36788" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby On Rails</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="796712" ref_url="https://bugzilla.suse.com/796712" source="BUGZILLA"/>
		<reference ref_id="797449" ref_url="https://bugzilla.suse.com/797449" source="BUGZILLA"/>
		<reference ref_id="797452" ref_url="https://bugzilla.suse.com/797452" source="BUGZILLA"/>
		<reference ref_id="800320" ref_url="https://bugzilla.suse.com/800320" source="BUGZILLA"/>
		<reference ref_id="803336" ref_url="https://bugzilla.suse.com/803336" source="BUGZILLA"/>
		<reference ref_id="803339" ref_url="https://bugzilla.suse.com/803339" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5664" ref_url="https://www.suse.com/security/cve/CVE-2012-5664/" source="CVE"/>
		<reference ref_id="CVE-2013-0155" ref_url="https://www.suse.com/security/cve/CVE-2013-0155/" source="CVE"/>
		<reference ref_id="CVE-2013-0156" ref_url="https://www.suse.com/security/cve/CVE-2013-0156/" source="CVE"/>
		<reference ref_id="CVE-2013-0276" ref_url="https://www.suse.com/security/cve/CVE-2013-0276/" source="CVE"/>
		<reference ref_id="CVE-2013-0277" ref_url="https://www.suse.com/security/cve/CVE-2013-0277/" source="CVE"/>
		<description>

The Ruby on Rails stack has been updated to 2.3.17 to fix various security 
issues and bugs.

The rails gems have been updated to fix:

    * Unsafe Query Generation Risk in Ruby on Rails (CVE-2013-0155)
    * Multiple vulnerabilities in parameter parsing in Action Pack
      (CVE-2013-0156)
    * activerecord: SQL Injection (CVE-2012-5664)
    * rails: Vulnerability in JSON Parser in Ruby on Rails 3.0 and 2.3
      (CVE-2013-0333)
    * activerecord: Circumvention of attr_protected (CVE-2013-0276)
    * activerecord: Serialized Attributes YAML Vulnerability with Rails 2.3
      and 3.0 (CVE-2013-0277)

Security Issue references:

    * CVE-2012-5664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5664&gt;
    * CVE-2013-0155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155&gt;
    * CVE-2013-0156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156&gt;
    * CVE-2013-0277
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0277&gt;
    * CVE-2013-0276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-18"/>
	<updated date="2013-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/796712">SUSE bug 796712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797449">SUSE bug 797449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797452">SUSE bug 797452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800320">SUSE bug 800320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803336">SUSE bug 803336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803339">SUSE bug 803339</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5664/">CVE-2012-5664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0155/">CVE-2013-0155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0156/">CVE-2013-0156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0276/">CVE-2013-0276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0277/">CVE-2013-0277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563140" comment="rubygem-actionmailer-2_3-2.3.17-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563141" comment="rubygem-actionpack-2_3-2.3.17-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563142" comment="rubygem-activerecord-2_3-2.3.17-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563143" comment="rubygem-activeresource-2_3-2.3.17-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563144" comment="rubygem-activesupport-2_3-2.3.17-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563145" comment="rubygem-rails-2.3.17-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563146" comment="rubygem-rails-2_3-2.3.17-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36789" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-2_1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="853632" ref_url="https://bugzilla.suse.com/853632" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6415" ref_url="https://www.suse.com/security/cve/CVE-2013-6415/" source="CVE"/>
		<description>

This update fixes the following security issue with rubygem-actionpack:

    * bnc#853632: number_to_currency XSS (CVE-2013-6415)

Security Issue reference:

    * CVE-2013-6415
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-12"/>
	<updated date="2013-12-12"/>
	<bugzilla href="https://bugzilla.suse.com/853632">SUSE bug 853632</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6415/">CVE-2013-6415</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563147" comment="rubygem-actionpack-2_1-2.1.2-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36790" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-2_3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="853632" ref_url="https://bugzilla.suse.com/853632" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4491" ref_url="https://www.suse.com/security/cve/CVE-2013-4491/" source="CVE"/>
		<reference ref_id="CVE-2013-6414" ref_url="https://www.suse.com/security/cve/CVE-2013-6414/" source="CVE"/>
		<reference ref_id="CVE-2013-6415" ref_url="https://www.suse.com/security/cve/CVE-2013-6415/" source="CVE"/>
		<reference ref_id="CVE-2013-6417" ref_url="https://www.suse.com/security/cve/CVE-2013-6417/" source="CVE"/>
		<description>

This update fixes the following security issues with rubygem-actionpack:

    * CVE-2013-6415: rubygem-actionpack: number_to_currency XSS
      (bnc#853632).

Security Issue references:

    * CVE-2013-4491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491&gt;
    * CVE-2013-6417
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417&gt;
    * CVE-2013-6415
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415&gt;
    * CVE-2013-6414
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853632">SUSE bug 853632</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4491/">CVE-2013-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6414/">CVE-2013-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6415/">CVE-2013-6415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6417/">CVE-2013-6417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563148" comment="rubygem-actionpack-2_3-2.3.17-0.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36791" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="766792" ref_url="https://bugzilla.suse.com/766792" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2660" ref_url="https://www.suse.com/security/cve/CVE-2012-2660/" source="CVE"/>
		<reference ref_id="CVE-2012-2661" ref_url="https://www.suse.com/security/cve/CVE-2012-2661/" source="CVE"/>
		<reference ref_id="CVE-2012-2694" ref_url="https://www.suse.com/security/cve/CVE-2012-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-2695" ref_url="https://www.suse.com/security/cve/CVE-2012-2695/" source="CVE"/>
		<description>

This update to rubygem-activerecord fixes a SQL injection caused by 
mishandling nested parameters . ( CVE-2012-2695
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2695&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-03"/>
	<updated date="2012-08-03"/>
	<bugzilla href="https://bugzilla.suse.com/766792">SUSE bug 766792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2660/">CVE-2012-2660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2661/">CVE-2012-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2694/">CVE-2012-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2695/">CVE-2012-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563149" comment="rubygem-activerecord-2_3-2.3.14-0.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36792" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-2_3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="775653" ref_url="https://bugzilla.suse.com/775653" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3464" ref_url="https://www.suse.com/security/cve/CVE-2012-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3465" ref_url="https://www.suse.com/security/cve/CVE-2012-3465/" source="CVE"/>
		<description>

rubygem-activesupport-2_3 was updated to fix two HTML escaping issues that 
may be used by an attacker for a cross-site scripting (XSS) attack. (
CVE-2012-3464 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3464&gt; 
, CVE-2012-3465
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3465&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/775653">SUSE bug 775653</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3464/">CVE-2012-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3465/">CVE-2012-3465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563150" comment="rubygem-activesupport-2_3-2.3.14-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36793" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="846239" ref_url="https://bugzilla.suse.com/846239" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4389" ref_url="https://www.suse.com/security/cve/CVE-2013-4389/" source="CVE"/>
		<description>

The Rubygem ActiveSupport received a security fix:

    * CVE-2013-4389: A possible DoS vulnerability in the log subscriber
      component was fixed

Security Issue reference:

    * CVE-2013-4389
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/846239">SUSE bug 846239</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4389/">CVE-2013-4389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563151" comment="rubygem-activesupport-3_2-3.2.12-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36794" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-json_pure</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="803342" ref_url="https://bugzilla.suse.com/803342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0269" ref_url="https://www.suse.com/security/cve/CVE-2013-0269/" source="CVE"/>
		<description>

The json_pure Ruby Gem has been updated to fix a Denial of Service and 
Unsafe Object Creation Vulnerability in JSON (CVE-2013-0269)

    * Entity expansion DoS vulnerability in REXML (XML bomb)

Security Issues:

    * CVE-2013-0269
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-20"/>
	<updated date="2013-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/803342">SUSE bug 803342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0269/">CVE-2013-0269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563152" comment="rubygem-json_pure-1.2.0-0.4.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36795" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-mail-2_3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="759092" ref_url="https://bugzilla.suse.com/759092" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2139" ref_url="https://www.suse.com/security/cve/CVE-2012-2139/" source="CVE"/>
		<reference ref_id="CVE-2012-2140" ref_url="https://www.suse.com/security/cve/CVE-2012-2140/" source="CVE"/>
		<description>

This update of rubygem-mail fixes two security issues:

    * CVE-2012-2139: A file system traversal in file_delivery method.
    * CVE-2012-2140: Arbitrary command execution when using exim or
      sendmail from the commandline.

Security Issue references:

    * CVE-2012-2139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2139&gt;
    * CVE-2012-2140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-06"/>
	<updated date="2012-06-06"/>
	<bugzilla href="https://bugzilla.suse.com/759092">SUSE bug 759092</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2139/">CVE-2012-2139</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2140/">CVE-2012-2140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563153" comment="rubygem-mail-2_3-2.3.0-0.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36796" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack-cache</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="763650" ref_url="https://bugzilla.suse.com/763650" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2671" ref_url="https://www.suse.com/security/cve/CVE-2012-2671/" source="CVE"/>
		<description>

The following issue has been fixed:

    * rack-cache caches potentially sensitive response headers such as
      Set-Cookie (CVE-2012-2671)

Security Issue reference:

    * CVE-2012-2671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2671&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-11"/>
	<updated date="2012-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/763650">SUSE bug 763650</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2671/">CVE-2012-2671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563154" comment="rubygem-rack-cache-1_1-1.1-0.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36797" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rdoc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="802406" ref_url="https://bugzilla.suse.com/802406" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0256" ref_url="https://www.suse.com/security/cve/CVE-2013-0256/" source="CVE"/>
		<description>

rubygem rdoc had a incorrect piece of javascript in darkfish.js, which 
allowed cross site scripting attacks (XSS).

This was possible only if the darkfish.js or rdoc generated documentation 
is exposed on the webserver, which is not a common use case. 
(CVE-2013-0256)

Security Issue reference:

    * CVE-2013-0256
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0256&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-21"/>
	<updated date="2013-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/802406">SUSE bug 802406</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0256/">CVE-2013-0256</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563155" comment="rubygem-rdoc-3.9.1-0.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36798" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby on Rails</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="809932" ref_url="https://bugzilla.suse.com/809932" source="BUGZILLA"/>
		<reference ref_id="809935" ref_url="https://bugzilla.suse.com/809935" source="BUGZILLA"/>
		<reference ref_id="809940" ref_url="https://bugzilla.suse.com/809940" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1854" ref_url="https://www.suse.com/security/cve/CVE-2013-1854/" source="CVE"/>
		<description>

The Ruby on Rails 2.3 stack received security fixes for following issues:

ActionPack:

    * CVE-2013-1855: A XSS vulnerability in sanitize_css in Action Pack was
      fixed (bnc#809935).
    * CVE-2013-1857: A XSS Vulnerability in the sanitize helper of Ruby on
      Rails was fixed (bnc#809940).

ActiveRecord:

    * CVE-2013-1854: A Symbol DoS vulnerability in Active Record was fixed
      (bnc#809932).

ActiveSupport:

    * CVE-2013-1854: A Symbol DoS vulnerability in Active Record was fixed
      (bnc#809932).

Security Issue reference:

    * CVE-2013-1854
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-03"/>
	<updated date="2013-04-03"/>
	<bugzilla href="https://bugzilla.suse.com/809932">SUSE bug 809932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809935">SUSE bug 809935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809940">SUSE bug 809940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1854/">CVE-2013-1854</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563156" comment="rubygem-actionpack-2_3-2.3.17-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563157" comment="rubygem-activerecord-2_3-2.3.17-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563158" comment="rubygem-activesupport-2_3-2.3.17-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36799" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby On Rails 3.2 stack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="809932" ref_url="https://bugzilla.suse.com/809932" source="BUGZILLA"/>
		<reference ref_id="809935" ref_url="https://bugzilla.suse.com/809935" source="BUGZILLA"/>
		<reference ref_id="809940" ref_url="https://bugzilla.suse.com/809940" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1854" ref_url="https://www.suse.com/security/cve/CVE-2013-1854/" source="CVE"/>
		<description>

The Ruby on Rails 3.2 stack has been updated to 3.2.12 to fix various 
security issues and bugs:

    * rubygem-actionmailer-3_2: has been updated to 3.2.12.
    * rubygem-actionpack-3_2: has been updated to 3.2.12.
    * rubygem-activeresource-3_2: has been updated to 3.2.12.
    * rubygem-activesupport-3_2: has been updated to 3.2.12.
    * rubygem-railties-3_2: has been updated to 3.2.12.
    * rubygem-rails-3_2: has been updated to 3.2.12.
    * rubygem-activemodel-3_2: has been updated to 3.2.12, received a
      security fix for CVE-2013-0276: Fix issue with attr_protected where
      malformed input could circumvent protection
    * 

      rubygem-activerecord-3_2: has been updated to 3.2.12, received a
      security fix for CVE-2013-0276:

          o 

            Quote numeric values being compared to non-numeric columns.
            Otherwise, in some database, the string column values will be
            coerced to a numeric allowing 0, 0.0 or false to match any
            string starting with a non-digit.

            Read more about this problem here
            &lt;http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/&gt; 
            .

    * A XSS in sanitize_css in Action Pack has been fixed (CVE-2013-1855)
    * A XSS Vulnerability in the sanitize helper of Ruby on Rails Action
      Pack has been fixed (CVE-2013-1857)
    * A Symbol DoS vulnerability in Active Record has been fixed.
      (CVE-2013-1854)
    * Also rubygem-rack-1_4 has been updated to 1.4.5 (bnc#802794
      bnc#802795)
          o Fix CVE-2013-0263, timing attack against Rack::Session::Cookie
          o Fix CVE-2013-0262, symlink path traversal in Rack::File
          o update to 1.4.4 (bnc#798452)
                + [SEC] Rack::Auth::AbstractRequest no longer symbolizes
                  arbitrary strings (CVE-2013-0184)
          o changes from 1.4.3
                + Security: Prevent unbounded reads in large multipart
                  boundaries (CVE-2013-0183)
          o changes from 1.4.2 (CVE-2012-6109)
                + Add warnings when users do not provide a session secret
                + Fix parsing performance for unquoted filenames
                + Updated URI backports
                + Fix URI backport version matching, and silence constant
                  warnings
                + Correct parameter parsing with empty values
                + Correct rackup '-I' flag, to allow multiple uses
                + Correct rackup pidfile handling
                + Report rackup line numbers correctly
                + Fix request loops caused by non-stale nonces with time
                  limits
                + Fix reloader on Windows
                + Prevent infinite recursions from Response#to_ary
                + Various middleware better conforms to the body close
                  specification
                + Updated language for the body close specification
                + Additional notes regarding ECMA escape compatibility
                  issues
                + Fix the parsing of multiple ranges in range headers
                + Prevent errors from empty parameter keys
                + Added PATCH verb to Rack::Request
                + Various documentation updates
                + Fix session merge semantics (fixes rack-test)
                + Rack::Static :index can now handle multiple directories
                + All tests now utilize Rack::Lint (special thanks to Lars
                  Gierth)
                + Rack::File cache_control parameter is now deprecated, and
                  removed by 1.5
                + Correct Rack::Directory script name escaping
                + Rack::Static supports header rules for sophisticated
                  configurations
                + Multipart parsing now works without a Content-Length
                  header
                + New logos courtesy of Zachary Scott!
                + Rack::BodyProxy now explicitly defines #each, useful for
                  C extensions
                + Cookies that are not URI escaped no longer cause
                  exceptions

Security Issues:

    * CVE-2013-1854
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-27"/>
	<updated date="2013-03-27"/>
	<bugzilla href="https://bugzilla.suse.com/809932">SUSE bug 809932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809935">SUSE bug 809935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809940">SUSE bug 809940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1854/">CVE-2013-1854</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563159" comment="rubygem-activesupport-3_2-3.2.12-0.5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563160" comment="rubygem-rack-1_4-1.4.5-0.5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36800" version="1" class="patch">
	<metadata>
		<title>Security update for subversion</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="850667" ref_url="https://bugzilla.suse.com/850667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4505" ref_url="https://www.suse.com/security/cve/CVE-2013-4505/" source="CVE"/>
		<reference ref_id="CVE-2013-4558" ref_url="https://www.suse.com/security/cve/CVE-2013-4558/" source="CVE"/>
		<description>

The following issues have been fixed in subversion:

    * mod_dontdothat did not restrict requests from serf based clients
      (CVE-2013-4505)
    * DoS via an assert in mod_dav_svn (CVE-2013-4558)

Security Issue references:

    * CVE-2013-4505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505&gt;
    * CVE-2013-4558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-13"/>
	<updated date="2014-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/850667">SUSE bug 850667</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4505/">CVE-2013-4505</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4558/">CVE-2013-4558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563161" comment="subversion-1.6.17-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563162" comment="subversion-devel-1.6.17-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563163" comment="subversion-perl-1.6.17-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563164" comment="subversion-python-1.6.17-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563165" comment="subversion-server-1.6.17-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563166" comment="subversion-tools-1.6.17-1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36801" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-gabble</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="807449" ref_url="https://bugzilla.suse.com/807449" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1769" ref_url="https://www.suse.com/security/cve/CVE-2013-1769/" source="CVE"/>
		<description>

telepathy-gabble was updated to fix several remotely-triggerable NULL 
crashes (CVE-2013-1769)

Security Issues:

    * CVE-2013-1769
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-15"/>
	<updated date="2013-03-15"/>
	<bugzilla href="https://bugzilla.suse.com/807449">SUSE bug 807449</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1769/">CVE-2013-1769</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563167" comment="telepathy-gabble-0.7.10-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36802" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<description>

wireshark was updated to security update version 1.8.12, fixing bugs and 
security issues.

    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html&gt;

Security Issue references:

    * CVE-2013-7112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112&gt;
    * CVE-2013-7113
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113&gt;
    * CVE-2013-7114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-27"/>
	<updated date="2013-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563168" comment="wireshark-1.8.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563169" comment="wireshark-devel-1.8.12-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36803" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="793927" ref_url="https://bugzilla.suse.com/793927" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797014" ref_url="https://bugzilla.suse.com/797014" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="798188" ref_url="https://bugzilla.suse.com/798188" source="BUGZILLA"/>
		<reference ref_id="799694" ref_url="https://bugzilla.suse.com/799694" source="BUGZILLA"/>
		<reference ref_id="800156" ref_url="https://bugzilla.suse.com/800156" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="802690" ref_url="https://bugzilla.suse.com/802690" source="BUGZILLA"/>
		<reference ref_id="805094" ref_url="https://bugzilla.suse.com/805094" source="BUGZILLA"/>
		<reference ref_id="806736" ref_url="https://bugzilla.suse.com/806736" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<description>

XEN has been updated to fix various bugs and security issues:

    * 

      CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the
      Xen AMD IOMMU code by default choose to use a single interrupt
      remapping table for the whole system. This sharing implied that any
      guest with a passed through PCI device that is bus mastering capable
      can inject interrupts into other guests, including domain 0. This has
      been disabled for AMD chipsets not capable of it.

    * 

      CVE-2012-6075: qemu: The e1000 had overflows under some conditions,
      potentially corrupting memory.

    * 

      CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT
      (debug build only)

    * 

      CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation
      flaw was fixed.

Also the following bugs have been fixed:

    * bnc#805094 - xen hot plug attach/detach fails
    * bnc#802690 - domain locking can prevent a live migration from
      completing
    * bnc#797014 - no way to control live migrations
          o fix logic error in stdiostream_progress
          o restore logging in xc_save
          o add options to control migration tunables
    * bnc#806736: enabling xentrace crashes hypervisor
    * Upstream patches from Jan 26287-sched-credit-pick-idle.patch
      26501-VMX-simplify-CR0-update.patch
      26502-VMX-disable-SMEP-when-not-paging.patch
      26516-ACPI-parse-table-retval.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch
      (Replaces CVE-2013-0153-xsa36.patch)
      26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces
      CVE-2013-0153-xsa36.patch)
      26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
      26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
      CVE-2013-0153-xsa36.patch)
    * bnc#798188 - Add $network to xend initscript dependencies
    * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update
      Fixed with update to Xen version 4.1.4
    * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN
      kernel
    * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch
      26427-x86-AMD-enable-WC+.patch
    * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start
    * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch
      26333-x86-get_page_type-assert.patch (Replaces
      CVE-2013-0154-xsa37.patch)
      26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
      CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch
    * Update to Xen 4.1.4 c/s 23432
    * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid
      spurious build failures
    * Upstream patches from Jan 26179-PCI-find-next-cap.patch
      26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch
      26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch
      26229-gnttab-version-switch.patch (Replaces
      CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch
      (Replaces CVE-2012-5511-xsa27.patch)
      26231-memory-exchange-checks.patch (Replaces
      CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch
      (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
      (Replaces CVE-2012-5515-xsa31.patch)
      26235-IOMMU-ATS-max-queue-depth.patch
      26272-x86-EFI-makefile-cflags-filter.patch
      26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch
    * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI
      Makefile to do additional filtering.

Security Issue references:

    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-13"/>
	<updated date="2013-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/793927">SUSE bug 793927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797014">SUSE bug 797014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798188">SUSE bug 798188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799694">SUSE bug 799694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800156">SUSE bug 800156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802690">SUSE bug 802690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805094">SUSE bug 805094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806736">SUSE bug 806736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563170" comment="xen-devel-4.1.4_02-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36804" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="764982" ref_url="https://bugzilla.suse.com/764982" source="BUGZILLA"/>
		<reference ref_id="766283" ref_url="https://bugzilla.suse.com/766283" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="773955" ref_url="https://bugzilla.suse.com/773955" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN has been fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * 

      vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

    * 

      virt-manager - SLE11-SP2 ONLY

    * bnc#764982 - virt-manager fails to start after upgrade to SLES11 SP2
      from SLES10

Security Issue reference:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-05"/>
	<updated date="2012-08-05"/>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764982">SUSE bug 764982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766283">SUSE bug 766283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563171" comment="libvirt-devel-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563172" comment="libvirt-devel-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563173" comment="xen-devel-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36805" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="776300" ref_url="https://bugzilla.suse.com/776300" source="BUGZILLA"/>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777086" ref_url="https://bugzilla.suse.com/777086" source="BUGZILLA"/>
		<reference ref_id="777088" ref_url="https://bugzilla.suse.com/777088" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

XEN was updated 4.1.3 to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3495: xen: hypercall physdev_get_free_pirq vulnerability
      (XSA-13)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3498: xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

The following related bugs in vm-install 0.5.12 have been fixed:

    * bnc#776300 - vm-install does not pass --extra-args in --upgrade
    * Add for support Open Enterprise Server 11
    * Add support for Windows 8 and Windows Server 2012
    * Add support for Ubuntu 12 (Precise Pangolin)

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776300">SUSE bug 776300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563174" comment="xen-devel-4.1.3_02-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36806" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="778105" ref_url="https://bugzilla.suse.com/778105" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="784087" ref_url="https://bugzilla.suse.com/784087" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786518" ref_url="https://bugzilla.suse.com/786518" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN was updated to fix various bugs and security issues:

The following security issues have been fixed:

    * CVE-2012-4544: xen: Domain builder Out-of-memory due to malicious
      kernel/ramdisk (XSA 25)
    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA 20)
    * CVE-2012-4536: xen: pirq range check DoS vulnerability (XSA 21)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA 22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA 23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA 24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Also the following bugs have been fixed and upstream patches have been 
applied:

    * 

      bnc#784087 - L3: Xen BUG at io_apic.c:129
      26102-x86-IOAPIC-legacy-not-first.patch

    * 

      Upstream patches merged:
      26054-x86-AMD-perf-ctr-init.patch
      26055-x86-oprof-hvm-mode.patch
      26056-page-alloc-flush-filter.patch
      26061-x86-oprof-counter-range.patch
      26062-ACPI-ERST-move-data.patch
      26063-x86-HPET-affinity-lock.patch
      26093-HVM-PoD-grant-mem-type.patch
      25931-x86-domctl-iomem-mapping-checks.patch
      25952-x86-MMIO-remap-permissions.patch
      25808-domain_create-return-value.patch
      25814-x86_64-set-debugreg-guest.patch
      25815-x86-PoD-no-bug-in-non-translated.patch
      25816-x86-hvm-map-pirq-range-check.patch
      25833-32on64-bogus-pt_base-adjust.patch
      25834-x86-S3-MSI-resume.patch
      25835-adjust-rcu-lock-domain.patch
      25836-VT-d-S3-MSI-resume.patch
      25850-tmem-xsa-15-1.patch
      25851-tmem-xsa-15-2.patch
      25852-tmem-xsa-15-3.patch
      25853-tmem-xsa-15-4.patch
      25854-tmem-xsa-15-5.patch
      25855-tmem-xsa-15-6.patch
      25856-tmem-xsa-15-7.patch
      25857-tmem-xsa-15-8.patch
      25858-tmem-xsa-15-9.patch
      25859-tmem-missing-break.patch
      25860-tmem-cleanup.patch
      25883-pt-MSI-cleanup.patch
      25927-x86-domctl-ioport-mapping-range.patch
      25929-tmem-restore-pool-version.patch

    * 

      bnc#778105 - first XEN-PV VM fails to spawn
      xend: Increase wait time for disk to appear in host bootloader
      Modified existing xen-domUloader.diff

      25752-ACPI-pm-op-valid-cpu.patch
      25754-x86-PoD-early-access.patch
      25755-x86-PoD-types.patch
      25756-x86-MMIO-max-mapped-pfn.patch

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778105">SUSE bug 778105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784087">SUSE bug 784087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563175" comment="xen-devel-4.1.3_04-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36807" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="809662" ref_url="https://bugzilla.suse.com/809662" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="814709" ref_url="https://bugzilla.suse.com/814709" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<description>

XEN has been updated to 4.1.5 c/s 23509 to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2013-1918: Certain page table manipulation operations in Xen
      4.1.x, 4.2.x, and earlier were not preemptible, which allowed local
      PV kernels to cause a denial of service via vectors related to deep
      page table traversal.

    * 

      CVE-2013-1952: Xen 4.x, when using Intel VT-d for a bus mastering
      capable PCI device, did not properly check the source when accessing
      a bridge devices interrupt remapping table entries for MSI
      interrupts, which allowed local guest domains to cause a denial of
      service (interrupt injection) via unspecified vectors.

    * 

      CVE-2013-2076: A information leak in the XSAVE/XRSTOR instructions
      could be used to determine state of floating point operations in
      other domains.

    * 

      CVE-2013-2077: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XRSTOR, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2078: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XSETBV, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2072: Systems which allow untrusted administrators to
      configure guest vcpu affinity may be exploited to trigger a buffer
      overrun and corrupt memory.

    * 

      CVE-2013-1917: Xen 3.1 through 4.x, when running 64-bit hosts on
      Intel CPUs, did not clear the NT flag when using an IRET after a
      SYSENTER instruction, which allowed PV guest users to cause a denial
      of service (hypervisor crash) by triggering a #GP fault, which is not
      properly handled by another IRET instruction.

    * 

      CVE-2013-1919: Xen 4.2.x and 4.1.x did not properly restrict access
      to IRQs, which allowed local stub domain clients to gain access to
      IRQs and cause a denial of service via vectors related to
      'passed-through IRQs or PCI devices.'

    * 

      CVE-2013-1920: Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is
      running 'under memory pressure' and the Xen Security Module (XSM) is
      enabled, used the wrong ordering of operations when extending the
      per-domain event channel tracking table, which caused a
      use-after-free and allowed local guest kernels to inject arbitrary
      events and gain privileges via unspecified vectors.

    * 

      CVE-2013-1964: Xen 4.0.x and 4.1.x incorrectly released a grant
      reference when releasing a non-v1, non-transitive grant, which
      allowed local guest administrators to cause a denial of service (host
      crash), obtain sensitive information, or possible have other impacts
      via unspecified vectors.

Bugfixes:

    * 

      Upstream patches from Jan
      26956-x86-mm-preemptible-cleanup.patch
      27071-x86-IO-APIC-fix-guest-RTE-write-corner-cases.patch
      27072-x86-shadow-fix-off-by-one-in-MMIO-permission-check.patch
      27079-fix-XSA-46-regression-with-xend-xm.patch
      27083-AMD-iommu-SR56x0-Erratum-64-Reset-all-head-tail-pointers.patch

    * 

      Update to Xen 4.1.5 c/s 23509
      There were many xen.spec file patches dropped as now being included
      in the 4.1.5 tarball.

    * 

      bnc#809662 - can't use pv-grub to start domU (pygrub does work)
      xen.spec

    * 

      Upstream patches from Jan
      26702-powernow-add-fixups-for-AMD-P-state-figures.patch
      26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch
      26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch
      26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
      26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch
      26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
      26737-ACPI-APEI-Add-apei_exec_run_optional.patch
      26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch
      26743-VT-d-deal-with-5500-5520-X58-errata.patch
      26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch
      26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch
      26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
      26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch
      26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
      26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch
      26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch
      26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
      26851-iommu-crash-Interrupt-remapping-is-also-disabled-on-crash.patch

    * 

      bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on
      Kyoto
      xend-cpuinfo-model-name.patch

    * 

      Upstream patches from Jan
      26536-xenoprof-div-by-0.patch
      26578-AMD-IOMMU-replace-BUG_ON.patch
      26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch
      26659-AMD-IOMMU-erratum-746-workaround.patch
      26660-x86-fix-CMCI-injection.patch
      26672-vmx-fix-handling-of-NMI-VMEXIT.patch
      26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch
      26676-fix-compat-memory-exchange-op-splitting.patch
      26677-x86-make-certain-memory-sub-ops-return-valid-values.patch
      26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch
      26679-x86-defer-processing-events-on-the-NMI-exit-path.patch
      26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch
      26692-x86-MSI-fully-protect-MSI-X-table.patch

Security Issue references:

    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2078
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809662">SUSE bug 809662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814709">SUSE bug 814709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563176" comment="xen-devel-4.1.5_02-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36808" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="803712" ref_url="https://bugzilla.suse.com/803712" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="823786" ref_url="https://bugzilla.suse.com/823786" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.1.6 which fixes various bugs and security 
issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies.
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling
      (CVE-2013-2194 CVE-2013-2195 CVE-2013-2196)

Various bugs have also been fixed:

    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage ,xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, xen
      hypervisor will panic on multiple blades nPar. (bnc#839600)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * migrate.py support of short options dropped by PTF (bnc#824676)
    * after live migration rcu_sched_state detected stalls add new option
      xm migrate --min_remaing (bnc#803712)
    * various upstream fixes have been included

Security Issue references:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/803712">SUSE bug 803712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823786">SUSE bug 823786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563177" comment="xen-devel-4.1.6_02-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36809" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<description>

Xen has been updated to fix a security issue and a bug:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.

A non-security bug has also been fixed:

    * It is possible to start a VM twice on the same node (bnc#840997)

Security Issue references:

    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563178" comment="xen-devel-4.1.6_04-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36810" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<description>

This update fixes the following security issue with xorg-x11-server:

    * bnc#853846: integer underflow when handling trapezoids
      (CVE-2013-6424)

Security Issue reference:

    * CVE-2013-6424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563179" comment="xorg-x11-server-sdk-7.4-27.70.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36811" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<description>

This update fixes a stack buffer overflow in xorg-x11 in the 
bdfReadCharacters() function. CVE-2013-6462 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2013-6462
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563180" comment="xorg-x11-devel-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563181" comment="xorg-x11-devel-32bit-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36812" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues (bnc#815451, 
bnc#821664).

Security Issue references:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563182" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563183" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36813" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982)

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563184" comment="xorg-x11-libXext-devel-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563185" comment="xorg-x11-libXext-devel-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36814" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563186" comment="xorg-x11-libXfixes-devel-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563187" comment="xorg-x11-libXfixes-devel-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36815" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563188" comment="xorg-x11-libXp-devel-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563189" comment="xorg-x11-libXp-devel-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36816" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563190" comment="xorg-x11-libXrender-devel-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563191" comment="xorg-x11-libXrender-devel-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36817" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563192" comment="xorg-x11-libXt-devel-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563193" comment="xorg-x11-libXt-devel-32bit-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36818" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563194" comment="xorg-x11-libXv-devel-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563195" comment="xorg-x11-libXv-devel-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36819" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP2</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following security issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issues:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-sdk:11:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073773" comment="SUSE Linux Enterprise Software Development Kit 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563196" comment="xorg-x11-libxcb-devel-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563197" comment="xorg-x11-libxcb-devel-32bit-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36820" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563198" comment="MozillaFirefox-devel-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563199" comment="mozilla-nspr-devel-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563200" comment="mozilla-nss-devel-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36821" version="1" class="patch">
	<metadata>
		<title>Security update for Image Magick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

ImageMagick has been updated to fix four security issues:

    * Crafted jpeg file could have lead to a Denial of Service
      (CVE-2014-8716).
    * Out-of-bounds memory access in resize code (CVE-2014-8354)
    * Out-of-bounds memory access in PCX parser (CVE-2014-8355).
    * Out-of-bounds memory error in DCM decode (CVE-2014-8562).

Security Issues:

    * CVE-2014-8716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716&gt;
    * CVE-2014-8355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355&gt;
    * CVE-2014-8354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354&gt;
    * CVE-2014-8562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563201" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563202" comment="ImageMagick-devel-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563203" comment="libMagick++-devel-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563204" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563205" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563206" comment="libMagickWand1-32bit-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563207" comment="perl-PerlMagick-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36822" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563208" comment="MozillaFirefox-devel-17.0.9esr-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36823" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563209" comment="MozillaFirefox-devel-31.8.0esr-0.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36824" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563210" comment="MozillaFirefox-devel-38.5.0esr-28.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36825" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This Mozilla Firefox and Mozilla NSS update to 24.5.0esr fixes the 
following several security and non-security issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to 3.16:

    * required for Firefox 29
    * CVE-2014-1492: In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563211" comment="MozillaFirefox-devel-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563212" comment="mozilla-nspr-devel-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563213" comment="mozilla-nss-devel-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36826" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.

The following vulnerabilities have been fixed:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563214" comment="MozillaFirefox-devel-31.6.0esr-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36827" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563215" comment="MozillaFirefox-devel-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563216" comment="mozilla-nspr-devel-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563217" comment="mozilla-nss-devel-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36828" version="1" class="patch">
	<metadata>
		<title>Security update for a2ps</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="871097" ref_url="https://bugzilla.suse.com/871097" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>

The text to postscript converter a2ps received a security update.

The fixps script did not call ghostscript with the -DSAFER option, allowing 
command execution by attacker supplied postscript files.

Security Issue reference:

    * CVE-2014-0466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563218" comment="a2ps-devel-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36829" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001657.html" source="SUSE-SU"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563219" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563220" comment="apache2-devel-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563221" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563222" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563223" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563224" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563225" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36830" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_fcgid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="844935" ref_url="https://bugzilla.suse.com/844935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4365" ref_url="https://www.suse.com/security/cve/CVE-2013-4365/" source="CVE"/>
		<description>

A heap overflow in the apache2-mod_fcgid module was fixed that could be 
used by remote attackers to crash the server instance. (CVE-2013-4365)

Security Issues:

    * CVE-2013-4365
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4365&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/844935">SUSE bug 844935</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4365/">CVE-2013-4365</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562802" comment="apache2-mod_fcgid-2.2-31.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36831" version="1" class="patch">
	<metadata>
		<title>Security update for php53</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="902357" ref_url="https://bugzilla.suse.com/902357" source="BUGZILLA"/>
		<reference ref_id="902360" ref_url="https://bugzilla.suse.com/902360" source="BUGZILLA"/>
		<reference ref_id="902368" ref_url="https://bugzilla.suse.com/902368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00030.html" source="SUSE-SU"/>
		<description>

This update fixes the following vulnerabilities in php:

    * Heap corruption issue in exif_thumbnail(). (CVE-2014-3670)
    * Integer overflow in unserialize(). (CVE-2014-3669)
    * Xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime().
      (CVE-2014-3668)

Security Issues:

    * CVE-2014-3669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669&gt;
    * CVE-2014-3670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670&gt;
    * CVE-2014-3668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-28"/>
	<updated date="2014-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563226" comment="php53-devel-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563227" comment="php53-imap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563228" comment="php53-posix-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563229" comment="php53-readline-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563230" comment="php53-sockets-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563231" comment="php53-sqlite-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563232" comment="php53-tidy-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36832" version="1" class="patch">
	<metadata>
		<title>Security update for augeas</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="853044" ref_url="https://bugzilla.suse.com/853044" source="BUGZILLA"/>
		<reference ref_id="871323" ref_url="https://bugzilla.suse.com/871323" source="BUGZILLA"/>
		<reference ref_id="876044" ref_url="https://bugzilla.suse.com/876044" source="BUGZILLA"/>
		<reference ref_id="885003" ref_url="https://bugzilla.suse.com/885003" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>

Augeas has been updated to fix a symlink overwrite problem (CVE-2012-0786, 
CVE-2013-6412).

Also a bug has been fixed where 'augtool -s set was failing' (bnc#876044)

Additionally parsing the multipath configuration has been fixed. bnc#871323

Security Issues:

    * CVE-2012-0786
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786&gt;
    * CVE-2013-6412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-30"/>
	<updated date="2014-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871323">SUSE bug 871323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876044">SUSE bug 876044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563233" comment="augeas-devel-0.9.0-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36833" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563234" comment="augeas-devel-0.9.0-3.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36834" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck'. 
(CVE-2012-3386)

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue references:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562864" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36835" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

The command-line shell 'bash' evaluates environment variables, which allows 
the injection of characters and might be used to access files on the system 
in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed 
vulnerability tracked under CVE-2014-6271 and is less serious due to the 
special, non-default system configuration that is needed to create an 
exploitable situation.

To remove further exploitation potential we now limit the 
function-in-environment variable to variables prefixed with BASH_FUNC_. 
This hardening feature is work in progress and might be improved in later 
updates.

Additionally, two other security issues have been fixed:

    * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
    * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

    * CVE-2014-7169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169&gt;
    * CVE-2014-7186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186&gt;
    * CVE-2014-7187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563235" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563236" comment="readline-devel-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563237" comment="readline-devel-32bit-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36836" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562865" comment="bind-devel-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562866" comment="bind-devel-32bit-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36837" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563238" comment="bind-devel-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563239" comment="bind-devel-32bit-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36838" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563240" comment="bind-devel-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563241" comment="bind-devel-32bit-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36839" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563242" comment="bind-devel-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563243" comment="bind-devel-32bit-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36840" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563244" comment="bind-devel-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563245" comment="bind-devel-32bit-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36841" version="1" class="patch">
	<metadata>
		<title>Security update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="902676" ref_url="https://bugzilla.suse.com/902676" source="BUGZILLA"/>
		<reference ref_id="902677" ref_url="https://bugzilla.suse.com/902677" source="BUGZILLA"/>
		<reference ref_id="903655" ref_url="https://bugzilla.suse.com/903655" source="BUGZILLA"/>
		<reference ref_id="905735" ref_url="https://bugzilla.suse.com/905735" source="BUGZILLA"/>
		<reference ref_id="905736" ref_url="https://bugzilla.suse.com/905736" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to fix eight security issues:

    * Lack of range checking leading to controlled write in
      _bfd_elf_setup_sections() (CVE-2014-8485).
    * Invalid read flaw in libbfd (CVE-2014-8484).
    * Write to uninitialized memory in the PE parser (CVE-2014-8501).
    * Crash in the PE parser (CVE-2014-8502).
    * Segfault in the ihex parser when it encounters a malformed ihex file
      (CVE-2014-8503).
    * Stack buffer overflow in srec_scan (CVE-2014-8504).
    * Out-of-bounds memory write while processing a crafted 'ar' archive
      (CVE-2014-8738).
    * Directory traversal vulnerability allowing random file
      deletion/creation (CVE-2014-8737).

Security Issues:

    * CVE-2014-8501
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501&gt;
    * CVE-2014-8502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502&gt;
    * CVE-2014-8503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503&gt;
    * CVE-2014-8504
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504&gt;
    * CVE-2014-8485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485&gt;
    * CVE-2014-8738
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738&gt;
    * CVE-2014-8484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484&gt;
    * CVE-2014-8737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563246" comment="binutils-devel-2.23.1-0.23.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563247" comment="binutils-devel-32bit-2.23.1-0.23.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563248" comment="binutils-gold-2.23.1-0.23.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563249" comment="cross-ppc-binutils-2.23.1-0.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563250" comment="cross-spu-binutils-2.23.1-0.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36842" version="1" class="patch">
	<metadata>
		<title>Security update for ctdb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="836064" ref_url="https://bugzilla.suse.com/836064" source="BUGZILLA"/>
		<reference ref_id="867815" ref_url="https://bugzilla.suse.com/867815" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4159" ref_url="https://www.suse.com/security/cve/CVE-2013-4159/" source="CVE"/>
		<description>

This update for ctdb provides fixes for the following issues:

    * Insecure temporary file creation potentially allows for exploitation
      via symbolic links. (CVE-2013-4159)
    * Excessive lock contention can result in severe performance
      degradation when a CTDB cluster is under load.

Security Issue reference:

    * CVE-2013-4159
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4159&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-16"/>
	<updated date="2014-06-16"/>
	<bugzilla href="https://bugzilla.suse.com/836064">SUSE bug 836064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867815">SUSE bug 867815</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4159/">CVE-2013-4159</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563251" comment="ctdb-devel-1.0.114.6-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36843" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="887240" ref_url="https://bugzilla.suse.com/887240" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00002.html" source="SUSE-SU"/>
		<description>

This update fixes various issues in CUPS.

    * CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031: Various
      insufficient symbolic link checking could have lead to privilege
      escalation from the lp user to root.

Security Issues:

    * CVE-2014-3537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537&gt;
    * CVE-2014-5029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029&gt;
    * CVE-2014-5030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030&gt;
    * CVE-2014-5031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563252" comment="cups-devel-1.3.9-8.46.52.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36844" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<description>

This curl update fixes the following security issues:

    * bnc#868627: wrong re-use of connections (CVE-2014-0138).
    * bnc#868629: IP address wildcard certificate validation
      (CVE-2014-0139).
    * bnc#870444: --insecure option inappropriately enforcing security
      safeguard.

Security Issue references:

    * CVE-2014-0138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138&gt;
    * CVE-2014-0139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563253" comment="libcurl-devel-7.19.7-1.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36845" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563254" comment="libcurl-devel-7.19.7-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36846" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563255" comment="libcurl-devel-7.19.7-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36847" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="896453" ref_url="https://bugzilla.suse.com/896453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<description>

Various denial of service issues were fixed in the DBUS service.

    * CVE-2014-3638: dbus-daemon tracks whether method call messages expect
      a reply, so that unsolicited replies can be dropped. As currently
      implemented, if there are n parallel method calls in progress, each
      method reply takes O(n) CPU time. A malicious user could exploit this
      by opening the maximum allowed number of parallel connections and
      sending the maximum number of parallel method calls on each one,
      causing subsequent method calls to be unreasonably slow, a denial of
      service.
    * CVE-2014-3639: dbus-daemon allows a small number of 'incomplete'
      connections (64 by default) whose identity has not yet been
      confirmed. When this limit has been reached, subsequent connections
      are dropped. Alban's testing indicates that one malicious process
      that makes repeated connection attempts, but never completes the
      authentication handshake and instead waits for dbus-daemon to time
      out and disconnect it, can cause the majority of legitimate
      connection attempts to fail.

Security Issues:

    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;
    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-16"/>
	<updated date="2014-09-16"/>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563256" comment="dbus-1-devel-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563257" comment="dbus-1-devel-doc-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36848" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563258" comment="dhcp-devel-4.2.4.P2-0.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36849" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, badblocks was enhanced to work with very large partitions. 
(bsc#932539)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-26"/>
	<updated date="2015-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563259" comment="e2fsprogs-devel-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563260" comment="libblkid-devel-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563261" comment="libblkid-devel-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563262" comment="libcom_err-devel-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563263" comment="libcom_err-devel-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563264" comment="libext2fs-devel-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563265" comment="libext2fs-devel-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563266" comment="libext2fs2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563267" comment="libext2fs2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563268" comment="libuuid-devel-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563269" comment="libuuid-devel-32bit-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36850" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563270" comment="libasm-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563271" comment="libdw-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563272" comment="libebl-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563273" comment="libelf-devel-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563274" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36851" version="1" class="patch">
	<metadata>
		<title>Security update for emacs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="854683" ref_url="https://bugzilla.suse.com/854683" source="BUGZILLA"/>
		<reference ref_id="876847" ref_url="https://bugzilla.suse.com/876847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<description>

Emacs has been updated to fix the following issues:

    * Several cases of insecure usage of temporary files. (CVE-2014-3421,
      CVE-2014-3422, CVE-2014-3423, CVE-2014-3424)
    * Use of vc-annotate for renamed files when using Git. (bnc#854683)

Security Issues:

    * CVE-2014-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421&gt;
    * CVE-2014-3422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422&gt;
    * CVE-2014-3423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423&gt;
    * CVE-2014-3424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<bugzilla href="https://bugzilla.suse.com/854683">SUSE bug 854683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563275" comment="emacs-nox-22.3-4.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36852" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="901553" ref_url="https://bugzilla.suse.com/901553" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

evolution-data-server has been updated to disable support for SSLv3.

This security issues has been fixed:

    * SSLv3 POODLE attack (CVE-2014-3566)

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/901553">SUSE bug 901553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563276" comment="evolution-data-server-devel-2.28.2-0.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36853" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562899" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36854" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>

file was updated to fix one security issue.

    * An out-of-bounds read flaw file's donote() function. This could
      possibly lead to file executable crash (CVE-2014-3710).

Security Issues:

    * CVE-2014-3710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563277" comment="file-devel-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563278" comment="python-magic-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36855" version="1" class="patch">
	<metadata>
		<title>Security update for finch</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="861019" ref_url="https://bugzilla.suse.com/861019" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2013-6489" ref_url="https://www.suse.com/security/cve/CVE-2013-6489/" source="CVE"/>
		<reference ref_id="CVE-2013-6490" ref_url="https://www.suse.com/security/cve/CVE-2013-6490/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<description>

The pidgin Instant Messenger has been updated to fix various security 
issues:

    * CVE-2014-0020: Remotely triggerable crash in IRC argument parsing
    * CVE-2013-6490: Buffer overflow in SIMPLE header parsing
    * CVE-2013-6489: Buffer overflow in MXit emoticon parsing
    * CVE-2013-6487: Buffer overflow in Gadu-Gadu HTTP parsing
    * CVE-2013-6486: Pidgin uses clickable links to untrusted executables
    * CVE-2013-6485: Buffer overflow parsing chunked HTTP responses
    * CVE-2013-6484: Crash reading response from STUN server
    * CVE-2013-6483: XMPP doesn't verify 'from' on some iq replies
    * CVE-2013-6482: NULL pointer dereference parsing SOAP data in MSN
    * CVE-2013-6482: NULL pointer dereference parsing OIM data in MSN
    * CVE-2013-6482: NULL pointer dereference parsing headers in MSN
    * CVE-2013-6481: Remote crash reading Yahoo! P2P message
    * CVE-2013-6479: Remote crash parsing HTTP responses
    * CVE-2013-6478: Crash when hovering pointer over a long URL
    * CVE-2013-6477: Crash handling bad XMPP timestamp
    * CVE-2012-6152: Yahoo! remote crash from incorrect character encoding

Security Issue references:

    * CVE-2014-0020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020&gt;
    * CVE-2013-6490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490&gt;
    * CVE-2013-6489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489&gt;
    * CVE-2013-6487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487&gt;
    * CVE-2013-6486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486&gt;
    * CVE-2013-6485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485&gt;
    * CVE-2013-6484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484&gt;
    * CVE-2013-6483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483&gt;
    * CVE-2013-6482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482&gt;
    * CVE-2013-6481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481&gt;
    * CVE-2013-6479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479&gt;
    * CVE-2013-6478
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478&gt;
    * CVE-2013-6477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477&gt;
    * CVE-2012-6152
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-08"/>
	<updated date="2014-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6489/">CVE-2013-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6490/">CVE-2013-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563279" comment="finch-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563280" comment="finch-devel-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563281" comment="libpurple-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563282" comment="libpurple-devel-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563283" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563284" comment="pidgin-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563285" comment="pidgin-devel-2.6.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36856" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

    * 

      MFSA 2013-41: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      References

          o Christoph Diehl, Christian Holler, Jesse Ruderman, Timothy
            Nikkel, and Jeff Walden reported memory safety problems and
            crashes that affect Firefox ESR 17, and Firefox 20.
          o Bob Clary, Ben Turner, Benoit Jacob, Bobby Holley, Christoph
            Diehl, Christian Holler, Andrew McCreight, Gary Kwong, Jason
            Orendorff, Jesse Ruderman, Matt Wobensmith, and Mats Palmgren
            reported memory safety problems and crashes that affect Firefox
            20.
    * 

      MFSA 2013-42 / CVE-2013-1670: Security researcher Cody Crews reported
      a method to call a content level constructor that allows for this
      constructor to have chrome privileged accesss. This affects chrome
      object wrappers (COW) and allows for write actions on objects when
      only read actions should be allowed. This can lead to cross-site
      scripting (XSS) attacks.

    * 

      MFSA 2013-43 / CVE-2013-1671: Mozilla security researcher
      moz_bug_r_a4 reported a mechanism to exploit the control when set to
      the file type in order to get the full path. This can lead to
      information leakage and could be combined with other exploits to
      target attacks on the local file system.

    * 

      MFSA 2013-44 / CVE-2013-1672: Security researcher Seb Patane reported
      an issue with the Mozilla Maintenance Service on Windows. This issue
      allows unprivileged users to local privilege escalation through the
      system privileges used by the service when interacting with local
      malicious software. This allows the user to bypass integrity checks
      leading to local privilege escalation. Local file system access is
      necessary in order for this issue to be exploitable and it cannot be
      triggered through web content.

    * 

      MFSA 2013-45: Security researcher Robert Kugler discovered that in
      some instances the Mozilla Maintenance Service on Windows will be
      vulnerable to some previously fixed privilege escalation attacks that
      allowed for local privilege escalation. This was caused by the
      Mozilla Updater not updating Windows Registry entries for the Mozilla
      Maintenance Service, which fixed the earlier issues present if
      Firefox 12 had been installed. New installations of Firefox after
      version 12 are not affected by this issue. Local file system access
      is necessary in order for this issue to be exploitable and it cannot
      be triggered through web content. References: - old
      MozillaMaintenance Service registry entry not updated leading to
      Trusted Path Privilege Escalation (CVE-2013-1673) - Possible
      Arbitrary Code Execution by Update Service (CVE-2012-1942)

    * 

      MFSA 2013-46 / CVE-2013-1674: Security researcher Nils reported a
      use-after-free when resizing video while playing. This could allow
      for arbitrary code execution.

    * 

      MFSA 2013-47 / CVE-2013-1675: Mozilla community member Ms2ger
      discovered that some DOMSVGZoomEvent functions are used without being
      properly initialized, causing uninitialized memory to be used when
      they are called by web content. This could lead to a information
      leakage to sites depending on the contents of this uninitialized
      memory.

    * 

      MFSA 2013-48: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and invalid
      write problems rated as moderate to critical as security issues in
      shipped software. Some of these issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting additional use-after-free flaws in dir=auto
      code introduced during Firefox development. These were fixed before
      general release.

      References

          o Out of Bounds Read in SelectionIterator::GetNextSegment
            (CVE-2013-1676)
          o Out-of-bound read in gfxSkipCharsIterator::SetOffsets
            (CVE-2013-1677))
          o Invalid write in _cairo_xlib_surface_add_glyph (CVE-2013-1678)
          o Heap-use-after-free in mozilla::plugins::child::_geturlnotify
            (CVE-2013-1679)
          o Heap-use-after-free in nsFrameList::FirstChild (CVE-2013-1680)
          o Heap-use-after-free in nsContentUtils::RemoveScriptBlocker
            (CVE-2013-1681)
    * 

      CVE-2012-1942
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942&gt;

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;
    * CVE-2013-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801&gt;
    * CVE-2013-1669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669&gt;
    * CVE-2013-1670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670&gt;
    * CVE-2013-1671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671&gt;
    * CVE-2013-1672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672&gt;
    * CVE-2013-1673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673&gt;
    * CVE-2013-1674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674&gt;
    * CVE-2013-1675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675&gt;
    * CVE-2013-1676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676&gt;
    * CVE-2013-1677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677&gt;
    * CVE-2013-1678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678&gt;
    * CVE-2013-1679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679&gt;
    * CVE-2013-1680
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680&gt;
    * CVE-2013-1681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681&gt;
    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-02"/>
	<updated date="2013-07-02"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563286" comment="MozillaFirefox-devel-17.0.7esr-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36857" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563287" comment="MozillaFirefox-devel-17.0.10esr-0.7.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36858" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

This updates the Mozilla Firefox browser to the 24.3.0ESR security release. 
The Mozilla NSS libraries are now on version 3.15.4.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-07"/>
	<updated date="2014-02-07"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563288" comment="MozillaFirefox-devel-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563289" comment="mozilla-nss-devel-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36859" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563290" comment="MozillaFirefox-devel-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563212" comment="mozilla-nspr-devel-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36860" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563291" comment="MozillaFirefox-devel-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563292" comment="mozilla-nss-devel-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36861" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563293" comment="MozillaFirefox-devel-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563294" comment="mozilla-nspr-devel-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563295" comment="mozilla-nss-devel-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36862" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563296" comment="MozillaFirefox-devel-31.3.0esr-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36863" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-27"/>
	<updated date="2015-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563297" comment="MozillaFirefox-devel-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563298" comment="mozilla-nss-devel-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36864" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563299" comment="MozillaFirefox-devel-31.5.3esr-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36865" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563300" comment="MozillaFirefox-devel-31.7.0esr-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36866" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563301" comment="mozilla-nspr-devel-4.10.9-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36867" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563302" comment="MozillaFirefox-devel-38.3.0esr-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36868" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563303" comment="MozillaFirefox-devel-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563304" comment="mozilla-nspr-devel-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563305" comment="mozilla-nss-devel-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36869" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="854370" ref_url="https://bugzilla.suse.com/854370" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 24.2.0 ESR security release.

This is a major upgrade from the 17 ESR release branch.

Security issues fixed:

    * CVE-2013-5611 Application Installation doorhanger persists on
      navigation (MFSA 2013-105)
    * CVE-2013-5609 Miscellaneous memory safety hazards (rv:24.2) (MFSA
      2013-104)
    * CVE-2013-5610 Miscellaneous memory safety hazards (rv:26.0) (MFSA
      2013-104)
    * CVE-2013-5612 Character encoding cross-origin XSS attack (MFSA
      2013-106)
    * CVE-2013-5614 Sandbox restrictions not applied to nested object
      elements (MFSA 2013-107)
    * CVE-2013-5616 Use-after-free in event listeners (MFSA 2013-108)
    * CVE-2013-5619 Potential overflow in JavaScript binary search
      algorithms (MFSA 2013-110)
    * CVE-2013-6671 Segmentation violation when replacing ordered list
      elements (MFSA 2013-111)
    * CVE-2013-6673 Trust settings for built-in roots ignored during EV
      certificate validation (MFSA 2013-113)
    * CVE-2013-5613 Use-after-free in synthetic mouse movement (MFSA
      2013-114)
    * CVE-2013-5615 GetElementIC typed array stubs can be generated outside
      observed typesets (MFSA 2013-115)
    * CVE-2013-6672 Linux clipboard information disclosure though selection
      paste (MFSA 2013-112)
    * CVE-2013-5618 Use-after-free during Table Editing (MFSA 2013-109)

Security Issue references:

    * CVE-2013-5609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609&gt;
    * CVE-2013-5610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610&gt;
    * CVE-2013-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611&gt;
    * CVE-2013-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612&gt;
    * CVE-2013-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613&gt;
    * CVE-2013-5614
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614&gt;
    * CVE-2013-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615&gt;
    * CVE-2013-5616
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616&gt;
    * CVE-2013-5618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618&gt;
    * CVE-2013-5619
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619&gt;
    * CVE-2013-6671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671&gt;
    * CVE-2013-6672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672&gt;
    * CVE-2013-6673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563306" comment="MozillaFirefox-devel-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563307" comment="mozilla-nss-devel-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36870" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563308" comment="MozillaFirefox-devel-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563309" comment="mozilla-nspr-devel-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563310" comment="mozilla-nss-devel-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36871" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-09"/>
	<updated date="2015-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563311" comment="MozillaFirefox-devel-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563312" comment="mozilla-nss-devel-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36872" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563313" comment="flac-devel-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563314" comment="libFLAC++6-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563315" comment="libFLAC++6-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36873" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864576" ref_url="https://bugzilla.suse.com/864576" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>

This update fixes a denial of service (crash) security issue rlm_pap hash 
processing in FreeRadius, which could have been caused by special passwords 
fed into the RLM-PAP password checking method via LDAP by remote attackers.

Security Issue reference:

    * CVE-2014-2015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-01"/>
	<updated date="2014-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/864576">SUSE bug 864576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563316" comment="freeradius-server-devel-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563317" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36874" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563318" comment="freetype2-devel-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563319" comment="freetype2-devel-32bit-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36875" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<description>

This update for FUSE fixes the following security issue:

    * CVE-2015-3202: FUSE did not clear the environment upon execution of
      external programs.

Security Issues:

    * CVE-2015-3202
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-20"/>
	<updated date="2015-05-20"/>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563320" comment="fuse-devel-2.8.7-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36876" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563321" comment="gd-devel-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36877" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563322" comment="giflib-devel-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563323" comment="giflib-devel-32bit-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36878" version="1" class="patch">
	<metadata>
		<title>Security update for gimp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="791372" ref_url="https://bugzilla.suse.com/791372" source="BUGZILLA"/>
		<reference ref_id="853423" ref_url="https://bugzilla.suse.com/853423" source="BUGZILLA"/>
		<reference ref_id="853425" ref_url="https://bugzilla.suse.com/853425" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2013-1913" ref_url="https://www.suse.com/security/cve/CVE-2013-1913/" source="CVE"/>
		<reference ref_id="CVE-2013-1978" ref_url="https://www.suse.com/security/cve/CVE-2013-1978/" source="CVE"/>
		<description>

This update fixes the following security issues with gimp:

    * bnc#853423: XWD plugin g_new() integer overflow (CVE-2013-1913)
    * bnc#853425: XWD plugin color map heap-based buffer overflow
      (CVE-2013-1978)
    * bnc#791372: memory corruption via XWD files (CVE-2012-5576)

Security Issue references:

    * CVE-2013-1913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913&gt;
    * CVE-2012-5576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576&gt;
    * CVE-2013-1978
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-03"/>
	<updated date="2014-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/791372">SUSE bug 791372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853423">SUSE bug 853423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853425">SUSE bug 853425</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1913/">CVE-2013-1913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1978/">CVE-2013-1978</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563324" comment="gimp-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563325" comment="gimp-devel-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563326" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563327" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36879" version="1" class="patch">
	<metadata>
		<title>Security update for git</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="910756" ref_url="https://bugzilla.suse.com/910756" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<description>

This update fixes the following security issue:

    * CVE-2014-9390: Arbitrary command execution vulnerability on
      case-insensitive file systems. (bsc#910756)

Linux systems are normally not affected by this issue, unless git is 
operating on FAT, NTFS or other non Linux file systems.

Security Issues:

    * CVE-2014-9390
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-16"/>
	<updated date="2015-01-16"/>
	<bugzilla href="https://bugzilla.suse.com/910756">SUSE bug 910756</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563328" comment="git-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563329" comment="git-arch-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563330" comment="git-core-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563331" comment="git-cvs-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563332" comment="git-daemon-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563333" comment="git-email-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563334" comment="git-gui-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563335" comment="git-svn-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563336" comment="git-web-1.7.12.4-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563337" comment="gitk-1.7.12.4-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36880" version="1" class="patch">
	<metadata>
		<title>Recommended update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="948969" ref_url="https://bugzilla.suse.com/948969" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:2184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001714.html" source="SUSE-SU"/>
		<description>
The git package was updated to fix the following security issue:

- Fix remote code execution with recursive fetch of submodules (bsc#948969).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948969">SUSE bug 948969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563338" comment="git-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563339" comment="git-arch-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563340" comment="git-core-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563341" comment="git-cvs-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563342" comment="git-daemon-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563343" comment="git-email-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563344" comment="git-gui-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563345" comment="git-svn-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563346" comment="git-web-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563347" comment="gitk-1.7.12.4-0.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36881" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="888347" ref_url="https://bugzilla.suse.com/888347" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<description>

This glibc update fixes a critical privilege escalation problem and two 
non-security issues:

    * bnc#892073: An off-by-one error leading to a heap-based buffer
      overflow was found in __gconv_translit_find(). An exploit that
      targets the problem is publicly available. (CVE-2014-5119)
    * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv.
    * bnc#888347: printf-multibyte-format.patch: Don't parse %s format
      argument as multi-byte string.

Security Issues:

    * CVE-2014-5119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-29"/>
	<updated date="2014-08-29"/>
	<bugzilla href="https://bugzilla.suse.com/888347">SUSE bug 888347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563348" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563349" comment="glibc-info-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36882" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563350" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563351" comment="glibc-info-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36883" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563352" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563353" comment="glibc-info-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36884" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have 
been fixed.

Further information is available at 
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563354" comment="libgnutls-devel-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563355" comment="libgnutls-extra-devel-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36885" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563357" comment="libgnutls-devel-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563358" comment="libgnutls-extra-devel-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36886" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563360" comment="libgnutls-devel-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563361" comment="libgnutls-extra-devel-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36887" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563363" comment="libgpgme-devel-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563364" comment="libgpgme11-32bit-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563365" comment="libgpgme11-x86-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36888" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563366" comment="gtk2-devel-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563367" comment="gtk2-devel-32bit-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36889" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563368" comment="gtk2-devel-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563369" comment="gtk2-devel-32bit-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36890" version="1" class="patch">
	<metadata>
		<title>Security update for guestfs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="845720" ref_url="https://bugzilla.suse.com/845720" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>

A predictable socketname in the guestfish commandline tool could be used by 
a local attacker to gain access to guestfish sessions of other users on the 
same system. (CVE-2013-4419)

Security Issue reference:

    * CVE-2013-4419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-24"/>
	<updated date="2013-10-24"/>
	<bugzilla href="https://bugzilla.suse.com/845720">SUSE bug 845720</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563370" comment="libguestfs-devel-1.20.4-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36891" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue in icu:

    * CVE-2014-9654: insufficient size limit checks in regular expression
      compiler (bsc#917129)

Security Issues:

    * CVE-2014-9654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-18"/>
	<updated date="2015-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563371" comment="icu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563372" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563373" comment="libicu-devel-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563374" comment="libicu-devel-32bit-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36892" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following security issues:

    * 

      CVE-2014-8137: Double free in jas_iccattrval_destroy(). Double call
      to free() allowed attackers to cause a denial of service or possibly
      have unspecified other impact via unknown vectors. (bsc#909474)

    * 

      CVE-2014-8138: Heap overflow in jas_decode(). This could be used to
      do an arbitrary write and could result in arbitrary code execution.
      (bsc#909475)

    * 

      CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot(). Could
      allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image, which
      triggers a heap-based buffer overflow. (bsc#911837)

    * 

      CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c.
      Could allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image.
      (bsc#911837)

Security Issues:

    * CVE-2014-8138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138&gt;
    * CVE-2014-8137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137&gt;
    * CVE-2014-8157
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157&gt;
    * CVE-2014-8158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-03"/>
	<updated date="2015-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563375" comment="libjasper-devel-1.900.1-134.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36893" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html" source="SUSE-SU"/>
		<description>

java-1_6_0-ibm has been updated to version 1.6.0_sr16.2 to fix 18 security 
issues.

These security issues has been fixed:

    * Unspecified vulnerability in Oracle Java SE 6u81 (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563376" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563377" comment="java-1_6_0-ibm-devel-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563378" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36894" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563379" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563380" comment="java-1_6_0-ibm-devel-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563381" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36895" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563382" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563383" comment="java-1_6_0-ibm-devel-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563384" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36896" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<description>

java-1_7_0-ibm has been updated to version 1.7.0_sr7.2 to fix 21 security 
issues.

These security issues have been fixed:

    * Unspecified vulnerability (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors (CVE-2014-6456).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect integrity via unknown vectors related to
      Deployment, a different vulnerability than CVE-2014-6527
      (CVE-2014-6476).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect integrity via unknown vectors related to
      Deployment, a different vulnerability than CVE-2014-6476
      (CVE-2014-6527).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-21"/>
	<updated date="2014-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563385" comment="java-1_7_0-ibm-devel-1.7.0_sr8.0-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36897" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<description>
java-1_7_0-ibm was updated to fix 21 security issues.

These security issues were fixed:
- CVE-2015-4729: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-4748: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security (bsc#938895).
- CVE-2015-2664: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allowed remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine (bsc#938895).
- CVE-2015-2613: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-4731: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX (bsc#938895).
- CVE-2015-2637: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4733: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bsc#938895).
- CVE-2015-4732: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590 (bsc#938895).
- CVE-2015-2621: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allowed remote attackers to affect confidentiality via vectors related to JMX (bsc#938895).
- CVE-2015-2619: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2590: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732 (bsc#938895).
- CVE-2015-2638: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2625: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JSSE (bsc#938895).
- CVE-2015-2632: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-1931: Unspecified vulnerability (bsc#938895).
- CVE-2015-4760: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue (bsc#935540).
- CVE-2015-2601: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, did not properly combine state data with key data during the initialization phase, which made it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the 'Bar Mitzvah' issue (bsc#938895).
- CVE-2015-4749: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect availability via vectors related to JNDI (bsc#938895).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563386" comment="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36898" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<description>
The java-1_7_0-ibm package was updated to version 7.0-9.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.0-9.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563387" comment="java-1_7_0-ibm-devel-1.7.0_sr9.20-42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36899" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563388" comment="kdebase4-workspace-devel-4.3.5-0.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36900" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001292.html" source="SUSE-SU"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563389" comment="kde4-l10n-de-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563390" comment="kde4-l10n-de-doc-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36901" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563391" comment="kdebase4-workspace-devel-4.3.5-0.12.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36902" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the kdelibs4 KSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563393" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563394" comment="libkde4-devel-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563395" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563396" comment="libkdecore4-devel-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36903" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="926007" ref_url="https://bugzilla.suse.com/926007" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).

The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926007">SUSE bug 926007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563397" comment="kernel-docs-3.0.101-0.47.71.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36904" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="891082" ref_url="https://bugzilla.suse.com/891082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<description>

This MIT krb5 update fixes a buffer overrun problem in kadmind:

    * bnc#891082: buffer overrun in kadmind with LDAP back end
      (MITKRB5-SA-2014-001) (CVE-2014-4345)

MIT krb5 Security Advisory 2014-001

    * http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt

Security Issues:

    * CVE-2014-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563398" comment="krb5-devel-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563399" comment="krb5-devel-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563400" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36905" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563401" comment="krb5-devel-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563402" comment="krb5-devel-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563403" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36906" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563404" comment="krb5-devel-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563405" comment="krb5-devel-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563406" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36907" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563407" comment="krb5-devel-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563408" comment="krb5-devel-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563409" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36908" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563410" comment="krb5-devel-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563411" comment="krb5-devel-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563412" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36909" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563413" comment="krb5-devel-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563414" comment="krb5-devel-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563415" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36910" version="1" class="patch">
	<metadata>
		<title>Security update for kvm and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="843074" ref_url="https://bugzilla.suse.com/843074" source="BUGZILLA"/>
		<reference ref_id="852397" ref_url="https://bugzilla.suse.com/852397" source="BUGZILLA"/>
		<reference ref_id="878350" ref_url="https://bugzilla.suse.com/878350" source="BUGZILLA"/>
		<reference ref_id="879665" ref_url="https://bugzilla.suse.com/879665" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="897783" ref_url="https://bugzilla.suse.com/897783" source="BUGZILLA"/>
		<reference ref_id="899144" ref_url="https://bugzilla.suse.com/899144" source="BUGZILLA"/>
		<reference ref_id="899484" ref_url="https://bugzilla.suse.com/899484" source="BUGZILLA"/>
		<reference ref_id="900084" ref_url="https://bugzilla.suse.com/900084" source="BUGZILLA"/>
		<reference ref_id="904176" ref_url="https://bugzilla.suse.com/904176" source="BUGZILLA"/>
		<reference ref_id="905097" ref_url="https://bugzilla.suse.com/905097" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="908381" ref_url="https://bugzilla.suse.com/908381" source="BUGZILLA"/>
		<reference ref_id="910145" ref_url="https://bugzilla.suse.com/910145" source="BUGZILLA"/>
		<reference ref_id="911742" ref_url="https://bugzilla.suse.com/911742" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<description>

This collective update for KVM and libvirt provides fixes for security and 
non-security issues.

kvm:

    * Fix NULL pointer dereference because of uninitialized UDP socket.
      (bsc#897654, CVE-2014-3640)
    * Fix performance degradation after migration. (bsc#878350)
    * Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag
      in FS_IOC_FIEMAP ioctl. (bsc#908381)
    * Add validate hex properties for qdev. (bsc#852397)
    * Add boot option to do strict boot (bsc#900084)
    * Add query-command-line-options QMP command. (bsc#899144)
    * Fix incorrect return value of migrate_cancel. (bsc#843074)
    * Fix insufficient parameter validation during ram load. (bsc#905097,
      CVE-2014-7840)
    * Fix insufficient blit region checks in qemu/cirrus. (bsc#907805,
      CVE-2014-8106)

libvirt:

    * Fix security hole with migratable flag in dumpxml. (bsc#904176,
      CVE-2014-7823)
    * Fix domain deadlock. (bsc#899484, CVE-2014-3657)
    * Use correct definition when looking up disk in qemu blkiotune.
      (bsc#897783, CVE-2014-3633)
    * Fix undefined symbol when starting virtlockd. (bsc#910145)
    * Add '-boot strict' to qemu's commandline whenever possible.
      (bsc#900084)
    * Add support for 'reboot-timeout' in qemu. (bsc#899144)
    * Increase QEMU's monitor timeout to 30sec. (bsc#911742)
    * Allow setting QEMU's migration max downtime any time. (bsc#879665)

Security Issues:

    * CVE-2014-7823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823&gt;
    * CVE-2014-3657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657&gt;
    * CVE-2014-3633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633&gt;
    * CVE-2014-3640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640&gt;
    * CVE-2014-7840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840&gt;
    * CVE-2014-8106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/843074">SUSE bug 843074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852397">SUSE bug 852397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878350">SUSE bug 878350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879665">SUSE bug 879665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899144">SUSE bug 899144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900084">SUSE bug 900084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908381">SUSE bug 908381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910145">SUSE bug 910145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911742">SUSE bug 911742</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563416" comment="libvirt-devel-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563417" comment="libvirt-devel-32bit-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36911" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562960" comment="liblcms-devel-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562961" comment="liblcms-devel-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562962" comment="python-lcms-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36912" version="1" class="patch">
	<metadata>
		<title>Security update for lcms2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="826097" ref_url="https://bugzilla.suse.com/826097" source="BUGZILLA"/>
		<description>

lcms2 has been updated to the version 2.5 which is a maintenance release to 
fix various security and other bugs.

    * User defined parametric curves can now be saved in ICC profiles.
    * RGB profiles using same tone curves for several channels are storing
      now only one copy of the curve
    * update black point detection algorithm to reflect ICC changes
    * Added new cmsPlugInTHR() and fixed some race conditions
    * Added error descriptions on cmsSmoothToneCurve
    * Several improvements in cgats parser.
    * Fixed devicelink generation for 8 bits
    * Added a reference for Mac MLU tag
    * Added a way to read the profile creator from header
    * Added identity curves support for write V2 LUT
    * Added TIFF Lab16 handling on tifficc
    * Fixed a bug in parametric curves
    * Rendering intent used when creating the transform is now propagated
      to profile header in cmsTransform2Devicelink.
    * Transform2Devicelink now keeps white point when guessing deviceclass
      is enabled
    * Added some checks for non-happy path, mostly failing mallocs
      (bnc#826097).

For further changes please see the ChangeLog in the RPM.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-19"/>
	<updated date="2013-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/826097">SUSE bug 826097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563418" comment="liblcms2-devel-2.5-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36913" version="1" class="patch">
	<metadata>
		<title>Security update for libQt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="856832" ref_url="https://bugzilla.suse.com/856832" source="BUGZILLA"/>
		<reference ref_id="859158" ref_url="https://bugzilla.suse.com/859158" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<description>

The Qt library was updated to fix a XML entity expansion attack (XXE). 
(CVE-2013-4549)

Security Issue reference:

    * CVE-2013-4549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859158">SUSE bug 859158</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563419" comment="libQtWebKit-devel-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563422" comment="libqt4-devel-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563423" comment="libqt4-devel-doc-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563424" comment="libqt4-devel-doc-data-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563425" comment="libqt4-sql-mysql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563426" comment="libqt4-sql-mysql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563427" comment="libqt4-sql-postgresql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563428" comment="libqt4-sql-postgresql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563429" comment="libqt4-sql-postgresql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563430" comment="libqt4-sql-sqlite-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563431" comment="libqt4-sql-sqlite-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563432" comment="libqt4-sql-unixODBC-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563433" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563434" comment="libqt4-sql-unixODBC-x86-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36914" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563435" comment="postgresql91-devel-9.1.12-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36915" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563436" comment="libevent-devel-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36916" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery 
issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563437" comment="mozilla-nss-devel-3.16.5-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36917" version="1" class="patch">
	<metadata>
		<title>Security update for libgadu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="878540" ref_url="https://bugzilla.suse.com/878540" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<description>

A memory corruption vulnerability has been fixed in libgadu. CVE-2013-6487 
has been assigned to this issue.

Security Issue reference:

    * CVE-2013-6487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/878540">SUSE bug 878540</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563438" comment="libgadu-1.8.2-1.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563439" comment="libgadu-devel-1.8.2-1.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36918" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562991" comment="libgcrypt-devel-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562992" comment="libgcrypt-devel-32bit-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36919" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563440" comment="libgcrypt-devel-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563441" comment="libgcrypt-devel-32bit-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36920" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563442" comment="libgcrypt-devel-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563443" comment="libgcrypt-devel-32bit-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36921" version="1" class="patch">
	<metadata>
		<title>Security update for libksba
</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563444" comment="libksba-devel-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36922" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563445" comment="libksba-devel-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36923" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563446" comment="lzo-devel-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563447" comment="lzo-devel-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36924" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563448" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563449" comment="mpfr-devel-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563450" comment="mpfr-devel-32bit-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36925" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could have been exploited causing a denial of service (endless loop)
      (bnc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563451" comment="libmspack-devel-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36926" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563452" comment="libmspack-devel-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36927" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="887580" ref_url="https://bugzilla.suse.com/887580" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<description>

This MySQL update provides the following:

    * upgrade to version 5.5.39, [bnc#887580]
    * CVE's fixed: CVE-2014-2484, CVE-2014-4258, CVE-2014-4260,
      CVE-2014-2494, CVE-2014-4238, CVE-2014-4207, CVE-2014-4233,
      CVE-2014-4240, CVE-2014-4214, CVE-2014-4243

See also:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
&lt;http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html&gt;

Security Issues:

    * CVE-2014-2484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484&gt;
    * CVE-2014-4258
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258&gt;
    * CVE-2014-4260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260&gt;
    * CVE-2014-2494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494&gt;
    * CVE-2014-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238&gt;
    * CVE-2014-4207
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207&gt;
    * CVE-2014-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233&gt;
    * CVE-2014-4240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240&gt;
    * CVE-2014-4214
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214&gt;
    * CVE-2014-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563453" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563454" comment="libmysql55client_r18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563455" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563456" comment="libmysqlclient_r15-x86-5.0.96-0.6.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36928" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-25"/>
	<updated date="2014-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563457" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36929" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563458" comment="libpixman-1-0-devel-0.24.4-0.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36930" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="873123" ref_url="https://bugzilla.suse.com/873123" source="BUGZILLA"/>
		<reference ref_id="873124" ref_url="https://bugzilla.suse.com/873124" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>

This libpng update fixes the following two overflow security issues.

    * bnc#873123: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_sPLT() and png_set_text_2()
      (CVE-2013-7354).
    * bnc#873124: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_unknown_chunks()
      (CVE-2013-7353).

Security Issue references:

    * CVE-2013-7353
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353&gt;
    * CVE-2013-7354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-29"/>
	<updated date="2014-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563459" comment="libpng-devel-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563460" comment="libpng-devel-32bit-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36931" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563461" comment="libpng-devel-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563462" comment="libpng-devel-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36932" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563463" comment="libpng-devel-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563464" comment="libpng-devel-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36933" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="845765" ref_url="https://bugzilla.suse.com/845765" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<description>

This update fixes problems in DCTStream error handling in poppler.

Security Issue reference:

    * CVE-2010-5110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563465" comment="libpoppler-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563466" comment="libpoppler-glib-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563467" comment="libpoppler-qt2-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563468" comment="libpoppler-qt3-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563469" comment="libpoppler-qt4-devel-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563470" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36934" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

The following security issue is fixed in this update:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv.

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563471" comment="libpulse-devel-0.9.23-0.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36935" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the QT4 QSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563472" comment="libQtWebKit-devel-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563475" comment="libqt4-devel-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563476" comment="libqt4-devel-doc-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563477" comment="libqt4-devel-doc-data-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563478" comment="libqt4-sql-mysql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563479" comment="libqt4-sql-mysql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563480" comment="libqt4-sql-postgresql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563481" comment="libqt4-sql-postgresql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563482" comment="libqt4-sql-postgresql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563483" comment="libqt4-sql-sqlite-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563484" comment="libqt4-sql-sqlite-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563485" comment="libqt4-sql-unixODBC-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563486" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563487" comment="libqt4-sql-unixODBC-x86-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36936" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<description>

The libqt4 library was updated to fix several security issues:

    * CVE-2015-0295: Division by zero when processing malformed BMP files.
      (bsc#921999)
    * CVE-2015-1858: Segmentation fault in BMP Qt Image Format Handling.
      (bsc#927806)
    * CVE-2015-1859: Segmentation fault in ICO Qt Image Format Handling.
      (bsc#927807)
    * CVE-2015-1860: Segmentation fault in GIF Qt Image Format Handling.
      (bsc#927808)

Security Issues:

    * CVE-2015-1858
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858&gt;
    * CVE-2015-1859
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859&gt;
    * CVE-2015-1860
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860&gt;
    * CVE-2015-0295
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563488" comment="libQtWebKit-devel-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563491" comment="libqt4-devel-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563492" comment="libqt4-devel-doc-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563493" comment="libqt4-devel-doc-data-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563494" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563495" comment="libqt4-sql-mysql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563496" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563497" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563498" comment="libqt4-sql-postgresql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563499" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563500" comment="libqt4-sql-sqlite-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563501" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563502" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563503" comment="libqt4-sql-unixODBC-x86-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36937" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="900214" ref_url="https://bugzilla.suse.com/900214" source="BUGZILLA"/>
		<reference ref_id="900218" ref_url="https://bugzilla.suse.com/900218" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>

LibreOffice was updated to fix two security issues.

These security issues have been fixed:

    * 'Document as E-mail' vulnerability (bnc#900218).
    * Impress remote control use-after-free vulnerability (CVE-2014-3693).

Security Issues:

    * CVE-2014-3693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-20"/>
	<updated date="2014-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/900214">SUSE bug 900214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900218">SUSE bug 900218</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563504" comment="libreoffice-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563505" comment="libreoffice-base-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563506" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563507" comment="libreoffice-base-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563508" comment="libreoffice-branding-upstream-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563509" comment="libreoffice-calc-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563510" comment="libreoffice-calc-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563511" comment="libreoffice-draw-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563512" comment="libreoffice-draw-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563513" comment="libreoffice-filters-optional-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563514" comment="libreoffice-gnome-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563515" comment="libreoffice-help-cs-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563516" comment="libreoffice-help-da-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563517" comment="libreoffice-help-de-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563518" comment="libreoffice-help-en-GB-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563519" comment="libreoffice-help-en-US-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563520" comment="libreoffice-help-es-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563521" comment="libreoffice-help-fr-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563522" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563523" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563524" comment="libreoffice-help-hu-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563525" comment="libreoffice-help-it-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563526" comment="libreoffice-help-ja-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563527" comment="libreoffice-help-ko-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563528" comment="libreoffice-help-nl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563529" comment="libreoffice-help-pl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563530" comment="libreoffice-help-pt-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563531" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563532" comment="libreoffice-help-ru-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563533" comment="libreoffice-help-sv-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563534" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563535" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563536" comment="libreoffice-icon-themes-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563537" comment="libreoffice-impress-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563538" comment="libreoffice-impress-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563539" comment="libreoffice-kde-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563540" comment="libreoffice-kde4-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563541" comment="libreoffice-l10n-af-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563542" comment="libreoffice-l10n-ar-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563543" comment="libreoffice-l10n-ca-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563544" comment="libreoffice-l10n-cs-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563545" comment="libreoffice-l10n-da-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563546" comment="libreoffice-l10n-de-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563547" comment="libreoffice-l10n-el-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563548" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563549" comment="libreoffice-l10n-es-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563550" comment="libreoffice-l10n-fi-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563551" comment="libreoffice-l10n-fr-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563552" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563553" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563554" comment="libreoffice-l10n-hu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563555" comment="libreoffice-l10n-it-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563556" comment="libreoffice-l10n-ja-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563557" comment="libreoffice-l10n-ko-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563558" comment="libreoffice-l10n-nb-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563559" comment="libreoffice-l10n-nl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563560" comment="libreoffice-l10n-nn-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563561" comment="libreoffice-l10n-pl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563562" comment="libreoffice-l10n-prebuilt-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563563" comment="libreoffice-l10n-pt-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563564" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563565" comment="libreoffice-l10n-ru-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563566" comment="libreoffice-l10n-sk-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563567" comment="libreoffice-l10n-sv-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563568" comment="libreoffice-l10n-xh-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563569" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563570" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563571" comment="libreoffice-l10n-zu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563572" comment="libreoffice-mailmerge-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563573" comment="libreoffice-math-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563574" comment="libreoffice-mono-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563575" comment="libreoffice-officebean-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563576" comment="libreoffice-pyuno-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563577" comment="libreoffice-sdk-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563578" comment="libreoffice-writer-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563579" comment="libreoffice-writer-extensions-4.0.3.3.26-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36938" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="382137" ref_url="https://bugzilla.suse.com/382137" source="BUGZILLA"/>
		<reference ref_id="593612" ref_url="https://bugzilla.suse.com/593612" source="BUGZILLA"/>
		<reference ref_id="654230" ref_url="https://bugzilla.suse.com/654230" source="BUGZILLA"/>
		<reference ref_id="753460" ref_url="https://bugzilla.suse.com/753460" source="BUGZILLA"/>
		<reference ref_id="757432" ref_url="https://bugzilla.suse.com/757432" source="BUGZILLA"/>
		<reference ref_id="779620" ref_url="https://bugzilla.suse.com/779620" source="BUGZILLA"/>
		<reference ref_id="779642" ref_url="https://bugzilla.suse.com/779642" source="BUGZILLA"/>
		<reference ref_id="780044" ref_url="https://bugzilla.suse.com/780044" source="BUGZILLA"/>
		<reference ref_id="783433" ref_url="https://bugzilla.suse.com/783433" source="BUGZILLA"/>
		<reference ref_id="802888" ref_url="https://bugzilla.suse.com/802888" source="BUGZILLA"/>
		<reference ref_id="816593" ref_url="https://bugzilla.suse.com/816593" source="BUGZILLA"/>
		<reference ref_id="817956" ref_url="https://bugzilla.suse.com/817956" source="BUGZILLA"/>
		<reference ref_id="819614" ref_url="https://bugzilla.suse.com/819614" source="BUGZILLA"/>
		<reference ref_id="819822" ref_url="https://bugzilla.suse.com/819822" source="BUGZILLA"/>
		<reference ref_id="819865" ref_url="https://bugzilla.suse.com/819865" source="BUGZILLA"/>
		<reference ref_id="820077" ref_url="https://bugzilla.suse.com/820077" source="BUGZILLA"/>
		<reference ref_id="820273" ref_url="https://bugzilla.suse.com/820273" source="BUGZILLA"/>
		<reference ref_id="820503" ref_url="https://bugzilla.suse.com/820503" source="BUGZILLA"/>
		<reference ref_id="820504" ref_url="https://bugzilla.suse.com/820504" source="BUGZILLA"/>
		<reference ref_id="820509" ref_url="https://bugzilla.suse.com/820509" source="BUGZILLA"/>
		<reference ref_id="820788" ref_url="https://bugzilla.suse.com/820788" source="BUGZILLA"/>
		<reference ref_id="820800" ref_url="https://bugzilla.suse.com/820800" source="BUGZILLA"/>
		<reference ref_id="820819" ref_url="https://bugzilla.suse.com/820819" source="BUGZILLA"/>
		<reference ref_id="820836" ref_url="https://bugzilla.suse.com/820836" source="BUGZILLA"/>
		<reference ref_id="821567" ref_url="https://bugzilla.suse.com/821567" source="BUGZILLA"/>
		<reference ref_id="821795" ref_url="https://bugzilla.suse.com/821795" source="BUGZILLA"/>
		<reference ref_id="822908" ref_url="https://bugzilla.suse.com/822908" source="BUGZILLA"/>
		<reference ref_id="823626" ref_url="https://bugzilla.suse.com/823626" source="BUGZILLA"/>
		<reference ref_id="823651" ref_url="https://bugzilla.suse.com/823651" source="BUGZILLA"/>
		<reference ref_id="823655" ref_url="https://bugzilla.suse.com/823655" source="BUGZILLA"/>
		<reference ref_id="823675" ref_url="https://bugzilla.suse.com/823675" source="BUGZILLA"/>
		<reference ref_id="823935" ref_url="https://bugzilla.suse.com/823935" source="BUGZILLA"/>
		<reference ref_id="825305" ref_url="https://bugzilla.suse.com/825305" source="BUGZILLA"/>
		<reference ref_id="825891" ref_url="https://bugzilla.suse.com/825891" source="BUGZILLA"/>
		<reference ref_id="825976" ref_url="https://bugzilla.suse.com/825976" source="BUGZILLA"/>
		<reference ref_id="828390" ref_url="https://bugzilla.suse.com/828390" source="BUGZILLA"/>
		<reference ref_id="828598" ref_url="https://bugzilla.suse.com/828598" source="BUGZILLA"/>
		<reference ref_id="829017" ref_url="https://bugzilla.suse.com/829017" source="BUGZILLA"/>
		<reference ref_id="830205" ref_url="https://bugzilla.suse.com/830205" source="BUGZILLA"/>
		<reference ref_id="831457" ref_url="https://bugzilla.suse.com/831457" source="BUGZILLA"/>
		<reference ref_id="831578" ref_url="https://bugzilla.suse.com/831578" source="BUGZILLA"/>
		<reference ref_id="834035" ref_url="https://bugzilla.suse.com/834035" source="BUGZILLA"/>
		<reference ref_id="834705" ref_url="https://bugzilla.suse.com/834705" source="BUGZILLA"/>
		<reference ref_id="834720" ref_url="https://bugzilla.suse.com/834720" source="BUGZILLA"/>
		<reference ref_id="834722" ref_url="https://bugzilla.suse.com/834722" source="BUGZILLA"/>
		<reference ref_id="835985" ref_url="https://bugzilla.suse.com/835985" source="BUGZILLA"/>
		<reference ref_id="837302" ref_url="https://bugzilla.suse.com/837302" source="BUGZILLA"/>
		<reference ref_id="839727" ref_url="https://bugzilla.suse.com/839727" source="BUGZILLA"/>
		<reference ref_id="862510" ref_url="https://bugzilla.suse.com/862510" source="BUGZILLA"/>
		<reference ref_id="863021" ref_url="https://bugzilla.suse.com/863021" source="BUGZILLA"/>
		<reference ref_id="864396" ref_url="https://bugzilla.suse.com/864396" source="BUGZILLA"/>
		<reference ref_id="870234" ref_url="https://bugzilla.suse.com/870234" source="BUGZILLA"/>
		<reference ref_id="878854" ref_url="https://bugzilla.suse.com/878854" source="BUGZILLA"/>
		<reference ref_id="893141" ref_url="https://bugzilla.suse.com/893141" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4156" ref_url="https://www.suse.com/security/cve/CVE-2013-4156/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<description>

LibreOffice was updated to version 4.0.3.3.26. (SUSE 4.0-patch26, tag 
suse-4.0-26, based on upstream 4.0.3.3).

Two security issues have been fixed:

    * DOCM memory corruption vulnerability. (CVE-2013-4156, bnc#831578)
    * Data exposure using crafted OLE objects. (CVE-2014-3575, bnc#893141)

The following non-security issues have been fixed:

    * chart shown flipped (bnc#834722)
    * chart missing dataset (bnc#839727)
    * import new line in text (bnc#828390)
    * lines running off screens (bnc#819614)
    * add set-all language menu (bnc#863021)
    * text rotation (bnc#783433, bnc#862510)
    * page border shadow testcase (bnc#817956)
    * one more clickable field fix (bnc#802888)
    * multilevel labels are rotated (bnc#820273)
    * incorrect nested table margins (bnc#816593)
    * use BitmapURL only if its valid (bnc#821567)
    * import gradfill for text colors (bnc#870234)
    * fix undo of paragraph attributes (bnc#828598)
    * stop-gap solution to avoid crash (bnc#830205)
    * import images with duotone filter (bnc#820077)
    * missing drop downs for autofilter (bnc#834705)
    * typos in first page style creation (bnc#820836)
    * labels wrongly interpreted as dates (bnc#834720)
    * RTF import of fFilled shape property (bnc#825305)
    * placeholders text size is not correct (bnc#831457)
    * cells value formatted with wrong output (bnc#821795)
    * RTF import of freeform shape coordinates (bnc#823655)
    * styles (rename &amp;) copy to different decks (bnc#757432)
    * XLSX Chart import with internal data table (bnc#819822)
    * handle M.d.yyyy date format in DOCX import (bnc#820509)
    * paragraph style in empty first page header (bnc#823651)
    * copying slides having same master page name (bnc#753460)
    * printing handouts using the default, 'Order' (bnc#835985)
    * wrap polygon was based on dest size of picture (bnc#820800)
    * added common flags support for SEQ field import (bnc#825976)
    * hyperlinks of illustration index in DOCX export (bnc#834035)
    * allow insertion of redlines with an empty author (bnc#837302)
    * handle drawinglayer rectangle inset in VML import (bnc#779642)
    * don't apply complex font size to non-complex font (bnc#820819)
    * issue with negative seeks in win32 shell extension (bnc#829017)
    * slide appears quite garbled when imported from PPTX (bnc#593612)
    * initial MCE support in writerfilter ooxml tokenizer (bnc#820503)
    * MSWord uses \xb for linebreaks in DB fields, take 2 (bnc#878854)
    * try harder to convert floating tables to text frames (bnc#779620)
    * itemstate in parent style incorrectly reported as set (bnc#819865)
    * default color hidden by Default style in writerfilter (bnc#820504)
    * DOCX document crashes when using internal OOXML filter (bnc#382137)
    * ugly workaround for external leading with symbol fonts (bnc#823626)
    * followup fix for exported xlsx causes errors for mso2007 (bnc#823935)
    * we only support simple labels in the InternalDataProvider
      (bnc#864396)
    * RTF import: fix import of numbering bullet associated font
      (bnc#823675)
    * page specific footer extended to every pages in DOCX export
      (bnc#654230)
    * v:textbox mso-fit-shape-to-text style property in VML import
      (bnc#820788)
    * w:spacing in a paragraph should also apply to as-char objects
      (bnc#780044)
    * compatibility setting for MS Word wrapping text in less space
      (bnc#822908)
    * fix SwWrtShell::SelAll() to work with empty table at doc start
      (bnc#825891)

Security Issues:

    * CVE-2014-3575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575&gt;
    * CVE-2013-4156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/382137">SUSE bug 382137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/593612">SUSE bug 593612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654230">SUSE bug 654230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753460">SUSE bug 753460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757432">SUSE bug 757432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779620">SUSE bug 779620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779642">SUSE bug 779642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780044">SUSE bug 780044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783433">SUSE bug 783433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802888">SUSE bug 802888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816593">SUSE bug 816593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817956">SUSE bug 817956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819614">SUSE bug 819614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819822">SUSE bug 819822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819865">SUSE bug 819865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820077">SUSE bug 820077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820273">SUSE bug 820273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820503">SUSE bug 820503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820504">SUSE bug 820504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820509">SUSE bug 820509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820788">SUSE bug 820788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820800">SUSE bug 820800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820819">SUSE bug 820819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820836">SUSE bug 820836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821567">SUSE bug 821567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821795">SUSE bug 821795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822908">SUSE bug 822908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823626">SUSE bug 823626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823651">SUSE bug 823651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823655">SUSE bug 823655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823675">SUSE bug 823675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823935">SUSE bug 823935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825305">SUSE bug 825305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825891">SUSE bug 825891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825976">SUSE bug 825976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828390">SUSE bug 828390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828598">SUSE bug 828598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829017">SUSE bug 829017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830205">SUSE bug 830205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831457">SUSE bug 831457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831578">SUSE bug 831578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834035">SUSE bug 834035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834705">SUSE bug 834705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834720">SUSE bug 834720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834722">SUSE bug 834722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835985">SUSE bug 835985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837302">SUSE bug 837302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839727">SUSE bug 839727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862510">SUSE bug 862510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863021">SUSE bug 863021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864396">SUSE bug 864396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870234">SUSE bug 870234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878854">SUSE bug 878854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4156/">CVE-2013-4156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563580" comment="libreoffice-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563581" comment="libreoffice-base-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563582" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563583" comment="libreoffice-base-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563584" comment="libreoffice-branding-upstream-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563585" comment="libreoffice-calc-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563586" comment="libreoffice-calc-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563587" comment="libreoffice-draw-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563588" comment="libreoffice-draw-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563589" comment="libreoffice-filters-optional-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563590" comment="libreoffice-gnome-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563591" comment="libreoffice-help-cs-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563592" comment="libreoffice-help-da-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563593" comment="libreoffice-help-de-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563594" comment="libreoffice-help-en-GB-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563595" comment="libreoffice-help-en-US-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563596" comment="libreoffice-help-es-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563597" comment="libreoffice-help-fr-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563598" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563599" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563600" comment="libreoffice-help-hu-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563601" comment="libreoffice-help-it-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563602" comment="libreoffice-help-ja-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563603" comment="libreoffice-help-ko-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563604" comment="libreoffice-help-nl-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563605" comment="libreoffice-help-pl-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563606" comment="libreoffice-help-pt-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563607" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563608" comment="libreoffice-help-ru-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563609" comment="libreoffice-help-sv-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563610" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563611" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563612" comment="libreoffice-icon-themes-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563613" comment="libreoffice-impress-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563614" comment="libreoffice-impress-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563615" comment="libreoffice-kde-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563616" comment="libreoffice-kde4-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563617" comment="libreoffice-l10n-af-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563618" comment="libreoffice-l10n-ar-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563619" comment="libreoffice-l10n-ca-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563620" comment="libreoffice-l10n-cs-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563621" comment="libreoffice-l10n-da-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563622" comment="libreoffice-l10n-de-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563623" comment="libreoffice-l10n-el-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563624" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563625" comment="libreoffice-l10n-es-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563626" comment="libreoffice-l10n-fi-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563627" comment="libreoffice-l10n-fr-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563628" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563629" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563630" comment="libreoffice-l10n-hu-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563631" comment="libreoffice-l10n-it-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563632" comment="libreoffice-l10n-ja-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563633" comment="libreoffice-l10n-ko-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563634" comment="libreoffice-l10n-nb-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563635" comment="libreoffice-l10n-nl-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563636" comment="libreoffice-l10n-nn-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563637" comment="libreoffice-l10n-pl-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563638" comment="libreoffice-l10n-prebuilt-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563639" comment="libreoffice-l10n-pt-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563640" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563641" comment="libreoffice-l10n-ru-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563642" comment="libreoffice-l10n-sk-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563643" comment="libreoffice-l10n-sv-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563644" comment="libreoffice-l10n-xh-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563645" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563646" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563647" comment="libreoffice-l10n-zu-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563648" comment="libreoffice-mailmerge-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563649" comment="libreoffice-math-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563650" comment="libreoffice-mono-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563651" comment="libreoffice-officebean-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563652" comment="libreoffice-pyuno-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563653" comment="libreoffice-sdk-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563654" comment="libreoffice-writer-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563655" comment="libreoffice-writer-extensions-4.0.3.3.26-0.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36939" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563656" comment="librsvg-devel-2.26.0-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36940" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

This update for libsndfile fixes two buffer read overflows in 
sd2_parse_rsrc_fork(). (CVE-2014-9496, bsc#911796)

Security Issues:

    * CVE-2014-9496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563657" comment="libsndfile-devel-1.0.20-2.6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36941" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563658" comment="libsndfile-devel-1.0.20-2.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36942" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="865222" ref_url="https://bugzilla.suse.com/865222" source="BUGZILLA"/>
		<reference ref_id="894361" ref_url="https://bugzilla.suse.com/894361" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>

This update for net-snmp fixes a remote denial of service problem inside 
snmptrapd when it is started with the '-OQ' option. (CVE-2014-3565, 
bnc#894361)

Additionally, a timeout issue during SNMP MIB walk on OID 1.3.6.1.2.1.4.24 
when using newer (v5.5+) versions of snmpwalk has been fixed. (bnc#865222)

Security Issues:

    * CVE-2014-3565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865222">SUSE bug 865222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563659" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563660" comment="net-snmp-devel-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563661" comment="net-snmp-devel-32bit-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36943" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="866278" ref_url="https://bugzilla.suse.com/866278" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<description>

This update of libssh fixes the following security issue:

    * When libssh operates in server mode, the randomness pool was not
      switched on fork, so two pools could operate on the same randomness
      and could generate the same keys.

Security Issue references:

    * CVE-2014-0017
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-07"/>
	<updated date="2014-03-07"/>
	<bugzilla href="https://bugzilla.suse.com/866278">SUSE bug 866278</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563662" comment="libssh2-0.2-5.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36944" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<description>

The ssh client library libssh2_org was updated to fix a security issue:

    * CVE-2015-1782: A malicious server could send a crafted
      SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a
      crash of the application using libssh2_org.

Security Issues:

    * CVE-2015-1782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563663" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563664" comment="libssh2-1-32bit-1.2.9-4.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563665" comment="libssh2-1-x86-1.2.9-4.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563666" comment="libssh2-devel-1.2.9-4.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36945" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563667" comment="libtasn1-devel-1.5-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36946" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563094" comment="libtiff-devel-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563095" comment="libtiff-devel-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36947" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="857490" ref_url="https://bugzilla.suse.com/857490" source="BUGZILLA"/>
		<reference ref_id="873705" ref_url="https://bugzilla.suse.com/873705" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<description>

libvirt has been patched to fix two security issues.

Further information is available at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179&gt; and
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456&gt;

These security issues have been fixed:

    * Unsafe parsing of XML documents allows arbitrary file read or denial
      of service (CVE-2014-0179)
    * Ability to delete or create arbitrary host devices (CVE-2013-6456)

Security Issue references:

    * CVE-2014-0179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179&gt;
    * CVE-2013-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-07"/>
	<updated date="2014-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563668" comment="libvirt-devel-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563669" comment="libvirt-devel-32bit-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36948" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563670" comment="LibVNCServer-devel-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36949" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563671" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563672" comment="libwmf-32bit-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563673" comment="libwmf-devel-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563674" comment="libwmf-gnome-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563675" comment="libwmf-gnome-32bit-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563676" comment="libwmf-gnome-x86-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563677" comment="libwmf-x86-0.2.8.4-206.29.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36950" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563678" comment="libwsman-devel-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563679" comment="openwsman-python-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36951" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>

This update fixes a denial of service via recursive entity expansion. 
(CVE-2014-3660)

Security Issues:

    * CVE-2014-3660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-20"/>
	<updated date="2014-10-20"/>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563680" comment="libxml2-devel-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563681" comment="libxml2-devel-32bit-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36952" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563682" comment="libxml2-devel-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563683" comment="libxml2-devel-32bit-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36953" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563684" comment="libxml2-devel-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563685" comment="libxml2-devel-32bit-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36954" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563102" comment="libxslt-devel-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563103" comment="libxslt-devel-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563104" comment="libxslt-python-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36955" version="1" class="patch">
	<metadata>
		<title>Security update for libyaml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="907809" ref_url="https://bugzilla.suse.com/907809" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>

This libyaml update fixes the following security issue:

    * CVE-2014-9130: Assert failure when processing wrapped strings.
      (bnc#907809)

Security Issues:

    * CVE-2014-9130
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-30"/>
	<updated date="2014-12-30"/>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563686" comment="libyaml-devel-0.1.3-0.10.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36956" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="867350" ref_url="https://bugzilla.suse.com/867350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2323" ref_url="https://www.suse.com/security/cve/CVE-2014-2323/" source="CVE"/>
		<reference ref_id="CVE-2014-2324" ref_url="https://www.suse.com/security/cve/CVE-2014-2324/" source="CVE"/>
		<description>

The HTTP server lighttpd was updated to fix the following security issues:

    * CVE-2014-2323: SQL injection vulnerability in mod_mysql_vhost.c in
      lighttpd allowed remote attackers to execute arbitrary SQL commands
      via the host name.
    * CVE-2014-2323: Multiple directory traversal vulnerabilities in
      mod_evhost and mod_simple_vhost in lighttpd allowed remote attackers
      to read arbitrary files via .. (dot dot) in the host name.

More information can be found on the lighttpd advisory page: 
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
&lt;http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt&gt;

Security Issues references:

    * CVE-2014-2323
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2323&gt;
    * CVE-2014-2324
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2324&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-19"/>
	<updated date="2014-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/867350">SUSE bug 867350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2323/">CVE-2014-2323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2324/">CVE-2014-2324</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563687" comment="lighttpd-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563688" comment="lighttpd-mod_cml-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563689" comment="lighttpd-mod_magnet-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563690" comment="lighttpd-mod_mysql_vhost-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563691" comment="lighttpd-mod_rrdtool-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563692" comment="lighttpd-mod_trigger_b4_dl-1.4.20-2.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563693" comment="lighttpd-mod_webdav-1.4.20-2.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36957" version="1" class="patch">
	<metadata>
		<title>Security update for lxc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="839653" ref_url="https://bugzilla.suse.com/839653" source="BUGZILLA"/>
		<reference ref_id="839663" ref_url="https://bugzilla.suse.com/839663" source="BUGZILLA"/>
		<reference ref_id="855809" ref_url="https://bugzilla.suse.com/855809" source="BUGZILLA"/>
		<reference ref_id="869663" ref_url="https://bugzilla.suse.com/869663" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>

The container framework LXC has been updated to fix various bugs and a 
security issue:

    * CVE-2013-6441: The sshd template allowed privilege escalation on the
      host.
    * SLES container time not aligned with host time (bnc#839653)
    * SLES container boot takes ages (bnc#839663)
    * lxc mounts /dev/pts with wrong options (bnc#869663)

Security Issues:

    * CVE-2013-6441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/839653">SUSE bug 839653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839663">SUSE bug 839663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869663">SUSE bug 869663</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563694" comment="lxc-0.8.0-0.21.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563695" comment="lxc-devel-0.8.0-0.21.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36958" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563697" comment="lxc-devel-0.8.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36959" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="923070" ref_url="https://bugzilla.suse.com/923070" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9462" ref_url="https://www.suse.com/security/cve/CVE-2014-9462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001369.html" source="SUSE-SU"/>
		<description>

mercurial was updated to fix a potential command injection via 
sshpeer._validaterepo() (CVE-2014-9462)

Security Issues:

    * CVE-2014-9462
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9462&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<bugzilla href="https://bugzilla.suse.com/923070">SUSE bug 923070</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9462/">CVE-2014-9462</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563698" comment="mercurial-2.3.2-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36960" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563699" comment="bytefx-data-mysql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563700" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563701" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563702" comment="mono-data-firebird-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563703" comment="mono-data-oracle-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563704" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563705" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563706" comment="mono-data-sybase-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563707" comment="mono-devel-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563708" comment="mono-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563709" comment="mono-jscript-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563710" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563711" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563712" comment="mono-wcf-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563713" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563714" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563715" comment="mono-winfxcore-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563716" comment="monodoc-core-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36961" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563717" comment="MozillaFirefox-devel-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563718" comment="mozilla-nss-devel-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36962" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563719" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36963" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563720" comment="mozilla-nss-devel-3.19.2.2-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36964" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-28"/>
	<updated date="2013-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563112" comment="mozilla-nspr-devel-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563721" comment="mozilla-nss-devel-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36965" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563722" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563723" comment="libmysql55client_r18-x86-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36966" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563724" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563725" comment="libmysql55client_r18-x86-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36967" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563726" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563727" comment="libmysql55client_r18-x86-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36968" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864843" ref_url="https://bugzilla.suse.com/864843" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>

The monitoring service Nagios has been updated to fix potential buffer 
overflows in its CGI scripts. (CVE-2014-1878)

Security Issue reference:

    * CVE-2014-1878
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1878&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/864843">SUSE bug 864843</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563728" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563729" comment="nagios-devel-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563730" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36969" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563732" comment="net-snmp-devel-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563733" comment="net-snmp-devel-32bit-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36970" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563117" comment="mozilla-nspr-devel-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563734" comment="mozilla-nss-devel-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36971" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563735" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563736" comment="openldap2-back-perl-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563737" comment="openldap2-devel-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563738" comment="openldap2-devel-32bit-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36972" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-13"/>
	<updated date="2015-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563739" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563740" comment="openldap2-back-perl-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563741" comment="openldap2-devel-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563742" comment="openldap2-devel-32bit-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36973" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563743" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563744" comment="openldap2-back-perl-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563745" comment="openldap2-devel-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563746" comment="openldap2-devel-32bit-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36974" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSLP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="778508" ref_url="https://bugzilla.suse.com/778508" source="BUGZILLA"/>
		<reference ref_id="855385" ref_url="https://bugzilla.suse.com/855385" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001397.html" source="SUSE-SU"/>
		<description>

This update for OpenSLP fixes a bug in SLPIntersectStringList that could 
lead to an out-of-bounds read (CVE-2012-4428). Additionally, the SLP daemon 
now always use localtime(3) when writing to log files to avoid having 
timestamps with different timezones.

Security Issues:

    * CVE-2012-4428
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-06"/>
	<updated date="2015-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855385">SUSE bug 855385</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563747" comment="openslp-devel-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563748" comment="openslp-server-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36975" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563749" comment="libopenssl-devel-0.9.8j-0.80.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36976" version="1" class="patch">
	<metadata>
		<title>Security update for osc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="901643" ref_url="https://bugzilla.suse.com/901643" source="BUGZILLA"/>
		<reference ref_id="936939" ref_url="https://bugzilla.suse.com/936939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0778" ref_url="https://www.suse.com/security/cve/CVE-2015-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001529.html" source="SUSE-SU"/>
		<description>
This update provides osc 0.152.0 with various fixes and improvements.

This security issue was fixed:

- CVE-2015-0778: Shell command injection via crafted _service files. (bsc#901643)

For a comprehensive list of changes, please refer to the package's change log.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/901643">SUSE bug 901643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936939">SUSE bug 936939</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0778/">CVE-2015-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563750" comment="osc-0.152.0-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36977" version="1" class="patch">
	<metadata>
		<title>Security update for pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="848417" ref_url="https://bugzilla.suse.com/848417" source="BUGZILLA"/>
		<reference ref_id="870433" ref_url="https://bugzilla.suse.com/870433" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>

This update changes the broken default behavior of pam_pwhistory to not 
enforce checks when the root user requests password changes. In order to 
enforce pwhistory checks on the root user, the 'enforce_for_root' parameter 
needs to be set for the pam_pwhistory.so module.

This pam update fixes the following security and non-security issues:

    * bnc#870433: Fixed pam_timestamp path injection problem
      (CVE-2014-2583)
    * bnc#848417: Fixed pam_pwhistory root password enforcement when
      resetting non-root user's password

Security Issue references:

    * CVE-2014-2583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/848417">SUSE bug 848417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563751" comment="pam-devel-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563752" comment="pam-devel-32bit-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36978" version="1" class="patch">
	<metadata>
		<title>Security update for perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="838333" ref_url="https://bugzilla.suse.com/838333" source="BUGZILLA"/>
		<reference ref_id="896715" ref_url="https://bugzilla.suse.com/896715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>

This update fixes a memory leak and an infinite recursion in Data::Dumper. 
(CVE-2014-4330)

Security Issues:

    * CVE-2014-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/838333">SUSE bug 838333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563753" comment="perl-base-32bit-5.10.0-64.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36979" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001558.html" source="SUSE-SU"/>
		<description>
PHP was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-5589: PHP could be crashed when processing an invalid file with the 'phar' extension with a segfault in Phar::convertToData, leading to Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due to a buffer overlow in phar_fix_filepath (bsc#938719)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563754" comment="php53-devel-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563755" comment="php53-imap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563756" comment="php53-posix-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563757" comment="php53-readline-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563758" comment="php53-sockets-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563759" comment="php53-sqlite-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563760" comment="php53-tidy-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36980" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942294" ref_url="https://bugzilla.suse.com/942294" source="BUGZILLA"/>
		<reference ref_id="942295" ref_url="https://bugzilla.suse.com/942295" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00022.html" source="SUSE-SU"/>
		<description>

This update of PHP5 brings several security fixes.

Security fixes:
* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]

It also includes a bugfix for the odbc module:
* compare with SQL_NULL_DATA correctly [bnc#935074]
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563761" comment="php53-devel-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563762" comment="php53-imap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563763" comment="php53-posix-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563764" comment="php53-readline-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563765" comment="php53-sockets-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563766" comment="php53-sqlite-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563767" comment="php53-tidy-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36981" version="1" class="patch">
	<metadata>
		<title>Security update for popt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>

This rpm update fixes the following security and non security issues.

    * bnc#908128: check for bad invalid name sizes (CVE-2014-8118)
    * bnc#906803: create files with mode 0 (CVE-2013-6435)
    * bnc#892431: honor --noglob in install mode

Security Issues:

    * CVE-2014-8118
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118&gt;
    * CVE-2013-6435
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563768" comment="popt-devel-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563769" comment="popt-devel-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563771" comment="rpm-devel-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563772" comment="rpm-devel-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36982" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563774" comment="postgresql94-devel-9.4.5-0.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36983" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563775" comment="postgresql91-devel-9.1.15-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36984" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563776" comment="postgresql91-devel-9.1.18-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36985" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563777" comment="postgresql91-devel-9.1.19-0.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36986" version="1" class="patch">
	<metadata>
		<title>Security update for ppp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="891489" ref_url="https://bugzilla.suse.com/891489" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>

This ppp update fixes a potential security issue that an unprivileged 
attacker could access privileged options:

    * integer overflow in option parsing (CVE-2014-3158, bnc#891489)

Security Issues:

    * CVE-2014-3158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-26"/>
	<updated date="2014-08-26"/>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563778" comment="ppp-devel-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36987" version="1" class="patch">
	<metadata>
		<title>Security update for pwlib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="809917" ref_url="https://bugzilla.suse.com/809917" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1864" ref_url="https://www.suse.com/security/cve/CVE-2013-1864/" source="CVE"/>
		<description>

This update fixes a XML DoS vulnerability in pwlib. CVE-2013-1864 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-1864
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1864&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/809917">SUSE bug 809917</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1864/">CVE-2013-1864</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563779" comment="pwlib-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563780" comment="pwlib-devel-1.10.10-120.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36988" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563122" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563123" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563124" comment="python-devel-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563125" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563126" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36989" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python was updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 has been disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563781" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563782" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563783" comment="python-devel-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563786" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563787" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563788" comment="python-tk-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36990" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563789" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563790" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563791" comment="python-devel-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563794" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563795" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563796" comment="python-tk-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36991" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563797" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563798" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563799" comment="python-devel-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563802" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563803" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563804" comment="python-tk-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36992" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The 'urlparse' module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563805" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563806" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563807" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563810" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563811" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563812" comment="python-tk-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36993" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="818100" ref_url="https://bugzilla.suse.com/818100" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2037" ref_url="https://www.suse.com/security/cve/CVE-2013-2037/" source="CVE"/>
		<description>

This patch fixes a SSL certificate verification issue in python-httplib2.

Security Issue reference:

    * CVE-2013-2037
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2037&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-29"/>
	<updated date="2013-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/818100">SUSE bug 818100</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2037/">CVE-2013-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563128" comment="python-httplib2-0.7.4-0.7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36994" version="1" class="patch">
	<metadata>
		<title>Security update for python-imaging</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="863541" ref_url="https://bugzilla.suse.com/863541" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>

This python-imaging update fixes the following two security issues:

    * bnc#863541: Fixed insecure temporary file creation and handling
      (CVE-2014-1932, CVE-2014-1933)

Security Issue references:

    * CVE-2014-1932
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932&gt;
    * CVE-2014-1933
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-23"/>
	<updated date="2014-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563813" comment="python-imaging-1.1.6-168.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563814" comment="python-imaging-sane-1.1.6-168.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36995" version="1" class="patch">
	<metadata>
		<title>Security update for python-logilab-common</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="861822" ref_url="https://bugzilla.suse.com/861822" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1838" ref_url="https://www.suse.com/security/cve/CVE-2014-1838/" source="CVE"/>
		<reference ref_id="CVE-2014-1839" ref_url="https://www.suse.com/security/cve/CVE-2014-1839/" source="CVE"/>
		<description>

With this update multiple temporary file vulnerabilities have been fixed 
(CVE-2014-1838).

Security Issue references:

    * CVE-2014-1838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1838&gt;
    * CVE-2014-1839
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1839&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-18"/>
	<updated date="2014-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/861822">SUSE bug 861822</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1838/">CVE-2014-1838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1839/">CVE-2014-1839</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563815" comment="python-logilab-common-0.56.2-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36996" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="877258" ref_url="https://bugzilla.suse.com/877258" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>

This security update for python-lxml fixes a input sanitization flaw in 
clean_html. (CVE-2014-3146)

Security Issues:

    * CVE-2014-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-01"/>
	<updated date="2014-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563817" comment="python-lxml-doc-2.3.6-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36997" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="843759" ref_url="https://bugzilla.suse.com/843759" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1633" ref_url="https://www.suse.com/security/cve/CVE-2013-1633/" source="CVE"/>
		<description>

python-setuptools so far used only HTTP to retrieve packages, which could 
have lead to man in the middle attacks on newly installed python code.

This update adjusts it to use HTTPS, guaranteeing better connection 
integrity.

Security Issue reference:

    * CVE-2013-1633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1633&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-09"/>
	<updated date="2014-04-09"/>
	<bugzilla href="https://bugzilla.suse.com/843759">SUSE bug 843759</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1633/">CVE-2013-1633</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563818" comment="python-setuptools-0.6c8-10.19.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36998" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
		<description>
python-setuptools was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2013-7440: Non-RFC6125-compliant host name matching was incorrect (bsc#930189)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563819" comment="python-setuptools-0.6c11-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36999" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets could have caused the
      routing table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563130" comment="quagga-0.99.15-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563131" comment="quagga-devel-0.99.15-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37000" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-2_3 and rubygem-activesupport-2_3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864873" ref_url="https://bugzilla.suse.com/864873" source="BUGZILLA"/>
		<description>

Various Ruby gems were released where the unpacked tree was patched for the 
current security issues, but the included gem file (gem archive) was not 
adjusted.

This update rolls the current updates to also contain the fixes in the .gem 
files.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/864873">SUSE bug 864873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563820" comment="rubygem-activerecord-2_3-2.3.17-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563821" comment="rubygem-activesupport-2_3-2.3.17-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37001" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864873" ref_url="https://bugzilla.suse.com/864873" source="BUGZILLA"/>
		<description>

Various ruby gems were released with the previous update where the unpacked 
tree was patched for the current security issues, but the included gem file 
(gem archive) was not adjusted.

This update rolls the current updates to also contain the fixes in the .gem 
files (bnc#864873).

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/864873">SUSE bug 864873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563822" comment="rubygem-activesupport-3_2-3.2.12-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37002" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="881284" ref_url="https://bugzilla.suse.com/881284" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>

sendmail has been updated to fix the following security issue:

    * Not properly closing file descriptors before executing programs
      (CVE-2014-3956).

Security Issues:

    * CVE-2014-3956
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/881284">SUSE bug 881284</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563823" comment="sendmail-8.14.3-50.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563824" comment="sendmail-devel-8.14.3-50.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37003" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<description>

This Ruby update fixes the following security issue:

    * bnc#808137: Fixed entity expansion DoS vulnerability in REXML
      (CVE-2013-1821).

Security Issue reference:

    * CVE-2013-1821
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563825" comment="ruby-devel-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563827" comment="ruby-doc-ri-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563828" comment="ruby-examples-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563829" comment="ruby-test-suite-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37004" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-2_1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="853632" ref_url="https://bugzilla.suse.com/853632" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6415" ref_url="https://www.suse.com/security/cve/CVE-2013-6415/" source="CVE"/>
		<description>

This update fixes the following security issue with rubygem-actionpack:

    * bnc#853632: number_to_currency XSS (CVE-2013-6415)

Security Issue reference:

    * CVE-2013-6415
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-12"/>
	<updated date="2013-12-12"/>
	<bugzilla href="https://bugzilla.suse.com/853632">SUSE bug 853632</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6415/">CVE-2013-6415</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563147" comment="rubygem-actionpack-2_1-2.1.2-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37005" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-2_3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864433" ref_url="https://bugzilla.suse.com/864433" source="BUGZILLA"/>
		<reference ref_id="864873" ref_url="https://bugzilla.suse.com/864873" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0081" ref_url="https://www.suse.com/security/cve/CVE-2014-0081/" source="CVE"/>
		<description>

Rubygem Actionpack was updated to fix a cross-site scripting vulnerability:

    * CVE-2014-0081: XSS Vulnerability in number_to_currency,
      number_to_percentage and number_to_human.

Security Issue reference:

    * CVE-2014-0081
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0081&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/864433">SUSE bug 864433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864873">SUSE bug 864873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0081/">CVE-2014-0081</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563831" comment="rubygem-actionpack-2_3-2.3.17-0.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37006" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="846239" ref_url="https://bugzilla.suse.com/846239" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4389" ref_url="https://www.suse.com/security/cve/CVE-2013-4389/" source="CVE"/>
		<description>

The Rubygem ActiveSupport received a security fix:

CVE-2013-4389: A possible DoS vulnerability in the log subscriber component 
was fixed.

Security Issue reference:

    * CVE-2013-4389
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/846239">SUSE bug 846239</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4389/">CVE-2013-4389</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563151" comment="rubygem-activesupport-3_2-3.2.12-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37007" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="934800" ref_url="https://bugzilla.suse.com/934800" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3227" ref_url="https://www.suse.com/security/cve/CVE-2015-3227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001787.html" source="SUSE-SU"/>
		<description>
rubygem-activesupport-3_2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-3227: Possible Denial of Service attack in Active Support (bsc#934800).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934800">SUSE bug 934800</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3227/">CVE-2015-3227</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563832" comment="rubygem-activesupport-3_2-3.2.12-0.14.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37008" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="963329" ref_url="https://bugzilla.suse.com/963329" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7576" ref_url="https://www.suse.com/security/cve/CVE-2015-7576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001906.html" source="SUSE-SU"/>
		<description>

This update for rubygem-activesupport-3_2 fixes the following issues:

- CVE-2015-7576: Timing attack vulnerability in basic authentication in Action Controller (bsc#963329)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963329">SUSE bug 963329</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7576/">CVE-2015-7576</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563833" comment="rubygem-activesupport-3_2-3.2.12-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37009" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-bundler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="898205" ref_url="https://bugzilla.suse.com/898205" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0334" ref_url="https://www.suse.com/security/cve/CVE-2013-0334/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001365.html" source="SUSE-SU"/>
		<description>

The Rubygem Bundler was updated to 1.7.0.

Bundler 1.7 is a security-only release to address CVE-2013-0334, a 
vulnerability where a gem might be installed from an unintended source 
server, particularly while using both rubygems.org and gems.github.com.

Upstream changes entry with more explanations:

Any Gemfile with multiple top-level source lines cannot reliably control 
the gem server that a particular gem is fetched from. As a result, Bundler 
might install the wrong gem if more than one source provides a gem with the 
same name.

This is especially possible in the case of Github's legacy gem server, 
hosted at gems.github.com. An attacker might create a malicious gem on 
Rubygems.org with the same name as a commonly-used Github gem. From that 
point forward, running bundle install might result in the malicious gem 
being used instead of the expected gem.

To mitigate this, the Bundler and Rubygems.org teams worked together to 
copy almost every gem hosted on gems.github.com to rubygems.org, reducing 
the number of gems that can be used for such an attack.

Resolution:

To resolve this issue, upgrade to Bundler 1.7 by running gem install 
bundler. The next time you run bundle install for any Gemfile that contains 
multiple sources, each gem available from multiple sources will print a 
warning.

For every warning printed, edit the Gemfile to either specify a :source 
option for that gem, or move the gem line into a block that is passed to a 
source method call.

For detailed information about the changes to how sources are handled in 
Bundler version 1.7, see the release announcement.

Security Issues:

    * CVE-2013-0334
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0334&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-11"/>
	<updated date="2015-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/898205">SUSE bug 898205</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0334/">CVE-2013-0334</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563834" comment="rubygem-bundler-1.7.0-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37010" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-i18n-0_6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="854166" ref_url="https://bugzilla.suse.com/854166" source="BUGZILLA"/>
		<reference ref_id="855139" ref_url="https://bugzilla.suse.com/855139" source="BUGZILLA"/>
		<reference ref_id="864873" ref_url="https://bugzilla.suse.com/864873" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4492" ref_url="https://www.suse.com/security/cve/CVE-2013-4492/" source="CVE"/>
		<description>

rubygem-i18-0_6 was updated to fix a security issue:

    * Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n
      gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary
      web script or HTML via a crafted I18n::MissingTranslationData.new
      call.

Additionally the package requires ruby directly now, and also applies the 
security patch to the bundled .gem file.

Security Issues references:

    * CVE-2013-4492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4492&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-25"/>
	<updated date="2014-02-25"/>
	<bugzilla href="https://bugzilla.suse.com/854166">SUSE bug 854166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855139">SUSE bug 855139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864873">SUSE bug 864873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4492/">CVE-2013-4492</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563835" comment="rubygem-i18n-0_6-0.6.0-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37011" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-mail-2_3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="864873" ref_url="https://bugzilla.suse.com/864873" source="BUGZILLA"/>
		<description>

Various Ruby gems were released where the unpacked tree was patched for the 
current security issues, but the included gem file (gem archive) was not 
adjusted.

This update rolls the current updates to also contain the fixes in the .gem 
files. (bnc#864873)

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-27"/>
	<updated date="2014-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/864873">SUSE bug 864873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563836" comment="rubygem-mail-2_3-2.3.0-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37012" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="934797" ref_url="https://bugzilla.suse.com/934797" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001658.html" source="SUSE-SU"/>
		<description>
rubygem-rack was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-3225: Crafted requests could have caused a SystemStackError leading to Denial of Service (bsc#934797).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-01"/>
	<updated date="2015-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934797">SUSE bug 934797</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563837" comment="rubygem-rack-1.1.6-0.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37013" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack-1_4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="934797" ref_url="https://bugzilla.suse.com/934797" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001584.html" source="SUSE-SU"/>
		<description>
rubygem-rack-1_4 was updated to fix one security issue.

This security issue was fixed:

- CVE-2015-3225: Crafted requests could have caused a SystemStackError leading to Denial of Service. (bsc#934797)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-04"/>
	<updated date="2015-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934797">SUSE bug 934797</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563838" comment="rubygem-rack-1_4-1.4.5-0.7.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37014" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack-ssl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="869162" ref_url="https://bugzilla.suse.com/869162" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2538" ref_url="https://www.suse.com/security/cve/CVE-2014-2538/" source="CVE"/>
		<description>

This update for rubygem-rack-ssl fixes a cross-site scripting (XSS) 
vulnerability in error page.

Security Issue reference:

    * CVE-2014-2538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2538&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-04"/>
	<updated date="2014-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/869162">SUSE bug 869162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2538/">CVE-2014-2538</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563839" comment="rubygem-rack-ssl-1.3.2-0.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37015" version="1" class="patch">
	<metadata>
		<title>Security update for rxvt-unicode</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="876101" ref_url="https://bugzilla.suse.com/876101" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3121" ref_url="https://www.suse.com/security/cve/CVE-2014-3121/" source="CVE"/>
		<description>

rxvt-unicode was updated to ensure that window property values can not be 
queried in secure mode. (CVE-2014-3121)

Security Issue reference:

    * CVE-2014-3121
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-20"/>
	<updated date="2014-06-20"/>
	<bugzilla href="https://bugzilla.suse.com/876101">SUSE bug 876101</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3121/">CVE-2014-3121</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563840" comment="rxvt-unicode-9.05-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37016" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563841" comment="libldb-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563842" comment="libnetapi-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563843" comment="libnetapi0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563844" comment="libsmbclient-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563845" comment="libsmbsharemodes-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563846" comment="libsmbsharemodes0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563847" comment="libtalloc-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563848" comment="libtdb-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563849" comment="libtevent-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563850" comment="libwbclient-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563851" comment="samba-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563852" comment="samba-test-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37017" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="899558" ref_url="https://bugzilla.suse.com/899558" source="BUGZILLA"/>
		<reference ref_id="913001" ref_url="https://bugzilla.suse.com/913001" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<description>

Samba has been updated to fix one security issue:

    * CVE-2015-0240: Don't call talloc_free on an uninitialized pointer
      (bnc#917376).

Additionally, these non-security issues have been fixed:

    * Realign the winbind request structure following require_membership_of
      field expansion (bnc#913001).
    * Reuse connections derived from DFS referrals (bso#10123,
      fate#316512).
    * Set domain/workgroup based on authentication callback value
      (bso#11059).
    * Fix spoolss error response marshalling (bso#10984).
    * Fix spoolss EnumJobs and GetJob responses (bso#10905, bnc#898031).
    * Fix handling of bad EnumJobs levels (bso#10898).
    * Fix small memory-leak in the background print process; (bnc#899558).
    * Prune idle or hung connections older than 'winbind request timeout'
      (bso#3204, bnc#872912).

Security Issues:

    * CVE-2015-0240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-17"/>
	<updated date="2015-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899558">SUSE bug 899558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913001">SUSE bug 913001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563853" comment="libldb-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563854" comment="libnetapi-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563855" comment="libnetapi0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563856" comment="libsmbclient-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563857" comment="libsmbsharemodes-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563858" comment="libsmbsharemodes0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563859" comment="libtalloc-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563860" comment="libtdb-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563861" comment="libtevent-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563862" comment="libwbclient-devel-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563863" comment="samba-devel-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37018" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563864" comment="libldb-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563865" comment="libnetapi-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563866" comment="libnetapi0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563867" comment="libsmbclient-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563868" comment="libsmbsharemodes-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563869" comment="libsmbsharemodes0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563870" comment="libtalloc-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563871" comment="libtdb-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563872" comment="libtevent-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563873" comment="libwbclient-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563874" comment="samba-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563875" comment="samba-test-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37019" version="1" class="patch">
	<metadata>
		<title>Security update for shim</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="813448" ref_url="https://bugzilla.suse.com/813448" source="BUGZILLA"/>
		<reference ref_id="863205" ref_url="https://bugzilla.suse.com/863205" source="BUGZILLA"/>
		<reference ref_id="866690" ref_url="https://bugzilla.suse.com/866690" source="BUGZILLA"/>
		<reference ref_id="875385" ref_url="https://bugzilla.suse.com/875385" source="BUGZILLA"/>
		<reference ref_id="889332" ref_url="https://bugzilla.suse.com/889332" source="BUGZILLA"/>
		<reference ref_id="889765" ref_url="https://bugzilla.suse.com/889765" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>

shim has been updated to fix three security issues:

    * OOB read access when parsing DHCPv6 packets (remote DoS)
      (CVE-2014-3675).
    * Heap overflow when parsing IPv6 addresses provided by tftp:// DHCPv6
      boot option (RCE) (CVE-2014-3676).
    * Memory corruption when processing user provided MOK lists
      (CVE-2014-3677).

Security Issues:

    * CVE-2014-3675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675&gt;
    * CVE-2014-3676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676&gt;
    * CVE-2014-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/813448">SUSE bug 813448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863205">SUSE bug 863205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866690">SUSE bug 866690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875385">SUSE bug 875385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889765">SUSE bug 889765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37020" version="1" class="patch">
	<metadata>
		<title>Security update for struts</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="875455" ref_url="https://bugzilla.suse.com/875455" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001388.html" source="SUSE-SU"/>
		<description>

Apache Struts was updated to fix a security issue:

    * CVE-2014-0114: The ActionForm object in Apache Struts 1.x through
      1.3.10 allows remote attackers to 'manipulate' the ClassLoader and
      execute arbitrary code via the class parameter, which is passed to
      the getClass method.

Security Issue reference:

    * CVE-2014-0114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-20"/>
	<updated date="2014-06-20"/>
	<bugzilla href="https://bugzilla.suse.com/875455">SUSE bug 875455</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563877" comment="struts-1.2.9-162.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563878" comment="struts-javadoc-1.2.9-162.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563879" comment="struts-manual-1.2.9-162.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37021" version="1" class="patch">
	<metadata>
		<title>Security update for subversion</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="889849" ref_url="https://bugzilla.suse.com/889849" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3528" ref_url="https://www.suse.com/security/cve/CVE-2014-3528/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001347.html" source="SUSE-SU"/>
		<description>

subversion has been updated to fix one security problem:

    * bnc#889849: Reveal authentication information through an md5
      collision attack on authentication realm (CVE-2014-3528)

Security Issues:

    * CVE-2014-3528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/889849">SUSE bug 889849</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3528/">CVE-2014-3528</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563880" comment="subversion-1.6.17-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563881" comment="subversion-devel-1.6.17-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563882" comment="subversion-perl-1.6.17-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563883" comment="subversion-python-1.6.17-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563884" comment="subversion-server-1.6.17-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563885" comment="subversion-tools-1.6.17-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37022" version="1" class="patch">
	<metadata>
		<title>Security update for tidy (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="933588" ref_url="https://bugzilla.suse.com/933588" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
		<description>

This update fixes two heap-based buffer overflows in tidy/libtidy. These vulnerabilities
could allow remote attackers to cause a denial of service (crash) via vectors involving
a command character in an href. (CVE-2015-5522, CVE-2015-5523)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-26"/>
	<updated date="2015-08-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563886" comment="libtidy-1.0-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563887" comment="libtidy-devel-1.0-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563888" comment="tidy-1.0-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37023" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563889" comment="libtiff-devel-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563890" comment="libtiff-devel-32bit-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37024" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="899303" ref_url="https://bugzilla.suse.com/899303" source="BUGZILLA"/>
		<reference ref_id="905245" ref_url="https://bugzilla.suse.com/905245" source="BUGZILLA"/>
		<reference ref_id="905246" ref_url="https://bugzilla.suse.com/905246" source="BUGZILLA"/>
		<reference ref_id="905247" ref_url="https://bugzilla.suse.com/905247" source="BUGZILLA"/>
		<reference ref_id="905248" ref_url="https://bugzilla.suse.com/905248" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<description>

wireshark has been updated to version 1.10.11 to fix five security issues.

These security issues have been fixed:

    * SigComp UDVM buffer overflow (CVE-2014-8710).
    * AMQP dissector crash (CVE-2014-8711).
    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
    * TN5250 infinite loops (CVE-2014-8714).

This non-security issue has been fixed:

    * enable zlib (bnc#899303).

Further bug fixes and updated protocol support as listed in:

https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html&gt;

Security Issues:

    * CVE-2014-8711
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711&gt;
    * CVE-2014-8710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710&gt;
    * CVE-2014-8714
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714&gt;
    * CVE-2014-8712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712&gt;
    * CVE-2014-8713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/899303">SUSE bug 899303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563892" comment="wireshark-devel-1.10.11-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37025" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563894" comment="wireshark-devel-1.12.7-0.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37026" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563896" comment="wireshark-devel-1.12.9-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37027" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563897" comment="xalan-j2-demo-2.7.0-217.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563898" comment="xalan-j2-javadoc-2.7.0-217.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563899" comment="xalan-j2-manual-2.7.0-217.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37028" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="910441" ref_url="https://bugzilla.suse.com/910441" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix two security issues and a bug:

    * CVE-2015-3456: A buffer overflow in the floppy drive emulation, which
      could be used to carry out denial of service attacks or potential
      code execution against the host. This vulnerability is also known as
      VENOM.
    * CVE-2015-3340: Xen did not initialize certain fields, which allowed
      certain remote service domains to obtain sensitive information from
      memory via a (1) XEN_DOMCTL_gettscinfo or (2)
      XEN_SYSCTL_getdomaininfolist request.
    * An exception in setCPUAffinity when restoring guests. (bsc#910441)

Security Issues:

    * CVE-2015-3456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456&gt;
    * CVE-2015-3340
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-13"/>
	<updated date="2015-05-13"/>
	<bugzilla href="https://bugzilla.suse.com/910441">SUSE bug 910441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563900" comment="xen-devel-4.2.5_06-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37029" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="866902" ref_url="https://bugzilla.suse.com/866902" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="896023" ref_url="https://bugzilla.suse.com/896023" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

Xen has been updated to version 4.2.5 with additional patches to fix six 
security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).

These non-security issues have been fixed:

    * Xen save/restore of HVM guests cuts off disk and networking
      (bnc#866902).
    * Windows 2012 R2 fails to boot up with greater than 60 vcpus
      (bnc#882089).
    * Increase limit domUloader to 32MB (bnc#901317).
    * Adjust xentop column layout (bnc#896023).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-27"/>
	<updated date="2014-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/866902">SUSE bug 866902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896023">SUSE bug 896023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563901" comment="xen-devel-4.2.5_02-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37030" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<description>

xen was updated to fix the following security issues:

* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140)
* CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139)
* CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127)
* CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137)
* CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136)
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563902" comment="xen-devel-4.2.5_12-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37031" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="941074" ref_url="https://bugzilla.suse.com/941074" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<description>
xen was updated to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bsc#941074: Device 51728 could not be connected. Hotplug scripts not working
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941074">SUSE bug 941074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563903" comment="xen-devel-4.2.5_14-18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37032" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="808085" ref_url="https://bugzilla.suse.com/808085" source="BUGZILLA"/>
		<reference ref_id="808269" ref_url="https://bugzilla.suse.com/808269" source="BUGZILLA"/>
		<reference ref_id="817210" ref_url="https://bugzilla.suse.com/817210" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<description>

The Xen hypervisor and toolset has been updated to 4.2.2_06 to fix various 
bugs and security issues:

The following security issues have been addressed:

    * CVE-2013-2194: Various integer overflows in the ELF loader were
      fixed. (XSA-55)
    * CVE-2013-2195: Various pointer dereferences issues in the ELF loader
      were fixed. (XSA-55)
    * CVE-2013-2196: Various other problems in the ELF loader were fixed.
      (XSA-55)
    * CVE-2013-2078: A Hypervisor crash due to missing exception recovery
      on XSETBV was fixed. (XSA-54)
    * CVE-2013-2077: A Hypervisor crash due to missing exception recovery
      on XRSTOR was fixed. (XSA-53)
    * CVE-2013-2211: libxl allowed guest write access to sensitive console
      related xenstore keys. (XSA-57)
    * CVE-2013-2076: An information leak on XSAVE/XRSTOR capable AMD CPUs
      (XSA-52) was fixed, where parts of this state could leak to other
      VMs.

Also the following bugs have been fixed:

    * performance issues in mirror lvm (bnc#801663)
    * aacraid driver panics mapping INT A when booting kernel-xen
      (bnc#808085)
    * Fully Virtualized Windows VM install failed on Ivy Bridge platforms
      with Xen kernel (bnc#808269)
    * Did not boot with i915 graphics controller with VT-d enabled
      (bnc#817210)

Security Issue references:

    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-15"/>
	<updated date="2013-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808085">SUSE bug 808085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808269">SUSE bug 808269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817210">SUSE bug 817210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563904" comment="xen-devel-4.2.2_06-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37033" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="817799" ref_url="https://bugzilla.suse.com/817799" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="835896" ref_url="https://bugzilla.suse.com/835896" source="BUGZILLA"/>
		<reference ref_id="836239" ref_url="https://bugzilla.suse.com/836239" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="842512" ref_url="https://bugzilla.suse.com/842512" source="BUGZILLA"/>
		<reference ref_id="842513" ref_url="https://bugzilla.suse.com/842513" source="BUGZILLA"/>
		<reference ref_id="842514" ref_url="https://bugzilla.suse.com/842514" source="BUGZILLA"/>
		<reference ref_id="842515" ref_url="https://bugzilla.suse.com/842515" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.2.3 c/s 26170, fixing various bugs and 
security issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-4369: XSA-68: Fixed possible null dereference when parsing
      vif ratelimiting info
    * CVE-2013-4370: XSA-69: Fixed misplaced free in ocaml
      xc_vcpu_getaffinity stub
    * CVE-2013-4371: XSA-70: Fixed use-after-free in libxl_list_cpupool
      under memory pressure
    * CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-1432: XSA-58: Page reference counting error due to
      XSA-45/CVE-2013-1918 fixes.

Various bugs have also been fixed:

    * Boot failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage, xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform with xen environment, xen hypervisor
      will panic on multiple blades nPar. (bnc#839600)
    * vcpus not started after upgrading Dom0 from SLES 11 SP2 to SP3
      (bnc#835896)
    * SLES 11 SP3 Xen security patch does not automatically update UEFI
      boot binary (bnc#836239)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * SLES 9 SP4 guest fails to start after upgrading to SLES 11 SP3
      (bnc#817799)
    * Various upstream fixes have been included.

Security Issues:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4369
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369&gt;
    * CVE-2013-4370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370&gt;
    * CVE-2013-4371
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/817799">SUSE bug 817799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835896">SUSE bug 835896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836239">SUSE bug 836239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563905" comment="xen-devel-4.2.3_02-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37034" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849665" ref_url="https://bugzilla.suse.com/849665" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="851386" ref_url="https://bugzilla.suse.com/851386" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<description>

The Xen hypervisor and tool-suite have been updated to fix security issues 
and bugs:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.
    * CVE-2013-4553: XSA-74: A lock order reversal between page_alloc_lock
      and mm_rwlock could lead to deadlocks.
    * CVE-2013-4554: XSA-76: Hypercalls exposed to privilege rings 1 and 2
      of HVM guests which might lead to Hypervisor escalation under
      specific circumstances.
    * CVE-2013-6375: XSA-78: Insufficient TLB flushing in VT-d (iommu) code
      could lead to access of memory that was revoked.
    * CVE-2013-4551: XSA-75: A host crash due to guest VMX instruction
      execution was fixed.

Non-security bugs have also been fixed:

    * bnc#840997: It is possible to start a VM twice on the same node.
    * bnc#842417: In HP's UEFI x86_64 platform and SLES 11-SP3, dom0 will
      could lock-up on multiple blades nPar.
    * bnc#848014: Xen Hypervisor panics on 8-blades nPar with 46-bit memory
      addressing.
    * bnc#846849: Soft lock-up with PCI pass-through and many VCPUs.
    * bnc#833483: Boot Failure with Xen kernel in UEFI mode with error 'No
      memory for trampoline'.
    * Increase the maximum supported CPUs in the Hypervisor to 512.

Security Issues:

    * CVE-2013-1922
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922&gt;
    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4551
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-27"/>
	<updated date="2013-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851386">SUSE bug 851386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563906" comment="xen-devel-4.2.3_08-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37035" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="853048" ref_url="https://bugzilla.suse.com/853048" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="858311" ref_url="https://bugzilla.suse.com/858311" source="BUGZILLA"/>
		<reference ref_id="860092" ref_url="https://bugzilla.suse.com/860092" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860165" ref_url="https://bugzilla.suse.com/860165" source="BUGZILLA"/>
		<reference ref_id="860300" ref_url="https://bugzilla.suse.com/860300" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="863297" ref_url="https://bugzilla.suse.com/863297" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1642" ref_url="https://www.suse.com/security/cve/CVE-2014-1642/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1895" ref_url="https://www.suse.com/security/cve/CVE-2014-1895/" source="CVE"/>
		<reference ref_id="CVE-2014-1896" ref_url="https://www.suse.com/security/cve/CVE-2014-1896/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 3 Xen hypervisor and 
toolset has been updated to 4.2.4 to fix various bugs and security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when using Intel VT-d and
      a PCI device has been assigned, does not clear the flag that
      suppresses IOMMU TLB flushes when unspecified errors occur, which
      causes the TLB entries to not be flushed and allows local guest
      administrators to cause a denial of service (host crash) or gain
      privileges via unspecified vectors. (bnc#853048)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and 4.3.x, when
      using device passthrough and configured to support a large number of
      CPUs, frees certain memory that may still be intended for use, which
      allows local guest administrators to cause a denial of service
      (memory corruption and hypervisor crash) and possibly execute
      arbitrary code via vectors related to an out-of-memory error that
      triggers a (1) use-after-free or (2) double free. (bnc#860092)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-85: CVE-2014-1895: The FLASK_AVC_CACHESTAT hypercall, which
      provides access to per-cpu statistics on the Flask security policy,
      incorrectly validates the CPU for which statistics are being
      requested. (bnc#860165)

    * 

      XSA-86: CVE-2014-1896: libvchan (a library for inter-domain
      communication) does not correctly handle unusual or malicious
      contents in the xenstore ring. A malicious guest can exploit this to
      cause a libvchan-using facility to read or write past the end of the
      ring. (bnc#860300)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

Also the following non-security bugs have been fixed:

    * Fixed boot problems with Xen kernel. '(XEN) setup 0000:00:18.0 for d0
      failed (-19)' (bnc#858311)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * Fixed Xen hypervisor panic in HP's UEFI x86_64 platform and with xen
      environment, in booting stage. (bnc#833251)
    * xend/pvscsi: recognize also SCSI CDROM devices (bnc#863297)
    * pygrub: Support (/dev/xvda) style disk specifications

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-6400
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895&gt;
    * CVE-2014-1896
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-27"/>
	<updated date="2014-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858311">SUSE bug 858311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863297">SUSE bug 863297</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1642/">CVE-2014-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1895/">CVE-2014-1895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1896/">CVE-2014-1896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563907" comment="xen-devel-4.2.4_02-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37036" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="798770" ref_url="https://bugzilla.suse.com/798770" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842006" ref_url="https://bugzilla.suse.com/842006" source="BUGZILLA"/>
		<reference ref_id="858178" ref_url="https://bugzilla.suse.com/858178" source="BUGZILLA"/>
		<reference ref_id="862608" ref_url="https://bugzilla.suse.com/862608" source="BUGZILLA"/>
		<reference ref_id="864801" ref_url="https://bugzilla.suse.com/864801" source="BUGZILLA"/>
		<reference ref_id="865682" ref_url="https://bugzilla.suse.com/865682" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="878841" ref_url="https://bugzilla.suse.com/878841" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="881900" ref_url="https://bugzilla.suse.com/881900" source="BUGZILLA"/>
		<reference ref_id="882092" ref_url="https://bugzilla.suse.com/882092" source="BUGZILLA"/>
		<reference ref_id="891539" ref_url="https://bugzilla.suse.com/891539" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to fix 
various bugs and security issues.

The following security issues have been fixed:

    * XSA-108: CVE-2014-7188: Improper MSR range used for x2APIC emulation
      (bnc#897657)
    * XSA-106: CVE-2014-7156: Missing privilege level checks in x86
      emulation of software interrupts (bnc#895802)
    * XSA-105: CVE-2014-7155: Missing privilege level checks in x86 HLT,
      LGDT, LIDT, and LMSW emulation (bnc#895799)
    * XSA-104: CVE-2014-7154: Race condition in HVMOP_track_dirty_vram
      (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)
    * XSA-96: CVE-2014-3967, CVE-2014-3968: Vulnerabilities in HVM MSI
      injection (bnc#878841)
    * XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not preemptible
      (bnc#867910)
    * XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer overflow
      (bnc#842006)
    * CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load
      (bnc#864801)

The following non-security issues have been fixed:

    * xend: Fix netif convertToDeviceNumber for running domains
      (bnc#891539)
    * Installing SLES12 as a VM on SLES11 SP3 fails because of btrfs in the
      VM (bnc#882092)
    * XEN kernel panic do_device_not_available() (bnc#881900)
    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * SLES 11 SP3 vm-install should get RHEL 7 support when released
      (bnc#862608)
    * SLES 11 SP3 XEN kiso version cause softlockup on 8 blades npar(480
      cpu) (bnc#858178)
    * Local attach support for PHY backends using scripts
      local_attach_support_for_phy.patch (bnc#865682)
    * Improve multipath support for npiv devices block-npiv (bnc#798770)

Security Issues:

    * CVE-2013-4344
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344&gt;
    * CVE-2013-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-3967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967&gt;
    * CVE-2014-3968
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/798770">SUSE bug 798770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858178">SUSE bug 858178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862608">SUSE bug 862608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865682">SUSE bug 865682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881900">SUSE bug 881900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882092">SUSE bug 882092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891539">SUSE bug 891539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563908" comment="xen-devel-4.2.4_04-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37037" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919341" ref_url="https://bugzilla.suse.com/919341" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Fully virtualized guest install from network source failed with
      'cannot find guest domain' in XEN. (bsc#919341)

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919341">SUSE bug 919341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563909" comment="xen-devel-4.2.5_04-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37038" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932790" ref_url="https://bugzilla.suse.com/932790" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix seven security vulnerabilities:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bnc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bnc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bnc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bnc#931628)
    * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
      (XSA-134, bnc#932790)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bnc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bnc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563910" comment="xen-devel-4.2.5_08-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37039" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:
      
- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563911" comment="xen-devel-4.2.5_18-21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37040" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563912" comment="xfsprogs-devel-3.1.8-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37041" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563913" comment="xorg-x11-devel-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563914" comment="xorg-x11-devel-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37042" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues.

Bug 815451/821664

CVE-2013-1981 CVE-2013-1997 CVE-2013-2004

Security Issues:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563182" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563183" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37043" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563915" comment="xorg-x11-libX11-devel-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563916" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37044" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues.

Bug 815451/821665 CVE-2013-1982

Security Issues:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563917" comment="xorg-x11-libXext-devel-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563918" comment="xorg-x11-libXext-devel-32bit-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37045" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixed a integer overflow issue.

Bug 815451/821667 CVE-2013-1983

Security Issues:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563919" comment="xorg-x11-libXfixes-devel-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563920" comment="xorg-x11-libXfixes-devel-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37046" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues.

Bug 815451/821668 CVE-2013-2062

Security Issues:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563188" comment="xorg-x11-libXp-devel-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563189" comment="xorg-x11-libXp-devel-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37047" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues.

Bug 815451/821669 CVE-2013-1987

Security Issues:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563921" comment="xorg-x11-libXrender-devel-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563922" comment="xorg-x11-libXrender-devel-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37048" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues.

Bug 815451/821670 CVE-2013-2002/CVE-2013-2005

Security Issues:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563923" comment="xorg-x11-libXt-devel-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563924" comment="xorg-x11-libXt-devel-32bit-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37049" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues.

Bug 815451/821671 CVE-2013-1989/CVE-2013-2066

Security Issues:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp3</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077554" comment="SUSE Linux Enterprise Software Development Kit 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563925" comment="xorg-x11-libXv-devel-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563926" comment="xorg-x11-libXv-devel-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37050" version="1" class="patch">
	<metadata>
		<title>Security update for Botan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013209" ref_url="https://bugzilla.suse.com/1013209" source="BUGZILLA"/>
		<reference ref_id="968030" ref_url="https://bugzilla.suse.com/968030" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7827" ref_url="https://www.suse.com/security/cve/CVE-2015-7827/" source="CVE"/>
		<reference ref_id="CVE-2016-9132" ref_url="https://www.suse.com/security/cve/CVE-2016-9132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002883.html" source="SUSE-SU"/>
		<description>

This update for Botan fixes the following issues:

- CVE-2015-7827: PKCS #1 v1.5 decoding was not constant time, it could be used to 
mount a Bleichenbacher million-message attack (bsc#968030) 

- CVE-2016-9132: While decoding BER length fields, an integer overflow could occur 
leading to a denial-of-service (bsc#1013209)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013209">SUSE bug 1013209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968030">SUSE bug 968030</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7827/">CVE-2015-7827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9132/">CVE-2016-9132</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563927" comment="libbotan-devel-1.6.5-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37051" version="1" class="patch">
	<metadata>
		<title>Security update for Botan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013209" ref_url="https://bugzilla.suse.com/1013209" source="BUGZILLA"/>
		<reference ref_id="968030" ref_url="https://bugzilla.suse.com/968030" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7827" ref_url="https://www.suse.com/security/cve/CVE-2015-7827/" source="CVE"/>
		<reference ref_id="CVE-2016-9132" ref_url="https://www.suse.com/security/cve/CVE-2016-9132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002900.html" source="SUSE-SU"/>
		<description>

This update for Botan fixes the following issues:

- CVE-2015-7827: PKCS #1 v1.5 decoding was not constant time, it could be used to
  mount a Bleichenbacher million-message attack (bsc#968030)

- CVE-2016-9132: While decoding BER length fields, an integer overflow could occur
  leading to a denial-of-service (bsc#1013209)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013209">SUSE bug 1013209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968030">SUSE bug 968030</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7827/">CVE-2015-7827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9132/">CVE-2016-9132</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563928" comment="libbotan-1_6_5-1.6.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563929" comment="libbotan-devel-1.6.5-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37052" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes the following issues:

- Security update Remote Code Execution / Local File read [bsc#978061]
  CVE-2016-3714, CVE-2016-3715, CVE-2016-3717, CVE-2016-3718
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using GraphicsMagick's
  'tmp:' file specification syntax.
- CVE-2016-3717: Possible local file read by using GraphicsMagick's 
  'txt:' file specification syntax.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563930" comment="GraphicsMagick-1.2.5-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563931" comment="libGraphicsMagick2-1.2.5-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563932" comment="perl-GraphicsMagick-1.2.5-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37053" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="851064" ref_url="https://bugzilla.suse.com/851064" source="BUGZILLA"/>
		<reference ref_id="965574" ref_url="https://bugzilla.suse.com/965574" source="BUGZILLA"/>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4589" ref_url="https://www.suse.com/security/cve/CVE-2013-4589/" source="CVE"/>
		<reference ref_id="CVE-2015-8808" ref_url="https://www.suse.com/security/cve/CVE-2015-8808/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via special filenames (bnc#982178).
- CVE-2013-4589: The ExportAlphaQuantumType function in export.c in GraphicsMagick might have allowed remote attackers to cause a denial of service (crash) via vectors related to exporting the alpha of an 8-bit RGBA image (bsc#851064).
- CVE-2015-8808: Out-of-bound read in the parsing of GIF files (bnc#965574).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851064">SUSE bug 851064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965574">SUSE bug 965574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4589/">CVE-2013-4589</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8808/">CVE-2015-8808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563933" comment="GraphicsMagick-1.2.5-4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563934" comment="libGraphicsMagick2-1.2.5-4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563935" comment="perl-GraphicsMagick-1.2.5-4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37054" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="965853" ref_url="https://bugzilla.suse.com/965853" source="BUGZILLA"/>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983309" ref_url="https://bugzilla.suse.com/983309" source="BUGZILLA"/>
		<reference ref_id="983455" ref_url="https://bugzilla.suse.com/983455" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-2317" ref_url="https://www.suse.com/security/cve/CVE-2016-2317/" source="CVE"/>
		<reference ref_id="CVE-2016-2318" ref_url="https://www.suse.com/security/cve/CVE-2016-2318/" source="CVE"/>
		<reference ref_id="CVE-2016-5240" ref_url="https://www.suse.com/security/cve/CVE-2016-5240/" source="CVE"/>
		<reference ref_id="CVE-2016-5241" ref_url="https://www.suse.com/security/cve/CVE-2016-5241/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<description>
GraphicsMagick was updated to fix 37 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2014-9807: Double free in pdb coder. (bsc#983794).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2014-9805: SEGV due to a corrupted pnm file (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images (bsc#983796).
- CVE-2014-9820: Heap overflow in xpm files (bsc#984150).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9809: SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2016-5240: SVG converting issue resulting in DoS (endless loop) (bsc#983309).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2016-5241: Arithmetic exception (div by 0) in SVG conversion (bsc#983455).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2016-2317: Multiple vulnerabilities when parsing and processing SVG files (bsc#965853).
- CVE-2016-2318: Multiple vulnerabilities when parsing and processing SVG files (bsc#965853).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965853">SUSE bug 965853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983309">SUSE bug 983309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983455">SUSE bug 983455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2317/">CVE-2016-2317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2318/">CVE-2016-2318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5240/">CVE-2016-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5241/">CVE-2016-5241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563936" comment="GraphicsMagick-1.2.5-4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563937" comment="libGraphicsMagick2-1.2.5-4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563938" comment="perl-GraphicsMagick-1.2.5-4.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37055" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002206" ref_url="https://bugzilla.suse.com/1002206" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="999673" ref_url="https://bugzilla.suse.com/999673" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7446" ref_url="https://www.suse.com/security/cve/CVE-2016-7446/" source="CVE"/>
		<reference ref_id="CVE-2016-7447" ref_url="https://www.suse.com/security/cve/CVE-2016-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-7448" ref_url="https://www.suse.com/security/cve/CVE-2016-7448/" source="CVE"/>
		<reference ref_id="CVE-2016-7449" ref_url="https://www.suse.com/security/cve/CVE-2016-7449/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7529: Out-of-bound in quantum handling (bsc#1000399)
- CVE-2016-7528: Out-of-bound access in xcf file coder (bsc#1000434)
- CVE-2016-7527: Out-of-bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7519: Out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7517: Out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out-of-bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7446 CVE-2016-7447 CVE-2016-7448 CVE-2016-7449: various issues fixed in 1.3.25 (bsc#999673)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- Divide by zero in WriteTIFFImage (bsc#1002206)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002206">SUSE bug 1002206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999673">SUSE bug 999673</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7446/">CVE-2016-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7447/">CVE-2016-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7448/">CVE-2016-7448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7449/">CVE-2016-7449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563939" comment="GraphicsMagick-1.2.5-4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563940" comment="libGraphicsMagick2-1.2.5-4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563941" comment="perl-GraphicsMagick-1.2.5-4.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37056" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002415.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes the following issues:
  - Memory allocation failure in AcquireMagickMemory (CVE-2016-8862) [bsc#1007245]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563942" comment="GraphicsMagick-1.2.5-4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563943" comment="libGraphicsMagick2-1.2.5-4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563944" comment="perl-GraphicsMagick-1.2.5-4.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37057" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013640" ref_url="https://bugzilla.suse.com/1013640" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9830" ref_url="https://www.suse.com/security/cve/CVE-2016-9830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes the following issues:

* CVE-2016-9556 Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8866 Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
* CVE-2016-9830: Memory allocation failure in MagickRealloc (memory.c) (bsc#1013640).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013640">SUSE bug 1013640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9830/">CVE-2016-9830</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563945" comment="GraphicsMagick-1.2.5-4.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563946" comment="libGraphicsMagick2-1.2.5-4.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563947" comment="perl-GraphicsMagick-1.2.5-4.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37058" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes several issues.

These security issues were fixed: 

- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310).
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311).
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312).
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321).
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322).
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324).
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-20"/>
	<updated date="2017-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563948" comment="GraphicsMagick-1.2.5-4.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563949" comment="libGraphicsMagick2-1.2.5-4.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563950" comment="perl-GraphicsMagick-1.2.5-4.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37059" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027255" ref_url="https://bugzilla.suse.com/1027255" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6335" ref_url="https://www.suse.com/security/cve/CVE-2017-6335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002782.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes the following issues:

Security issue fixed:
- CVE-2017-6335: Heap out of bounds write issue when reading CMYKA TIFF files which claim to offer
  fewer samples per pixel than required (bsc#1027255).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-04"/>
	<updated date="2017-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027255">SUSE bug 1027255</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6335/">CVE-2017-6335</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563951" comment="GraphicsMagick-1.2.5-4.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563952" comment="libGraphicsMagick2-1.2.5-4.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563953" comment="perl-GraphicsMagick-1.2.5-4.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37060" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<description>

This update for GraphicsMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985).
  The previous fix for CVE-2014-9847 (bsc#984144) was incorrect and incomplete and has been refreshed.
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563954" comment="GraphicsMagick-1.2.5-4.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563955" comment="libGraphicsMagick2-1.2.5-4.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563956" comment="perl-GraphicsMagick-1.2.5-4.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37061" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="1050611" ref_url="https://bugzilla.suse.com/1050611" source="BUGZILLA"/>
		<reference ref_id="1050674" ref_url="https://bugzilla.suse.com/1050674" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-11636" ref_url="https://www.suse.com/security/cve/CVE-2017-11636/" source="CVE"/>
		<reference ref_id="CVE-2017-11643" ref_url="https://www.suse.com/security/cve/CVE-2017-11643/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

Security issues fixed:

- CVE-2017-8350: The PNG/JNG decoder recieved an incremental fix, fixing some related issues in the
  same code. (bsc#1036985)
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: The ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via a crafted file (bsc#1049072)
- CVE-2017-11643: A heap overflow in WriteCMYKImage()function in coders/cmyk.c was fixed (bsc#1050611)
- CVE-2017-11636: A heap overflow in WriteRGBImage() in coders/rgb.c was fixed (bsc#1050674)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050611">SUSE bug 1050611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050674">SUSE bug 1050674</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11636/">CVE-2017-11636</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11643/">CVE-2017-11643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563957" comment="GraphicsMagick-1.2.5-4.78.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563958" comment="libGraphicsMagick2-1.2.5-4.78.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563959" comment="perl-GraphicsMagick-1.2.5-4.78.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37062" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1054596" ref_url="https://bugzilla.suse.com/1054596" source="BUGZILLA"/>
		<reference ref_id="1054598" ref_url="https://bugzilla.suse.com/1054598" source="BUGZILLA"/>
		<reference ref_id="1055042" ref_url="https://bugzilla.suse.com/1055042" source="BUGZILLA"/>
		<reference ref_id="1055050" ref_url="https://bugzilla.suse.com/1055050" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-12936" ref_url="https://www.suse.com/security/cve/CVE-2017-12936/" source="CVE"/>
		<reference ref_id="CVE-2017-12937" ref_url="https://www.suse.com/security/cve/CVE-2017-12937/" source="CVE"/>
		<reference ref_id="CVE-2017-13063" ref_url="https://www.suse.com/security/cve/CVE-2017-13063/" source="CVE"/>
		<reference ref_id="CVE-2017-13064" ref_url="https://www.suse.com/security/cve/CVE-2017-13064/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

- CVE-2017-15033: A denial of service attack (memory leak) in ReadYUVImage in coders/yuv.c was fixed (bsc#1061873)
- CVE-2017-13063: A heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c was fixed (bsc#1055050)
- CVE-2017-13064: A heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c was fixed (bsc#1055042)
- CVE-2017-12936: The ReadWMFImage function in coders/wmf.c in GraphicsMagick had a use-after-free issue for data associated with exception reporting.  (bsc#1054598)
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an out-of-bounds read with the MNG CLIP chunk.  (bsc#1055430)
- CVE-2017-12937: The ReadSUNImage function in coders/sun.c in GraphicsMagick had a colormap heap-based buffer over-read.  (bsc#1054596)
- CVE-2017-11534: A Memory Leak in the lite_font_map() function in coders/wmf.c was fixed (bsc#1050135)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-23"/>
	<updated date="2017-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054596">SUSE bug 1054596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055042">SUSE bug 1055042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055050">SUSE bug 1055050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12936/">CVE-2017-12936</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12937/">CVE-2017-12937</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13063/">CVE-2017-13063</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13064/">CVE-2017-13064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563960" comment="GraphicsMagick-1.2.5-4.78.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563961" comment="libGraphicsMagick2-1.2.5-4.78.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563962" comment="perl-GraphicsMagick-1.2.5-4.78.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37063" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056426" ref_url="https://bugzilla.suse.com/1056426" source="BUGZILLA"/>
		<reference ref_id="1056429" ref_url="https://bugzilla.suse.com/1056429" source="BUGZILLA"/>
		<reference ref_id="1057508" ref_url="https://bugzilla.suse.com/1057508" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="1067409" ref_url="https://bugzilla.suse.com/1067409" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13776" ref_url="https://www.suse.com/security/cve/CVE-2017-13776/" source="CVE"/>
		<reference ref_id="CVE-2017-13777" ref_url="https://www.suse.com/security/cve/CVE-2017-13777/" source="CVE"/>
		<reference ref_id="CVE-2017-14165" ref_url="https://www.suse.com/security/cve/CVE-2017-14165/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c could lead to denial of service [bsc#1050632]
  * CVE-2017-14342: Memory exhaustion in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
  * CVE-2017-14341: Infinite loop in the ReadWPGImage function could lead to denial of service [bsc#1058637]
  * CVE-2017-16546: Issue in ReadWPGImage function in coders/wpg.c could lead to denial of service [bsc#1067181]
  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  validation problems could lead to denial of service [bsc#1067184]
  * CVE-2017-16669: coders/wpg.c  allows remote attackers to cause a denial of service via crafted file [bsc#1067409]
  * CVE-2017-13776: denial of service issue in ReadXBMImage() in a coders/xbm.c [bsc#1056429]
  * CVE-2017-13777: denial of service issue in ReadXBMImage() in a coders/xbm.c [bsc#1056426]
  * CVE-2017-13134: heap-based buffer over-read in the function SFWScan in coders/sfw.c could lead to denial of service via a crafted file [bsc#1055214]
  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. [bsc#1054757] 
  * CVE-2017-14165: The ReadSUNImage function in coders/sun.c has an issue where memory allocation is excessive because it depends only on a length field in a header. This may lead to remote denial of service in the MagickMalloc function in magick/memory.c. [bsc#1057508]
  * CVE-2017-12587: Large loop vulnerability in the ReadPWPImage function in coders\pwp.c. [bsc#1052450]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056426">SUSE bug 1056426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056429">SUSE bug 1056429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13776/">CVE-2017-13776</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13777/">CVE-2017-13777</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14165/">CVE-2017-14165</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563963" comment="GraphicsMagick-1.2.5-4.78.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563964" comment="libGraphicsMagick2-1.2.5-4.78.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563965" comment="perl-GraphicsMagick-1.2.5-4.78.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37064" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047054" ref_url="https://bugzilla.suse.com/1047054" source="BUGZILLA"/>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1061587" ref_url="https://bugzilla.suse.com/1061587" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="1067177" ref_url="https://bugzilla.suse.com/1067177" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10799" ref_url="https://www.suse.com/security/cve/CVE-2017-10799/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-14994" ref_url="https://www.suse.com/security/cve/CVE-2017-14994/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-16547" ref_url="https://www.suse.com/security/cve/CVE-2017-16547/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes several issues.

These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422)
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a
  crafted file (bsc#1058422)
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory
  allocation, which may have lead to remote denial of service in the
  MagickRealloc function in magick/memory.c (bsc#1056550)
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a
  denial of service (ReadPSDImage memory exhaustion) via a crafted file
  (bsc#1055063)
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460)
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU
  consumption. When a crafted PSD file, which claims a large 'length'
  field in the header but did not contain sufficient backing data, is
  provided, the loop over 'length' would consume huge CPU resources,
  since there is no EOF check inside the loop (bsc#1057723)
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050)
- CVE-2017-14733: ReadRLEImage in coders/rle.c mishandled RLE headers that
  specified too few colors, which allowed remote attackers to cause a denial of
  service (heap-based buffer over-read and application crash) via a crafted file
  (bsc#1060577).
- CVE-2017-12662: Fixed a memory leak vulnerability in WritePDFImage in
  coders/pdf.c (bsc#1052758).
- CVE-2017-14994: ReadDCMImage in coders/dcm.c allowed remote attackers to
  cause a denial of service (NULL pointer dereference) via a crafted DICOM image,
  related to the ability of DCM_ReadNonNativeImages to yield an image list
  with zero frames (bsc#1061587).
- CVE-2017-12140: The ReadDCMImage function in coders\dcm.c had an integer
  signedness error leading to excessive memory consumption via a crafted DCM file
  (bsc#1051847).
- CVE-2017-12644: Fixed memory leak vulnerability in ReadDCMImage in
  coders\dcm.c (bsc#1052764).
- CVE-2017-11188: The ReadDPXImage function in coders\dpx.c had a large loop
  vulnerability that can cause CPU exhaustion via a crafted DPX file, related to
  lack of an EOF check (bsc#1048457).
- CVE-2017-10799: When processing a DPX image (with metadata indicating a large
  width) in coders/dpx.c, a denial of service (OOM) could have occurred in
  ReadDPXImage() (bsc#1047054).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of
  service (application crash) or possibly have unspecified other impact via an
  image received from stdin (bsc#1049373).
- CVE-2017-11532: Prevent a memory leak vulnerability in the WriteMPCImage()
  function in coders/mpc.c via a crafted file allowing for DoS (bsc#1050129).
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082).
- CVE-2017-16547: The DrawImage function in magick/render.c did not properly
  look for pop keywords that are associated with push keywords, which allowed
  remote attackers to cause a denial of service (negative strncpy and application
  crash) or possibly have unspecified other impact via a crafted file
  (bsc#1067177).
- Prevent memory leak via crafted file in pwp.c allowing for DoS (bsc#1051412)
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975).
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061587">SUSE bug 1061587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067177">SUSE bug 1067177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10799/">CVE-2017-10799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14994/">CVE-2017-14994</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16547/">CVE-2017-16547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563966" comment="GraphicsMagick-1.2.5-4.78.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563967" comment="libGraphicsMagick2-1.2.5-4.78.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563968" comment="perl-GraphicsMagick-1.2.5-4.78.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37065" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1047910" ref_url="https://bugzilla.suse.com/1047910" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055038" ref_url="https://bugzilla.suse.com/1055038" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1067198" ref_url="https://bugzilla.suse.com/1067198" source="BUGZILLA"/>
		<reference ref_id="1073690" ref_url="https://bugzilla.suse.com/1073690" source="BUGZILLA"/>
		<reference ref_id="1074023" ref_url="https://bugzilla.suse.com/1074023" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074175" ref_url="https://bugzilla.suse.com/1074175" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11102" ref_url="https://www.suse.com/security/cve/CVE-2017-11102/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13065" ref_url="https://www.suse.com/security/cve/CVE-2017-13065/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-15238" ref_url="https://www.suse.com/security/cve/CVE-2017-15238/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="CVE-2017-17501" ref_url="https://www.suse.com/security/cve/CVE-2017-17501/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17782" ref_url="https://www.suse.com/security/cve/CVE-2017-17782/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17915" ref_url="https://www.suse.com/security/cve/CVE-2017-17915/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes several issues.

These security issues were fixed:

- CVE-2017-13065: Prevent NULL pointer dereference in the function SVGStartElement
  (bsc#1055038).
- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11102: The ReadOneJNGImage function allowed remote attackers to
  cause a denial of service (application crash) during JNG reading via a
  zero-length color_image data structure (bsc#1047910).
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052717)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-15238: ReadOneJNGImage had a use-after-free issue when the height or
  width is zero, related to ReadJNGImage (bsc#1067198).
- CVE-2017-17782: Prevent heap-based buffer over-read in ReadOneJNGImage
  related to oFFs chunk allocation (bsc#1073690).
- CVE-2017-17501: WriteOnePNGImage had a heap-based buffer over-read that could
  be triggered via a crafted file (bsc#1074023).
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17915: Prevent heap-based buffer over-read in ReadMNGImage when
  accessing one byte testing whether a limit has been reached (bsc#1074175).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055038">SUSE bug 1055038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067198">SUSE bug 1067198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073690">SUSE bug 1073690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074023">SUSE bug 1074023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074175">SUSE bug 1074175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11102/">CVE-2017-11102</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13065/">CVE-2017-13065</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15238/">CVE-2017-15238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17501/">CVE-2017-17501</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17782/">CVE-2017-17782</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17915/">CVE-2017-17915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563969" comment="GraphicsMagick-1.2.5-4.78.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563970" comment="libGraphicsMagick2-1.2.5-4.78.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563971" comment="perl-GraphicsMagick-1.2.5-4.78.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37066" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1047900" ref_url="https://bugzilla.suse.com/1047900" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1072934" ref_url="https://bugzilla.suse.com/1072934" source="BUGZILLA"/>
		<reference ref_id="1073081" ref_url="https://bugzilla.suse.com/1073081" source="BUGZILLA"/>
		<reference ref_id="1074307" ref_url="https://bugzilla.suse.com/1074307" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11140" ref_url="https://www.suse.com/security/cve/CVE-2017-11140/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17502" ref_url="https://www.suse.com/security/cve/CVE-2017-17502/" source="CVE"/>
		<reference ref_id="CVE-2017-17503" ref_url="https://www.suse.com/security/cve/CVE-2017-17503/" source="CVE"/>
		<reference ref_id="CVE-2017-17912" ref_url="https://www.suse.com/security/cve/CVE-2017-17912/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

- CVE-2017-9407: The ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11140: coders/jpeg.c allowed remote attackers to cause a denial of service (application crash).  [boo#1047900]
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed [boo#1049374]
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-12432: A memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-12668: A memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: A memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. [boo#1058009]
- CVE-2017-17502: ReadCMYKImage in ImportCMYKQuantumType had a heap-based buffer over-read via a crafted file.  [boo#1073081]
- CVE-2017-17912: A heap-based buffer over-read in ReadNewsProfile in coders/tiff.c was fixed. [boo#1074307]
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. [boo#1076182]
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-17503: A heap-based buffer overflow in the ReadGRAYImage was fixed (bsc#1072934)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-22"/>
	<updated date="2018-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047900">SUSE bug 1047900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072934">SUSE bug 1072934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073081">SUSE bug 1073081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074307">SUSE bug 1074307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11140/">CVE-2017-11140</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17502/">CVE-2017-17502</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17503/">CVE-2017-17503</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17912/">CVE-2017-17912</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563972" comment="GraphicsMagick-1.2.5-4.78.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563973" comment="libGraphicsMagick2-1.2.5-4.78.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563974" comment="perl-GraphicsMagick-1.2.5-4.78.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37067" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="1077737" ref_url="https://bugzilla.suse.com/1077737" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17500" ref_url="https://www.suse.com/security/cve/CVE-2017-17500/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<description>

  
This update for GraphicsMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
- CVE-2017-17500: A heap-based buffer overflow (read) in the ImportRGBQuantumType was fixed. (bsc#1077737)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17500/">CVE-2017-17500</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563975" comment="GraphicsMagick-1.2.5-4.78.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563976" comment="libGraphicsMagick2-1.2.5-4.78.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563977" comment="perl-GraphicsMagick-1.2.5-4.78.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37068" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1084062" ref_url="https://bugzilla.suse.com/1084062" source="BUGZILLA"/>
		<reference ref_id="1085233" ref_url="https://bugzilla.suse.com/1085233" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-18220" ref_url="https://www.suse.com/security/cve/CVE-2017-18220/" source="CVE"/>
		<reference ref_id="CVE-2017-18230" ref_url="https://www.suse.com/security/cve/CVE-2017-18230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060)
- CVE-2017-18230: Prevent NULL pointer dereference in the function
  ReadCINEONImage, which allowed attackers to cause a denial of service via a
  crafted file (bsc#1085233).
- CVE-2017-18220: The ReadOneJNGImage and ReadJNGImage functions allowed remote
  attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free)
  or possibly have unspecified other impact via a crafted file (bsc#1084062).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084062">SUSE bug 1084062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085233">SUSE bug 1085233</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18220/">CVE-2017-18220</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18230/">CVE-2017-18230</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563978" comment="GraphicsMagick-1.2.5-78.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563979" comment="libGraphicsMagick2-1.2.5-78.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563980" comment="perl-GraphicsMagick-1.2.5-78.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37069" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

- security update (png.c)
 * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]

- security update (gif.c)
 * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]


- security update (pcd.c)
 * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563981" comment="GraphicsMagick-1.2.5-78.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563982" comment="libGraphicsMagick2-1.2.5-78.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563983" comment="perl-GraphicsMagick-1.2.5-78.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37070" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050623" ref_url="https://bugzilla.suse.com/1050623" source="BUGZILLA"/>
		<reference ref_id="1055010" ref_url="https://bugzilla.suse.com/1055010" source="BUGZILLA"/>
		<reference ref_id="1085236" ref_url="https://bugzilla.suse.com/1085236" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11641" ref_url="https://www.suse.com/security/cve/CVE-2017-11641/" source="CVE"/>
		<reference ref_id="CVE-2017-13066" ref_url="https://www.suse.com/security/cve/CVE-2017-13066/" source="CVE"/>
		<reference ref_id="CVE-2017-18229" ref_url="https://www.suse.com/security/cve/CVE-2017-18229/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

* CVE-2017-18229: An allocation failure vulnerability was found in the function ReadTIFFImage in coders/tiff.c, 
  which could allows attackers to cause a denial of service via a crafted file, 
  because file size is not properly used to restrict scanline, strip, and tile allocations. [bsc#1085236]
* CVE-2017-11641: A memory Leak in the PersistCache function in magick/pixel_cache.c during writing of 
  Magick Persistent Cache (MPC) files could lead to denial of servic3. [bsc#1050623]
* CVE-2017-13066: A memory leak vulnerability in the function CloneImage in magick/image.c could 
  lead to denial of service [bsc#1055010]
* CVE-2018-10177: An infinite loop when reading MNG was fixed which could lead to a denial of service (hang) [bsc#1089781]

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050623">SUSE bug 1050623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055010">SUSE bug 1055010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085236">SUSE bug 1085236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11641/">CVE-2017-11641</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13066/">CVE-2017-13066</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18229/">CVE-2017-18229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563984" comment="GraphicsMagick-1.2.5-78.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563985" comment="libGraphicsMagick2-1.2.5-78.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563986" comment="perl-GraphicsMagick-1.2.5-78.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37071" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

The following security issues were addressed:

- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in theTracePoint() function in MagickCore/draw.c, which allows attackers to cause a denial of service (bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, and gray.c (bsc#1095812)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563987" comment="GraphicsMagick-1.2.5-78.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563988" comment="libGraphicsMagick2-1.2.5-78.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563989" comment="perl-GraphicsMagick-1.2.5-78.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37072" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004513.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

- Disable PS and PDF coders by default, remove gs calls from delegates.mgk (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563990" comment="GraphicsMagick-1.2.5-78.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563991" comment="libGraphicsMagick2-1.2.5-78.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563992" comment="perl-GraphicsMagick-1.2.5-78.66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37073" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1107619" ref_url="https://bugzilla.suse.com/1107619" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following security issue:

- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16640: Prevent memory leak in the function ReadOneJNGImage
  (bsc#1107619).
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616).
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612).
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609).
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604).
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file. (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072).
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747).
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746).
- CVE-2018-16749: A missing NULL check in ReadOneJNGImage allowed remote
  attackers to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file. (bsc#1108282)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563993" comment="GraphicsMagick-1.2.5-78.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563994" comment="libGraphicsMagick2-1.2.5-78.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563995" comment="perl-GraphicsMagick-1.2.5-78.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37074" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="1112392" ref_url="https://bugzilla.suse.com/1112392" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1119822" ref_url="https://bugzilla.suse.com/1119822" source="BUGZILLA"/>
		<reference ref_id="1119823" ref_url="https://bugzilla.suse.com/1119823" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10794" ref_url="https://www.suse.com/security/cve/CVE-2017-10794/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20184" ref_url="https://www.suse.com/security/cve/CVE-2018-20184/" source="CVE"/>
		<reference ref_id="CVE-2018-20185" ref_url="https://www.suse.com/security/cve/CVE-2018-20185/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

Security issues fixed:

- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage() (bsc#1113064).
- CVE-2017-10794: Fixed buffer overflow in RGB TIFF picture processing (bsc#1112392).
- CVE-2017-14997: Fixed integer underflow in ReadPICTImage in coders/pict.c (bsc#1112399).
- CVE-2018-20185: Fixed heap-based buffer over-read in the ReadBMPImage function of bmp.c (bsc#1119823)
- CVE-2018-20184: Fixed heap-based buffer overflow in the WriteTGAImage function of tga.c (bsc#1119822)

Regressions fixed after security update:

- CVE-2017-12663: Fixed memory leak in WriteMAPImage in coders/map.c (bsc#1052754).
- CVE-2017-9405: Fixed memory leak in the ReadICONImage function (bsc#1042911).
- CVE-2018-6405: Fixed ReadDCMImage function in coders/dcm (bsc#1078433).

Non-security issues fixed:

- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-03"/>
	<updated date="2019-01-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112392">SUSE bug 1112392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119822">SUSE bug 1119822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119823">SUSE bug 1119823</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-10794/">CVE-2017-10794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20184/">CVE-2018-20184</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20185/">CVE-2018-20185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563996" comment="GraphicsMagick-1.2.5-78.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563997" comment="libGraphicsMagick2-1.2.5-78.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563998" comment="perl-GraphicsMagick-1.2.5-78.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37075" version="1" class="patch">
	<metadata>
		<title>Security update for GraphicsMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<description>
This update for GraphicsMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381)
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563999" comment="GraphicsMagick-1.2.5-78.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564000" comment="libGraphicsMagick2-1.2.5-78.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564001" comment="perl-GraphicsMagick-1.2.5-78.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37076" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564002" comment="ImageMagick-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564003" comment="ImageMagick-devel-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564004" comment="libMagick++-devel-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564005" comment="libMagick++1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564006" comment="libMagickWand1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564007" comment="libMagickWand1-32bit-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564008" comment="perl-PerlMagick-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37077" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564009" comment="ImageMagick-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564010" comment="ImageMagick-devel-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564011" comment="libMagick++-devel-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564012" comment="libMagick++1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564013" comment="libMagickWand1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564014" comment="libMagickWand1-32bit-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564015" comment="perl-PerlMagick-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37078" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564016" comment="ImageMagick-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564017" comment="ImageMagick-devel-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564018" comment="libMagick++-devel-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564019" comment="libMagick++1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564020" comment="libMagickWand1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564021" comment="libMagickWand1-32bit-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564022" comment="perl-PerlMagick-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37079" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564023" comment="ImageMagick-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564024" comment="ImageMagick-devel-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564025" comment="libMagick++-devel-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564026" comment="libMagick++1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564027" comment="libMagickWand1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564028" comment="libMagickWand1-32bit-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564029" comment="perl-PerlMagick-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37080" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564030" comment="ImageMagick-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564031" comment="ImageMagick-devel-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564032" comment="libMagick++-devel-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564033" comment="libMagick++1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564034" comment="libMagickWand1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564035" comment="libMagickWand1-32bit-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564036" comment="perl-PerlMagick-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37081" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564037" comment="ImageMagick-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564038" comment="ImageMagick-devel-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564039" comment="libMagick++-devel-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564040" comment="libMagick++1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564041" comment="libMagickWand1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564042" comment="libMagickWand1-32bit-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564043" comment="perl-PerlMagick-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37082" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564044" comment="ImageMagick-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564045" comment="ImageMagick-devel-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564046" comment="libMagick++-devel-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564047" comment="libMagick++1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564048" comment="libMagickWand1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564049" comment="libMagickWand1-32bit-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564050" comment="perl-PerlMagick-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37083" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564051" comment="ImageMagick-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564052" comment="ImageMagick-devel-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564053" comment="libMagick++-devel-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564054" comment="libMagick++1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564055" comment="libMagickWand1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564056" comment="libMagickWand1-32bit-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564057" comment="perl-PerlMagick-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37084" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564058" comment="ImageMagick-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564059" comment="ImageMagick-devel-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564060" comment="libMagick++-devel-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564061" comment="libMagick++1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564062" comment="libMagickWand1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564063" comment="libMagickWand1-32bit-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564064" comment="perl-PerlMagick-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37085" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564065" comment="ImageMagick-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564066" comment="ImageMagick-devel-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564067" comment="libMagick++-devel-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564068" comment="libMagick++1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564069" comment="libMagickWand1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564070" comment="libMagickWand1-32bit-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564071" comment="perl-PerlMagick-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37086" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564072" comment="ImageMagick-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564073" comment="ImageMagick-devel-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564074" comment="libMagick++-devel-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564075" comment="libMagick++1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564076" comment="libMagickWand1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564077" comment="libMagickWand1-32bit-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564078" comment="perl-PerlMagick-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37087" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564079" comment="ImageMagick-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564080" comment="ImageMagick-devel-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564081" comment="libMagick++-devel-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564082" comment="libMagick++1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564083" comment="libMagickWand1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564084" comment="libMagickWand1-32bit-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564085" comment="perl-PerlMagick-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37088" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564086" comment="ImageMagick-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564087" comment="ImageMagick-devel-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564088" comment="libMagick++-devel-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564089" comment="libMagick++1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564090" comment="libMagickWand1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564091" comment="libMagickWand1-32bit-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564092" comment="perl-PerlMagick-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37089" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564093" comment="ImageMagick-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564094" comment="ImageMagick-devel-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564095" comment="libMagick++-devel-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564096" comment="libMagick++1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564097" comment="libMagickWand1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564098" comment="libMagickWand1-32bit-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564099" comment="perl-PerlMagick-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37090" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564100" comment="ImageMagick-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564101" comment="ImageMagick-devel-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564102" comment="libMagick++-devel-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564103" comment="libMagick++1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564104" comment="libMagickWand1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564105" comment="libMagickWand1-32bit-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564106" comment="perl-PerlMagick-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37091" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564107" comment="ImageMagick-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564108" comment="ImageMagick-devel-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564109" comment="libMagick++-devel-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564110" comment="libMagick++1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564111" comment="libMagickWand1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564112" comment="libMagickWand1-32bit-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564113" comment="perl-PerlMagick-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37092" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564114" comment="ImageMagick-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564115" comment="ImageMagick-devel-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564116" comment="libMagick++-devel-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564117" comment="libMagick++1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564118" comment="libMagickWand1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564119" comment="libMagickWand1-32bit-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564120" comment="perl-PerlMagick-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37093" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564121" comment="ImageMagick-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564122" comment="ImageMagick-devel-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564123" comment="libMagick++-devel-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564124" comment="libMagick++1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564125" comment="libMagickWand1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564126" comment="libMagickWand1-32bit-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564127" comment="perl-PerlMagick-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37094" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564128" comment="ImageMagick-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564129" comment="ImageMagick-devel-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564130" comment="libMagick++-devel-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564131" comment="libMagick++1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564132" comment="libMagickWand1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564133" comment="libMagickWand1-32bit-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564134" comment="perl-PerlMagick-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37095" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564135" comment="ImageMagick-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564136" comment="ImageMagick-devel-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564137" comment="libMagick++-devel-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564138" comment="libMagick++1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564139" comment="libMagickWand1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564140" comment="libMagickWand1-32bit-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564141" comment="perl-PerlMagick-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37096" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004508.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564142" comment="ImageMagick-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564143" comment="ImageMagick-devel-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564144" comment="libMagick++-devel-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564145" comment="libMagick++1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564146" comment="libMagickWand1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564147" comment="libMagickWand1-32bit-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564148" comment="perl-PerlMagick-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37097" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564149" comment="ImageMagick-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564150" comment="ImageMagick-devel-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564151" comment="libMagick++-devel-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564152" comment="libMagick++1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564153" comment="libMagickWand1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564154" comment="libMagickWand1-32bit-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564155" comment="perl-PerlMagick-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37098" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564156" comment="ImageMagick-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564157" comment="ImageMagick-devel-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564158" comment="libMagick++-devel-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564159" comment="libMagick++1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564160" comment="libMagickWand1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564161" comment="libMagickWand1-32bit-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564162" comment="perl-PerlMagick-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37099" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564163" comment="ImageMagick-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564164" comment="ImageMagick-devel-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564165" comment="libMagick++-devel-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564166" comment="libMagick++1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564167" comment="libMagickWand1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564168" comment="libMagickWand1-32bit-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564169" comment="perl-PerlMagick-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37100" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00011.html" source="SUSE-SU"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564170" comment="LibVNCServer-devel-0.9.1-159.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37101" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003871.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564171" comment="LibVNCServer-devel-0.9.1-160.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37102" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564172" comment="LibVNCServer-devel-0.9.1-160.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37103" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564173" comment="LibVNCServer-devel-0.9.1-160.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37104" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563209" comment="MozillaFirefox-devel-31.8.0esr-0.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37105" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563210" comment="MozillaFirefox-devel-38.5.0esr-28.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37106" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564174" comment="MozillaFirefox-devel-38.6.1esr-34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37107" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564175" comment="MozillaFirefox-devel-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564176" comment="mozilla-nspr-devel-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564177" comment="mozilla-nss-devel-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37108" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-14"/>
	<updated date="2016-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564178" comment="MozillaFirefox-devel-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564179" comment="firefox-fontconfig-devel-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564180" comment="mozilla-nspr-devel-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564181" comment="mozilla-nss-devel-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37109" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564182" comment="MozillaFirefox-devel-45.3.0esr-50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37110" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564183" comment="MozillaFirefox-devel-45.4.0esr-53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37111" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564184" comment="MozillaFirefox-devel-45.6.0esr-62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37112" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564185" comment="MozillaFirefox-devel-45.7.0esr-65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37113" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564186" comment="MozillaFirefox-devel-45.8.0esr-68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37114" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564187" comment="MozillaFirefox-devel-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564188" comment="mozilla-nspr-devel-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564189" comment="mozilla-nss-devel-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37115" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox and mozilla-nss fixes the following issues:

Security issues fixed:
- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)
  - CVE-2017-7758: Out-of-bounds read in Opus encoder
  - CVE-2017-7749: Use-after-free during docshell reloading
  - CVE-2017-7751: Use-after-free with content viewer listeners
  - CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
  - CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
  - CVE-2017-7752: Use-after-free with IME input
  - CVE-2017-7750: Use-after-free with track elements
  - CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service
  - CVE-2017-7778: Vulnerabilities in the Graphite 2 library
  - CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
  - CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files
  - CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
  - CVE-2017-7757: Use-after-free in IndexedDB
  - CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application
  - CVE-2017-7763: Mac fonts render some unicode characters as spaces
  - CVE-2017-7765: Mark of the Web bypass when saving executable files
  - CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)
  - CVE-2016-10196: Vulnerabilities in Libevent library
  - CVE-2017-5443: Out-of-bounds write during BinHex decoding
  - CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
  - CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
  - CVE-2017-5465: Out-of-bounds read in ConvolvePixel
  - CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
  - CVE-2017-5467: Memory corruption when drawing Skia content
  - CVE-2017-5460: Use-after-free in frame selection
  - CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
  - CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
  - CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
  - CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
  - CVE-2017-5447: Out-of-bounds read during glyph processing
  - CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
  - CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content
  - CVE-2017-5442: Use-after-free during style changes
  - CVE-2017-5469: Potential Buffer overflow in flex-generated code
  - CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
  - CVE-2017-5441: Use-after-free with selection during scroll events
  - CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
  - CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
  - CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
  - CVE-2017-5435: Use-after-free during transaction processing in the editor
  - CVE-2017-5434: Use-after-free during focus handling
  - CVE-2017-5433: Use-after-free in SMIL animation functions
  - CVE-2017-5432: Use-after-free in text input selection
  - CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
  - CVE-2017-5459: Buffer overflow in WebGL
  - CVE-2017-5462: DRBG flaw in NSS
  - CVE-2017-5455: Sandbox escape through internal feed reader APIs
  - CVE-2017-5454: Sandbox escape allowing file system read access through file picker
  - CVE-2017-5456: Sandbox escape allowing local file system access
  - CVE-2017-5451: Addressbar spoofing with onblur event

- General
  - CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842)

Bugfixes:
- workaround for Firefox hangs (bsc#1031485, bsc#1025108)
- Update to gcc-5-branch head.
  * Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460),
    (bsc#930496), (bsc#930392) and (bsc#955382).
- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)
- Fix libffi include install.  (bsc#935510)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564190" comment="MozillaFirefox-devel-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564191" comment="mozilla-nss-devel-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37116" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<description>


Mozilla Firefox was updated to the ESR 52.3 release (bsc#1052829)

Following security issues were fixed:

* MFSA 2017-19/CVE-2017-7807: Domain hijacking through AppCache fallback
* MFSA 2017-19/CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts
* MFSA 2017-19/CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID
* MFSA 2017-19/CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections
* MFSA 2017-19/CVE-2017-7787: Same-origin policy bypass with iframes through page reloads
* MFSA 2017-19/CVE-2017-7786: Buffer overflow while painting non-displayable SVG
* MFSA 2017-19/CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM
* MFSA 2017-19/CVE-2017-7784: Use-after-free with image observers
* MFSA 2017-19/CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements
* MFSA 2017-19/CVE-2017-7798: XUL injection in the style editor in devtools
* MFSA 2017-19/CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher
* MFSA 2017-19/CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3
* MFSA 2017-19/CVE-2017-7800: Use-after-free in WebSockets during disconnection
* MFSA 2017-19/CVE-2017-7801: Use-after-free with marquee during window resizing
* MFSA 2017-19/CVE-2017-7802: Use-after-free resizing image elements
* MFSA 2017-19/CVE-2017-7803: CSP containing 'sandbox' improperly applied

This update also fixes:

-  fixed firefox hangs after a while in FUTEX_WAIT_PRIVATE if
   cgroups enabled and running on cpu &gt;=1 (bsc#1031485)
-  The Itanium ia64 build was fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564192" comment="MozillaFirefox-devel-52.3.0esr-72.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37117" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564193" comment="MozillaFirefox-devel-52.5.0esr-72.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37118" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564194" comment="MozillaFirefox-devel-52.6.0esr-72.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37119" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564195" comment="MozillaFirefox-devel-52.7.3esr-72.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37120" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 52.8 release fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564196" comment="MozillaFirefox-devel-52.8.0esr-72.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37121" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564197" comment="MozillaFirefox-devel-52.8.1esr-72.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37122" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564198" comment="MozillaFirefox-devel-52.9.0esr-72.38.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37123" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563215" comment="MozillaFirefox-devel-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563216" comment="mozilla-nspr-devel-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563217" comment="mozilla-nss-devel-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37124" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564199" comment="MozillaFirefox-devel-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564200" comment="mozilla-nspr-devel-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564201" comment="mozilla-nss-devel-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37125" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564202" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564203" comment="OpenEXR-devel-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37126" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564204" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564205" comment="SDL-devel-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564206" comment="SDL-devel-32bit-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37127" version="1" class="patch">
	<metadata>
		<title>Security update for SDL_image (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1084256" ref_url="https://bugzilla.suse.com/1084256" source="BUGZILLA"/>
		<reference ref_id="1084257" ref_url="https://bugzilla.suse.com/1084257" source="BUGZILLA"/>
		<reference ref_id="1084288" ref_url="https://bugzilla.suse.com/1084288" source="BUGZILLA"/>
		<reference ref_id="1084303" ref_url="https://bugzilla.suse.com/1084303" source="BUGZILLA"/>
		<reference ref_id="1084304" ref_url="https://bugzilla.suse.com/1084304" source="BUGZILLA"/>
		<reference ref_id="1089087" ref_url="https://bugzilla.suse.com/1089087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12122" ref_url="https://www.suse.com/security/cve/CVE-2017-12122/" source="CVE"/>
		<reference ref_id="CVE-2017-14440" ref_url="https://www.suse.com/security/cve/CVE-2017-14440/" source="CVE"/>
		<reference ref_id="CVE-2017-14442" ref_url="https://www.suse.com/security/cve/CVE-2017-14442/" source="CVE"/>
		<reference ref_id="CVE-2017-14448" ref_url="https://www.suse.com/security/cve/CVE-2017-14448/" source="CVE"/>
		<reference ref_id="CVE-2017-14450" ref_url="https://www.suse.com/security/cve/CVE-2017-14450/" source="CVE"/>
		<reference ref_id="CVE-2018-3839" ref_url="https://www.suse.com/security/cve/CVE-2018-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004836.html" source="SUSE-SU"/>
		<description>
This update for SDL_image fixes the following issues:

- CVE-2017-14442: A specially crafted BMP image could have caused a stack overflow for an attacker that can display a specially crafted image (bsc#1084304).
- CVE-2017-14450: A specially crafted GIF image could have caused a buffer overflow on a global section for an attacker that can display an image (bsc#1084288).
- CVE-2017-12122: An exploitable code execution vulnerability exists in the ILBM image rendering functionality. A specially crafted ILBM image can cause a heap overflow resulting in code execution. (bsc#1084256).
- CVE-2017-14440: An exploitable code execution vulnerability exists in the ILBM image rendering functionality. A specially crafted ILBM image can cause a stack overflow resulting in code execution. (bsc#1084257).
- CVE-2017-14448: An exploitable code execution vulnerability exists in the XCF image rendering functionality. A specially crafted XCF image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. (bsc#1084303).
- CVE-2018-3839: An exploitable code execution vulnerability exists in the XCF image rendering functionality. A specially crafted XCF image can cause an out-of-bounds write on the heap, resulting in code execution. (bsc#1089087).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-07"/>
	<updated date="2018-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084256">SUSE bug 1084256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084257">SUSE bug 1084257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084288">SUSE bug 1084288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084303">SUSE bug 1084303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084304">SUSE bug 1084304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089087">SUSE bug 1089087</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12122/">CVE-2017-12122</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14440/">CVE-2017-14440</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14442/">CVE-2017-14442</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14448/">CVE-2017-14448</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14450/">CVE-2017-14450</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3839/">CVE-2018-3839</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564207" comment="SDL_image-1.2.6-84.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564208" comment="SDL_image-devel-1.2.6-84.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37128" version="1" class="patch">
	<metadata>
		<title>Security update for SDL_image (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1114519" ref_url="https://bugzilla.suse.com/1114519" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3977" ref_url="https://www.suse.com/security/cve/CVE-2018-3977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004870.html" source="SUSE-SU"/>
		<description>
This update for SDL_image fixes the following issues:

Security issue fixed:

- CVE-2018-3977: Fixed a heap overflow issue (bsc#1114519).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114519">SUSE bug 1114519</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3977/">CVE-2018-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564209" comment="SDL_image-1.2.6-84.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564210" comment="SDL_image-devel-1.2.6-84.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37129" version="1" class="patch">
	<metadata>
		<title>security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<description>


This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#939709 (XSA-139):  Use after free in QEMU/Xen
  block unplug protocol (CVE-2015-5166)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564211" comment="xen-devel-4.4.2_12-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37130" version="1" class="patch">
	<metadata>
		<title>Security update for Xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="985860" ref_url="https://bugzilla.suse.com/985860" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004754.html" source="SUSE-SU"/>
		<description>
This update for Xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630).
- CVE-2016-4463: Prevent stack-based buffer overflow that allowed
  context-dependent attackers to cause a denial of service via a deeply nested
  DTD (bsc#985860).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985860">SUSE bug 985860</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564212" comment="Xerces-c-2.8.0-29.17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564213" comment="libXerces-c-devel-2.8.0-29.17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564214" comment="libXerces-c28-2.8.0-29.17.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37131" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004578.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)

Other changes made:

- Removed support for javadoc
- Default value for stripAbsolutePathSpec changed to 'true'
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564216" comment="ant-antlr-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564217" comment="ant-apache-bcel-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564218" comment="ant-apache-bsf-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564219" comment="ant-apache-log4j-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564220" comment="ant-apache-oro-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564221" comment="ant-apache-regexp-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564222" comment="ant-apache-resolver-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564223" comment="ant-commons-logging-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564224" comment="ant-javamail-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564225" comment="ant-jdepend-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564226" comment="ant-jmf-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564227" comment="ant-junit-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564228" comment="ant-manual-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564229" comment="ant-nodeps-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564230" comment="ant-scripts-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564231" comment="ant-swing-1.7.1-16.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37132" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001657.html" source="SUSE-SU"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563219" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563220" comment="apache2-devel-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563221" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563222" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563223" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563224" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563225" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37133" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002158.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564233" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564234" comment="apache2-devel-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564235" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564236" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564237" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564238" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564239" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37134" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564240" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564241" comment="apache2-devel-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564242" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564243" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564244" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564245" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564246" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37135" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003074.html" source="SUSE-SU"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564247" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564248" comment="apache2-devel-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564249" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564250" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564251" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564252" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564253" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37136" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564254" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564255" comment="apache2-devel-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564256" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564257" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564258" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564259" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564260" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37137" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564261" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564262" comment="apache2-devel-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564263" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564264" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564265" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564266" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564267" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37138" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564268" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564269" comment="apache2-devel-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564270" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564271" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564272" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564273" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564274" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37139" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_fcgid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="988492" ref_url="https://bugzilla.suse.com/988492" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000104" ref_url="https://www.suse.com/security/cve/CVE-2016-1000104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002159.html" source="SUSE-SU"/>
		<description>

This update for apache2-mod_fcgid fixes the following issues:
 
* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-1000104). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988492)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000104/">CVE-2016-1000104</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564275" comment="apache2-mod_fcgid-2.2-31.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37140" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564276" comment="audiofile-devel-0.2.6-142.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37141" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563234" comment="augeas-devel-0.9.0-3.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37142" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issues fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
- CVE-2014-8119: Fix improper handling of escaped strings leading to memory corruption (bsc#925225).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564277" comment="augeas-devel-0.9.0-3.21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37143" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005098.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564278" comment="avahi-compat-howl-devel-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564279" comment="avahi-compat-mDNSResponder-devel-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564280" comment="avahi-mono-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564281" comment="libavahi-devel-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564282" comment="libavahi-glib-devel-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564283" comment="libavahi-gobject-devel-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564284" comment="libavahi-gobject0-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564285" comment="libavahi-ui0-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564286" comment="libhowl0-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564287" comment="python-avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564288" comment="python-avahi-gtk-0.6.23-35.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37144" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="959755" ref_url="https://bugzilla.suse.com/959755" source="BUGZILLA"/>
		<reference ref_id="971410" ref_url="https://bugzilla.suse.com/971410" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially
  crafted SHELLOPTS+PS4 variables. (bsc#1001299)
- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when
  $HOSTNAME was expanded in the prompt. (bsc#1000396)

The following bugs were fixed:

- bsc#971410: Scripts could terminate unexpectedly due to mishandled recursive traps.
- bsc#959755: Clarify that the files /etc/profile as well as /etc/bash.bashrc may source
  other files as well even if the bash does not.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959755">SUSE bug 959755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971410">SUSE bug 971410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564289" comment="libreadline5-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564290" comment="readline-devel-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564291" comment="readline-devel-32bit-5.2-147.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37145" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1031729" ref_url="https://bugzilla.suse.com/1031729" source="BUGZILLA"/>
		<reference ref_id="976776" ref_url="https://bugzilla.suse.com/976776" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<description>

This update for bash fixed several issues

This security issue was fixed:

- CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845).

This non-security issue was fixed:

- Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031729">SUSE bug 1031729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976776">SUSE bug 976776</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564292" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564293" comment="readline-devel-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564294" comment="readline-devel-32bit-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37146" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563238" comment="bind-devel-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563239" comment="bind-devel-32bit-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37147" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563240" comment="bind-devel-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563241" comment="bind-devel-32bit-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37148" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563242" comment="bind-devel-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563243" comment="bind-devel-32bit-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37149" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563244" comment="bind-devel-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563245" comment="bind-devel-32bit-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37150" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564295" comment="bind-devel-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564296" comment="bind-devel-32bit-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37151" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564297" comment="bind-devel-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564298" comment="bind-devel-32bit-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37152" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564299" comment="bind-devel-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564300" comment="bind-devel-32bit-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37153" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564301" comment="bind-devel-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564302" comment="bind-devel-32bit-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37154" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564303" comment="bind-devel-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564304" comment="bind-devel-32bit-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37155" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service
(daemon crash) via a long request that uses the lightweight resolver protocol.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564305" comment="bind-devel-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564306" comment="bind-devel-32bit-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37156" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1034162" ref_url="https://bugzilla.suse.com/1034162" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00018.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564307" comment="bind-devel-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564308" comment="bind-devel-32bit-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37157" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564309" comment="bind-devel-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564310" comment="bind-devel-32bit-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37158" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00006.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564311" comment="bind-devel-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564312" comment="bind-devel-32bit-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37159" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564313" comment="libarchive-devel-2.5.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37160" version="1" class="patch">
	<metadata>
		<title>Security update for bsh2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="967593" ref_url="https://bugzilla.suse.com/967593" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2510" ref_url="https://www.suse.com/security/cve/CVE-2016-2510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00019.html" source="SUSE-SU"/>
		<description>

This update for bsh2 fixes the following issue:

- CVE-2016-2510: An application that includes BeanShell on the
  classpath may be vulnerable if another part of the application uses Java
  serialization or XStream to deserialize data from an untrusted source.

Please see https://github.com/beanshell/beanshell/releases/tag/2.0b6 for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967593">SUSE bug 967593</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2510/">CVE-2016-2510</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564314" comment="bsh2-2.0-318.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564315" comment="bsh2-classgen-2.0-318.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564316" comment="bsh2-javadoc-2.0-318.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37161" version="1" class="patch">
	<metadata>
		<title>Fixing security issues on OBS toolchain (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1059858" ref_url="https://bugzilla.suse.com/1059858" source="BUGZILLA"/>
		<reference ref_id="1069904" ref_url="https://bugzilla.suse.com/1069904" source="BUGZILLA"/>
		<reference ref_id="796918" ref_url="https://bugzilla.suse.com/796918" source="BUGZILLA"/>
		<reference ref_id="827480" ref_url="https://bugzilla.suse.com/827480" source="BUGZILLA"/>
		<reference ref_id="891829" ref_url="https://bugzilla.suse.com/891829" source="BUGZILLA"/>
		<reference ref_id="938556" ref_url="https://bugzilla.suse.com/938556" source="BUGZILLA"/>
		<reference ref_id="967265" ref_url="https://bugzilla.suse.com/967265" source="BUGZILLA"/>
		<reference ref_id="967610" ref_url="https://bugzilla.suse.com/967610" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4007" ref_url="https://www.suse.com/security/cve/CVE-2016-4007/" source="CVE"/>
		<reference ref_id="CVE-2017-14804" ref_url="https://www.suse.com/security/cve/CVE-2017-14804/" source="CVE"/>
		<reference ref_id="CVE-2017-9274" ref_url="https://www.suse.com/security/cve/CVE-2017-9274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00030.html" source="SUSE-SU"/>
		<description>
This OBS toolchain update fixes the following issues:

Package 'build':

- CVE-2017-14804: Improve file name check extractbuild (bsc#1069904)
- Fixed Dockerfile repository parsing

Package 'obs-service-source_validator':

- CVE-2017-9274: Don't use rpmbuild to extract sources, patches etc. from a spec (bnc#938556).
- CVE-2016-4007: Several maintained source services are vulnerable to code/paramter injection (bsc#967265)
- Update to version 0.7.
- Use spec_query instead of output_versions using the specfile parser from the build package (boo#1059858)
- obs-service-source_validator: several occurrences of uninitialized value (bsc#967610)
- hack for util-linux specfiles (bnc#891829)
- fix dependency to gnupg2 for Fedora (bnc#827480)
- exit if tmpdir creation fails (bnc#796918)


Package 'osc':

- Update to version 0.162.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059858">SUSE bug 1059858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069904">SUSE bug 1069904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796918">SUSE bug 796918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827480">SUSE bug 827480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891829">SUSE bug 891829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938556">SUSE bug 938556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967265">SUSE bug 967265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967610">SUSE bug 967610</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4007/">CVE-2016-4007</cve>
	<cve impact="important" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14804/">CVE-2017-14804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9274/">CVE-2017-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564317" comment="build-20171128-8.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564318" comment="osc-0.162.1-7.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37162" version="1" class="patch">
	<metadata>
		<title>Security update for bzr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1058214" ref_url="https://bugzilla.suse.com/1058214" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14176" ref_url="https://www.suse.com/security/cve/CVE-2017-14176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004107.html" source="SUSE-SU"/>
		<description>


Bzr was updated to fix a security issue:

- CVE-2017-14176: Avoid code execution using ssh:// url injection (boo#1058214)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-01"/>
	<updated date="2018-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058214">SUSE bug 1058214</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14176/">CVE-2017-14176</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564319" comment="bzr-1.8-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37163" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564320" comment="cairo-devel-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564321" comment="cairo-devel-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564322" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37164" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002248.html" source="SUSE-SU"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564323" comment="cracklib-devel-2.8.12-56.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37165" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1075785" ref_url="https://bugzilla.suse.com/1075785" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004977.html" source="SUSE-SU"/>
		<description>
This update for crash provides the following fix:

- Update crash to support -bigmem kernel dumps for PPC64, including the ones that have
  extended process virtual address space support to 128TB (bsc#1075785, bsc#1032471).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075785">SUSE bug 1075785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564324" comment="crash-7.0.9-30.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564325" comment="crash-devel-7.0.9-30.3.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37166" version="1" class="patch">
	<metadata>
		<title>Security update for ctdb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="969522" ref_url="https://bugzilla.suse.com/969522" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:1640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00043.html" source="SUSE-SU"/>
		<description>
ctdb was updated to fix one security issue.

This security issue was fixed:
- bsc#969522: ctdb opening sockets with htons(IPPROTO_RAW)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564326" comment="ctdb-devel-1.0.114.6-0.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37167" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564327" comment="cups-devel-1.3.9-8.46.56.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37168" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563254" comment="libcurl-devel-7.19.7-1.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37169" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564328" comment="libcurl-devel-7.19.7-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37170" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564329" comment="libcurl-devel-7.19.7-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37171" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564330" comment="libcurl-devel-7.19.7-1.69.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37172" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564331" comment="libcurl-devel-7.19.7-1.70.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37173" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564332" comment="libcurl-devel-7.19.7-1.70.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37174" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564333" comment="libcurl-devel-7.19.7-1.70.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37175" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564334" comment="libcurl-devel-7.37.0-70.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37176" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564335" comment="libcurl-devel-7.37.0-70.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37177" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564336" comment="libcurl-devel-7.37.0-70.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37178" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564337" comment="libcurl-devel-7.37.0-70.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37179" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003198.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564338" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37180" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html" source="SUSE-SU"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564339" comment="cyrus-imapd-devel-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564340" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564341" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37181" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563258" comment="dhcp-devel-4.2.4.P2-0.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37182" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564342" comment="dhcp-devel-4.2.4.P2-0.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37183" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003731.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes several issues.
 
This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119)

This non-security issue was fixed:

- Enhance dhclient-script to handle static route updates. (bsc#1023415)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564343" comment="dhcp-devel-4.2.4.P2-0.28.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37184" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564344" comment="dhcp-devel-4.2.4.P2-0.28.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37185" version="1" class="patch">
	<metadata>
		<title>Security update for dom4j (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1105443" ref_url="https://bugzilla.suse.com/1105443" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000632" ref_url="https://www.suse.com/security/cve/CVE-2018-1000632/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004787.html" source="SUSE-SU"/>
		<description>
This update for dom4j fixes the following issues:

- CVE-2018-1000632: Prevent XML injection vulnerability that allowed an
  attacker to tamper with XML documents (bsc#1105443)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105443">SUSE bug 1105443</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000632/">CVE-2018-1000632</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564345" comment="dom4j-1.6.1-8.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37186" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00075.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564346" comment="emacs-nox-22.3-42.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37187" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003796.html" source="SUSE-SU"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564347" comment="evince-devel-2.28.2-0.7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37188" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564348" comment="libexempi-devel-2.0.2-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37189" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564349" comment="libexpat-devel-2.0.1-88.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37190" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564350" comment="libexpat-devel-2.0.1-88.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37191" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564351" comment="libexpat-devel-2.0.1-88.42.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37192" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563301" comment="mozilla-nspr-devel-4.10.9-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37193" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563302" comment="MozillaFirefox-devel-38.3.0esr-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37194" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563303" comment="MozillaFirefox-devel-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563304" comment="mozilla-nspr-devel-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563305" comment="mozilla-nss-devel-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37195" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-13"/>
	<updated date="2017-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564352" comment="MozillaFirefox-devel-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564353" comment="mozilla-nss-devel-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37196" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-09"/>
	<updated date="2015-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563311" comment="MozillaFirefox-devel-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563312" comment="mozilla-nss-devel-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37197" version="1" class="patch">
	<metadata>
		<title>Security update for fontconfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="992534" ref_url="https://bugzilla.suse.com/992534" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html" source="SUSE-SU"/>
		<description>

This update for fontconfig fixes the following issues:

- security update:
  * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564354" comment="fontconfig-devel-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564355" comment="fontconfig-devel-32bit-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37198" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003008.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564356" comment="freeradius-server-devel-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564357" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37199" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564358" comment="freeradius-server-devel-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564359" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37200" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002028.html" source="SUSE-SU"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564360" comment="freetype2-devel-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564361" comment="freetype2-devel-32bit-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37201" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564362" comment="freetype2-devel-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564363" comment="freetype2-devel-32bit-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37202" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003851.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564364" comment="freetype2-devel-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564365" comment="freetype2-devel-32bit-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37203" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005097.html" source="SUSE-SU"/>
		<description>
This update for fuse fixes the following issues:

Security issue fixed:

- CVE-2018-10906: Fix a bypass of the user_allow_other restriction (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564366" comment="fuse-devel-2.8.7-0.11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37204" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="938159" ref_url="https://bugzilla.suse.com/938159" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="999596" ref_url="https://bugzilla.suse.com/999596" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
		<description>

  
This update for gcc43 fixes the following issues:

Security issue fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

New features:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection to mitigate the Stack Clash attack.  [bnc#1039513]

Non security bugs fixed:

- Fixed build of 32bit libgcov.a with LFS support.  [bsc#1044016]
- Fixed issue with libstdc++ functional when an exception is thrown during construction.  [bsc#999596]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed ICE compiling AFS modules for the s390x kernel.  [bsc#938159]
- Backport large file support from GCC 4.6.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938159">SUSE bug 938159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999596">SUSE bug 999596</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564367" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564368" comment="gcc43-ada-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564369" comment="gcc43-fortran-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564370" comment="gcc43-fortran-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564371" comment="gcc43-obj-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564372" comment="gcc43-objc-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564373" comment="gcc43-objc-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564374" comment="libada43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564375" comment="libobjc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564376" comment="libobjc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37205" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564377" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564378" comment="gcc43-ada-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564379" comment="gcc43-fortran-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564380" comment="gcc43-fortran-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564381" comment="gcc43-obj-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564382" comment="gcc43-objc-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564383" comment="gcc43-objc-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564384" comment="libada43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564385" comment="libobjc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564386" comment="libobjc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37206" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="889990" ref_url="https://bugzilla.suse.com/889990" source="BUGZILLA"/>
		<reference ref_id="899871" ref_url="https://bugzilla.suse.com/899871" source="BUGZILLA"/>
		<reference ref_id="917169" ref_url="https://bugzilla.suse.com/917169" source="BUGZILLA"/>
		<reference ref_id="919274" ref_url="https://bugzilla.suse.com/919274" source="BUGZILLA"/>
		<reference ref_id="922534" ref_url="https://bugzilla.suse.com/922534" source="BUGZILLA"/>
		<reference ref_id="924525" ref_url="https://bugzilla.suse.com/924525" source="BUGZILLA"/>
		<reference ref_id="924687" ref_url="https://bugzilla.suse.com/924687" source="BUGZILLA"/>
		<reference ref_id="930176" ref_url="https://bugzilla.suse.com/930176" source="BUGZILLA"/>
		<reference ref_id="934689" ref_url="https://bugzilla.suse.com/934689" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="947772" ref_url="https://bugzilla.suse.com/947772" source="BUGZILLA"/>
		<reference ref_id="947791" ref_url="https://bugzilla.suse.com/947791" source="BUGZILLA"/>
		<reference ref_id="948168" ref_url="https://bugzilla.suse.com/948168" source="BUGZILLA"/>
		<reference ref_id="949000" ref_url="https://bugzilla.suse.com/949000" source="BUGZILLA"/>
		<reference ref_id="951644" ref_url="https://bugzilla.suse.com/951644" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="970009" ref_url="https://bugzilla.suse.com/970009" source="BUGZILLA"/>
		<reference ref_id="976627" ref_url="https://bugzilla.suse.com/976627" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="981311" ref_url="https://bugzilla.suse.com/981311" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002618.html" source="SUSE-SU"/>
		<description>

This update for gcc48 to version 4.8.5 fixes several issues.

This security issue was fixed:

- CVE-2015-5276: The std::random_device class in libstdc++ did not properly handle short reads from blocking sources, which made it easier for context-dependent attackers to predict the random values via unspecified vectors (bsc#945842).

These non-security issues were fixed:

- Provide missing libasan0-32bit and other multilibs via the updated product description [bsc#951644]
- Fixed libffi issue for armv7l [bsc#988274]
- Fixed libffi issue for armv7l [bsc#988274]
- Fixed a kernel miscompile on aarch64 [bnc#981311]
- Fixed a ppc64le ICE. [bnc#976627]
- Fixed issue with using gcov and #pragma pack [bsc#977654]
- Fixed samba build on AARCH64 [bsc#970009]
- Fixed HTM builtins on powerpc [bsc#955382]
- Fixed build of SLOF [bsc#949000]
- Fixed libffi issues on aarch64 [bsc#948168]
- Fixed no_instrument_function attribute handling on PPC64 with -mprofile-kernel [bsc#947791]
- Fixed bogus integer overflow in constant expression [bsc#934689]
- Fixed ICE with atomics on aarch64 [bsc#930176]
- Fixed -imacros bug [bsc#917169]
- Fixed incorrect -Warray-bounds warnings [bsc#919274]
- Updated -mhotpatch for s390x [bsc#924525]
- Fixed ppc64le issue with doubleword vector extract [bsc#924687]
- Fixed reload issue on S390.
- Keep functions leaf when they are instrumented for profiling on s390[x] [bsc#899871]
- Avoid accessing invalid memory when passing aggregates by value [bsc#922534]
- Rework of the memory allocator for C++ exceptions used in OOM situations [bsc#889990]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889990">SUSE bug 889990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899871">SUSE bug 899871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917169">SUSE bug 917169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919274">SUSE bug 919274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922534">SUSE bug 922534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924525">SUSE bug 924525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924687">SUSE bug 924687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930176">SUSE bug 930176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934689">SUSE bug 934689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947772">SUSE bug 947772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947791">SUSE bug 947791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948168">SUSE bug 948168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949000">SUSE bug 949000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951644">SUSE bug 951644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970009">SUSE bug 970009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976627">SUSE bug 976627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981311">SUSE bug 981311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564387" comment="cpp48-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564388" comment="gcc48-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564389" comment="gcc48-32bit-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564390" comment="gcc48-c++-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564391" comment="gcc48-fortran-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564392" comment="gcc48-fortran-32bit-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564393" comment="gcc48-info-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564394" comment="gcc48-locale-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564395" comment="libasan0-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564396" comment="libasan0-32bit-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564397" comment="libstdc++48-devel-4.8.5-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564398" comment="libstdc++48-devel-32bit-4.8.5-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37207" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003190.html" source="SUSE-SU"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bsc#1028744]
- Backport patch for PR65612. [bsc#1022062]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564399" comment="cpp48-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564400" comment="gcc48-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564401" comment="gcc48-32bit-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564402" comment="gcc48-c++-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564403" comment="gcc48-fortran-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564404" comment="gcc48-fortran-32bit-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564405" comment="gcc48-info-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564406" comment="gcc48-locale-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564407" comment="libasan0-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564408" comment="libasan0-32bit-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564409" comment="libstdc++48-devel-4.8.5-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564410" comment="libstdc++48-devel-32bit-4.8.5-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37208" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564411" comment="cpp5-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564412" comment="gcc5-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564413" comment="gcc5-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564414" comment="gcc5-c++-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564415" comment="gcc5-c++-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564416" comment="gcc5-fortran-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564417" comment="gcc5-fortran-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564418" comment="gcc5-info-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564419" comment="gcc5-locale-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564420" comment="libasan2-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564421" comment="libasan2-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564422" comment="libatomic1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564423" comment="libcilkrts5-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564424" comment="libcilkrts5-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564425" comment="libffi-devel-gcc5-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564426" comment="libffi-devel-gcc5-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564427" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564428" comment="libitm1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564429" comment="libitm1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564430" comment="liblsan0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564431" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564432" comment="libstdc++6-devel-gcc5-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564433" comment="libstdc++6-devel-gcc5-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564434" comment="libtsan0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564435" comment="libubsan0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564436" comment="libubsan0-32bit-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37209" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002270.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564437" comment="gd-devel-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37210" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002375.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564438" comment="gd-devel-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37211" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002518.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564439" comment="gd-devel-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37212" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564440" comment="gd-devel-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37213" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003638.html" source="SUSE-SU"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564441" comment="gd-devel-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37214" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002392.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564442" comment="ghostscript-devel-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564443" comment="ghostscript-ijs-devel-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564444" comment="libgimpprint-devel-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37215" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564445" comment="ghostscript-devel-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564446" comment="ghostscript-ijs-devel-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564447" comment="libgimpprint-devel-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37216" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00009.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564448" comment="ghostscript-devel-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564449" comment="ghostscript-ijs-devel-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564450" comment="libgimpprint-devel-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37217" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00052.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564451" comment="ghostscript-devel-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564452" comment="ghostscript-ijs-devel-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564453" comment="libgimpprint-devel-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37218" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564454" comment="ghostscript-devel-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564455" comment="ghostscript-ijs-devel-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564456" comment="libgimpprint-devel-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37219" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564457" comment="ghostscript-devel-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564458" comment="ghostscript-ijs-devel-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564459" comment="libgimpprint-devel-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37220" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564460" comment="ghostscript-devel-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564461" comment="ghostscript-ijs-devel-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564462" comment="libgimpprint-devel-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37221" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563322" comment="giflib-devel-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563323" comment="giflib-devel-32bit-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37222" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002024.html" source="SUSE-SU"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564463" comment="giflib-devel-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564464" comment="giflib-devel-32bit-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37223" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="986021" ref_url="https://bugzilla.suse.com/986021" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002161.html" source="SUSE-SU"/>
		<description>
gimp was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-4994: Use-after-free vulnerabilities in the channel and layer properties parsing process (bsc#986021).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-19"/>
	<updated date="2016-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/986021">SUSE bug 986021</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564465" comment="gimp-2.6.2-3.34.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564466" comment="gimp-devel-2.6.2-3.34.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564467" comment="gimp-lang-2.6.2-3.34.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564468" comment="gimp-plugins-python-2.6.2-3.34.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37224" version="1" class="patch">
	<metadata>
		<title>Recommended update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="948969" ref_url="https://bugzilla.suse.com/948969" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:2184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001714.html" source="SUSE-SU"/>
		<description>
The git package was updated to fix the following security issue:

- Fix remote code execution with recursive fetch of submodules (bsc#948969).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948969">SUSE bug 948969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563338" comment="git-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563339" comment="git-arch-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563340" comment="git-core-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563341" comment="git-cvs-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563342" comment="git-daemon-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563343" comment="git-email-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563344" comment="git-gui-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563345" comment="git-svn-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563346" comment="git-web-1.7.12.4-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563347" comment="gitk-1.7.12.4-0.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37225" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="971328" ref_url="https://bugzilla.suse.com/971328" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html" source="SUSE-SU"/>
		<description>
This update for git fixes a buffer overflow issue that had the potential to be abused for remote execution of arbitrary code (CVE-2016-2315, CVE-2016-2324, bsc#971328).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-16"/>
	<updated date="2016-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564469" comment="git-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564470" comment="git-arch-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564471" comment="git-core-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564472" comment="git-cvs-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564473" comment="git-daemon-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564474" comment="git-email-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564475" comment="git-gui-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564476" comment="git-svn-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564477" comment="git-web-1.7.12.4-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564478" comment="gitk-1.7.12.4-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37226" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1038395" ref_url="https://bugzilla.suse.com/1038395" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002923.html" source="SUSE-SU"/>
		<description>

This update for git fixes the following issue:

- CVE-2017-8386: git shell, may allow a user who comes over SSH to run an
interactive pager by causing it to spawn 'git upload-pack --help' (bsc#1038395):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-29"/>
	<updated date="2017-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038395">SUSE bug 1038395</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564479" comment="git-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564480" comment="git-arch-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564481" comment="git-core-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564482" comment="git-cvs-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564483" comment="git-daemon-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564484" comment="git-email-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564485" comment="git-gui-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564486" comment="git-svn-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564487" comment="git-web-1.7.12.4-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564488" comment="gitk-1.7.12.4-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37227" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1052481" ref_url="https://bugzilla.suse.com/1052481" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00058.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

  - CVE-2017-1000117: an argument injection in SSH URLs could lead to client-side code execution (bsc#1052481)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-21"/>
	<updated date="2017-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564489" comment="git-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564490" comment="git-arch-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564491" comment="git-core-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564492" comment="git-cvs-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564493" comment="git-daemon-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564494" comment="git-email-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564495" comment="git-gui-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564496" comment="git-svn-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564497" comment="git-web-1.7.12.4-0.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564498" comment="gitk-1.7.12.4-0.18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37228" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1061041" ref_url="https://bugzilla.suse.com/1061041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00015.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2017-14867: A cvsserver perl script command injection was fixed (CVE-2017-14867, bsc#1061041):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061041">SUSE bug 1061041</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564499" comment="git-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564500" comment="git-arch-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564501" comment="git-core-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564502" comment="git-cvs-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564503" comment="git-daemon-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564504" comment="git-email-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564505" comment="git-gui-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564506" comment="git-svn-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564507" comment="git-web-1.7.12.4-0.18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564508" comment="gitk-1.7.12.4-0.18.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37229" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1063412" ref_url="https://bugzilla.suse.com/1063412" source="BUGZILLA"/>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15298" ref_url="https://www.suse.com/security/cve/CVE-2017-15298/" source="CVE"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2017-15298: Fixed mishandling layers of tree objects, which allowed remote attackers to cause DoS a crafted repository, aka a Git bomb (bsc#1063412).
- CVE-2018-11233: Fixed path sanity-checks on NTFS that can read arbitrary memory (bsc#1095218).
- CVE-2018-11235: Fixed arbitrary code execution when recursively cloning a malicious repository (bsc#1095219).
- CVE-2018-17456: Fixed a code execution via .gitmodules (bsc#1110949) (partial)

Non-security issues fixed:

- Fixed an issue where send-email failed to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-31"/>
	<updated date="2019-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1063412">SUSE bug 1063412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15298/">CVE-2017-15298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564509" comment="git-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564510" comment="git-arch-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564511" comment="git-core-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564512" comment="git-cvs-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564513" comment="git-daemon-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564514" comment="git-email-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564515" comment="git-gui-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564516" comment="git-svn-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564517" comment="git-web-1.7.12.4-0.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564518" comment="gitk-1.7.12.4-0.18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37230" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3966-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183966-1.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564519" comment="glib2-devel-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564520" comment="glib2-devel-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564521" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564522" comment="libgio-fam-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37231" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563350" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563351" comment="glibc-info-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37232" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563352" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563353" comment="glibc-info-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37233" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="931399" ref_url="https://bugzilla.suse.com/931399" source="BUGZILLA"/>
		<reference ref_id="965699" ref_url="https://bugzilla.suse.com/965699" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="973179" ref_url="https://bugzilla.suse.com/973179" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="986302" ref_url="https://bugzilla.suse.com/986302" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- Drop old fix that could break services that start before IPv6 is up. (bsc#931399)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Relocate DSOs in dependency order, fixing a potential crash during symbol
  relocation phase. (bsc#986302)
- Fix nscd assertion failure in gc. (bsc#965699)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931399">SUSE bug 931399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965699">SUSE bug 965699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973179">SUSE bug 973179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986302">SUSE bug 986302</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564523" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564524" comment="glibc-info-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37234" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00018.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564525" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564526" comment="glibc-info-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37235" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00038.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564527" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564528" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37236" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-28"/>
	<updated date="2018-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564529" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564530" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37237" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1076871" ref_url="https://bugzilla.suse.com/1076871" source="BUGZILLA"/>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003870.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

Non security issue fixed:

- Fix incorrect getaddrinfo assertion trigger (bsc#1076871)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076871">SUSE bug 1076871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564531" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564532" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37238" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1077763" ref_url="https://bugzilla.suse.com/1077763" source="BUGZILLA"/>
		<reference ref_id="1079625" ref_url="https://bugzilla.suse.com/1079625" source="BUGZILLA"/>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161).

Bug fixes:

- bsc#1086690: Fix crash in resolver on memory allocation failure.
- bsc#1077763: Fix allocation in in6ailist_add.
- bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077763">SUSE bug 1077763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079625">SUSE bug 1079625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564533" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564534" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37239" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1058774" ref_url="https://bugzilla.suse.com/1058774" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583)
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580)
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234).

This non-security issue was fixed:

- Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058774">SUSE bug 1058774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564535" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564536" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37240" version="1" class="patch">
	<metadata>
		<title>Recommended update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1110170" ref_url="https://bugzilla.suse.com/1110170" source="BUGZILLA"/>
		<reference ref_id="1110174" ref_url="https://bugzilla.suse.com/1110174" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325).

Non-security issue fixed:

- Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618).
- Remove improper assert in dlclose (bsc#1110174, BZ #11941).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110170">SUSE bug 1110170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110174">SUSE bug 1110174</bugzilla>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564537" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564538" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37241" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563357" comment="libgnutls-devel-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563358" comment="libgnutls-extra-devel-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37242" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563360" comment="libgnutls-devel-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563361" comment="libgnutls-extra-devel-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37243" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564539" comment="libgnutls-devel-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564540" comment="libgnutls-extra-devel-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564541" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37244" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564542" comment="libgnutls-devel-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564543" comment="libgnutls-extra-devel-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564544" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37245" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002598.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: Out of bounds memory read in windows_icon_typefind (bsc#1013669).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564545" comment="gstreamer-0_10-plugins-base-devel-0.10.35-5.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37246" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563366" comment="gtk2-devel-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563367" comment="gtk2-devel-32bit-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37247" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563368" comment="gtk2-devel-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563369" comment="gtk2-devel-32bit-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37248" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<description>

This update for gtk2 fixes the following security issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564546" comment="gtk2-devel-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564547" comment="gtk2-devel-32bit-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37249" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003740.html" source="SUSE-SU"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564548" comment="gtk2-devel-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564549" comment="gtk2-devel-32bit-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37250" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1039465" ref_url="https://bugzilla.suse.com/1039465" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<description>
This update for gtk2 provides the following fixes:

These security issues were fixed:

- CVE-2017-6312: Prevent integer overflow that allowed context-dependent
  attackers to cause a denial of service (segmentation fault and application
  crash) via a crafted image entry offset in an ICO file (bsc#1027026).
- CVE-2017-6314: The make_available_at_least function allowed context-dependent
  attackers to cause a denial of service (infinite loop) via a large TIFF file
  (bsc#1027025).
- CVE-2017-6313: Prevent integer underflow in the load_resources function that
  allowed context-dependent attackers to cause a denial of service (out-of-bounds
  read and program crash) via a crafted image entry size in an ICO file
  (bsc#1027024).
- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544).

This non-security issue was fixed:

- Prevent an infinite loop when a window is destroyed while traversed (bsc#1039465).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039465">SUSE bug 1039465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564550" comment="gtk2-devel-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564551" comment="gtk2-devel-32bit-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37251" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002622.html" source="SUSE-SU"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564552" comment="guile-devel-1.8.5-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37252" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<description>
icu was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-15"/>
	<updated date="2015-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564553" comment="icu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564554" comment="libicu-32bit-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564555" comment="libicu-devel-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564556" comment="libicu-devel-32bit-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37253" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="952260" ref_url="https://bugzilla.suse.com/952260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002018.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following issue:

The previous patch for CVE-2014-9654 was incorrect and lead
to non-working regular expressions. This update fixes this 
problem (bsc#952260)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564557" comment="icu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564558" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564559" comment="libicu-devel-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564560" comment="libicu-devel-32bit-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37254" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002590.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564561" comment="icu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564562" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564563" comment="libicu-devel-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564564" comment="libicu-devel-32bit-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37255" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564565" comment="icu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564566" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564567" comment="libicu-devel-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564568" comment="libicu-devel-32bit-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37256" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564569" comment="icu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564570" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564571" comment="libicu-devel-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564572" comment="libicu-devel-32bit-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37257" version="1" class="patch">
	<metadata>
		<title>Security update for imlib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963797" ref_url="https://bugzilla.suse.com/963797" source="BUGZILLA"/>
		<reference ref_id="963800" ref_url="https://bugzilla.suse.com/963800" source="BUGZILLA"/>
		<reference ref_id="973759" ref_url="https://bugzilla.suse.com/973759" source="BUGZILLA"/>
		<reference ref_id="973761" ref_url="https://bugzilla.suse.com/973761" source="BUGZILLA"/>
		<reference ref_id="974202" ref_url="https://bugzilla.suse.com/974202" source="BUGZILLA"/>
		<reference ref_id="977538" ref_url="https://bugzilla.suse.com/977538" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5326" ref_url="https://www.suse.com/security/cve/CVE-2011-5326/" source="CVE"/>
		<reference ref_id="CVE-2014-9763" ref_url="https://www.suse.com/security/cve/CVE-2014-9763/" source="CVE"/>
		<reference ref_id="CVE-2014-9764" ref_url="https://www.suse.com/security/cve/CVE-2014-9764/" source="CVE"/>
		<reference ref_id="CVE-2016-3993" ref_url="https://www.suse.com/security/cve/CVE-2016-3993/" source="CVE"/>
		<reference ref_id="CVE-2016-3994" ref_url="https://www.suse.com/security/cve/CVE-2016-3994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002091.html" source="SUSE-SU"/>
		<description>

This update for imlib2 fixes the following issues: 

Security issues fixed:
- CVE-2016-3994: Potential DOS in giflib loader (bsc#973759)
- CVE-2016-3993: Off buy 1 in merge update (bsc#973761)
- CVE-2014-9764: fix segmentation fault when opening specifically crafted input (bsc#963797)
- CVE-2014-9763: Prevent division-by-zero crashes (bsc#963800)
- CVE-2011-5326: Ellipse of width 1 triggers crashes (bsc#974202)

Bugs fixed:
- bsc#977538: Fix various potential crashes		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963797">SUSE bug 963797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963800">SUSE bug 963800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973759">SUSE bug 973759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973761">SUSE bug 973761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974202">SUSE bug 974202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977538">SUSE bug 977538</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5326/">CVE-2011-5326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9763/">CVE-2014-9763</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9764/">CVE-2014-9764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3993/">CVE-2016-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3994/">CVE-2016-3994</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564573" comment="imlib2-1.4.2-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564574" comment="imlib2-devel-1.4.2-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564575" comment="imlib2-filters-1.4.2-2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564576" comment="imlib2-loaders-1.4.2-2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37258" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564577" comment="libjasper-devel-1.900.14-134.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37259" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564578" comment="libjasper-devel-1.900.14-134.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37260" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564579" comment="libjasper-devel-1.900.14-134.33.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37261" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to 7.1-3.10 to fix several security issues.

The following vulnerabilities were fixed:
  
* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data.
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.  
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564580" comment="java-1_7_1-ibm-devel-1.7.1_sr3.10-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37262" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<description>
The java-1_7_1-ibm package was updated to version 7.1-3.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.1-3.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564581" comment="java-1_7_1-ibm-devel-1.7.1_sr3.20-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37263" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues by updating to 7.1-3.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564582" comment="java-1_7_1-ibm-devel-1.7.1_sr3.30-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37264" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.1 SR3 FP40 relese fixes the following issues: 

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564583" comment="java-1_7_1-ibm-devel-1.7.1_sr3.40-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37265" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-3.60 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564584" comment="java-1_7_1-ibm-devel-1.7.1_sr3.60-19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37266" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564585" comment="java-1_7_1-ibm-devel-1.7.1_sr4.1-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37267" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Version update to 7.1-4.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client


		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564586" comment="java-1_7_1-ibm-devel-1.7.1_sr4.5-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37268" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564587" comment="java-1_7_1-ibm-devel-1.7.1_sr4.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37269" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

* CVE-2017-10349: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10348: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10388: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2016-9841:  'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10293: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10345: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10350: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10356: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10357: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10347: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10355: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10285: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10281: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10295: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10346: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2016-10165: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564588" comment="java-1_7_1-ibm-devel-1.7.1_sr4.15-26.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37270" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm provides the following fix:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
             apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
           trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
            converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
            policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
            internally
  - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
            internally
  - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
            specification attribute
  - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
            stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler
  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-07"/>
	<updated date="2018-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564589" comment="java-1_7_1-ibm-devel-1.7.1_sr4.20-26.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37271" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]

Security fixes:

-   CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
    CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
    CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564590" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37272" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.30 fixes the following issues:

Security issues fixed:

- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564591" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37273" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564592" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37274" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-14"/>
	<updated date="2019-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564593" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37275" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<description>

IBM Java 7.1 was updated to version 7.1-3.50 to fix the following security issues:

CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-07"/>
	<updated date="2016-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564594" comment="java-1_7_1-ibm-devel-1.7.1_sr3.50-16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37276" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564595" comment="libjpeg-devel-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564596" comment="libjpeg-devel-32bit-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37277" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563391" comment="kdebase4-workspace-devel-4.3.5-0.12.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37278" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004799.html" source="SUSE-SU"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564597" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564598" comment="kdelibs3-arts-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564599" comment="kdelibs3-arts-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564600" comment="kdelibs3-arts-x86-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564601" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564602" comment="kdelibs3-devel-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564603" comment="kdelibs3-doc-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37279" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="909589" ref_url="https://bugzilla.suse.com/909589" source="BUGZILLA"/>
		<reference ref_id="954847" ref_url="https://bugzilla.suse.com/954847" source="BUGZILLA"/>
		<reference ref_id="971030" ref_url="https://bugzilla.suse.com/971030" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="979915" ref_url="https://bugzilla.suse.com/979915" source="BUGZILLA"/>
		<reference ref_id="982544" ref_url="https://bugzilla.suse.com/982544" source="BUGZILLA"/>
		<reference ref_id="983721" ref_url="https://bugzilla.suse.com/983721" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="988498" ref_url="https://bugzilla.suse.com/988498" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).

The following non-security bugs were fixed:
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- bridge: superfluous skb-&gt;nfct check in br_nf_dev_queue_xmit (bsc#982544).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/909589">SUSE bug 909589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954847">SUSE bug 954847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971030">SUSE bug 971030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979915">SUSE bug 979915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982544">SUSE bug 982544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983721">SUSE bug 983721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988498">SUSE bug 988498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564604" comment="kernel-docs-3.0.101-80.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37280" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003344" ref_url="https://bugzilla.suse.com/1003344" source="BUGZILLA"/>
		<reference ref_id="1003568" ref_url="https://bugzilla.suse.com/1003568" source="BUGZILLA"/>
		<reference ref_id="1003677" ref_url="https://bugzilla.suse.com/1003677" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1004520" ref_url="https://bugzilla.suse.com/1004520" source="BUGZILLA"/>
		<reference ref_id="1005857" ref_url="https://bugzilla.suse.com/1005857" source="BUGZILLA"/>
		<reference ref_id="1005896" ref_url="https://bugzilla.suse.com/1005896" source="BUGZILLA"/>
		<reference ref_id="1005903" ref_url="https://bugzilla.suse.com/1005903" source="BUGZILLA"/>
		<reference ref_id="1006917" ref_url="https://bugzilla.suse.com/1006917" source="BUGZILLA"/>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="763198" ref_url="https://bugzilla.suse.com/763198" source="BUGZILLA"/>
		<reference ref_id="771065" ref_url="https://bugzilla.suse.com/771065" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="843236" ref_url="https://bugzilla.suse.com/843236" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="865783" ref_url="https://bugzilla.suse.com/865783" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="907611" ref_url="https://bugzilla.suse.com/907611" source="BUGZILLA"/>
		<reference ref_id="908458" ref_url="https://bugzilla.suse.com/908458" source="BUGZILLA"/>
		<reference ref_id="908684" ref_url="https://bugzilla.suse.com/908684" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="909994" ref_url="https://bugzilla.suse.com/909994" source="BUGZILLA"/>
		<reference ref_id="911687" ref_url="https://bugzilla.suse.com/911687" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="922947" ref_url="https://bugzilla.suse.com/922947" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="934760" ref_url="https://bugzilla.suse.com/934760" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968014" ref_url="https://bugzilla.suse.com/968014" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="973203" ref_url="https://bugzilla.suse.com/973203" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="976867" ref_url="https://bugzilla.suse.com/976867" source="BUGZILLA"/>
		<reference ref_id="977687" ref_url="https://bugzilla.suse.com/977687" source="BUGZILLA"/>
		<reference ref_id="979514" ref_url="https://bugzilla.suse.com/979514" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="982218" ref_url="https://bugzilla.suse.com/982218" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="983619" ref_url="https://bugzilla.suse.com/983619" source="BUGZILLA"/>
		<reference ref_id="984102" ref_url="https://bugzilla.suse.com/984102" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="984992" ref_url="https://bugzilla.suse.com/984992" source="BUGZILLA"/>
		<reference ref_id="985206" ref_url="https://bugzilla.suse.com/985206" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="987565" ref_url="https://bugzilla.suse.com/987565" source="BUGZILLA"/>
		<reference ref_id="988440" ref_url="https://bugzilla.suse.com/988440" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="989764" ref_url="https://bugzilla.suse.com/989764" source="BUGZILLA"/>
		<reference ref_id="989779" ref_url="https://bugzilla.suse.com/989779" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="991923" ref_url="https://bugzilla.suse.com/991923" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="993127" ref_url="https://bugzilla.suse.com/993127" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994436" ref_url="https://bugzilla.suse.com/994436" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="994926" ref_url="https://bugzilla.suse.com/994926" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996664" ref_url="https://bugzilla.suse.com/996664" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998399" ref_url="https://bugzilla.suse.com/998399" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999584" ref_url="https://bugzilla.suse.com/999584" source="BUGZILLA"/>
		<reference ref_id="999600" ref_url="https://bugzilla.suse.com/999600" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

For the PowerPC64 a new 'bigmem' flavor has been added to support big Power machines. (FATE#319026)

The following security bugs were fixed:

- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).

The following non-security bugs were fixed:

- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).
- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).
- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- avoid dentry crash triggered by NFS (bsc#984194).
- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).
- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).
- drivers: hv: vss: run only on supported host versions (bnc#986337).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- i2c: i801: add Intel Lewisburg device IDs (fate#319286).
- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -&gt; 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- introduce SIZE_MAX (bsc#1000189).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi: Import kabi files from 3.0.101-80
- kabi-fix for flock_owner addition (bsc#998689).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).
- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- oom: print nodemask in the oom report (bnc#1003866).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- pciback: return proper values during BAR sizing.
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC' obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS &amp; cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils &lt; 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)
- random32: add prandom_u32_max (bsc#989152).
- remove problematic preprocessor constructs (bsc#928138,fate#319026).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- rpm/package-descriptions: add -bigmem description
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: make executable
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).
- sort hyperv patches properly in series.conf
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).
- x86/gart: Check for GART support before accessing GART registers (fate#321400).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).
- zfcp: fix ELS/GS request&amp;response length for hardware data router (bnc#1003677, LTC#144308).
- zfcp: fix payload trace length for SAN request&amp;response (bnc#1003677, LTC#144312).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).
- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003344">SUSE bug 1003344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003568">SUSE bug 1003568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003677">SUSE bug 1003677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004520">SUSE bug 1004520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005857">SUSE bug 1005857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005896">SUSE bug 1005896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005903">SUSE bug 1005903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006917">SUSE bug 1006917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763198">SUSE bug 763198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771065">SUSE bug 771065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843236">SUSE bug 843236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865783">SUSE bug 865783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907611">SUSE bug 907611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908458">SUSE bug 908458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908684">SUSE bug 908684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909994">SUSE bug 909994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911687">SUSE bug 911687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934760">SUSE bug 934760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973203">SUSE bug 973203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976867">SUSE bug 976867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977687">SUSE bug 977687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979514">SUSE bug 979514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982218">SUSE bug 982218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983619">SUSE bug 983619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984102">SUSE bug 984102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984992">SUSE bug 984992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985206">SUSE bug 985206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987565">SUSE bug 987565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988440">SUSE bug 988440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989764">SUSE bug 989764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989779">SUSE bug 989779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991923">SUSE bug 991923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993127">SUSE bug 993127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994436">SUSE bug 994436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994926">SUSE bug 994926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996664">SUSE bug 996664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998399">SUSE bug 998399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999584">SUSE bug 999584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999600">SUSE bug 999600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564605" comment="kernel-docs-3.0.101-88.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37281" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1005877" ref_url="https://bugzilla.suse.com/1005877" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010713" ref_url="https://bugzilla.suse.com/1010713" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012183" ref_url="https://bugzilla.suse.com/1012183" source="BUGZILLA"/>
		<reference ref_id="1012411" ref_url="https://bugzilla.suse.com/1012411" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012852" ref_url="https://bugzilla.suse.com/1012852" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015561" ref_url="https://bugzilla.suse.com/1015561" source="BUGZILLA"/>
		<reference ref_id="1015752" ref_url="https://bugzilla.suse.com/1015752" source="BUGZILLA"/>
		<reference ref_id="1015760" ref_url="https://bugzilla.suse.com/1015760" source="BUGZILLA"/>
		<reference ref_id="1015796" ref_url="https://bugzilla.suse.com/1015796" source="BUGZILLA"/>
		<reference ref_id="1015803" ref_url="https://bugzilla.suse.com/1015803" source="BUGZILLA"/>
		<reference ref_id="1015817" ref_url="https://bugzilla.suse.com/1015817" source="BUGZILLA"/>
		<reference ref_id="1015828" ref_url="https://bugzilla.suse.com/1015828" source="BUGZILLA"/>
		<reference ref_id="1015844" ref_url="https://bugzilla.suse.com/1015844" source="BUGZILLA"/>
		<reference ref_id="1015848" ref_url="https://bugzilla.suse.com/1015848" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1015932" ref_url="https://bugzilla.suse.com/1015932" source="BUGZILLA"/>
		<reference ref_id="1016320" ref_url="https://bugzilla.suse.com/1016320" source="BUGZILLA"/>
		<reference ref_id="1016505" ref_url="https://bugzilla.suse.com/1016505" source="BUGZILLA"/>
		<reference ref_id="1016520" ref_url="https://bugzilla.suse.com/1016520" source="BUGZILLA"/>
		<reference ref_id="1016668" ref_url="https://bugzilla.suse.com/1016668" source="BUGZILLA"/>
		<reference ref_id="1016688" ref_url="https://bugzilla.suse.com/1016688" source="BUGZILLA"/>
		<reference ref_id="1016824" ref_url="https://bugzilla.suse.com/1016824" source="BUGZILLA"/>
		<reference ref_id="1016831" ref_url="https://bugzilla.suse.com/1016831" source="BUGZILLA"/>
		<reference ref_id="1017686" ref_url="https://bugzilla.suse.com/1017686" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1019079" ref_url="https://bugzilla.suse.com/1019079" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019165" ref_url="https://bugzilla.suse.com/1019165" source="BUGZILLA"/>
		<reference ref_id="1019348" ref_url="https://bugzilla.suse.com/1019348" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="748806" ref_url="https://bugzilla.suse.com/748806" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795297" ref_url="https://bugzilla.suse.com/795297" source="BUGZILLA"/>
		<reference ref_id="800999" ref_url="https://bugzilla.suse.com/800999" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="901809" ref_url="https://bugzilla.suse.com/901809" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909491" ref_url="https://bugzilla.suse.com/909491" source="BUGZILLA"/>
		<reference ref_id="913387" ref_url="https://bugzilla.suse.com/913387" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="924708" ref_url="https://bugzilla.suse.com/924708" source="BUGZILLA"/>
		<reference ref_id="925065" ref_url="https://bugzilla.suse.com/925065" source="BUGZILLA"/>
		<reference ref_id="953233" ref_url="https://bugzilla.suse.com/953233" source="BUGZILLA"/>
		<reference ref_id="961589" ref_url="https://bugzilla.suse.com/961589" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="987333" ref_url="https://bugzilla.suse.com/987333" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989680" ref_url="https://bugzilla.suse.com/989680" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="990245" ref_url="https://bugzilla.suse.com/990245" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="999101" ref_url="https://bugzilla.suse.com/999101" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
  where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations
  or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device
  NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers
  and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST
  packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr
  operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial
  of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove
  a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
  between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or
  cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability
  (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local
  malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
  because it first requires compromising a privileged process and current compiler optimizations restrict access to the
  vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain
  error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted
  application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users
  to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel
  allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching
  a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking
  for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or
  possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel
  allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the
  corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local
  users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call
  (bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of
  service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time
  interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a
  denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero
  bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote
  attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).

The following non-security bugs were fixed:

- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 &amp; 256 bit keys to AESNI RFC4106 (bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host-&gt;n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-09"/>
	<updated date="2017-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005877">SUSE bug 1005877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012411">SUSE bug 1012411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015561">SUSE bug 1015561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015752">SUSE bug 1015752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015760">SUSE bug 1015760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015796">SUSE bug 1015796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015803">SUSE bug 1015803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015817">SUSE bug 1015817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015828">SUSE bug 1015828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015844">SUSE bug 1015844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015848">SUSE bug 1015848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015932">SUSE bug 1015932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016320">SUSE bug 1016320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016505">SUSE bug 1016505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016520">SUSE bug 1016520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016668">SUSE bug 1016668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016688">SUSE bug 1016688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016824">SUSE bug 1016824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016831">SUSE bug 1016831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017686">SUSE bug 1017686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019165">SUSE bug 1019165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019348">SUSE bug 1019348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748806">SUSE bug 748806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795297">SUSE bug 795297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800999">SUSE bug 800999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901809">SUSE bug 901809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909491">SUSE bug 909491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913387">SUSE bug 913387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924708">SUSE bug 924708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925065">SUSE bug 925065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953233">SUSE bug 953233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961589">SUSE bug 961589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987333">SUSE bug 987333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989680">SUSE bug 989680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990245">SUSE bug 990245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999101">SUSE bug 999101</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564606" comment="kernel-docs-3.0.101-94.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37282" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00004.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following security bug:

CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver (drivers/tty/n_hdlc.c)
could have been exploited to gain a local privilege escalation (bnc#1027565)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-03"/>
	<updated date="2017-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564607" comment="kernel-docs-3.0.101-97.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37283" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1018074" ref_url="https://bugzilla.suse.com/1018074" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1042921" ref_url="https://bugzilla.suse.com/1042921" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00023.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be
  'jumped over' by userland programs using more than one page of stack in
  functions and so lead to memory corruption. This update extends the stack
  guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this
  attack vector. This is not a kernel bugfix, but a hardening measure against
  this kind of userland attack.(bsc#1039348)

The following non-security bugs were fixed:

- fnic now returns 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic is now using rport-&gt;dd_data to check if rport is online instead of rport_lookup (bsc#1035920).
- The rport check location in fnic_queuecommand_lck was corrected (bsc#1035920).
- xfs: remove patches that caused regression (bsc#1043234).
- mm: enlarge stack guard gap (bnc#1039348, CVE-2017-1000364, bnc#1042921).
- PCI: Allow access to VPD attributes with size 0 (bsc#1018074).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1018074">SUSE bug 1018074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042921">SUSE bug 1042921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564608" comment="kernel-docs-3.0.101-104.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37284" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000365" ref_url="https://bugzilla.suse.com/1000365" source="BUGZILLA"/>
		<reference ref_id="1000380" ref_url="https://bugzilla.suse.com/1000380" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1029140" ref_url="https://bugzilla.suse.com/1029140" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030814" ref_url="https://bugzilla.suse.com/1030814" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035721" ref_url="https://bugzilla.suse.com/1035721" source="BUGZILLA"/>
		<reference ref_id="1035777" ref_url="https://bugzilla.suse.com/1035777" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1036056" ref_url="https://bugzilla.suse.com/1036056" source="BUGZILLA"/>
		<reference ref_id="1036288" ref_url="https://bugzilla.suse.com/1036288" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037191" ref_url="https://bugzilla.suse.com/1037191" source="BUGZILLA"/>
		<reference ref_id="1037193" ref_url="https://bugzilla.suse.com/1037193" source="BUGZILLA"/>
		<reference ref_id="1037227" ref_url="https://bugzilla.suse.com/1037227" source="BUGZILLA"/>
		<reference ref_id="1037232" ref_url="https://bugzilla.suse.com/1037232" source="BUGZILLA"/>
		<reference ref_id="1037233" ref_url="https://bugzilla.suse.com/1037233" source="BUGZILLA"/>
		<reference ref_id="1037356" ref_url="https://bugzilla.suse.com/1037356" source="BUGZILLA"/>
		<reference ref_id="1037358" ref_url="https://bugzilla.suse.com/1037358" source="BUGZILLA"/>
		<reference ref_id="1037359" ref_url="https://bugzilla.suse.com/1037359" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039258" ref_url="https://bugzilla.suse.com/1039258" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041762" ref_url="https://bugzilla.suse.com/1041762" source="BUGZILLA"/>
		<reference ref_id="1041975" ref_url="https://bugzilla.suse.com/1041975" source="BUGZILLA"/>
		<reference ref_id="1042045" ref_url="https://bugzilla.suse.com/1042045" source="BUGZILLA"/>
		<reference ref_id="1042615" ref_url="https://bugzilla.suse.com/1042615" source="BUGZILLA"/>
		<reference ref_id="1042633" ref_url="https://bugzilla.suse.com/1042633" source="BUGZILLA"/>
		<reference ref_id="1042687" ref_url="https://bugzilla.suse.com/1042687" source="BUGZILLA"/>
		<reference ref_id="1042832" ref_url="https://bugzilla.suse.com/1042832" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044216" ref_url="https://bugzilla.suse.com/1044216" source="BUGZILLA"/>
		<reference ref_id="1044230" ref_url="https://bugzilla.suse.com/1044230" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044882" ref_url="https://bugzilla.suse.com/1044882" source="BUGZILLA"/>
		<reference ref_id="1044913" ref_url="https://bugzilla.suse.com/1044913" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045356" ref_url="https://bugzilla.suse.com/1045356" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1045525" ref_url="https://bugzilla.suse.com/1045525" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1045547" ref_url="https://bugzilla.suse.com/1045547" source="BUGZILLA"/>
		<reference ref_id="1045615" ref_url="https://bugzilla.suse.com/1045615" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1046192" ref_url="https://bugzilla.suse.com/1046192" source="BUGZILLA"/>
		<reference ref_id="1046715" ref_url="https://bugzilla.suse.com/1046715" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047053" ref_url="https://bugzilla.suse.com/1047053" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049688" ref_url="https://bugzilla.suse.com/1049688" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050154" ref_url="https://bugzilla.suse.com/1050154" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051515" ref_url="https://bugzilla.suse.com/1051515" source="BUGZILLA"/>
		<reference ref_id="1051770" ref_url="https://bugzilla.suse.com/1051770" source="BUGZILLA"/>
		<reference ref_id="1055680" ref_url="https://bugzilla.suse.com/1055680" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="792863" ref_url="https://bugzilla.suse.com/792863" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="938352" ref_url="https://bugzilla.suse.com/938352" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-10277" ref_url="https://www.suse.com/security/cve/CVE-2016-10277/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2016-10277: Potential privilege escalation due to a missing bounds check in the lp driver. A kernel command-line adversary can overflow the parport_nr array to execute code (bsc#1039456).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7533: Bug in inotify code allowing privilege escalation (bsc#1049483).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bsc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-1000365: The Linux Kernel imposed a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354)
- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bnc#1032340)
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-1000380: sound/core/timer.c was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents could have bene disclosed when a read and an ioctl happen at the same time (bnc#1044125)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431)
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used by local console attackers to bypass certain secure boot settings. (bnc#1039456)
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885)
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069)
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883)
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879)
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850)

The following non-security bugs were fixed:

- 8250: use callbacks to access UART_DLL/UART_DLM.
- ALSA: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- ALSA: hda - using uninitialized data (bsc#1045538).
- ALSA: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- ALSA: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- ALSA: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- ALSA: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- Add CVE tag to references
- CIFS: backport prepath matching fix (bsc#799133).
- Drop CONFIG_PPC_CELL from bigmem (bsc#1049128).
- EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr().
- Fix scripts/bigmem-generate-ifdef-guard to work on all branches
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- IB/mlx4: Demote mcg message from warning to debug (bsc#919382).
- IB/mlx4: Fix ib device initialization error flow (bsc#919382).
- IB/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- IB/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- IB/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- IB/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- Input: cm109 - validate number of endpoints before using them (bsc#1037193).
- Input: hanwang - validate number of endpoints before using them (bsc#1037232).
- Input: yealink - validate number of endpoints before using them (bsc#1037227).
- KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- NFS: Avoid getting confused by confused server (bsc#1045416).
- NFS: Fix another OPEN_DOWNGRADE bug (git-next).
- NFS: Fix size of NFSACL SETACL operations (git-fixes).
- NFS: Make nfs_readdir revalidate less often (bsc#1048232).
- NFS: tidy up nfs_show_mountd_netid (git-fixes).
- NFSD: Do not use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- NFSv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- NFSv4: Fix another bug in the close/open_downgrade code (git-fixes).
- NFSv4: Fix problems with close in the presence of a delegation (git-fixes).
- NFSv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- SUNRPC: Fix a memory leak in the backchannel code (git-fixes).
- Staging: vt6655-6: potential NULL dereference in hostap_disable_hostapd() (bsc#1045479).
- USB: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- USB: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- USB: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- USB: iowarrior: fix NULL-deref in write (bsc#1037359).
- USB: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- USB: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- USB: serial: ark3116: fix register-accessor error handling (git-fixes).
- USB: serial: ch341: fix open error handling (bsc#1037441).
- USB: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- USB: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- USB: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- USB: serial: io_ti: fix information leak in completion handler (git-fixes).
- USB: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- USB: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- USB: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- USB: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- USB: usbip: fix nonconforming hub descriptor (bsc#1047487).
- USB: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- USB: usbtmc: Change magic number to constant (bsc#1036288).
- USB: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- USB: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- USB: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- USB: usbtmc: add missing endpoint sanity check (bsc#1036288).
- USB: usbtmc: fix DMA on stack (bsc#1036288).
- USB: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- USB: usbtmc: fix probe error path (bsc#1036288).
- USB: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- USB: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- Use make --output-sync feature when available (bsc#1012422).
- Xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- blacklist b50a6c584bb4 powerpc/perf: Clear MMCR2 when enabling PMU (bsc#1035721). 
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: Blacklist 847fa1a6d3d0 ('ftrace/x86_32: Set ftrace_stub to weak to prevent gcc from using short jumps to it') The released kernels are not build with a gas new enough to optimize the jmps so that this patch would be required. (bsc#1051478)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- cifs: do not compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975). backporting upstream commit 2f2591a34db6c9361faa316c91a6e320cb4e6aee
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- dentry name snapshots (bsc#1049483).
- devres: fix a for loop bounds check (git-fixes).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216)
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport-&gt;dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fuse: add missing FR_FORCE (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- initial cr0 bits (bnc#1036056, LTC#153612).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jsm: add support for additional Neo cards (bsc#1045615).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush -&gt;event_work before stopping array (git-fixes).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- powerpc/ibmebus: Fix device reference leaks in sysfs interface (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/ibmebus: Fix further device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (bsc#1032471).
- powerpc/mm/slice: Update the function prototype (bsc#1032471).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (bsc#1032471).
- powerpc/pci/rpadlpar: Fix device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Drop support for pre-POWER4 cpus (bsc#1032471).
- powerpc: Remove STAB code (bsc#1032471).
- random32: fix off-by-one in seeding requirement (git-fixes).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev-&gt;stime underflow (bnc#938352).
- sched: Do not account bogus utime (bnc#938352).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of -&gt;host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- sfc: do not device_attach if a reset is pending (bsc#909618).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression greater than 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000365">SUSE bug 1000365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000380">SUSE bug 1000380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029140">SUSE bug 1029140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030814">SUSE bug 1030814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035721">SUSE bug 1035721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035777">SUSE bug 1035777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036056">SUSE bug 1036056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036288">SUSE bug 1036288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037191">SUSE bug 1037191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037193">SUSE bug 1037193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037227">SUSE bug 1037227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037232">SUSE bug 1037232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037233">SUSE bug 1037233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037356">SUSE bug 1037356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037358">SUSE bug 1037358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037359">SUSE bug 1037359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039258">SUSE bug 1039258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041762">SUSE bug 1041762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041975">SUSE bug 1041975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042045">SUSE bug 1042045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042615">SUSE bug 1042615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042633">SUSE bug 1042633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042687">SUSE bug 1042687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042832">SUSE bug 1042832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044216">SUSE bug 1044216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044230">SUSE bug 1044230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044882">SUSE bug 1044882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044913">SUSE bug 1044913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045356">SUSE bug 1045356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045525">SUSE bug 1045525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045547">SUSE bug 1045547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045615">SUSE bug 1045615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046192">SUSE bug 1046192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046715">SUSE bug 1046715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047053">SUSE bug 1047053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049688">SUSE bug 1049688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050154">SUSE bug 1050154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051515">SUSE bug 1051515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051770">SUSE bug 1051770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055680">SUSE bug 1055680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792863">SUSE bug 792863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938352">SUSE bug 938352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-10277/">CVE-2016-10277</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564609" comment="kernel-docs-3.0.101-108.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37285" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00016.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following issues:

- Stack corruption could have lead to local privilege escalation
  (bsc#1059525, CVE-2017-1000253).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-13"/>
	<updated date="2017-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564610" comment="kernel-docs-3.0.101-108.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37286" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092772" ref_url="https://bugzilla.suse.com/1092772" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1093666" ref_url="https://bugzilla.suse.com/1093666" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097562" ref_url="https://bugzilla.suse.com/1097562" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100705" ref_url="https://bugzilla.suse.com/1100705" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="1103909" ref_url="https://bugzilla.suse.com/1103909" source="BUGZILLA"/>
		<reference ref_id="1104481" ref_url="https://bugzilla.suse.com/1104481" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1104901" ref_url="https://bugzilla.suse.com/1104901" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105723" ref_url="https://bugzilla.suse.com/1105723" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106199" ref_url="https://bugzilla.suse.com/1106199" source="BUGZILLA"/>
		<reference ref_id="1106202" ref_url="https://bugzilla.suse.com/1106202" source="BUGZILLA"/>
		<reference ref_id="1106206" ref_url="https://bugzilla.suse.com/1106206" source="BUGZILLA"/>
		<reference ref_id="1106209" ref_url="https://bugzilla.suse.com/1106209" source="BUGZILLA"/>
		<reference ref_id="1106212" ref_url="https://bugzilla.suse.com/1106212" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106609" ref_url="https://bugzilla.suse.com/1106609" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1106930" ref_url="https://bugzilla.suse.com/1106930" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107064" ref_url="https://bugzilla.suse.com/1107064" source="BUGZILLA"/>
		<reference ref_id="1107071" ref_url="https://bugzilla.suse.com/1107071" source="BUGZILLA"/>
		<reference ref_id="1107650" ref_url="https://bugzilla.suse.com/1107650" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107949" ref_url="https://bugzilla.suse.com/1107949" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14617: Prevent NULL pointer dereference and panic in
  hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
  hfs+ filesystem that has malformed catalog data, and is mounted read-only
  without a metadata directory (bsc#1102870).
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
  yurex_read allowed local attackers to use user access read/writes to crash the
  kernel or potentially escalate privileges (bsc#1106095).
- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent
  attackers for conducting Spectre-v2 attacks against paravirtual guests
  (bsc#1105348).
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322)
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119)

The following non-security bugs were fixed:

- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).
- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).
- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).
- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).
- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).
- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).
- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).
- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).
- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).
- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).
- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).
- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).
- ASoC: blackfin: Fix missing break (bsc#1045538).
- Enforce module signatures if the kernel is locked down (bsc#1093666).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- PCI: Fix TI816X class code quirk (bsc#1050431).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- TPM: Zero buffer whole after copying to userspace (bsc#1050381).
- USB: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- USB: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- USB: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- USB: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).
- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).
- USB: visor: Match I330 phone more precisely (bsc#1047487).
- applicom: dereferencing NULL on error path (git-fixes).
- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).
- base: make module_create_drivers_dir race-free (git-fixes).
- block: fix an error code in add_partition() (bsc#1106209).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).
- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).
- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).
- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).
- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).
- drm: re-enable error handling (bsc#1103884)
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).
- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).
- iommu/vt-d: Do not over-free page table directories (bsc#1106105).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).
- ipv6: correctly add local routes when lo goes up (bsc#1100705).
- ipv6: introduce ip6_rt_put() (bsc#1100705).
- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info-&gt;hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- nbd: ratelimit error msgs after socket close (bsc#1106206).
- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- qlge: Fix netdev features configuration (bsc#1098822).
- resource: fix integer overflow at reallocation (bsc#1045538).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).
- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).
- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).
- s390: detect etoken facility (bnc#1106930, LTC#171029).
- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).
- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- tpm: fix race condition in tpm_common_write() (bsc#1050381).
- tracing/blktrace: Fix to allow setting same value (bsc#1106212).
- tty: vt, fix bogus division in csi_J (git-fixes).
- tty: vt, return error when con_startup fails (git-fixes).
- uml: fix hostfs mknod() (bsc#1106202).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).
- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092772">SUSE bug 1092772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093666">SUSE bug 1093666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097562">SUSE bug 1097562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100705">SUSE bug 1100705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103909">SUSE bug 1103909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104481">SUSE bug 1104481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104901">SUSE bug 1104901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105723">SUSE bug 1105723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106199">SUSE bug 1106199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106202">SUSE bug 1106202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106206">SUSE bug 1106206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106209">SUSE bug 1106209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106212">SUSE bug 1106212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106609">SUSE bug 1106609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106930">SUSE bug 1106930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107064">SUSE bug 1107064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107071">SUSE bug 1107071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107650">SUSE bug 1107650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107949">SUSE bug 1107949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564611" comment="kernel-docs-3.0.101-108.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37287" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="891116" ref_url="https://bugzilla.suse.com/891116" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917968" ref_url="https://bugzilla.suse.com/917968" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="923431" ref_url="https://bugzilla.suse.com/923431" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="928988" ref_url="https://bugzilla.suse.com/928988" source="BUGZILLA"/>
		<reference ref_id="929076" ref_url="https://bugzilla.suse.com/929076" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="932882" ref_url="https://bugzilla.suse.com/932882" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935055" ref_url="https://bugzilla.suse.com/935055" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936095" ref_url="https://bugzilla.suse.com/936095" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936921" ref_url="https://bugzilla.suse.com/936921" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942404" ref_url="https://bugzilla.suse.com/942404" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943477" ref_url="https://bugzilla.suse.com/943477" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.

Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
  VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
  system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 do not properly consider yielding a
  processor, which allowed remote attackers to cause a denial of service
  (system hang) via incorrect checksums within a UDP packet flood
  (bsc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
  values, which allowed remote attackers to cause a denial of service
  (EPOLLET epoll application read outage) via an incorrect checksum in a
  UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
  bypass intended size restrictions and trigger read operations on
  additional memory locations by changing the handle_bytes value of a
  file handle during the execution of this function (bsc#915517).
* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel before 3.16 do not properly consider the
  side effects of failed __copy_to_user_inatomic and
  __copy_from_user_inatomic calls, which allows local users to cause a
  denial of service (system crash) or possibly gain privileges via a
  crafted application, aka an 'I/O' vector array overrun. (bsc#933429)
* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through
  3.19.1 do not properly restrict access to PCI command registers, which
  might allow local guest users to cause a denial of service
  (non-maskable interrupt and host crash) by disabling the (1) memory or
  (2) I/O decoding for a PCI Express device and then accessing the
  device, which triggers an Unsupported Request (UR) response.
  (bsc#919463)
* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before
  3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode
  task, which might allow local users to bypass the seccomp or audit
  protection mechanism via a crafted application that uses the (1) fork
  or (2) close system call, as demonstrated by an attack against seccomp
  before 3.16. (bsc#926240)
* CVE-2015-4700: The bpf_int_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
  local users to cause a denial of service (system crash) by creating a
  packet filter and then loading crafted BPF instructions that trigger
  late convergence by the JIT compiler (bsc#935705).
* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.19.1 did not validate certain length values,
  which allowed local users to cause a denial of service (incorrect data
  representation or integer overflow, and OOPS) via a crafted UDF
  filesystem (bsc#933907).
* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0
  (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as
  used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,
  allows guest OS users to obtain sensitive information from
  uninitialized locations in host OS kernel memory via unspecified
  vectors. (bsc#917830)
* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not validate certain lengths, which allowed local
  users to cause a denial of service (buffer over-read and system crash)
  via a crafted filesystem image, related to fs/udf/inode.c and
  fs/udf/symlink.c (bsc#933904).
* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the
  Linux kernel before 3.18.2 relies on component lengths that are unused,
  which allowed local users to cause a denial of service (system crash)
  via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.18.2 did not ensure a certain data-structure size
  consistency, which allowed local users to cause a denial of service
  (system crash) via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not ensure that space is available for storing a
  symlink target's name along with a trailing \0 character, which allowed
  local users to obtain sensitive information via a crafted filesystem
  image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).

The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- Apparmor: fix file_permission if profile is updated (bsc#917968).
- block: Discard bios do not have data (bsc#928988).
- cifs: Fix missing crypto allocation (bnc#937402).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).
- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm-&gt;def_flags setting in load_elf_binary() (fate#317831,bnc#891116)).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637). 
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn.
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- supported.conf: enable sch_mqprio (bsc#932882)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-09"/>
	<updated date="2015-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891116">SUSE bug 891116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917968">SUSE bug 917968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923431">SUSE bug 923431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928988">SUSE bug 928988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929076">SUSE bug 929076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932882">SUSE bug 932882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935055">SUSE bug 935055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936095">SUSE bug 936095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936921">SUSE bug 936921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942404">SUSE bug 942404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943477">SUSE bug 943477</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564612" comment="kernel-docs-3.0.101-65.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37288" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="912738" ref_url="https://bugzilla.suse.com/912738" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="933782" ref_url="https://bugzilla.suse.com/933782" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951815" ref_url="https://bugzilla.suse.com/951815" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955837" ref_url="https://bugzilla.suse.com/955837" source="BUGZILLA"/>
		<reference ref_id="955925" ref_url="https://bugzilla.suse.com/955925" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959649" ref_url="https://bugzilla.suse.com/959649" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963561" ref_url="https://bugzilla.suse.com/963561" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964818" ref_url="https://bugzilla.suse.com/964818" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966137" ref_url="https://bugzilla.suse.com/966137" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320200)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of service
  or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
  Linux kernel did not verify an address length, which allowed local users
  to obtain sensitive information from kernel memory and bypass the KASLR
  protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in
  the umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in
  ALSA that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
  CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
  handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
  bsc#968012, bsc#968013).

The following non-security bugs were fixed:
- alsa: hda - Add one more node in the EAPD supporting candidate list (bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too (bsc#951815).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also address bsc#966094).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- xen: Update Xen config files (enable upstream block frontend).
- ec2: Update kabi files and start tracking ec2
- xen: consolidate and simplify struct xenbus_driver instantiation (bsc#961658 fate#320200).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658 fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#961658 fate#320200).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. (bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry (bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- s390/cio: collect format 1 channel-path description data (bnc#958000, LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000, LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000, LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation (bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of indirect segments (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed (XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent (bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658 fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658 fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658 fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path (bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658 fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658 fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend (bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658 fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658 fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support (bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together (bsc#961658 fate#320200).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658 fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658 fate#320200).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Skip dirty pages in -&gt;releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912738">SUSE bug 912738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933782">SUSE bug 933782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951815">SUSE bug 951815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955925">SUSE bug 955925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959649">SUSE bug 959649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963561">SUSE bug 963561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964818">SUSE bug 964818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966137">SUSE bug 966137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564613" comment="kernel-docs-3.0.101-71.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37289" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1024450" ref_url="https://bugzilla.suse.com/1024450" source="BUGZILLA"/>
		<reference ref_id="1031358" ref_url="https://bugzilla.suse.com/1031358" source="BUGZILLA"/>
		<reference ref_id="1036286" ref_url="https://bugzilla.suse.com/1036286" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1037667" ref_url="https://bugzilla.suse.com/1037667" source="BUGZILLA"/>
		<reference ref_id="1037669" ref_url="https://bugzilla.suse.com/1037669" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1040609" ref_url="https://bugzilla.suse.com/1040609" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045205" ref_url="https://bugzilla.suse.com/1045205" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051133" ref_url="https://bugzilla.suse.com/1051133" source="BUGZILLA"/>
		<reference ref_id="1051932" ref_url="https://bugzilla.suse.com/1051932" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="1052370" ref_url="https://bugzilla.suse.com/1052370" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053317" ref_url="https://bugzilla.suse.com/1053317" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053933" ref_url="https://bugzilla.suse.com/1053933" source="BUGZILLA"/>
		<reference ref_id="1054070" ref_url="https://bugzilla.suse.com/1054070" source="BUGZILLA"/>
		<reference ref_id="1054076" ref_url="https://bugzilla.suse.com/1054076" source="BUGZILLA"/>
		<reference ref_id="1054093" ref_url="https://bugzilla.suse.com/1054093" source="BUGZILLA"/>
		<reference ref_id="1054247" ref_url="https://bugzilla.suse.com/1054247" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1054706" ref_url="https://bugzilla.suse.com/1054706" source="BUGZILLA"/>
		<reference ref_id="1056230" ref_url="https://bugzilla.suse.com/1056230" source="BUGZILLA"/>
		<reference ref_id="1056504" ref_url="https://bugzilla.suse.com/1056504" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057796" ref_url="https://bugzilla.suse.com/1057796" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1060665" ref_url="https://bugzilla.suse.com/1060665" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061180" ref_url="https://bugzilla.suse.com/1061180" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062842" ref_url="https://bugzilla.suse.com/1062842" source="BUGZILLA"/>
		<reference ref_id="1063301" ref_url="https://bugzilla.suse.com/1063301" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1064803" ref_url="https://bugzilla.suse.com/1064803" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1067816" ref_url="https://bugzilla.suse.com/1067816" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="984530" ref_url="https://bugzilla.suse.com/984530" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-1000112: An exploitable memory corruption due to UFO to non-UFO path switch was fixed. (bnc#1052311 bnc#1052365).

The following non-security bugs were fixed:

- alsa: core: Fix unexpected error at replacing user TLV (bsc#1045538).
- alsa: hda - fix Lewisburg audio issue (fate#319286).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1045538).
- alsa: timer: Add missing mutex lock for compat ioctls (bsc#1045538).
- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- nfs: Cache aggressively when file is open for writing (bsc#1053933).
- nfs: Do drop directory dentry when error clearly requires it (bsc#1051932).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1053933). # Conflicts: #	series.conf
- nfs: Optimize fallocate by refreshing mapping when needed (bsc#1053933).
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- nfs: invalidate file size when taking a lock (bsc#1053933).
- pci: fix hotplug related issues (bnc#1054247, LTC#157731).
- Update config files. (bsc#1057796) The CONFIG_MODULE_SIG_UEFI should be enabled on x86_64/xen architecture because xen can work with shim on x86_64. Enabling the following kernel config to load certificate from db/mok: +CONFIG_MODULE_SIG_BLACKLIST=y +CONFIG_MODULE_SIG_UEFI=y
- af_key: do not use GFP_KERNEL in atomic contexts (bsc#1054093).
- autofs: do not fail mount for transient error (bsc#1065180).
- xen: avoid deadlock in xenbus (bnc#1047523).
- blacklist.conf: Add PCI ASPM fix to blacklist (bsc#1045538)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- bnx2x: prevent crash when accessing PTP with interface down (bsc#1060665).
- cx231xx-audio: fix NULL-deref at probe (bsc#1050431).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- dm bufio: fix integer overflow when limiting maximum cache size (git-fixes).
- drm/mgag200: Fixes for G200eH3. (bnc#1062842)
- fnic: Use the local variable instead of I/O flag to acquire io_req_lock in fnic_queuecommand() to avoid deadloack (bsc#1067816).
- fuse: do not use iocb after it may have been freed (bsc#1054706).
- fuse: fix fuse_write_end() if zero bytes were copied (bsc#1054706).
- fuse: fsync() did not return IO errors (bsc#1054076).
- fuse: fuse_flush must check mapping-&gt;flags for errors (bsc#1054706).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gspca: konica: add missing endpoint sanity check (bsc#1050431).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#909484).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi/severities: Ignore zpci symbol changes (bsc#1054247)
- lib/mpi: mpi_read_raw_data(): fix nbits calculation (fate#314508).
- lpfc: check for valid scsi cmnd in lpfc_scsi_cmd_iocb_cmpl() (bsc#1051133).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061180).
- media: platform: davinci: return -EINVAL for VPFE_CMD_S_CCDC_RAW_PARAMS ioctl (bsc#1050431).
- net: Fix RCU splat in af_key (bsc#1054093).
- netback: coalesce (guest) RX SKBs as needed (bsc#1056504).
- nfs: Fix ugly referral attributes (git-fixes).
- nfs: improve shinking of access cache (bsc#1012917).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609 bsc#1024450).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669 bsc#1037667).
- powerpc/fadump: provide a helpful error message (bsc#1037669 bsc#1037667).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1064861, git-fixes).
- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530, bsc#1052370).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888, git-fixes f2ab6219969f).
- powerpc/slb: Force a full SLB flush when we insert for a bad EA (bsc#1054070).
- powerpc/xics: Harden xics hypervisor backend (bnc#1056230).
- powerpc: Correct instruction code for xxlor instruction (bsc#1064861, git-fixes).
- powerpc: Fix emulation of mfocrf in emulate_step() (bsc#1064861, git-fixes).
- powerpc: Fix the corrupt r3 error during MCE handling (bnc#1056230).
- powerpc: Make sure IPI handlers see data written by IPI senders (bnc#1056230).
- reiserfs: fix race in readdir (bsc#1039803).
- s390/cpcmd,vmcp: avoid GFP_DMA allocations (bnc#1060245, LTC#159112).
- s390/pci: do not cleanup in arch_setup_msi_irqs (bnc#1054247, LTC#157731).
- s390/pci: fix handling of PEC 306 (bnc#1054247, LTC#157731).
- s390/pci: improve error handling during fmb (de)registration (bnc#1054247, LTC#157731).
- s390/pci: improve error handling during interrupt deregistration (bnc#1054247, LTC#157731).
- s390/pci: improve pci hotplug (bnc#1054247, LTC#157731).
- s390/pci: improve unreg_ioat error handling (bnc#1054247, LTC#157731).
- s390/pci: introduce clp_get_state (bnc#1054247, LTC#157731).
- s390/pci: provide more debug information (bnc#1054247, LTC#157731).
- s390/qdio: avoid reschedule of outbound tasklet once killed (bnc#1063301, LTC#159885).
- s390/topology: alternative topology for topology-less machines (bnc#1060245, LTC#159177).
- s390/topology: enable / disable topology dynamically (bnc#1060245, LTC#159177).
- scsi: avoid system stall due to host_busy race (bsc#1031358).
- scsi: close race when updating blocked counters (bsc#1031358).
- scsi: qla2xxx: Get mutex lock before checking optrom_state (bsc#1053317).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1060245, LTC#158494).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1060245, LTC#158494).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1060245, LTC#158493).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1060245, LTC#158494).
- ser_gigaset: return -ENOMEM on error instead of success (bsc#1037441).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- tpm: fix a kernel memory leak in tpm-sysfs.c (bsc#1050381).
- usb-serial: check for NULL private data in pl2303_suse_disconnect (bsc#1064803).
- uwb: fix device quirk on big-endian hosts (bsc#1036629).
- virtio_scsi: do not call virtqueue_add_sgs(... GFP_NOIO) holding spinlock (bsc#1036286).
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- xfs: fix inobt inode allocation search optimization (bsc#1013018).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-11"/>
	<updated date="2017-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024450">SUSE bug 1024450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031358">SUSE bug 1031358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036286">SUSE bug 1036286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037667">SUSE bug 1037667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037669">SUSE bug 1037669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040609">SUSE bug 1040609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045205">SUSE bug 1045205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051133">SUSE bug 1051133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051932">SUSE bug 1051932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052370">SUSE bug 1052370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053317">SUSE bug 1053317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053933">SUSE bug 1053933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054070">SUSE bug 1054070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054076">SUSE bug 1054076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054093">SUSE bug 1054093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054247">SUSE bug 1054247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054706">SUSE bug 1054706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056230">SUSE bug 1056230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056504">SUSE bug 1056504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057796">SUSE bug 1057796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060665">SUSE bug 1060665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061180">SUSE bug 1061180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062842">SUSE bug 1062842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063301">SUSE bug 1063301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064803">SUSE bug 1064803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067816">SUSE bug 1067816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984530">SUSE bug 984530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564614" comment="kernel-docs-3.0.101-108.18.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37290" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1024612" ref_url="https://bugzilla.suse.com/1024612" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066973" ref_url="https://bugzilla.suse.com/1066973" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072457" ref_url="https://bugzilla.suse.com/1072457" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.

  This issue is addressed for the x86_64, the IBM Power and IBM zSeries
  architecture.

- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  This is done with help of Linux Kernel fixes on the Intel/AMD x86_64 and
  IBM zSeries architectures. On x86_64, this requires also updates of the
  CPU microcode packages, delivered in seperate updates.

  For IBM Power and zSeries the required firmware updates are supplied
  over regular channels by IBM.

  As this feature can have a performance impact, it can be disabled using
  the 'nospec' kernel commandline option.

- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This update does this on the Intel x86_64 and IBM Power
  architecture. Updates are also necessary for the ARM architecture,
  but will be delivered in the next round of updates.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).

The following non-security bugs were fixed:

- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1048185).
- autofs: fix careless error in recent commit (bsc#1065180).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- ecryptfs: fix dereference of NULL user_key_payload (bsc#1013018).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1013018).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1013018).
- fs: prevent speculative execution (bnc#1068032).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1045538).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1050431).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1072457, LTC#148203).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390/disassembler: correct disassembly lines alignment (bnc#1066973, LTC#161577).
- s390/disassembler: increase show_code buffer size (bnc#1066973, LTC#161577).
- s390: fix transactional execution control register handling (bnc#1072457, LTC#162116).
- s390: introduce CPU alternatives.
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier.
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- s390/spinlock: add ppa to system call path.
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1066973, LTC#160081).
- temporary fix (bsc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- usb: host: fix incorrect updating of offset (bsc#1047487).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- uvcvideo: prevent speculative execution (bnc#1068032).
- video: udlfb: Fix read EDID timeout (bsc#1045538).
- watchdog: hpwdt: add support for iLO5 (bsc#1024612).
- watchdog/hpwdt: Check source of NMI (bsc#1024612).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
- zd1211rw: fix NULL-deref at probe (bsc#1045479).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024612">SUSE bug 1024612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066973">SUSE bug 1066973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072457">SUSE bug 1072457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564615" comment="kernel-docs-3.0.101-108.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37291" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564616" comment="kernel-docs-3.0.101-108.24.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37292" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1059174" ref_url="https://bugzilla.suse.com/1059174" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069508" ref_url="https://bugzilla.suse.com/1069508" source="BUGZILLA"/>
		<reference ref_id="1070623" ref_url="https://bugzilla.suse.com/1070623" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074880" ref_url="https://bugzilla.suse.com/1074880" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076437" ref_url="https://bugzilla.suse.com/1076437" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077191" ref_url="https://bugzilla.suse.com/1077191" source="BUGZILLA"/>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077487" ref_url="https://bugzilla.suse.com/1077487" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078875" ref_url="https://bugzilla.suse.com/1078875" source="BUGZILLA"/>
		<reference ref_id="1079917" ref_url="https://bugzilla.suse.com/1079917" source="BUGZILLA"/>
		<reference ref_id="1080133" ref_url="https://bugzilla.suse.com/1080133" source="BUGZILLA"/>
		<reference ref_id="1080359" ref_url="https://bugzilla.suse.com/1080359" source="BUGZILLA"/>
		<reference ref_id="1080363" ref_url="https://bugzilla.suse.com/1080363" source="BUGZILLA"/>
		<reference ref_id="1080372" ref_url="https://bugzilla.suse.com/1080372" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080685" ref_url="https://bugzilla.suse.com/1080685" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building
  the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
  did not validate a value that is used during DMA page allocation, leading
  to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
  function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
  net/rds/rdma.c mishandled cases where page pinning fails or an invalid
  address is supplied, leading to an rds_atomic_free_op NULL pointer
  dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in
  net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
  to cause a denial of service (use-after-free and memory corruption)
  or possibly have unspecified other impact by leveraging the presence of
  xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's
  assigned to guests to send ethernet flow control pause frames via the
  PF. (bnc#1077355).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
  attackers to obtain potentially sensitive information from kernel
  memory, aka a write_mmio stack-based out-of-bounds read, related to
  arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream
  kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
  existed in the sound system, this can lead to a deadlock and denial of
  service condition (bnc#1076017).

The following non-security bugs were fixed:

- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache  (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,  bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags &amp; wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,  bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca  (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the  sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059174">SUSE bug 1059174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069508">SUSE bug 1069508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070623">SUSE bug 1070623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074880">SUSE bug 1074880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076437">SUSE bug 1076437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077191">SUSE bug 1077191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077487">SUSE bug 1077487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078875">SUSE bug 1078875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079917">SUSE bug 1079917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080133">SUSE bug 1080133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080359">SUSE bug 1080359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080363">SUSE bug 1080363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080372">SUSE bug 1080372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080685">SUSE bug 1080685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564617" comment="kernel-docs-3.0.101-108.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37293" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090630" ref_url="https://bugzilla.suse.com/1090630" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1091671" ref_url="https://bugzilla.suse.com/1091671" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1091815" ref_url="https://bugzilla.suse.com/1091815" source="BUGZILLA"/>
		<reference ref_id="1092372" ref_url="https://bugzilla.suse.com/1092372" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed
  local users to cause a denial of service (use-after-free) or possibly
  have unspecified other impact via crafted system calls (bnc#1091755).
- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.
- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions
  merged from the upstream kernel.

The following non-security bugs were fixed:

- Avoid quadratic search when freeing delegations (bsc#1084760).
- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).
- hid: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).
- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).
- powerpc/64: Disable gmb() on powerpc
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- series.conf: fix the header It was corrupted back in 2015.
- tracing: Create seq_buf layer in trace_seq (bsc#1091815).
- Update config files. Enable retpolines for i386 build.
- usb: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).
- usb: hub: fix SS hub-descriptor handling (bsc#1092372).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)
- x86/xen: disable IBRS around CPU stopper function invocation
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
- xfs: fix buffer use after free on IO error (bsc#1052943).
- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090630">SUSE bug 1090630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091671">SUSE bug 1091671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092372">SUSE bug 1092372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564618" comment="kernel-docs-3.0.101-108.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37294" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1088343" ref_url="https://bugzilla.suse.com/1088343" source="BUGZILLA"/>
		<reference ref_id="1089386" ref_url="https://bugzilla.suse.com/1089386" source="BUGZILLA"/>
		<reference ref_id="1090607" ref_url="https://bugzilla.suse.com/1090607" source="BUGZILLA"/>
		<reference ref_id="1091659" ref_url="https://bugzilla.suse.com/1091659" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1093600" ref_url="https://bugzilla.suse.com/1093600" source="BUGZILLA"/>
		<reference ref_id="1093710" ref_url="https://bugzilla.suse.com/1093710" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004105.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update main focus is a regression fix in SystemV IPC handling. (bsc#1093600)

The following non-security bugs were fixed:

- Drop cBPF SSBD as classic BPF does not really have a proper concept of pointers, and without eBPF maps the out-of-bounds access in speculative execution branch can't be mounted. Moreoever, seccomp BPF uses only such a subset of BPF that can only do absolute indexing, and therefore seccomp data buffer boundarier can't be crossed. Information condensed from Alexei and Kees.
- ibrs used instead of retpoline on Haswell processor with spectre_v2=retpoline (bsc#1092497)
- ib/mlx4: Convert slave port before building address-handle (bug#919382 FATE#317529).
- KABI protect struct _lowcore (bsc#1089386).
- Update config files, add Spectre mitigation for s390x (bnc#1089386, LTC#166572).
- Update s390 config files (bsc#1089386).
- fanotify: fix logic of events on child (bsc#1013018).
- ipc/msg: Fix faulty parsing of msgctl args (bsc#1093600,bsc#1072689).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1013018).
- powerpc, KVM: Split HVMODE_206 cpu feature bit into separate HV and architecture bits (bsc#1087082).
- powerpc: Fix /proc/cpuinfo revision for POWER9 DD2 (FATE#325713, bsc#1093710).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1091659, LTC#167429).
- s390/dasd: fix IO error for newly defined devices (bnc#1091659, LTC#167398).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1091659, LTC#168037).
- s390/qeth: on channel error, reject further cmd requests (bnc#1088343, LTC#165985).
- s390: add automatic detection of the spectre defense (bnc#1089386, LTC#166572).
- s390: add optimized array_index_mask_nospec (bnc#1089386, LTC#166572).
- s390: add sysfs attributes for spectre (bnc#1089386, LTC#166572).
- s390: correct module section names for expoline code revert (bsc#1089386).
- s390: correct nospec auto detection init order (bnc#1089386, LTC#166572).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1089386, LTC#166572).
- s390: fix retpoline build on 31bit (bsc#1089386).
- s390: improve cpu alternative handling for gmb and nobp (bnc#1089386, LTC#166572).
- s390: introduce execute-trampolines for branches (bnc#1089386, LTC#166572).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1089386, LTC#166572).
- s390: report spectre mitigation via syslog (bnc#1089386, LTC#166572).
- s390: run user space and KVM guests with modified branch prediction (bnc#1089386, LTC#166572).
- s390: scrub registers on kernel entry and KVM exit (bnc#1089386, LTC#166572).
- x86, mce: Fix mce_start_timer semantics (bsc#1090607).
- x86/kaiser: symbol kaiser_set_shadow_pgd() exported with non GPL
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-31"/>
	<updated date="2018-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088343">SUSE bug 1088343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089386">SUSE bug 1089386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090607">SUSE bug 1090607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091659">SUSE bug 1091659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093600">SUSE bug 1093600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093710">SUSE bug 1093710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564619" comment="kernel-docs-3.0.101-108.52.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37295" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).
- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564620" comment="kernel-docs-3.0.101-108.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37296" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004663.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-17182: An issue was discovered in the Linux kernel The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).

The following non-security bugs were fixed:

- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-11"/>
	<updated date="2018-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564621" comment="kernel-docs-3.0.101-108.77.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37297" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031572" ref_url="https://bugzilla.suse.com/1031572" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1086695" ref_url="https://bugzilla.suse.com/1086695" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1114440" ref_url="https://bugzilla.suse.com/1114440" source="BUGZILLA"/>
		<reference ref_id="1114672" ref_url="https://bugzilla.suse.com/1114672" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1115827" ref_url="https://bugzilla.suse.com/1115827" source="BUGZILLA"/>
		<reference ref_id="1115828" ref_url="https://bugzilla.suse.com/1115828" source="BUGZILLA"/>
		<reference ref_id="1115829" ref_url="https://bugzilla.suse.com/1115829" source="BUGZILLA"/>
		<reference ref_id="1115830" ref_url="https://bugzilla.suse.com/1115830" source="BUGZILLA"/>
		<reference ref_id="1115831" ref_url="https://bugzilla.suse.com/1115831" source="BUGZILLA"/>
		<reference ref_id="1115832" ref_url="https://bugzilla.suse.com/1115832" source="BUGZILLA"/>
		<reference ref_id="1115833" ref_url="https://bugzilla.suse.com/1115833" source="BUGZILLA"/>
		<reference ref_id="1115834" ref_url="https://bugzilla.suse.com/1115834" source="BUGZILLA"/>
		<reference ref_id="1115835" ref_url="https://bugzilla.suse.com/1115835" source="BUGZILLA"/>
		<reference ref_id="1115836" ref_url="https://bugzilla.suse.com/1115836" source="BUGZILLA"/>
		<reference ref_id="1115837" ref_url="https://bugzilla.suse.com/1115837" source="BUGZILLA"/>
		<reference ref_id="1115838" ref_url="https://bugzilla.suse.com/1115838" source="BUGZILLA"/>
		<reference ref_id="1115839" ref_url="https://bugzilla.suse.com/1115839" source="BUGZILLA"/>
		<reference ref_id="1115840" ref_url="https://bugzilla.suse.com/1115840" source="BUGZILLA"/>
		<reference ref_id="1115841" ref_url="https://bugzilla.suse.com/1115841" source="BUGZILLA"/>
		<reference ref_id="1115842" ref_url="https://bugzilla.suse.com/1115842" source="BUGZILLA"/>
		<reference ref_id="1115843" ref_url="https://bugzilla.suse.com/1115843" source="BUGZILLA"/>
		<reference ref_id="1115844" ref_url="https://bugzilla.suse.com/1115844" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117796" ref_url="https://bugzilla.suse.com/1117796" source="BUGZILLA"/>
		<reference ref_id="1117802" ref_url="https://bugzilla.suse.com/1117802" source="BUGZILLA"/>
		<reference ref_id="1117805" ref_url="https://bugzilla.suse.com/1117805" source="BUGZILLA"/>
		<reference ref_id="1117806" ref_url="https://bugzilla.suse.com/1117806" source="BUGZILLA"/>
		<reference ref_id="1117943" ref_url="https://bugzilla.suse.com/1117943" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118760" ref_url="https://bugzilla.suse.com/1118760" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120056" ref_url="https://bugzilla.suse.com/1120056" source="BUGZILLA"/>
		<reference ref_id="1120077" ref_url="https://bugzilla.suse.com/1120077" source="BUGZILLA"/>
		<reference ref_id="1120086" ref_url="https://bugzilla.suse.com/1120086" source="BUGZILLA"/>
		<reference ref_id="1120093" ref_url="https://bugzilla.suse.com/1120093" source="BUGZILLA"/>
		<reference ref_id="1120094" ref_url="https://bugzilla.suse.com/1120094" source="BUGZILLA"/>
		<reference ref_id="1120105" ref_url="https://bugzilla.suse.com/1120105" source="BUGZILLA"/>
		<reference ref_id="1120107" ref_url="https://bugzilla.suse.com/1120107" source="BUGZILLA"/>
		<reference ref_id="1120109" ref_url="https://bugzilla.suse.com/1120109" source="BUGZILLA"/>
		<reference ref_id="1120217" ref_url="https://bugzilla.suse.com/1120217" source="BUGZILLA"/>
		<reference ref_id="1120223" ref_url="https://bugzilla.suse.com/1120223" source="BUGZILLA"/>
		<reference ref_id="1120226" ref_url="https://bugzilla.suse.com/1120226" source="BUGZILLA"/>
		<reference ref_id="1120336" ref_url="https://bugzilla.suse.com/1120336" source="BUGZILLA"/>
		<reference ref_id="1120347" ref_url="https://bugzilla.suse.com/1120347" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1121997" ref_url="https://bugzilla.suse.com/1121997" source="BUGZILLA"/>
		<reference ref_id="1122874" ref_url="https://bugzilla.suse.com/1122874" source="BUGZILLA"/>
		<reference ref_id="1123505" ref_url="https://bugzilla.suse.com/1123505" source="BUGZILLA"/>
		<reference ref_id="1123702" ref_url="https://bugzilla.suse.com/1123702" source="BUGZILLA"/>
		<reference ref_id="1123706" ref_url="https://bugzilla.suse.com/1123706" source="BUGZILLA"/>
		<reference ref_id="1124010" ref_url="https://bugzilla.suse.com/1124010" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125931" ref_url="https://bugzilla.suse.com/1125931" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="969471" ref_url="https://bugzilla.suse.com/969471" source="BUGZILLA"/>
		<reference ref_id="969473" ref_url="https://bugzilla.suse.com/969473" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741/" source="CVE"/>
		<reference ref_id="CVE-2017-18360" ref_url="https://www.suse.com/security/cve/CVE-2017-18360/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-18360: In change_port_settings in drivers/usb/serial/io_ti.c local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates (bnc#1123706).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2019-7222: A information leak in exception handling in KVM could be used to expose host memory to guests. (bnc#1124735).

The following non-security bugs were fixed:

- aacraid: Fix memory leak in aac_fib_map_free (bsc#1115827).
- arcmsr: upper 32 of dma address lost (bsc#1115828).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (bsc#1121997).
- block/swim: Fix array bounds check (Git-fix).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- dasd: fix deadlock in dasd_times_out (bnc#1117943, LTC#174111).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106886)
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106886)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106886)
- Fix kabi break cased by NFS: Cache state owners after files are closed (bsc#1031572).
- fork: record start_time late (bsc#1121872).
- fscache: Fix dead object requeue (bsc#1107371).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (git-fixes).
- fs-cache: Move fscache_report_unexpected_submission() to make it more available (bsc#1107371).
- fs-cache: When submitting an op, cancel it if the target object is dying (bsc#1107371).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (git-fixes).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: Fix oops at process_init_reply() (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: umount should wait for all requests (git-fixes).
- igb: do not unmap NULL hw_addr (bsc#969471 bsc#969473 ) (bsc#1123702).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382) (bsc#1123702).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- kvm: x86: Fix the duplicated failure path handling in vmx_init (bsc#1104367).
- lib: add 'on'/'off' support to strtobool (bsc#1125931).
- megaraid_sas: Fix probing cards without io port (bsc#1115829).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114440, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114440, LTC#172679).
- nfs: Cache state owners after files are closed (bsc#1031572).
- nfs: Do not drop CB requests with invalid principals (git-fixes).
- nfsv4.1: Fix a kfree() of uninitialised pointers in decode_cb_sequence_args (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- nfsv4: Keep dropped state owners on the LRU list for a while (bsc#1031572).
- nlm: Ensure callback code also checks that the files match (git-fixes).
- ocfs2: fix three small problems in the patch (bsc#1086695)
- omap2fb: Fix stack memory disclosure (bsc#1106886)
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- powerpc/fadump: handle crash memory ranges array index overflow (git-fixes).
- powerpc/fadump: Return error when fadump registration fails (git-fixes).
- powerpc/fadump: Unregister fadump on kexec down path (git-fixes).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- Revert 'NFS: Make close(2) asynchronous when closing NFS O_DIRECT files' (git-fixes).
- ring-buffer: Always reset iterator to reader page (bsc#1120107).
- ring-buffer: Fix first commit on sub-buffer having non-zero delta (bsc#1120077).
- ring-buffer: Fix infinite spin in reading buffer (bsc#1120107).
- ring-buffer: Have ring_buffer_iter_empty() return true when empty (bsc#1120107).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- ring-buffer: Up rb_iter_peek() loop count to 3 (bsc#1120105).
- rpm/modprobe-xen.conf: Add --ignore-install.
- s390: always save and restore all registers on context switch (git-fixes).
- s390/dasd: fix using offset into zero size array error (git-fixes).
- s390/decompressor: fix initrd corruption caused by bss clear (git-fixes).
- s390/qdio: do not release memory in qdio_setup_irq() (git-fixes).
- s390/qdio: reset old sbal_state flags (bnc#1114440, LTC#171525).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114440, LTC#172682).
- s390/qeth: fix length check in SNMP processing (bnc#1117943, LTC#173657).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114440, LTC#172682).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/qeth: remove outdated portname debug msg (bnc#1117943, LTC#172960).
- s390/qeth: sanitize strings in debug messages (bnc#1117943, LTC#172960).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: aacraid: Fix typo in blink status (bsc#1115830).
- scsi: aacraid: Reorder Adapter status check (bsc#1115830).
- scsi: aic94xx: fix an error code in aic94xx_init() (bsc#1115831).
- scsi: bfa: integer overflow in debugfs (bsc#1115832).
- scsi: esp_scsi: Track residual for PIO transfers (bsc#1115833).
- scsi: fas216: fix sense buffer initialization (bsc#1115834).
- scsi: libfc: Revert ' libfc: use offload EM instance again instead jumping to next EM' (bsc#1115835).
- scsi: libsas: fix ata xfer length (bsc#1115836).
- scsi: libsas: fix error when getting phy events (bsc#1115837).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1115838).
- scsi: megaraid_sas: Fix data integrity failure for JBOD (passthrough) devices (bsc#1115839).
- scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression (bsc#1115839).
- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1115840).
- scsi: qla2xxx: shutdown chip if reset fail (bsc#1115841).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1115842).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bsc#1115843).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (git-fixes).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1123505, LTC#174581).
- sg: fix dxferp in from_to case (bsc#1115844).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- svc: Avoid garbage replies when pc_func() returns rpc_drop_reply (git-fixes).
- svcrpc: do not leak contexts on PROC_DESTROY (git-fixes).
- tracepoints: Do not trace when cpu is offline (bsc#1120109).
- tracing: Add #undef to fix compile error (bsc#1120226).
- tracing: Allow events to have NULL strings (bsc#1120056).
- tracing: Do not add event files for modules that fail tracepoints (bsc#1120086).
- tracing: Fix check for cpu online when event is disabled (bsc#1120109).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing/kprobes: Allow to create probe with a module name starting with a digit (bsc#1120336).
- tracing: Move mutex to protect against resetting of seq data (bsc#1120217).
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1120347).
- usb: keyspan: fix overrun-error reporting (bsc#1114672).
- usb: keyspan: fix tty line-status reporting (bsc#1114672).
- usb: option: fix Cinterion AHxx enumeration (bsc#1114672).
- usb: serial: ark3116: fix open error handling (bsc#1114672).
- usb: serial: ch341: fix control-message error handling (bsc#1114672).
- usb: serial: ch341: fix initial modem-control state (bsc#1114672).
- usb: serial: ch341: fix modem-status handling (bsc#1114672).
- usb: serial: ch341: fix open and resume after B0 (bsc#1114672).
- usb: serial: ch341: fix resume after reset (bsc#1114672).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1114672).
- usb: serial: cyberjack: fix NULL-deref at open (bsc#1114672).
- usb: serial: fix tty-device error handling at probe (bsc#1114672).
- usb: serial: ftdi_sio: fix modem-status error handling (bsc#1114672).
- usb: serial: io_ti: fix another NULL-deref at open (bsc#1114672).
- usb: serial: io_ti: fix NULL-deref at open (bsc#1114672).
- usb: serial: keyspan_pda: verify endpoints at probe (bsc#1114672).
- usb: serial: kl5kusb105: abort on open exception path (bsc#1114672).
- usb: serial: kl5kusb105: fix open error path (bsc#1114672).
- usb: serial: kobil_sct: fix NULL-deref in write (bsc#1114672).
- usb: serial: mct_u232: fix modem-status error handling (bsc#1114672).
- usb: serial: omninet: fix NULL-derefs at open and disconnect.
- usb: serial: pl2303: fix NULL-deref at open (bsc#1114672).
- usb: serial: ti_usb_3410_5052: fix NULL-deref at open (bsc#1114672).
- vmcore: Remove 'weak' from function declarations (git-fixes).
- x86, kvm: Remove incorrect redundant assembly constraint (bnc#931850).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081, bnc#1104684).
- xen: kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen: x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen/x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/process: Re-export start_thread() (bsc#1110006).
- xen/x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen/x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- xen/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen/x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix the logspace waiting algorithm (bsc#1122874).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031572">SUSE bug 1031572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086695">SUSE bug 1086695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114440">SUSE bug 1114440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114672">SUSE bug 1114672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115827">SUSE bug 1115827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115828">SUSE bug 1115828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115829">SUSE bug 1115829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115830">SUSE bug 1115830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115831">SUSE bug 1115831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115832">SUSE bug 1115832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115833">SUSE bug 1115833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115834">SUSE bug 1115834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115835">SUSE bug 1115835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115836">SUSE bug 1115836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115837">SUSE bug 1115837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115838">SUSE bug 1115838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115839">SUSE bug 1115839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115840">SUSE bug 1115840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115841">SUSE bug 1115841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115842">SUSE bug 1115842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115843">SUSE bug 1115843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115844">SUSE bug 1115844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117796">SUSE bug 1117796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117802">SUSE bug 1117802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117805">SUSE bug 1117805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117806">SUSE bug 1117806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117943">SUSE bug 1117943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118760">SUSE bug 1118760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120056">SUSE bug 1120056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120077">SUSE bug 1120077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120086">SUSE bug 1120086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120093">SUSE bug 1120093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120094">SUSE bug 1120094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120105">SUSE bug 1120105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120107">SUSE bug 1120107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120109">SUSE bug 1120109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120217">SUSE bug 1120217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120223">SUSE bug 1120223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120226">SUSE bug 1120226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120336">SUSE bug 1120336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120347">SUSE bug 1120347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121997">SUSE bug 1121997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122874">SUSE bug 1122874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123505">SUSE bug 1123505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123702">SUSE bug 1123702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125931">SUSE bug 1125931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969471">SUSE bug 969471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969473">SUSE bug 969473</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18360/">CVE-2017-18360</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564622" comment="kernel-docs-3.0.101-108.87.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37298" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="921081" ref_url="https://bugzilla.suse.com/921081" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="930835" ref_url="https://bugzilla.suse.com/930835" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944677" ref_url="https://bugzilla.suse.com/944677" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946214" ref_url="https://bugzilla.suse.com/946214" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="950298" ref_url="https://bugzilla.suse.com/950298" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953799" ref_url="https://bugzilla.suse.com/953799" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="954950" ref_url="https://bugzilla.suse.com/954950" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921081">SUSE bug 921081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930835">SUSE bug 930835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944677">SUSE bug 944677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946214">SUSE bug 946214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950298">SUSE bug 950298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953799">SUSE bug 953799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954950">SUSE bug 954950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564623" comment="kernel-docs-3.0.101-68.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37299" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="676471" ref_url="https://bugzilla.suse.com/676471" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="898592" ref_url="https://bugzilla.suse.com/898592" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="946122" ref_url="https://bugzilla.suse.com/946122" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="956491" ref_url="https://bugzilla.suse.com/956491" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="959381" ref_url="https://bugzilla.suse.com/959381" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="961518" ref_url="https://bugzilla.suse.com/961518" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="963998" ref_url="https://bugzilla.suse.com/963998" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="965860" ref_url="https://bugzilla.suse.com/965860" source="BUGZILLA"/>
		<reference ref_id="965923" ref_url="https://bugzilla.suse.com/965923" source="BUGZILLA"/>
		<reference ref_id="966245" ref_url="https://bugzilla.suse.com/966245" source="BUGZILLA"/>
		<reference ref_id="967863" ref_url="https://bugzilla.suse.com/967863" source="BUGZILLA"/>
		<reference ref_id="967914" ref_url="https://bugzilla.suse.com/967914" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968500" ref_url="https://bugzilla.suse.com/968500" source="BUGZILLA"/>
		<reference ref_id="968566" ref_url="https://bugzilla.suse.com/968566" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="968687" ref_url="https://bugzilla.suse.com/968687" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="969391" ref_url="https://bugzilla.suse.com/969391" source="BUGZILLA"/>
		<reference ref_id="969571" ref_url="https://bugzilla.suse.com/969571" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971433" ref_url="https://bugzilla.suse.com/971433" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="971947" ref_url="https://bugzilla.suse.com/971947" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="972363" ref_url="https://bugzilla.suse.com/972363" source="BUGZILLA"/>
		<reference ref_id="973237" ref_url="https://bugzilla.suse.com/973237" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973556" ref_url="https://bugzilla.suse.com/973556" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="974787" ref_url="https://bugzilla.suse.com/974787" source="BUGZILLA"/>
		<reference ref_id="975358" ref_url="https://bugzilla.suse.com/975358" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="976739" ref_url="https://bugzilla.suse.com/976739" source="BUGZILLA"/>
		<reference ref_id="976868" ref_url="https://bugzilla.suse.com/976868" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979347" ref_url="https://bugzilla.suse.com/979347" source="BUGZILLA"/>
		<reference ref_id="979419" ref_url="https://bugzilla.suse.com/979419" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981231" ref_url="https://bugzilla.suse.com/981231" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="982532" ref_url="https://bugzilla.suse.com/982532" source="BUGZILLA"/>
		<reference ref_id="982691" ref_url="https://bugzilla.suse.com/982691" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable changes in this kernel:
- It is now possible to mount a NFS export on the exporting host directly.

The following security bugs were fixed:
- CVE-2016-5244: A kernel information leak in rds_inc_info_copy was fixed that could leak kernel stack memory to userspace (bsc#983213).
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacked a bulk-out endpoint (bnc#961512).

The following non-security bugs were fixed:
- acpi / PCI: Account for ARI in _PRT lookups (bsc#968566).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- alsa: hrtimer: Handle start/stop more properly (bsc#973378).
- alsa: oxygen: add Xonar DGX support (bsc#982691).
- alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018).
- alsa: rawmidi: Fix race at copying and updating the position (bsc#968018).
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix double port list deletion (bsc#968018).
- alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).
- alsa: seq: Fix race at closing in virmidi driver (bsc#968018).
- alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018).
- alsa: timer: Call notifier in the same spinlock (bsc#973378).
- alsa: timer: Code cleanup (bsc#968018).
- alsa: timer: Fix leftover link at closing (bsc#968018).
- alsa: timer: Fix link corruption due to double start or stop (bsc#968018).
- alsa: timer: Fix race between stop and interrupt (bsc#968018).
- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
- alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- alsa: timer: Sync timer deletion at closing the system timer (bsc#973378).
- alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- hid-elo: kill not flush the work (bnc#982532).
- hpsa: fix issues with multilun devices (bsc#959381).
- hv: Assign correct -&gt;can_queue value in hv_storvsc (bnc#969391)
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- Import kabi files from kernel 3.0.101-71
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- ipvs: count pre-established TCP states as active (bsc#970114).
- isofs: Revert 'get_rock_ridge_filename(): handle malformed NM entries' This reverts commit cb6ce3ec7a964e56da9ba9cd3c9f0e708b5c3b2c. It should have never landed in the tree (we already have the patch via c63531c60ff that came through CVE branch), but I messed up the merge.
- kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- llist: Add llist_next().
- make vfree() safe to call from interrupt contexts .
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433).
- net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433).
- net/core: __hw_addr_sync_one / _multiple broken (bsc#971433).
- net/core: __hw_addr_unsync_one 'from' address not marked synced (bsc#971433).
- NFS4: treat lock owners as opaque values (bnc#968141).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFSd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237).
- NFSd: do not fail unchecked creates of non-special files (bsc#973237).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFS: use smaller allocations for 'struct idmap' (bsc#965923).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nvme: fix max_segments integer truncation (bsc#676471).
- NVMe: Unify controller probe and resume (bsc#979347).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- PCI: Move pci_ari_enabled() to global header (bsc#968566).
- RDMA/ucma: Fix AB-BA deadlock (bsc#963998).
- Restore kabi after lock-owner change (bnc#968141).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci_dma: fix DMA table corruption with &gt; 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- SCSI mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- Tidy series.conf, p5 Only one last patch which can be moved easily. There are some more x86-related things left at the end but moving them won't be that trivial.
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- vmxnet3: set carrier state properly on probe (bsc#972363).
- vmxnet3: set netdev parant device before calling netdev_info (bsc#972363).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- xfrm: do not segment UFO packets (bsc#946122).
- xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-24"/>
	<updated date="2016-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/676471">SUSE bug 676471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898592">SUSE bug 898592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946122">SUSE bug 946122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956491">SUSE bug 956491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959381">SUSE bug 959381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961518">SUSE bug 961518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963998">SUSE bug 963998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965860">SUSE bug 965860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965923">SUSE bug 965923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966245">SUSE bug 966245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967863">SUSE bug 967863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967914">SUSE bug 967914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968500">SUSE bug 968500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968566">SUSE bug 968566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968687">SUSE bug 968687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969391">SUSE bug 969391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969571">SUSE bug 969571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971433">SUSE bug 971433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971947">SUSE bug 971947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972363">SUSE bug 972363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973237">SUSE bug 973237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973556">SUSE bug 973556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974787">SUSE bug 974787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975358">SUSE bug 975358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976739">SUSE bug 976739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976868">SUSE bug 976868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979347">SUSE bug 979347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979419">SUSE bug 979419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981231">SUSE bug 981231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982532">SUSE bug 982532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982691">SUSE bug 982691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564624" comment="kernel-docs-3.0.101-77.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37300" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564625" comment="kernel-docs-3.0.101-84.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37301" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00033.html" source="SUSE-SU"/>
		<description>
This Linux kernel update for SUSE Linux Enterprise 11 SP4 fixes the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340, bsc#1045406]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564626" comment="kernel-docs-3.0.101-107.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37302" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00080.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote code execution vulnerability.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564627" comment="kernel-docs-3.0.101-108.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37303" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052351" ref_url="https://bugzilla.suse.com/1052351" source="BUGZILLA"/>
		<reference ref_id="1068054" ref_url="https://bugzilla.suse.com/1068054" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1080837" ref_url="https://bugzilla.suse.com/1080837" source="BUGZILLA"/>
		<reference ref_id="1083347" ref_url="https://bugzilla.suse.com/1083347" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1088997" ref_url="https://bugzilla.suse.com/1088997" source="BUGZILLA"/>
		<reference ref_id="1088998" ref_url="https://bugzilla.suse.com/1088998" source="BUGZILLA"/>
		<reference ref_id="1088999" ref_url="https://bugzilla.suse.com/1088999" source="BUGZILLA"/>
		<reference ref_id="1089000" ref_url="https://bugzilla.suse.com/1089000" source="BUGZILLA"/>
		<reference ref_id="1089001" ref_url="https://bugzilla.suse.com/1089001" source="BUGZILLA"/>
		<reference ref_id="1089002" ref_url="https://bugzilla.suse.com/1089002" source="BUGZILLA"/>
		<reference ref_id="1089003" ref_url="https://bugzilla.suse.com/1089003" source="BUGZILLA"/>
		<reference ref_id="1089004" ref_url="https://bugzilla.suse.com/1089004" source="BUGZILLA"/>
		<reference ref_id="1089005" ref_url="https://bugzilla.suse.com/1089005" source="BUGZILLA"/>
		<reference ref_id="1089006" ref_url="https://bugzilla.suse.com/1089006" source="BUGZILLA"/>
		<reference ref_id="1089007" ref_url="https://bugzilla.suse.com/1089007" source="BUGZILLA"/>
		<reference ref_id="1089008" ref_url="https://bugzilla.suse.com/1089008" source="BUGZILLA"/>
		<reference ref_id="1089010" ref_url="https://bugzilla.suse.com/1089010" source="BUGZILLA"/>
		<reference ref_id="1089011" ref_url="https://bugzilla.suse.com/1089011" source="BUGZILLA"/>
		<reference ref_id="1089012" ref_url="https://bugzilla.suse.com/1089012" source="BUGZILLA"/>
		<reference ref_id="1089013" ref_url="https://bugzilla.suse.com/1089013" source="BUGZILLA"/>
		<reference ref_id="1089016" ref_url="https://bugzilla.suse.com/1089016" source="BUGZILLA"/>
		<reference ref_id="1089192" ref_url="https://bugzilla.suse.com/1089192" source="BUGZILLA"/>
		<reference ref_id="1089199" ref_url="https://bugzilla.suse.com/1089199" source="BUGZILLA"/>
		<reference ref_id="1089200" ref_url="https://bugzilla.suse.com/1089200" source="BUGZILLA"/>
		<reference ref_id="1089201" ref_url="https://bugzilla.suse.com/1089201" source="BUGZILLA"/>
		<reference ref_id="1089202" ref_url="https://bugzilla.suse.com/1089202" source="BUGZILLA"/>
		<reference ref_id="1089203" ref_url="https://bugzilla.suse.com/1089203" source="BUGZILLA"/>
		<reference ref_id="1089204" ref_url="https://bugzilla.suse.com/1089204" source="BUGZILLA"/>
		<reference ref_id="1089205" ref_url="https://bugzilla.suse.com/1089205" source="BUGZILLA"/>
		<reference ref_id="1089206" ref_url="https://bugzilla.suse.com/1089206" source="BUGZILLA"/>
		<reference ref_id="1089207" ref_url="https://bugzilla.suse.com/1089207" source="BUGZILLA"/>
		<reference ref_id="1089208" ref_url="https://bugzilla.suse.com/1089208" source="BUGZILLA"/>
		<reference ref_id="1089209" ref_url="https://bugzilla.suse.com/1089209" source="BUGZILLA"/>
		<reference ref_id="1089210" ref_url="https://bugzilla.suse.com/1089210" source="BUGZILLA"/>
		<reference ref_id="1089211" ref_url="https://bugzilla.suse.com/1089211" source="BUGZILLA"/>
		<reference ref_id="1089212" ref_url="https://bugzilla.suse.com/1089212" source="BUGZILLA"/>
		<reference ref_id="1089213" ref_url="https://bugzilla.suse.com/1089213" source="BUGZILLA"/>
		<reference ref_id="1089214" ref_url="https://bugzilla.suse.com/1089214" source="BUGZILLA"/>
		<reference ref_id="1089215" ref_url="https://bugzilla.suse.com/1089215" source="BUGZILLA"/>
		<reference ref_id="1089216" ref_url="https://bugzilla.suse.com/1089216" source="BUGZILLA"/>
		<reference ref_id="1089217" ref_url="https://bugzilla.suse.com/1089217" source="BUGZILLA"/>
		<reference ref_id="1089218" ref_url="https://bugzilla.suse.com/1089218" source="BUGZILLA"/>
		<reference ref_id="1089219" ref_url="https://bugzilla.suse.com/1089219" source="BUGZILLA"/>
		<reference ref_id="1089220" ref_url="https://bugzilla.suse.com/1089220" source="BUGZILLA"/>
		<reference ref_id="1089221" ref_url="https://bugzilla.suse.com/1089221" source="BUGZILLA"/>
		<reference ref_id="1089222" ref_url="https://bugzilla.suse.com/1089222" source="BUGZILLA"/>
		<reference ref_id="1089223" ref_url="https://bugzilla.suse.com/1089223" source="BUGZILLA"/>
		<reference ref_id="1089224" ref_url="https://bugzilla.suse.com/1089224" source="BUGZILLA"/>
		<reference ref_id="1089225" ref_url="https://bugzilla.suse.com/1089225" source="BUGZILLA"/>
		<reference ref_id="1089226" ref_url="https://bugzilla.suse.com/1089226" source="BUGZILLA"/>
		<reference ref_id="1089227" ref_url="https://bugzilla.suse.com/1089227" source="BUGZILLA"/>
		<reference ref_id="1089228" ref_url="https://bugzilla.suse.com/1089228" source="BUGZILLA"/>
		<reference ref_id="1089229" ref_url="https://bugzilla.suse.com/1089229" source="BUGZILLA"/>
		<reference ref_id="1089230" ref_url="https://bugzilla.suse.com/1089230" source="BUGZILLA"/>
		<reference ref_id="1089231" ref_url="https://bugzilla.suse.com/1089231" source="BUGZILLA"/>
		<reference ref_id="1089232" ref_url="https://bugzilla.suse.com/1089232" source="BUGZILLA"/>
		<reference ref_id="1089233" ref_url="https://bugzilla.suse.com/1089233" source="BUGZILLA"/>
		<reference ref_id="1089234" ref_url="https://bugzilla.suse.com/1089234" source="BUGZILLA"/>
		<reference ref_id="1089235" ref_url="https://bugzilla.suse.com/1089235" source="BUGZILLA"/>
		<reference ref_id="1089236" ref_url="https://bugzilla.suse.com/1089236" source="BUGZILLA"/>
		<reference ref_id="1089237" ref_url="https://bugzilla.suse.com/1089237" source="BUGZILLA"/>
		<reference ref_id="1089238" ref_url="https://bugzilla.suse.com/1089238" source="BUGZILLA"/>
		<reference ref_id="1089239" ref_url="https://bugzilla.suse.com/1089239" source="BUGZILLA"/>
		<reference ref_id="1089240" ref_url="https://bugzilla.suse.com/1089240" source="BUGZILLA"/>
		<reference ref_id="1089241" ref_url="https://bugzilla.suse.com/1089241" source="BUGZILLA"/>
		<reference ref_id="1093194" ref_url="https://bugzilla.suse.com/1093194" source="BUGZILLA"/>
		<reference ref_id="1093195" ref_url="https://bugzilla.suse.com/1093195" source="BUGZILLA"/>
		<reference ref_id="1093196" ref_url="https://bugzilla.suse.com/1093196" source="BUGZILLA"/>
		<reference ref_id="1093197" ref_url="https://bugzilla.suse.com/1093197" source="BUGZILLA"/>
		<reference ref_id="1093198" ref_url="https://bugzilla.suse.com/1093198" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094421" ref_url="https://bugzilla.suse.com/1094421" source="BUGZILLA"/>
		<reference ref_id="1094422" ref_url="https://bugzilla.suse.com/1094422" source="BUGZILLA"/>
		<reference ref_id="1094423" ref_url="https://bugzilla.suse.com/1094423" source="BUGZILLA"/>
		<reference ref_id="1094424" ref_url="https://bugzilla.suse.com/1094424" source="BUGZILLA"/>
		<reference ref_id="1094425" ref_url="https://bugzilla.suse.com/1094425" source="BUGZILLA"/>
		<reference ref_id="1094436" ref_url="https://bugzilla.suse.com/1094436" source="BUGZILLA"/>
		<reference ref_id="1094437" ref_url="https://bugzilla.suse.com/1094437" source="BUGZILLA"/>
		<reference ref_id="1095241" ref_url="https://bugzilla.suse.com/1095241" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096746" ref_url="https://bugzilla.suse.com/1096746" source="BUGZILLA"/>
		<reference ref_id="1097443" ref_url="https://bugzilla.suse.com/1097443" source="BUGZILLA"/>
		<reference ref_id="1097445" ref_url="https://bugzilla.suse.com/1097445" source="BUGZILLA"/>
		<reference ref_id="1097948" ref_url="https://bugzilla.suse.com/1097948" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This new feature was added:

- Btrfs: Remove empty block groups in the background

The following security bugs were fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Btrfs: Avoid trucating page or punching hole in a already existed hole (bsc#1088998).
- Btrfs: Avoid truncate tailing page if fallocate range does not exceed inode size (bsc#1094424).
- Btrfs: Fix lost-data-profile caused by auto removing bg.
- Btrfs: Fix misuse of chunk mutex
- Btrfs: Fix out-of-space bug (bsc#1089231).
- Btrfs: Set relative data on clear btrfs_block_group_cache-&gt;pinned.
- Btrfs: Use ref_cnt for set_block_group_ro() (bsc#1089239).
- Btrfs: add alloc_fs_devices and switch to it (bsc#1089205).
- Btrfs: add btrfs_alloc_device and switch to it (bsc#1089204).
- Btrfs: add missing discards when unpinning extents with -o discard.
- Btrfs: add missing inode update when punching hole (bsc#1089006).
- Btrfs: add support for asserts (bsc#1089207).
- Btrfs: avoid syncing log in the fast fsync path when not necessary (bsc#1089010).
- Btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries.
- Btrfs: check pending chunks when shrinking fs to avoid corruption (bsc#1089235).
- Btrfs: cleanup backref search commit root flag stuff (bsc#1089200).
- Btrfs: delete chunk allocation attemp when setting block group ro.
- Btrfs: do not leak transaction in btrfs_sync_file() (bsc#1089210).
- Btrfs: do not mix the ordered extents of all files together during logging the inodes (bsc#1089214).
- Btrfs: do not remove extents and xattrs when logging new names (bsc#1089005).
- Btrfs: eliminate races in worker stopping code (bsc#1089211).
- Btrfs: ensure deletion from pinned_chunks list is protected.
- Btrfs: explictly delete unused block groups in close_ctree and ro-remount.
- Btrfs: fix -ENOSPC on block group removal.
- Btrfs: fix -ENOSPC when finishing block group creation.
- Btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group.
- Btrfs: fix NULL pointer crash when running balance and scrub concurrently (bsc#1089220).
- Btrfs: fix chunk allocation regression leading to transaction abort (bsc#1089236).
- Btrfs: fix crash caused by block group removal.
- Btrfs: fix data loss in the fast fsync path (bsc#1089007).
- Btrfs: fix deadlock caused by fsync when logging directory entries (bsc#1093194).
- Btrfs: fix directory inconsistency after fsync log replay (bsc#1089001).
- Btrfs: fix directory recovery from fsync log (bsc#1088999).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#1093195).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#1093196).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#1089241).
- Btrfs: fix find_free_dev_extent() malfunction in case device tree has hole (bsc#1089232).
- Btrfs: fix fitrim discarding device area reserved for boot loader's use.
- Btrfs: fix freeing used extent after removing empty block group.
- Btrfs: fix freeing used extents after removing empty block group.
- Btrfs: fix fs mapping extent map leak (bsc#1089229).
- Btrfs: fix fsync data loss after a ranged fsync (bsc#1089221).
- Btrfs: fix fsync data loss after adding hard link to inode (bsc#1089004).
- Btrfs: fix fsync data loss after append write (bsc#1089238).
- Btrfs: fix fsync log replay for inodes with a mix of regular refs and extrefs (bsc#1089003).
- Btrfs: fix fsync race leading to invalid data after log replay (bsc#1089000).
- Btrfs: fix fsync when extend references are added to an inode (bsc#1089002).
- Btrfs: fix fsync xattr loss in the fast fsync path (bsc#1094423).
- Btrfs: fix invalid extent maps due to hole punching (bsc#1094425).
- Btrfs: fix kernel oops while reading compressed data (bsc#1089192).
- Btrfs: fix log replay failure after linking special file and fsync (bsc#1089016).
- Btrfs: fix memory leak after block remove + trimming.
- Btrfs: fix metadata inconsistencies after directory fsync (bsc#1093197).
- Btrfs: fix race between balance and unused block group deletion (bsc#1089237).
- Btrfs: fix race between fs trimming and block group remove/allocation.
- Btrfs: fix race between scrub and block group deletion.
- Btrfs: fix race between transaction commit and empty block group removal.
- Btrfs: fix race conditions in BTRFS_IOC_FS_INFO ioctl (bsc#1089206).
- Btrfs: fix racy system chunk allocation when setting block group ro (bsc#1089233).
- Btrfs: fix regression in raid level conversion (bsc#1089234).
- Btrfs: fix skipped error handle when log sync failed (bsc#1089217).
- Btrfs: fix stale dir entries after removing a link and fsync (bsc#1089011).
- Btrfs: fix the number of transaction units needed to remove a block group.
- Btrfs: fix the skipped transaction commit during the file sync (bsc#1089216).
- Btrfs: fix unprotected alloc list insertion during the finishing procedure of replace (bsc#1089215).
- Btrfs: fix unprotected assignment of the target device (bsc#1089222).
- Btrfs: fix unprotected deletion from pending_chunks list.
- Btrfs: fix unprotected device list access when getting the fs information (bsc#1089228).
- Btrfs: fix unprotected device's variants on 32bits machine (bsc#1089227).
- Btrfs: fix unprotected device-&gt;bytes_used update (bsc#1089225).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#1089240).
- Btrfs: fix up read_tree_block to return proper error (bsc#1080837).
- Btrfs: fix wrong device bytes_used in the super block (bsc#1089224).
- Btrfs: fix wrong disk size when writing super blocks (bsc#1089223).
- Btrfs: fix xattr loss after power failure (bsc#1094436).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#1089013).
- Btrfs: initialize the seq counter in struct btrfs_device (bsc#1094437).
- Btrfs: iterate over unused chunk space in FITRIM.
- Btrfs: make btrfs_issue_discard return bytes discarded.
- Btrfs: make btrfs_search_forward return with nodes unlocked (bsc#1094422).
- Btrfs: make sure to copy everything if we rename (bsc#1088997).
- Btrfs: make the chunk allocator completely tree lockless (bsc#1089202).
- Btrfs: move btrfs_truncate_page to btrfs_cont_expand instead of btrfs_truncate (bsc#1089201).
- Btrfs: nuke write_super from comments (bsc#1089199).
- Btrfs: only drop modified extents if we logged the whole inode (bsc#1089213).
- Btrfs: only update disk_i_size as we remove extents (bsc#1089209).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#1089012).
- Btrfs: remove deleted xattrs on fsync log replay (bsc#1089008).
- Btrfs: remove empty block groups automatically.
- Btrfs: remove non-sense btrfs_error_discard_extent() function (bsc#1089230).
- Btrfs: remove parameter blocksize from read_tree_block (bsc#1080837).
- Btrfs: remove transaction from send (bsc#1089218).
- Btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock.
- Btrfs: remove unused max_key arg from btrfs_search_forward (bsc#1094421).
- Btrfs: return an error from btrfs_wait_ordered_range (bsc#1089212).
- Btrfs: set inode's logged_trans/last_log_commit after ranged fsync (bsc#1093198).
- Btrfs: skip superblocks during discard.
- Btrfs: stop refusing the relocation of chunk 0 (bsc#1089208).
- Btrfs: update free_chunk_space during allocting a new chunk (bsc#1089226).
- Btrfs: use global reserve when deleting unused block group after ENOSPC.
- Btrfs: use nodesize everywhere, kill leafsize (bsc#1080837).
- Btrfs: wait ordered range before doing direct io (bsc#1089203).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- balloon: do not BUG() when balloon is empty (bsc#1083347).
- fs: btrfs: volumes.c: Fix for possible null pointer dereference (bsc#1089219).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096746).
- kvm/powerpc: Add new ioctl to retreive server MMU infos (bsc#1094244).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- module: Fix locking in symbol_put_addr() (bsc#1097445).
- netfront: make req_prod check properly deal with index wraps (bsc#1046610).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump and flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: convert rtas_log_buf to linear allocation (bsc#1094244).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096746).
- s390/dasd: fix failing path verification (bnc#1096746).
- trace: module: Maintain a valid user count (bsc#1097443).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86: Fix /proc/mtrr with base/size more than 44bits (bsc#1052351).
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#989401).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052351">SUSE bug 1052351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068054">SUSE bug 1068054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080837">SUSE bug 1080837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083347">SUSE bug 1083347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088997">SUSE bug 1088997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088998">SUSE bug 1088998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088999">SUSE bug 1088999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089000">SUSE bug 1089000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089001">SUSE bug 1089001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089002">SUSE bug 1089002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089003">SUSE bug 1089003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089004">SUSE bug 1089004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089005">SUSE bug 1089005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089006">SUSE bug 1089006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089007">SUSE bug 1089007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089008">SUSE bug 1089008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089010">SUSE bug 1089010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089011">SUSE bug 1089011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089012">SUSE bug 1089012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089013">SUSE bug 1089013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089016">SUSE bug 1089016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089192">SUSE bug 1089192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089199">SUSE bug 1089199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089200">SUSE bug 1089200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089201">SUSE bug 1089201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089202">SUSE bug 1089202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089203">SUSE bug 1089203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089204">SUSE bug 1089204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089205">SUSE bug 1089205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089206">SUSE bug 1089206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089207">SUSE bug 1089207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089208">SUSE bug 1089208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089209">SUSE bug 1089209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089210">SUSE bug 1089210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089211">SUSE bug 1089211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089212">SUSE bug 1089212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089213">SUSE bug 1089213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089214">SUSE bug 1089214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089215">SUSE bug 1089215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089216">SUSE bug 1089216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089217">SUSE bug 1089217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089218">SUSE bug 1089218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089219">SUSE bug 1089219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089220">SUSE bug 1089220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089221">SUSE bug 1089221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089222">SUSE bug 1089222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089223">SUSE bug 1089223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089224">SUSE bug 1089224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089225">SUSE bug 1089225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089226">SUSE bug 1089226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089227">SUSE bug 1089227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089228">SUSE bug 1089228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089229">SUSE bug 1089229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089230">SUSE bug 1089230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089231">SUSE bug 1089231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089232">SUSE bug 1089232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089233">SUSE bug 1089233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089234">SUSE bug 1089234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089235">SUSE bug 1089235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089236">SUSE bug 1089236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089237">SUSE bug 1089237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089238">SUSE bug 1089238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089239">SUSE bug 1089239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089240">SUSE bug 1089240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089241">SUSE bug 1089241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093194">SUSE bug 1093194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093195">SUSE bug 1093195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093196">SUSE bug 1093196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093197">SUSE bug 1093197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093198">SUSE bug 1093198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094421">SUSE bug 1094421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094422">SUSE bug 1094422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094423">SUSE bug 1094423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094424">SUSE bug 1094424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094425">SUSE bug 1094425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094436">SUSE bug 1094436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094437">SUSE bug 1094437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096746">SUSE bug 1096746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097443">SUSE bug 1097443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097445">SUSE bug 1097445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097948">SUSE bug 1097948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564628" comment="kernel-docs-3.0.101-108.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37304" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094876" ref_url="https://bugzilla.suse.com/1094876" source="BUGZILLA"/>
		<reference ref_id="1098408" ref_url="https://bugzilla.suse.com/1098408" source="BUGZILLA"/>
		<reference ref_id="1099177" ref_url="https://bugzilla.suse.com/1099177" source="BUGZILLA"/>
		<reference ref_id="1099598" ref_url="https://bugzilla.suse.com/1099598" source="BUGZILLA"/>
		<reference ref_id="1099709" ref_url="https://bugzilla.suse.com/1099709" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="780242" ref_url="https://bugzilla.suse.com/780242" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795301" ref_url="https://bugzilla.suse.com/795301" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="909495" ref_url="https://bugzilla.suse.com/909495" source="BUGZILLA"/>
		<reference ref_id="923242" ref_url="https://bugzilla.suse.com/923242" source="BUGZILLA"/>
		<reference ref_id="925105" ref_url="https://bugzilla.suse.com/925105" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2014-3688: The SCTP implementation allowed remote attackers to cause a
  denial of service (memory consumption) by triggering a large number of chunks
  in an association's output queue (bsc#902351).

The following non-security bugs were fixed:

- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1045538).
- ALSA: seq: Do not allow resizing pool in use (bsc#1045538).
- Delete patches.fixes/0001-ipc-shm-Fix-shmat-mmap-nil-page-protection.patch (bsc# 1090078)
- IB/mlx4: fix sprintf format warning (bnc#786036).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#786036).
- USB: uss720: fix NULL-deref at probe (bnc#1047487).
- bna: integer overflow bug in debugfs (bnc#780242).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bug#923242).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bug#909495).
- fix a leak in /proc/schedstats (bsc#1094876).
- ixgbe: Initialize 64-bit stats seqcounts (bnc#795301).
- mm: fix the NULL mapping case in __isolate_lru_page() (git-fixes).
- module/retpoline: Warn about missing retpoline in module (bnc#1099177).
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bnc#786036).
- net/mlx4_en: Change default QoS settings (bnc#786036 ).
- net/mlx4_en: Use __force to fix a sparse warning in TX datapath (bug#925105).
- netxen: fix incorrect loop counter decrement (bnc#784815).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- s390/qdio: do not merge ERROR output buffers (bnc#1099709).
- s390/qeth: do not dump control cmd twice (bnc#1099709).
- s390/qeth: fix SETIP command handling (bnc#1099709).
- s390/qeth: free netdevice when removing a card (bnc#1099709).
- s390/qeth: lock read device while queueing next buffer (bnc#1099709).
- s390/qeth: when thread completes, wake up all waiters (bnc#1099709).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- tg3: do not clear stats while tg3_close (bnc#790588).
- video/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bnc#1099966).
- vmxnet3: use correct flag to indicate LRO feature (bsc#936423).
- x86-32/kaiser: Add CPL check for CR3 switch before iret (bsc#1098408).
- x86-non-upstream-eager-fpu 32bit fix (bnc#1087086, bnc#1100091, bnc#1099598).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1099177).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094876">SUSE bug 1094876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098408">SUSE bug 1098408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099177">SUSE bug 1099177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099598">SUSE bug 1099598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099709">SUSE bug 1099709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780242">SUSE bug 780242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795301">SUSE bug 795301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909495">SUSE bug 909495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923242">SUSE bug 923242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925105">SUSE bug 925105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564629" comment="kernel-docs-3.0.101-108.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37305" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1081680" ref_url="https://bugzilla.suse.com/1081680" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1103145" ref_url="https://bugzilla.suse.com/1103145" source="BUGZILLA"/>
		<reference ref_id="1105799" ref_url="https://bugzilla.suse.com/1105799" source="BUGZILLA"/>
		<reference ref_id="1106139" ref_url="https://bugzilla.suse.com/1106139" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107849" ref_url="https://bugzilla.suse.com/1107849" source="BUGZILLA"/>
		<reference ref_id="1108314" ref_url="https://bugzilla.suse.com/1108314" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114460" ref_url="https://bugzilla.suse.com/1114460" source="BUGZILLA"/>
		<reference ref_id="923775" ref_url="https://bugzilla.suse.com/923775" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).

The following non-security bugs were fixed:

- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).
- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KVM: Disable irq while unregistering user notifier (bsc#1106240).
- KVM: SVM: obey guest PAT (bsc#1106240).
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).
- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).
- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).
- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).
- KVM: x86: zero base3 of unusable segments (bsc#1106240).
- NFS - do not hang if xdr decoded username is bad (bsc#1105799).
- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).
- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).
- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).
- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).
- add kernel parameter to disable failfast on block devices  (bsc#1081680).
- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).
- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).
- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).
- dm: fix incomplete request_queue initialization (bsc#1047027).
- dm: only initialize the request_queue once (bsc#1047027).
- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).
- locks: fix unlock when fcntl_setlk races with a close (git-fixes).
- media: Fix invalid free in the fix for mceusb (bsc#1050431).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).
- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).
- media: mceusb: fix NULL-deref at probe (bsc#1050431).
- media: mceusb: fix memory leaks in error path.
- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).
- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).
- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).
- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).
- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).
- powerpc/book3s: handle machine check in Linux host (bsc#1094244).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).
- powerpc: Rework runlatch code (bsc#1094244).
- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).
- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).
- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).
- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).
- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).
- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).
- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).
- scsi: libfc: Do not login if the port is already started (bsc#1106139).
- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1110247).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081680">SUSE bug 1081680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103145">SUSE bug 1103145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105799">SUSE bug 1105799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106139">SUSE bug 1106139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107849">SUSE bug 1107849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108314">SUSE bug 1108314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114460">SUSE bug 1114460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923775">SUSE bug 923775</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564630" comment="kernel-docs-3.0.101-108.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37306" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065999" ref_url="https://bugzilla.suse.com/1065999" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1067912" ref_url="https://bugzilla.suse.com/1067912" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1081358" ref_url="https://bugzilla.suse.com/1081358" source="BUGZILLA"/>
		<reference ref_id="1082091" ref_url="https://bugzilla.suse.com/1082091" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083275" ref_url="https://bugzilla.suse.com/1083275" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085113" ref_url="https://bugzilla.suse.com/1085113" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1085513" ref_url="https://bugzilla.suse.com/1085513" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  Enhancements and bugfixes over the previous fixes have been added to this kernel.

- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).
- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).
- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).
- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kabi: x86/kaiser: properly align trampoline stack.
- keys: do not let add_key() update an uninstantiated key (bnc#1063416).
- keys: prevent creating a different user's keyrings (bnc#1065999).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- nfsv4: fix getacl head length estimation (git-fixes).
- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).
- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).
- posix-timers: Protect posix clock array access against speculation (bnc#1081358).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).
- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).
- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)
- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065999">SUSE bug 1065999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081358">SUSE bug 1081358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082091">SUSE bug 1082091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083275">SUSE bug 1083275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085113">SUSE bug 1085113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085513">SUSE bug 1085513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564631" comment="kernel-docs-3.0.101-108.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37307" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1032084" ref_url="https://bugzilla.suse.com/1032084" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1089665" ref_url="https://bugzilla.suse.com/1089665" source="BUGZILLA"/>
		<reference ref_id="1089668" ref_url="https://bugzilla.suse.com/1089668" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).

The following non-security bugs were fixed:

- kvm/x86: fix icebp instruction handling (bsc#1087088).
- media: cpia2: Fix a couple off by one bugs (bsc#1050431).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: allow flush-on-stat to be disabled (bsc#1065726).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bnc#1032084, FATE#323225).
- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084, FATE#323225).
- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084, FATE#323225).
- powerpc/fadump: use 'fadump_reserve_mem=' when specified (bnc#1032084, FATE#323225).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032084">SUSE bug 1032084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089665">SUSE bug 1089665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089668">SUSE bug 1089668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564632" comment="kernel-docs-3.0.101-108.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37308" version="1" class="patch">
	<metadata>
		<title>Security update for kernel modules packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="926856" ref_url="https://bugzilla.suse.com/926856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<description>


The following kernel modules were rebuild with 'retpoline' enablement
to allow full mitigation of the Spectre Variant 2 (CVE-2017-5715, bsc#1068032)

OFED was adjusted to add an entry to control the loading/unloading of cxgb4 to
/etc/sysconf/infiniband (bsc#926856).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926856">SUSE bug 926856</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564633" comment="ofed-devel-1.5.4.1-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37309" version="1" class="patch">
	<metadata>
		<title>Security update for various KMPs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1095824" ref_url="https://bugzilla.suse.com/1095824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<description>

This update rebuilds missing kernel modules (KMP) to use 'retpolines'
mitigations for Spectre Variant 2 (CVE-2017-5715).

Rebuilt KMP packages:

- cluster-network
- drbd
- gfs2
- iscsitarget
- ocfs2
- ofed
- oracleasm

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095824">SUSE bug 1095824</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564634" comment="ofed-devel-1.5.4.1-22.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37310" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563401" comment="krb5-devel-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563402" comment="krb5-devel-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563403" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37311" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563404" comment="krb5-devel-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563405" comment="krb5-devel-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563406" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37312" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564635" comment="krb5-devel-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564636" comment="krb5-devel-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564637" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37313" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564638" comment="krb5-devel-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564639" comment="krb5-devel-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564640" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37314" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="970696" ref_url="https://bugzilla.suse.com/970696" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).


This non-security issue was fixed:

- Avoid indefinite polling in KDC communication. (bsc#970696)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970696">SUSE bug 970696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564641" comment="krb5-devel-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564642" comment="krb5-devel-32bit-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564643" comment="krb5-server-1.6.3-133.49.113.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37315" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563413" comment="krb5-devel-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563414" comment="krb5-devel-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563415" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37316" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003689.html" source="SUSE-SU"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564644" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564645" comment="libapr-util1-devel-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564646" comment="libapr-util1-devel-32bit-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37317" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004058.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="moderate" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564647" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564648" comment="libapr1-devel-1.3.3-11.18.19.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564649" comment="libapr1-devel-32bit-1.3.3-11.18.19.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37318" version="1" class="patch">
	<metadata>
		<title>Security update for libcap-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="876832" ref_url="https://bugzilla.suse.com/876832" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3215" ref_url="https://www.suse.com/security/cve/CVE-2014-3215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002617.html" source="SUSE-SU"/>
		<description>
libcap-ng was updated to fix one security issue.

This security issue was fixed:

- CVE-2014-3215: seunshare in policycoreutils (which uses libcap-ng) is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which made it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges (bsc#876832).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/876832">SUSE bug 876832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3215/">CVE-2014-3215</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564650" comment="libcap-ng-devel-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564651" comment="python-capng-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37319" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002530.html" source="SUSE-SU"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564652" comment="libcares-devel-1.7.4-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37320" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004358.html" source="SUSE-SU"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564653" comment="libcgroup-devel-0.41.rc1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564654" comment="libcgroup1-0.41.rc1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37321" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003718.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564655" comment="libdb-4_5-devel-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564656" comment="libdb_java-4_5-4.5.20-97.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37322" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564657" comment="libevent-devel-1.4.5-24.24.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37323" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003626.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564658" comment="libexif-devel-0.6.17-2.14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37324" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563440" comment="libgcrypt-devel-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563441" comment="libgcrypt-devel-32bit-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37325" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564659" comment="libgcrypt-devel-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564660" comment="libgcrypt-devel-32bit-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37326" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003013.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening a against local side-channel attack in RSA key handling has been added (bsc#1046607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564661" comment="libgcrypt-devel-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564662" comment="libgcrypt-devel-32bit-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37327" version="1" class="patch">
	<metadata>
		<title>Recommended update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564663" comment="libical-devel-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564664" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37328" version="1" class="patch">
	<metadata>
		<title>Security update for libid3tag (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1081959" ref_url="https://bugzilla.suse.com/1081959" source="BUGZILLA"/>
		<reference ref_id="1081961" ref_url="https://bugzilla.suse.com/1081961" source="BUGZILLA"/>
		<reference ref_id="1081962" ref_url="https://bugzilla.suse.com/1081962" source="BUGZILLA"/>
		<reference ref_id="387731" ref_url="https://bugzilla.suse.com/387731" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<reference ref_id="CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003820.html" source="SUSE-SU"/>
		<description>
This update for libid3tag fixes the following issues:

- CVE-2004-2779 CVE-2017-11551: Fixed id3_utf16_deserialize() in utf16.c,
  which previously misparsed ID3v2 tags encoded in UTF-16 with an odd
  number of bytes, triggering an endless loop allocating memory until
  OOM leading to DoS. (bsc#1081959 bsc#1081961)
- CVE-2017-11550 CVE-2008-2109: Fixed the handling of unknown
  encodings when parsing ID3 tags. (bsc#1081962 bsc#387731)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081959">SUSE bug 1081959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081961">SUSE bug 1081961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081962">SUSE bug 1081962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/387731">SUSE bug 387731</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564665" comment="libid3tag-0.15.1b-132.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564666" comment="libid3tag-devel-0.15.1b-132.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37329" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564667" comment="libidn-devel-1.10-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37330" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003879.html" source="SUSE-SU"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564668" comment="libidn-devel-1.10-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37331" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564669" comment="libksba-devel-1.0.4-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37332" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563445" comment="libksba-devel-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37333" version="1" class="patch">
	<metadata>
		<title>Security update for libmikmod (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="625547" ref_url="https://bugzilla.suse.com/625547" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3995" ref_url="https://www.suse.com/security/cve/CVE-2009-3995/" source="CVE"/>
		<reference ref_id="CVE-2010-2546" ref_url="https://www.suse.com/security/cve/CVE-2010-2546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004100.html" source="SUSE-SU"/>
		<description>
This update for libmikmod fixes the following issues:

-  CVE-2010-2546: Multiple heap-based buffer overflows in loaders/load_it.c in libmikmod, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file, related to panpts, pitpts, and IT_ProcessEnvelope.  NOTE: some of these details are obtained from third party information.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3995. (bsc#625547).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/625547">SUSE bug 625547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3995/">CVE-2009-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2546/">CVE-2010-2546</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564670" comment="libmikmod-3.1.11a-116.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564671" comment="libmikmod-devel-3.1.11a-116.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37334" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563452" comment="libmspack-devel-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37335" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564672" comment="libmspack-devel-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37336" version="1" class="patch">
	<metadata>
		<title>Security update for libofx (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1058673" ref_url="https://bugzilla.suse.com/1058673" source="BUGZILLA"/>
		<reference ref_id="1060437" ref_url="https://bugzilla.suse.com/1060437" source="BUGZILLA"/>
		<reference ref_id="1061964" ref_url="https://bugzilla.suse.com/1061964" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14731" ref_url="https://www.suse.com/security/cve/CVE-2017-14731/" source="CVE"/>
		<reference ref_id="CVE-2017-2816" ref_url="https://www.suse.com/security/cve/CVE-2017-2816/" source="CVE"/>
		<reference ref_id="CVE-2017-2920" ref_url="https://www.suse.com/security/cve/CVE-2017-2920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004302.html" source="SUSE-SU"/>
		<description>
This update for libofx fixes the following issues:

Security issues fixed:

- CVE-2017-2816: Fix an exploitable buffer overflow vulnerability in the tag parsing functionality (bsc#1058673).
- CVE-2017-2920: Fix a buffer overflow vulnerability in sanitize_proprietary_tags in lib/ofx_preproc.cpp (bsc#1061964).
- CVE-2017-14731: Fix remote denial of service via a crafted file in ofx_proc_file in ofx_preproc.cpp (bsc#1060437).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-24"/>
	<updated date="2018-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058673">SUSE bug 1058673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060437">SUSE bug 1060437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061964">SUSE bug 1061964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14731/">CVE-2017-14731</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2816/">CVE-2017-2816</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2920/">CVE-2017-2920</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564673" comment="libofx-0.9.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564674" comment="libofx-devel-0.9.0-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564675" comment="libofx4-0.9.0-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37337" version="1" class="patch">
	<metadata>
		<title>Security update for libosip2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1034570" ref_url="https://bugzilla.suse.com/1034570" source="BUGZILLA"/>
		<reference ref_id="1034571" ref_url="https://bugzilla.suse.com/1034571" source="BUGZILLA"/>
		<reference ref_id="1034572" ref_url="https://bugzilla.suse.com/1034572" source="BUGZILLA"/>
		<reference ref_id="1034574" ref_url="https://bugzilla.suse.com/1034574" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10324" ref_url="https://www.suse.com/security/cve/CVE-2016-10324/" source="CVE"/>
		<reference ref_id="CVE-2016-10325" ref_url="https://www.suse.com/security/cve/CVE-2016-10325/" source="CVE"/>
		<reference ref_id="CVE-2016-10326" ref_url="https://www.suse.com/security/cve/CVE-2016-10326/" source="CVE"/>
		<reference ref_id="CVE-2017-7853" ref_url="https://www.suse.com/security/cve/CVE-2017-7853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002849.html" source="SUSE-SU"/>
		<description>

This update for libosip2 fixes several issues.

These security issues were fixed: 

- CVE-2017-7853: In libosip2  a malformed SIP message could have lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS (bsc#1034570)
- CVE-2016-10326: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS (bsc#1034571)
- CVE-2016-10325: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS (bsc#1034572)
- CVE-2016-10324: In libosip2 a malformed SIP message could have lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c (bsc#1034574)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-06"/>
	<updated date="2017-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034570">SUSE bug 1034570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034571">SUSE bug 1034571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034572">SUSE bug 1034572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034574">SUSE bug 1034574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10324/">CVE-2016-10324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10325/">CVE-2016-10325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10326/">CVE-2016-10326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7853/">CVE-2017-7853</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564676" comment="libosip2-3.1.0-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564677" comment="libosip2-devel-3.1.0-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37338" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564678" comment="libotr-devel-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37339" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563461" comment="libpng-devel-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563462" comment="libpng-devel-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37340" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563463" comment="libpng-devel-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563464" comment="libpng-devel-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37341" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564679" comment="libpng-devel-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564680" comment="libpng-devel-32bit-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37342" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002683.html" source="SUSE-SU"/>
		<description>

This update for libquicktime fixes the following issues:

- A crafted MP4 file could have caused libquicktime to crash or lead to
  undefined behaviour (bsc#1022805, CVE-2016-2399)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-07"/>
	<updated date="2017-03-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564681" comment="libquicktime-1.0.3-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564682" comment="libquicktime-devel-1.0.3-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37343" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="1044000" ref_url="https://bugzilla.suse.com/1044000" source="BUGZILLA"/>
		<reference ref_id="1044002" ref_url="https://bugzilla.suse.com/1044002" source="BUGZILLA"/>
		<reference ref_id="1044006" ref_url="https://bugzilla.suse.com/1044006" source="BUGZILLA"/>
		<reference ref_id="1044008" ref_url="https://bugzilla.suse.com/1044008" source="BUGZILLA"/>
		<reference ref_id="1044009" ref_url="https://bugzilla.suse.com/1044009" source="BUGZILLA"/>
		<reference ref_id="1044077" ref_url="https://bugzilla.suse.com/1044077" source="BUGZILLA"/>
		<reference ref_id="1044122" ref_url="https://bugzilla.suse.com/1044122" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

Security issues fixed:
- CVE-2017-9122: A DoS in quicktime_read_moov function in moov.c via a crafted mp4 file was fixed. (bsc#1044077)
- CVE-2017-9123: An invalid memory read in lqt_frame_duration via a crafted mp4 file was fixed. (bsc#1044009)
- CVE-2017-9124: A NULL pointer dereference in quicktime_match_32 via a crafted mp4 file was fixed. (bsc#1044008)
- CVE-2017-9125: A DoS in lqt_frame_duration function in lqt_quicktime.c via crafted mp4 file was fixed. (bsc#1044122)
- CVE-2017-9126: A heap-based buffer overflow in quicktime_read_dref_table via a crafted mp4 file was fixed. (bsc#1044006)
- CVE-2017-9127: A heap-based buffer overflow in quicktime_user_atoms_read_atom via a crafted mp4 file was fixed. (bsc#1044002)
- CVE-2017-9128: A heap-based buffer over-read in quicktime_video_width via a crafted mp4 file was fixed. (bsc#1044000)
- CVE-2016-2399: Adjust fix to prevent endless loop when there are less than 256 bytes to read. (bsc#1022805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564683" comment="libquicktime-1.0.3-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564684" comment="libquicktime-devel-1.0.3-6.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37344" version="1" class="patch">
	<metadata>
		<title>Recommended update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="306333" ref_url="https://bugzilla.suse.com/306333" source="BUGZILLA"/>
		<reference ref_id="547549" ref_url="https://bugzilla.suse.com/547549" source="BUGZILLA"/>
		<reference ref_id="668145" ref_url="https://bugzilla.suse.com/668145" source="BUGZILLA"/>
		<reference ref_id="679938" ref_url="https://bugzilla.suse.com/679938" source="BUGZILLA"/>
		<reference ref_id="681560" ref_url="https://bugzilla.suse.com/681560" source="BUGZILLA"/>
		<reference ref_id="688200" ref_url="https://bugzilla.suse.com/688200" source="BUGZILLA"/>
		<reference ref_id="718113" ref_url="https://bugzilla.suse.com/718113" source="BUGZILLA"/>
		<reference ref_id="73544" ref_url="https://bugzilla.suse.com/73544" source="BUGZILLA"/>
		<reference ref_id="806250" ref_url="https://bugzilla.suse.com/806250" source="BUGZILLA"/>
		<reference ref_id="857026" ref_url="https://bugzilla.suse.com/857026" source="BUGZILLA"/>
		<reference ref_id="889755" ref_url="https://bugzilla.suse.com/889755" source="BUGZILLA"/>
		<reference ref_id="890735" ref_url="https://bugzilla.suse.com/890735" source="BUGZILLA"/>
		<reference ref_id="907636" ref_url="https://bugzilla.suse.com/907636" source="BUGZILLA"/>
		<reference ref_id="907966" ref_url="https://bugzilla.suse.com/907966" source="BUGZILLA"/>
		<reference ref_id="910805" ref_url="https://bugzilla.suse.com/910805" source="BUGZILLA"/>
		<reference ref_id="910806" ref_url="https://bugzilla.suse.com/910806" source="BUGZILLA"/>
		<reference ref_id="914911" ref_url="https://bugzilla.suse.com/914911" source="BUGZILLA"/>
		<reference ref_id="934423" ref_url="https://bugzilla.suse.com/934423" source="BUGZILLA"/>
		<reference ref_id="936188" ref_url="https://bugzilla.suse.com/936188" source="BUGZILLA"/>
		<reference ref_id="936190" ref_url="https://bugzilla.suse.com/936190" source="BUGZILLA"/>
		<reference ref_id="939996" ref_url="https://bugzilla.suse.com/939996" source="BUGZILLA"/>
		<reference ref_id="940838" ref_url="https://bugzilla.suse.com/940838" source="BUGZILLA"/>
		<reference ref_id="943075" ref_url="https://bugzilla.suse.com/943075" source="BUGZILLA"/>
		<reference ref_id="945047" ref_url="https://bugzilla.suse.com/945047" source="BUGZILLA"/>
		<reference ref_id="945692" ref_url="https://bugzilla.suse.com/945692" source="BUGZILLA"/>
		<reference ref_id="951579" ref_url="https://bugzilla.suse.com/951579" source="BUGZILLA"/>
		<reference ref_id="954345" ref_url="https://bugzilla.suse.com/954345" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<description>

This update brings LibreOffice to version 5.0.4, a major version update.

It brings lots of new features, bug fixes and also security fixes.

Features as seen on http://www.libreoffice.org/discover/new-features/

* LibreOffice 5.0 ships an impressive number of new features for
  its spreadsheet module, Calc: complex formulae image cropping, new
  functions, more powerful conditional formatting, table addressing
  and much more. Calc's blend of performance and features makes it
  an enterprise-ready, heavy duty spreadsheet application capable of
  handling all kinds of workload for an impressive range of use cases
* New icons, major improvements to menus and sidebar : no other
  LibreOffice version has looked that good and helped you be creative and
  get things done the right way. In addition, style management is now more
  intuitive thanks to the visualization of styles right in the interface.
* LibreOffice 5 ships with numerous improvements to document import and
  export filters for MS Office, PDF, RTF, and more. You can now timestamp
  PDF documents generated with LibreOffice and enjoy enhanced document
  conversion fidelity all around.

The Pentaho Flow Reporting Engine is now added and used.

Security issues fixed:

* CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 did not properly
  track directionally isolated pieces of text, which allowed remote
  attackers to cause a denial of service (heap-based buffer overflow)
  or possibly execute arbitrary code via crafted text.
* CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 used an integer
  data type that is inconsistent with a header file, which allowed remote
  attackers to cause a denial of service (incorrect malloc followed by
  invalid free) or possibly execute arbitrary code via crafted text.
* CVE-2015-4551: An arbitrary file disclosure vulnerability in Libreoffice
  and Openoffice Calc and Writer was fixed.
* CVE-2015-5212: A LibreOffice 'PrinterSetup Length' integer underflow
  vulnerability could be used by attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5213: A LibreOffice 'Piece Table Counter' invalid check design
  error vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5214: Multiple Vendor LibreOffice Bookmark Status Memory
  Corruption Vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/306333">SUSE bug 306333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547549">SUSE bug 547549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668145">SUSE bug 668145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679938">SUSE bug 679938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681560">SUSE bug 681560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688200">SUSE bug 688200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718113">SUSE bug 718113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/73544">SUSE bug 73544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806250">SUSE bug 806250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857026">SUSE bug 857026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889755">SUSE bug 889755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890735">SUSE bug 890735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907636">SUSE bug 907636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907966">SUSE bug 907966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914911">SUSE bug 914911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939996">SUSE bug 939996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943075">SUSE bug 943075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945047">SUSE bug 945047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945692">SUSE bug 945692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951579">SUSE bug 951579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954345">SUSE bug 954345</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564686" comment="hyphen-devel-2.8.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564692" comment="libreoffice-branding-upstream-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564739" comment="libvoikko-devel-3.7.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564867" comment="mythes-devel-1.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37345" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563656" comment="librsvg-devel-2.26.0-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37346" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002819.html" source="SUSE-SU"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564869" comment="libsamplerate-devel-0.1.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37347" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563658" comment="libsndfile-devel-1.0.20-2.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37348" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564870" comment="libsndfile-devel-1.0.20-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37349" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564871" comment="libsndfile-devel-1.0.20-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37350" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564872" comment="libsndfile-devel-1.0.20-2.19.7.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37351" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564873" comment="libsndfile-devel-1.0.20-2.19.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37352" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="965875" ref_url="https://bugzilla.suse.com/965875" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001905.html" source="SUSE-SU"/>
		<description>

This update for libssh fixes the following issues: 

CVE-2016-0739: Fix Weakness in diffie-hellman secret key generation. (bsc#965875)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564874" comment="libssh-devel-0.2-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564875" comment="libssh-devel-doc-0.2-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564876" comment="libssh2-0.2-5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37353" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564877" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564878" comment="libssh2-1-32bit-1.2.9-4.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564879" comment="libssh2-1-x86-1.2.9-4.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564880" comment="libssh2-devel-1.2.9-4.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37354" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenicate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564881" comment="libssh2-1-1.4.3-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564882" comment="libssh2-1-32bit-1.4.3-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564883" comment="libssh2-1-x86-1.4.3-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564884" comment="libssh2-devel-1.4.3-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37355" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00080.html" source="SUSE-SU"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564885" comment="libtirpc-devel-0.2.1-1.12.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37356" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004512.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564886" comment="libtirpc-devel-0.2.1-1.13.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37357" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004670.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564887" comment="libtirpc-devel-0.2.1-1.13.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37358" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="948516" ref_url="https://bugzilla.suse.com/948516" source="BUGZILLA"/>
		<reference ref_id="948686" ref_url="https://bugzilla.suse.com/948686" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="959094" ref_url="https://bugzilla.suse.com/959094" source="BUGZILLA"/>
		<reference ref_id="960305" ref_url="https://bugzilla.suse.com/960305" source="BUGZILLA"/>
		<reference ref_id="961173" ref_url="https://bugzilla.suse.com/961173" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issue:
- CVE-2015-5313: directory directory traversal privilege
  escalation vulnerability. (bsc#953110)

Bugs fixed:
- bsc#960305: xenxs: support parsing and formatting vif bandwidth
- bsc#961173: xen: use correct domctl version in domaininfolist union
- bsc#959094: xen: Disable building xen-inotify subdriver. It is unmaintained
  and contains bugs that can cause client connection failures.
- bsc#948686: qemu: Use PAUSED state for domains that are starting up
- bsc#948516: Fix profile_status to distringuish between errors and unconfined
  domains.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-01"/>
	<updated date="2016-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948516">SUSE bug 948516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948686">SUSE bug 948686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959094">SUSE bug 959094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960305">SUSE bug 960305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961173">SUSE bug 961173</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564888" comment="libvirt-devel-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564889" comment="libvirt-devel-32bit-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37359" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="952889" ref_url="https://bugzilla.suse.com/952889" source="BUGZILLA"/>
		<reference ref_id="970906" ref_url="https://bugzilla.suse.com/970906" source="BUGZILLA"/>
		<reference ref_id="987527" ref_url="https://bugzilla.suse.com/987527" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002174.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issues fixed:
- CVE-2016-5008: empty VNC password disables authentication (bsc#987527)

Bugs fixed:
- bsc#970906: Fixed a race condition in xenstore event handling.
- bsc#952889: Change hap setting to align with Xen behavior.
- Fixed 'make check' failures.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-03"/>
	<updated date="2016-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952889">SUSE bug 952889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970906">SUSE bug 970906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564890" comment="libvirt-devel-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564891" comment="libvirt-devel-32bit-1.2.5-15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37360" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1025340" ref_url="https://bugzilla.suse.com/1025340" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003278.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1025340: Use xend for nodeGetFreeMemory API
- bsc#1026236: Add support for tsc timers on xen
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025340">SUSE bug 1025340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564892" comment="libvirt-devel-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564893" comment="libvirt-devel-32bit-1.2.5-23.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37361" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1055365" ref_url="https://bugzilla.suse.com/1055365" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1083061" ref_url="https://bugzilla.suse.com/1083061" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).
- CVE-2018-5748: Fixed possible denial of service when reading from QEMU monitor (bsc#1076500).


Non-security issues fixed:

- bsc#1083061: Fixed 'dumpxml --migratable' exports domain id in output on SLES11 SP4.
- bsc#1055365: Improve performance when listing hundreds of interfaces. 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055365">SUSE bug 1055365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083061">SUSE bug 1083061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564894" comment="libvirt-devel-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564895" comment="libvirt-devel-32bit-1.2.5-23.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37362" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: Added support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564896" comment="libvirt-devel-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564897" comment="libvirt-devel-32bit-1.2.5-23.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37363" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563670" comment="LibVNCServer-devel-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37364" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564898" comment="libvorbis-devel-1.2.0-79.20.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37365" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564899" comment="libvorbis-devel-1.2.0-79.20.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37366" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564900" comment="libvorbis-devel-1.2.0-79.20.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37367" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004157.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564901" comment="libvorbis-devel-1.2.0-79.20.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37368" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563671" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563672" comment="libwmf-32bit-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563673" comment="libwmf-devel-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563674" comment="libwmf-gnome-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563675" comment="libwmf-gnome-32bit-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563676" comment="libwmf-gnome-x86-0.2.8.4-206.29.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563677" comment="libwmf-x86-0.2.8.4-206.29.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37369" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564902" comment="libxml2-devel-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564903" comment="libxml2-devel-32bit-2.7.6-0.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37370" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564904" comment="libxml2-devel-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564905" comment="libxml2-devel-32bit-2.7.6-0.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37371" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564906" comment="libxml2-devel-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564907" comment="libxml2-devel-32bit-2.7.6-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37372" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002563.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564908" comment="libxml2-devel-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564909" comment="libxml2-devel-32bit-2.7.6-0.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37373" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564910" comment="libxml2-devel-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564911" comment="libxml2-devel-32bit-2.7.6-0.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37374" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564912" comment="libxml2-devel-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564913" comment="libxml2-devel-32bit-2.7.6-0.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37375" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003125.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564914" comment="libxml2-devel-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564915" comment="libxml2-devel-32bit-2.7.6-0.77.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37376" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564916" comment="libxml2-devel-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564917" comment="libxml2-devel-32bit-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37377" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564918" comment="libxml2-devel-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564919" comment="libxml2-devel-32bit-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37378" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563682" comment="libxml2-devel-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563683" comment="libxml2-devel-32bit-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37379" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563684" comment="libxml2-devel-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563685" comment="libxml2-devel-32bit-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37380" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564920" comment="libxslt-devel-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564921" comment="libxslt-devel-32bit-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564922" comment="libxslt-python-1.1.24-19.33.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37381" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="932286" ref_url="https://bugzilla.suse.com/932286" source="BUGZILLA"/>
		<reference ref_id="981347" ref_url="https://bugzilla.suse.com/981347" source="BUGZILLA"/>
		<reference ref_id="990847" ref_url="https://bugzilla.suse.com/990847" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3200" ref_url="https://www.suse.com/security/cve/CVE-2015-3200/" source="CVE"/>
		<reference ref_id="CVE-2016-1000212" ref_url="https://www.suse.com/security/cve/CVE-2016-1000212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002711.html" source="SUSE-SU"/>
		<description>

This update for lighttpd fixes the following issues:

Security issues fixed:

- CVE-2016-1000212: Don't allow requests to set the HTTP_PROXY variable. As *CGI apps
  might pick it up and use it for outgoing requests. (bsc#990847)
- CVE-2015-3200: Log injection via malformed base64 string in Authentication header.
  (bsc#932286)

Bug fixes:

- Add su directive to logrotate file as the directory is owned by lighttpd. (bsc#981347)
- Fix out of bounds read in mod_scgi.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932286">SUSE bug 932286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981347">SUSE bug 981347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990847">SUSE bug 990847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3200/">CVE-2015-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000212/">CVE-2016-1000212</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564923" comment="lighttpd-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564924" comment="lighttpd-mod_cml-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564925" comment="lighttpd-mod_magnet-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564926" comment="lighttpd-mod_mysql_vhost-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564927" comment="lighttpd-mod_rrdtool-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564928" comment="lighttpd-mod_trigger_b4_dl-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564929" comment="lighttpd-mod_webdav-1.4.20-2.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37382" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564930" comment="kernel-docs-3.0.101-91.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37383" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005651" ref_url="https://bugzilla.suse.com/1005651" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013800" ref_url="https://bugzilla.suse.com/1013800" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1016489" ref_url="https://bugzilla.suse.com/1016489" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1021913" ref_url="https://bugzilla.suse.com/1021913" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023014" ref_url="https://bugzilla.suse.com/1023014" source="BUGZILLA"/>
		<reference ref_id="1023163" ref_url="https://bugzilla.suse.com/1023163" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024788" ref_url="https://bugzilla.suse.com/1024788" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1025702" ref_url="https://bugzilla.suse.com/1025702" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026260" ref_url="https://bugzilla.suse.com/1026260" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029770" ref_url="https://bugzilla.suse.com/1029770" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1033771" ref_url="https://bugzilla.suse.com/1033771" source="BUGZILLA"/>
		<reference ref_id="1033794" ref_url="https://bugzilla.suse.com/1033794" source="BUGZILLA"/>
		<reference ref_id="1033804" ref_url="https://bugzilla.suse.com/1033804" source="BUGZILLA"/>
		<reference ref_id="1033816" ref_url="https://bugzilla.suse.com/1033816" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="909486" ref_url="https://bugzilla.suse.com/909486" source="BUGZILLA"/>
		<reference ref_id="911105" ref_url="https://bugzilla.suse.com/911105" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable new features:

- Toleration of newer crypto hardware for z Systems
- USB 2.0 Link power management for Haswell-ULT

The following security bugs were fixed:

- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bsc#979021).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application (bnc#1027066)
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c (bsc#1008374).

The following non-security bugs were fixed:

- NFSD: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783, bsc#1026260).
- SUNRPC: Clean up the slot table allocation (bsc#1013862).
- SUNRPC: Initalise the struct xprt upon allocation (bsc#1013862).
- USB: cdc-acm: fix broken runtime suspend (bsc#1033771).
- USB: cdc-acm: fix open and suspend race (bsc#1033771).
- USB: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).
- USB: cdc-acm: fix runtime PM for control messages (bsc#1033771).
- USB: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).
- USB: cdc-acm: fix shutdown and suspend race (bsc#1033771).
- USB: cdc-acm: fix write and resume race (bsc#1033771).
- USB: cdc-acm: fix write and suspend race (bsc#1033771).
- USB: hub: Fix crash after failure to read BOS descriptor
- USB: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).
- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- USB: serial: mos7720: fix NULL-deref at open (bsc#1033816).
- USB: serial: mos7720: fix parallel probe (bsc#1033816).
- USB: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).
- USB: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).
- USB: serial: mos7840: fix NULL-deref at open (bsc#1034026).
- USB: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).
- Update metadata for serial fixes (bsc#1013070)
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- clocksource: Remove 'weak' from clocksource_default_clock() declaration (bnc#1013018).
- dlm: backport 'fix lvb invalidation conditions' (bsc#1005651).
- drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)
- enic: set skb-&gt;hash type properly (bsc#911105).
- ext4: fix mballoc breakage with 64k block size (bsc#1013018).
- ext4: fix stack memory corruption with 64k block size (bsc#1013018).
- ext4: reject inodes with negative size (bsc#1013018).
- fuse: initialize fc-&gt;release before calling it (bsc#1013018).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- i40e: avoid null pointer dereference (bsc#909486).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508).
- kabi: fix (bsc#1008893).
- lockd: use init_utsname for id encoding (bsc#1033804).
- lockd: use rpc client's cl_nodename for id encoding (bsc#1033804).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md/linear: shutup lockdep warnning (bsc#1018446).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (bnc#931620).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).
- ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).
- ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018).
- ocfs2: null deref on allocation error (bsc#1013018).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: use pci_physfn() (bsc#999245).
- posix-timers: Fix stack info leak in timer_create() (bnc#1013018).
- powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).
- powerpc/vdso64: Use double word compare on pointers (bsc#1016489).
- rcu: Call out dangers of expedited RCU primitives (bsc#1008893).
- rcu: Direct algorithmic SRCU implementation (bsc#1008893).
- rcu: Flip -&gt;completed only once per SRCU grace period (bsc#1008893).
- rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893).
- rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893).
- rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893).
- s390/kmsg: add missing kmsg descriptions (bnc#1025702).
- s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702).
- s390/zcrypt: Introduce CEX6 toleration
- sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018).
- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).
- scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702).
- scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702).
- scsi: zfcp: fix use-after-'free' in FC ingress path after TMF (bnc#1025702).
- scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: Make xfs_icdinode-&gt;di_dmstate atomic_t (bsc#1024788).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: kill xfs_itruncate_start (bsc#1024788).
- xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788).
- xfs: remove the i_size field in struct xfs_inode (bsc#1024788).
- xfs: remove xfs_itruncate_data (bsc#1024788).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: split xfs_itruncate_finish (bsc#1024788).
- xfs: split xfs_setattr (bsc#1024788).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005651">SUSE bug 1005651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013800">SUSE bug 1013800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016489">SUSE bug 1016489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021913">SUSE bug 1021913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023014">SUSE bug 1023014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023163">SUSE bug 1023163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024788">SUSE bug 1024788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025702">SUSE bug 1025702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026260">SUSE bug 1026260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029770">SUSE bug 1029770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033771">SUSE bug 1033771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033794">SUSE bug 1033794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033804">SUSE bug 1033804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033816">SUSE bug 1033816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909486">SUSE bug 909486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911105">SUSE bug 911105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564931" comment="kernel-docs-3.0.101-100.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37384" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563697" comment="lxc-devel-0.8.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37385" version="1" class="patch">
	<metadata>
		<title>Security update for lynx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1008642" ref_url="https://bugzilla.suse.com/1008642" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9179" ref_url="https://www.suse.com/security/cve/CVE-2016-9179/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002675.html" source="SUSE-SU"/>
		<description>

This update for lynx fixes the following issues:

- CVE-2016-9179: It was found that Lynx doesn't parse the authority
  component of the URL correctly when the host name part ends with '?',
  and could instead be tricked into connecting to a different host.
  (bsc#1008642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008642">SUSE bug 1008642</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9179/">CVE-2016-9179</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564932" comment="lynx-2.8.6-145.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37386" version="1" class="patch">
	<metadata>
		<title>Security update for lynx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1068885" ref_url="https://bugzilla.suse.com/1068885" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000211" ref_url="https://www.suse.com/security/cve/CVE-2017-1000211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003467.html" source="SUSE-SU"/>
		<description>
This update for lynx fixes the following issues:

Security issue fixed:

- CVE-2017-1000211: Fix use after free in the HTMLparser that can resulting in memory disclosure (bsc#1068885).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068885">SUSE bug 1068885</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000211/">CVE-2017-1000211</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564933" comment="lynx-2.8.6-146.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37387" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1083903" ref_url="https://bugzilla.suse.com/1083903" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000115" ref_url="https://www.suse.com/security/cve/CVE-2018-1000115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004061.html" source="SUSE-SU"/>
		<description>
This update for memcached fixes the following issues:

- CVE-2018-1000115: Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability 
in the UDP support of the memcached server could result in denial of service via network flood 
(traffic amplification of 1:50,000 has been reported by reliable sources). (bsc#1083903)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083903">SUSE bug 1083903</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000115/">CVE-2018-1000115</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564934" comment="memcached-1.2.6-5.17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37388" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007870" ref_url="https://bugzilla.suse.com/1007870" source="BUGZILLA"/>
		<reference ref_id="1056865" ref_url="https://bugzilla.suse.com/1056865" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004166.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:
  
- CVE-2016-8705: Server update remote code execution (bsc#1007870).
- CVE-2017-9951: Heap-based buffer over-read in try_read_command function (incomplete fix for CVE-2016-8705) (bsc#1056865).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007870">SUSE bug 1007870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564935" comment="memcached-1.2.6-5.17.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37389" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="973175" ref_url="https://bugzilla.suse.com/973175" source="BUGZILLA"/>
		<reference ref_id="973176" ref_url="https://bugzilla.suse.com/973176" source="BUGZILLA"/>
		<reference ref_id="973177" ref_url="https://bugzilla.suse.com/973177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3068" ref_url="https://www.suse.com/security/cve/CVE-2016-3068/" source="CVE"/>
		<reference ref_id="CVE-2016-3069" ref_url="https://www.suse.com/security/cve/CVE-2016-3069/" source="CVE"/>
		<reference ref_id="CVE-2016-3630" ref_url="https://www.suse.com/security/cve/CVE-2016-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00017.html" source="SUSE-SU"/>
		<description>
mercurial was updated to fix three security issues.

These security issues were fixed:
- CVE-2016-3069: Arbitrary code execution when converting Git repos (bsc#973176).
- CVE-2016-3068: Arbitrary code execution with Git subrepos (bsc#973177).
- CVE-2016-3630: Remote code execution in binary delta decoding (bsc#973175).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/973175">SUSE bug 973175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973176">SUSE bug 973176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973177">SUSE bug 973177</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3068/">CVE-2016-3068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3069/">CVE-2016-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3630/">CVE-2016-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564936" comment="mercurial-2.3.2-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37390" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="978391" ref_url="https://bugzilla.suse.com/978391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3105" ref_url="https://www.suse.com/security/cve/CVE-2016-3105/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002083.html" source="SUSE-SU"/>
		<description>

This update for mercurial fixes the following issues: 

Security issues fixed:
- CVE-2016-3105: Versionsprior to 3.8 allowed arbitrary code execution
  when using the convert extension on Git repo. (bsc#978391)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-30"/>
	<updated date="2016-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/978391">SUSE bug 978391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3105/">CVE-2016-3105</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564937" comment="mercurial-2.3.2-0.14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37391" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1043063" ref_url="https://bugzilla.suse.com/1043063" source="BUGZILLA"/>
		<reference ref_id="1043502" ref_url="https://bugzilla.suse.com/1043502" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9462" ref_url="https://www.suse.com/security/cve/CVE-2017-9462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1558-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00007.html" source="SUSE-SU"/>
		<description>
This update for mercurial fixes the following issues:

- CVE-2017-9462: Arbitrary code execution was possible by remote users via 'hg serve --stdio'
  (bsc#1043063):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043063">SUSE bug 1043063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043502">SUSE bug 1043502</bugzilla>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9462/">CVE-2017-9462</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564938" comment="mercurial-2.3.2-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37392" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1052696" ref_url="https://bugzilla.suse.com/1052696" source="BUGZILLA"/>
		<reference ref_id="1053344" ref_url="https://bugzilla.suse.com/1053344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000115" ref_url="https://www.suse.com/security/cve/CVE-2017-1000115/" source="CVE"/>
		<reference ref_id="CVE-2017-1000116" ref_url="https://www.suse.com/security/cve/CVE-2017-1000116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003155.html" source="SUSE-SU"/>
		<description>
This update for mercurial fixes the following issues:

- CVE-2017-1000115: path traversal via symlink could lead to unauthorized access (bsc#1053344)
- CVE-2017-1000116: argument injection in SSH URLs could lead to client-side code execution (bsc#1052696)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-24"/>
	<updated date="2017-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053344">SUSE bug 1053344</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000115/">CVE-2017-1000115</cve>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000116/">CVE-2017-1000116</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564939" comment="mercurial-2.3.2-0.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37393" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1071715" ref_url="https://bugzilla.suse.com/1071715" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17458" ref_url="https://www.suse.com/security/cve/CVE-2017-17458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003609.html" source="SUSE-SU"/>
		<description>
This update for mercurial fixes the following issues:

- CVE-2017-17458: In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically. (bsc#1071715):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071715">SUSE bug 1071715</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17458/">CVE-2017-17458</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564940" comment="mercurial-2.3.2-0.18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37394" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1100353" ref_url="https://bugzilla.suse.com/1100353" source="BUGZILLA"/>
		<reference ref_id="1100354" ref_url="https://bugzilla.suse.com/1100354" source="BUGZILLA"/>
		<reference ref_id="1100355" ref_url="https://bugzilla.suse.com/1100355" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13346" ref_url="https://www.suse.com/security/cve/CVE-2018-13346/" source="CVE"/>
		<reference ref_id="CVE-2018-13347" ref_url="https://www.suse.com/security/cve/CVE-2018-13347/" source="CVE"/>
		<reference ref_id="CVE-2018-13348" ref_url="https://www.suse.com/security/cve/CVE-2018-13348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004290.html" source="SUSE-SU"/>
		<description>
This update for mercurial fixes the following issues:

Security issues fixed:

- CVE-2018-13346: Fix mpatch_apply function in mpatch.c that incorrectly proceeds in cases where the fragment start is past the end of the original data (bsc#1100354).
- CVE-2018-13347: Fix mpatch.c that mishandles integer addition and subtraction (bsc#1100355).
- CVE-2018-13348: Fix the mpatch_decode function in mpatch.c that mishandles certain situations where there should be at least 12 bytes remaining after thecurrent position in the patch data (bsc#1100353).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100353">SUSE bug 1100353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100354">SUSE bug 1100354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100355">SUSE bug 1100355</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13346/">CVE-2018-13346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13347/">CVE-2018-13347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13348/">CVE-2018-13348</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564941" comment="mercurial-2.3.2-0.18.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37395" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026 bsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation (MFSA 2016-92  bsc#1012964)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)
    
The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564942" comment="MozillaFirefox-devel-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564943" comment="mozilla-nss-devel-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37396" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564944" comment="bytefx-data-mysql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563700" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563701" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564945" comment="mono-data-firebird-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564946" comment="mono-data-oracle-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563704" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563705" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564947" comment="mono-data-sybase-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564948" comment="mono-devel-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564949" comment="mono-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564950" comment="mono-jscript-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563710" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563711" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564951" comment="mono-wcf-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563713" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563714" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564952" comment="mono-winfxcore-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564953" comment="monodoc-core-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37397" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary
  code execution through the string-to-double parser implementation. (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU
  consumption due to lack of protection against predictable hash collisions when processing
  form parameters. (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564954" comment="bytefx-data-mysql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564955" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564956" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564957" comment="mono-data-firebird-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564958" comment="mono-data-oracle-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564959" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564960" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564961" comment="mono-data-sybase-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564962" comment="mono-devel-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564963" comment="mono-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564964" comment="mono-jscript-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564965" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564966" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564967" comment="mono-wcf-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564968" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564969" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564970" comment="mono-winfxcore-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564971" comment="monodoc-core-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37398" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563717" comment="MozillaFirefox-devel-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563718" comment="mozilla-nss-devel-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37399" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563719" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37400" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563720" comment="mozilla-nss-devel-3.19.2.2-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37401" version="1" class="patch">
	<metadata>
		<title>Security update for mxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="979205" ref_url="https://bugzilla.suse.com/979205" source="BUGZILLA"/>
		<reference ref_id="979206" ref_url="https://bugzilla.suse.com/979206" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4570" ref_url="https://www.suse.com/security/cve/CVE-2016-4570/" source="CVE"/>
		<reference ref_id="CVE-2016-4571" ref_url="https://www.suse.com/security/cve/CVE-2016-4571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003406.html" source="SUSE-SU"/>
		<description>
This update for mxml fixes the following issues:

Security issues fixed:

- CVE-2016-4570, CVE-2016-4571: stack exhaustion parsing xml files using mxml (bsc#979205, bsc#979206)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-23"/>
	<updated date="2017-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979205">SUSE bug 979205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979206">SUSE bug 979206</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4570/">CVE-2016-4570</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4571/">CVE-2016-4571</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564972" comment="libmxml1-2.5-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564973" comment="mxml-2.5-24.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37402" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563722" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563723" comment="libmysql55client_r18-x86-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37403" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563724" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563725" comment="libmysql55client_r18-x86-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37404" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563726" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563727" comment="libmysql55client_r18-x86-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37405" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="976341" ref_url="https://bugzilla.suse.com/976341" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<description>
mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

More details are available at
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564974" comment="libmysql55client_r18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564975" comment="libmysql55client_r18-x86-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37406" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564976" comment="libmysqlclient-devel-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564977" comment="libmysqlclient_r15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564978" comment="libmysqlclient_r15-x86-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37407" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="967374" ref_url="https://bugzilla.suse.com/967374" source="BUGZILLA"/>
		<reference ref_id="989913" ref_url="https://bugzilla.suse.com/989913" source="BUGZILLA"/>
		<reference ref_id="989919" ref_url="https://bugzilla.suse.com/989919" source="BUGZILLA"/>
		<reference ref_id="989922" ref_url="https://bugzilla.suse.com/989922" source="BUGZILLA"/>
		<reference ref_id="989926" ref_url="https://bugzilla.suse.com/989926" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<description>

This mysql update to verson 5.5.52 fixes the following issues: 

Security issues fixed:
- CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913).
- CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919).
- CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922).
- CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926).
- CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and , under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)


More details can be found on:
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html

Bugs fixed:
- bsc#967374: properly restart mysql multi instances during upgrade
- bnc#937258: multi script to restart after crash
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-20"/>
	<updated date="2016-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967374">SUSE bug 967374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564979" comment="libmysql55client_r18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564980" comment="libmysql55client_r18-x86-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37408" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005580" ref_url="https://bugzilla.suse.com/1005580" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.53 fixes the following issues:

- CVE-2016-6662: Unspecified vulnerability in subcomponent Logging (bsc#1005580)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)

Release Notes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-12"/>
	<updated date="2016-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564981" comment="libmysql55client_r18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564982" comment="libmysql55client_r18-x86-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37409" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.54 fixes the following issues:

- CVE-2017-3318: Unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component (bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

Release Notes: 
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564983" comment="libmysql55client_r18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564984" comment="libmysql55client_r18-x86-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37410" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1029014" ref_url="https://bugzilla.suse.com/1029014" source="BUGZILLA"/>
		<reference ref_id="1029396" ref_url="https://bugzilla.suse.com/1029396" source="BUGZILLA"/>
		<reference ref_id="1034850" ref_url="https://bugzilla.suse.com/1034850" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3329" ref_url="https://www.suse.com/security/cve/CVE-2017-3329/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3461" ref_url="https://www.suse.com/security/cve/CVE-2017-3461/" source="CVE"/>
		<reference ref_id="CVE-2017-3462" ref_url="https://www.suse.com/security/cve/CVE-2017-3462/" source="CVE"/>
		<reference ref_id="CVE-2017-3463" ref_url="https://www.suse.com/security/cve/CVE-2017-3463/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<description>

This update for mysql to version 5.5.55 fixes the following issues:

These security issues were fixed:

- CVE-2017-3308: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3309: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3329: Unspecified vulnerability in Server: Thread (bsc#1034850)
- CVE-2017-3600: Unspecified vulnerability in Client: mysqldump (bsc#1034850)
- CVE-2017-3453: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3456: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3463: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3462: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3461: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3464: Unspecified vulnerability in Server: DDL (bsc#1034850)
- CVE-2017-3305: MySQL client sent authentication request unencrypted even if SSL was required (aka Ridddle) (bsc#1029396).
- CVE-2016-5483: Mysqldump failed to properly quote certain identifiers in SQL statements written to the dump output, allowing for execution of arbitrary commands (bsc#1029014)
- '--ssl-mode=REQUIRED' can be specified to require a secure connection (it fails if a secure connection cannot be obtained)

This non-security issue was fixed:

- Set the default umask to 077 in rc.mysql-multi [bsc#1020976]

For additional changes please see
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-55.html

Note: The issue tracked in bsc#1022428 and fixed in the last update was
assigned CVE-2017-3302.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3329/">CVE-2017-3329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3461/">CVE-2017-3461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3462/">CVE-2017-3462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3463/">CVE-2017-3463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564985" comment="libmysql55client_r18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564986" comment="libmysql55client_r18-x86-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37411" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1049398" ref_url="https://bugzilla.suse.com/1049398" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049411" ref_url="https://bugzilla.suse.com/1049411" source="BUGZILLA"/>
		<reference ref_id="1049415" ref_url="https://bugzilla.suse.com/1049415" source="BUGZILLA"/>
		<reference ref_id="1049416" ref_url="https://bugzilla.suse.com/1049416" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1049422" ref_url="https://bugzilla.suse.com/1049422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3635" ref_url="https://www.suse.com/security/cve/CVE-2017-3635/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3648" ref_url="https://www.suse.com/security/cve/CVE-2017-3648/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<reference ref_id="CVE-2017-3652" ref_url="https://www.suse.com/security/cve/CVE-2017-3652/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<description>
This update for mysql fixes the following issues:


- CVE-2017-3635: C API unspecified vulnerability (bsc#1049398) 
- CVE-2017-3636: Client programs unspecified vulnerability (bsc#1049399)
- CVE-2017-3641: DML unspecified vulnerability (bsc#1049404)
- CVE-2017-3648: Charsets unspecified vulnerability (bsc#1049411)
- CVE-2017-3651: Client mysqldump unspecified vulnerability (bsc#1049415)
- CVE-2017-3652: DDL unspecified vulnerability (bsc#1049416)
- CVE-2017-3653: DDL unspecified vulnerability (bsc#1049417)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049398">SUSE bug 1049398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3635/">CVE-2017-3635</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3648/">CVE-2017-3648</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3652/">CVE-2017-3652</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564987" comment="libmysql55client_r18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564988" comment="libmysql55client_r18-x86-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37412" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1064116" ref_url="https://bugzilla.suse.com/1064116" source="BUGZILLA"/>
		<reference ref_id="1064117" ref_url="https://bugzilla.suse.com/1064117" source="BUGZILLA"/>
		<reference ref_id="1064119" ref_url="https://bugzilla.suse.com/1064119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<description>


This update for mysql to version 5.5.58 fixes the following issues:

Fixed security issues:

- CVE-2017-10268: issue inside subcomponent Server Replication [bsc#1064101] 
- CVE-2017-10378: issue inside subcomponent Server Optimizer [bsc#1064115] 
- CVE-2017-10379: issue inside subcomponent Client programs [bsc#1064116] 
- CVE-2017-10384: issue inside subcomponent Server DDL [bsc#1064117] 

For a full list of changes check:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564989" comment="libmysql55client_r18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564990" comment="libmysql55client_r18-x86-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37413" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1076369" ref_url="https://bugzilla.suse.com/1076369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<description>
This update for mysql to version 5.5.59 fixes several issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369)
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server.  Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)

For additional changes please see http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564991" comment="libmysql55client_r18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564992" comment="libmysql55client_r18-x86-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37414" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1089987" ref_url="https://bugzilla.suse.com/1089987" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2773" ref_url="https://www.suse.com/security/cve/CVE-2018-2773/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2818" ref_url="https://www.suse.com/security/cve/CVE-2018-2818/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<description>

  This update fixes the following issues:

  - Update to 5.5.60 in Oracle Apr2018 CPU (bsc#1089987).
  - CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
  - CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2818: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
  - CVE-2018-2773: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2773/">CVE-2018-2773</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2818/">CVE-2018-2818</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564993" comment="libmysql55client_r18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564994" comment="libmysql55client_r18-x86-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37415" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1101679" ref_url="https://bugzilla.suse.com/1101679" source="BUGZILLA"/>
		<reference ref_id="1101680" ref_url="https://bugzilla.suse.com/1101680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3070" ref_url="https://www.suse.com/security/cve/CVE-2018-3070/" source="CVE"/>
		<reference ref_id="CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<description>
This update for mysql to version 5.5.61 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-3066: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Client. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3063: Fixed an easily exploitable vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101677)

 You can find more detailed information about this update in the
 [release notes](http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101679">SUSE bug 1101679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3070/">CVE-2018-3070</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564995" comment="libmysql55client_r18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564996" comment="libmysql55client_r18-x86-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37416" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112369" ref_url="https://bugzilla.suse.com/1112369" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3133" ref_url="https://www.suse.com/security/cve/CVE-2018-3133/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<description>

  
MySQL server was updated to version 5.5.62, fixing bugs and security issues.

Changes:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html

Following security issues were fixed:

- CVE-2016-9843: The crc32_big function in zlib might have allowed context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. (bsc#1013882)
  Please note that SUSE uses the system zlib, not the embedded copy.

- CVE-2018-3133: Authenticated low privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112369)
- CVE-2018-3174: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112368)
- CVE-2018-3282: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112432)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3133/">CVE-2018-3133</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564997" comment="libmysql55client_r18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564998" comment="libmysql55client_r18-x86-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37417" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004743.html" source="SUSE-SU"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564999" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565000" comment="nagios-devel-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565001" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37418" version="1" class="patch">
	<metadata>
		<title>Security update for nasm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003088.html" source="SUSE-SU"/>
		<description>
This update for nasm fixes the following issues:

Security issue fixed:
- CVE-2017-10686: Multiple heap use after free vulnerabilities. (bsc#1047936)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-04"/>
	<updated date="2017-08-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565002" comment="nasm-2.03.90-2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37419" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004191.html" source="SUSE-SU"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565003" comment="nautilus-devel-2.28.4-1.16.21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37420" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00004.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565004" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565005" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565006" comment="tack-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37421" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565007" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565008" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565009" comment="tack-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37422" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565010" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565011" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565012" comment="tack-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37423" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003620.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565013" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565014" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565015" comment="tack-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37424" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563732" comment="net-snmp-devel-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563733" comment="net-snmp-devel-32bit-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37425" version="1" class="patch">
	<metadata>
		<title>Security update for netatalk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1119540" ref_url="https://bugzilla.suse.com/1119540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1160" ref_url="https://www.suse.com/security/cve/CVE-2018-1160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004994.html" source="SUSE-SU"/>
		<description>
This update for netatalk fixes the following issues:

Security issue fixed:

- CVE-2018-1160 Fixed a missing bounds check in the handling of the DSI
  OPEN SESSION request, which allowed an unauthenticated to overwrite memory
  with data of their choice leading for arbitrary code execution with root
  privileges. (bsc#1119540)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119540">SUSE bug 1119540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1160/">CVE-2018-1160</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565016" comment="netatalk-2.0.3-249.23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565017" comment="netatalk-devel-2.0.3-249.23.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37426" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002944.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565018" comment="libnetpbm-devel-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565019" comment="libnetpbm-devel-32bit-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37427" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022500" ref_url="https://bugzilla.suse.com/1022500" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0358" ref_url="https://www.suse.com/security/cve/CVE-2017-0358/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004316.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g fixes the following issues:

- CVE-2017-0358: Missing sanitization of the environment during a call to
  modprobe allowed local users to escalate fo root privilege (bsc#1022500)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1022500">SUSE bug 1022500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0358/">CVE-2017-0358</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565020" comment="ntfs-3g-2011.4.12-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565021" comment="ntfs-3g-devel-2011.4.12-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565022" comment="ntfsprogs-2011.4.12-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37428" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565023" comment="libtasn1-devel-1.5-1.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37429" version="1" class="patch">
	<metadata>
		<title>Security update for ocaml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="977990" ref_url="https://bugzilla.suse.com/977990" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8869" ref_url="https://www.suse.com/security/cve/CVE-2015-8869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002243.html" source="SUSE-SU"/>
		<description>

This update for ocaml fixes the following issue: 

Security issue fixed:
- CVE-2015-8869: Prevent buffer overflow and information leak. (bsc#977990)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977990">SUSE bug 977990</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8869/">CVE-2015-8869</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565024" comment="ocaml-4.02.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565025" comment="ocaml-compiler-libs-4.02.1-3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565026" comment="ocaml-runtime-4.02.1-3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37430" version="1" class="patch">
	<metadata>
		<title>Security update for ocaml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1088591" ref_url="https://bugzilla.suse.com/1088591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9838" ref_url="https://www.suse.com/security/cve/CVE-2018-9838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003959.html" source="SUSE-SU"/>
		<description>
This update for ocaml fixes the following issues:

- CVE-2018-9838: Integer overflows when unmarshaling a bigarray data could result in a 
  bigarray with impossibly large dimensions leading to overflow when computing the 
  in-memory size of the bigarray. [bsc#1088591]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088591">SUSE bug 1088591</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9838/">CVE-2018-9838</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565027" comment="ocaml-4.02.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565028" comment="ocaml-compiler-libs-4.02.1-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565029" comment="ocaml-runtime-4.02.1-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37431" version="1" class="patch">
	<metadata>
		<title>Security update for ocaml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1088591" ref_url="https://bugzilla.suse.com/1088591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9838" ref_url="https://www.suse.com/security/cve/CVE-2018-9838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004110.html" source="SUSE-SU"/>
		<description>
This update for ocaml fixes the following issues:

- CVE-2018-9838: The caml_ba_deserialize function in byterun/bigarray.c
  in the standard library had an integer overflow which, in situations
  where marshalled data is accepted from an untrusted source, allows remote
  attackers to cause a denial of service (memory corruption) or possibly
  execute arbitrary code via a crafted object. [bsc#1088591]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-04"/>
	<updated date="2018-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088591">SUSE bug 1088591</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9838/">CVE-2018-9838</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565030" comment="ocaml-4.02.1-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565031" comment="ocaml-compiler-libs-4.02.1-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565032" comment="ocaml-runtime-4.02.1-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37432" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563735" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563736" comment="openldap2-back-perl-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563737" comment="openldap2-devel-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563738" comment="openldap2-devel-32bit-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37433" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563743" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563744" comment="openldap2-back-perl-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563745" comment="openldap2-devel-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563746" comment="openldap2-devel-32bit-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37434" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565033" comment="opensc-devel-0.11.6-5.27.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37435" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565034" comment="openslp-devel-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565035" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37436" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563749" comment="libopenssl-devel-0.9.8j-0.80.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37437" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565036" comment="libopenssl-devel-0.9.8j-0.89.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37438" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565037" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565038" comment="libopenssl-devel-32bit-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37439" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565039" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565040" comment="libopenssl-devel-32bit-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37440" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565041" comment="libopenssl-devel-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565042" comment="libopenssl-devel-32bit-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37441" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00013.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565043" comment="libopenssl-devel-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565044" comment="libopenssl-devel-32bit-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37442" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565045" comment="libopenssl-devel-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565046" comment="libopenssl-devel-32bit-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37443" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565047" comment="libopenssl-devel-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565048" comment="libopenssl-devel-32bit-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37444" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565049" comment="libopenssl-devel-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565050" comment="libopenssl-devel-32bit-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37445" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565051" comment="libwsman-devel-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565052" comment="openwsman-python-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37446" version="1" class="patch">
	<metadata>
		<title>Security update for osc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="901643" ref_url="https://bugzilla.suse.com/901643" source="BUGZILLA"/>
		<reference ref_id="936939" ref_url="https://bugzilla.suse.com/936939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0778" ref_url="https://www.suse.com/security/cve/CVE-2015-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001529.html" source="SUSE-SU"/>
		<description>
This update provides osc 0.152.0 with various fixes and improvements.

This security issue was fixed:

- CVE-2015-0778: Shell command injection via crafted _service files. (bsc#901643)

For a comprehensive list of changes, please refer to the package's change log.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/901643">SUSE bug 901643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936939">SUSE bug 936939</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0778/">CVE-2015-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563750" comment="osc-0.152.0-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37447" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="962220" ref_url="https://bugzilla.suse.com/962220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<description>
This update for pam fixes two security issues.

These security issues were fixed:
- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- CVE-2013-7041: Compare password hashes case-sensitively (bsc#854480).

This non-security issue was fixed:
- bsc#962220: Don't fail when /var/log/btmp is corrupted
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962220">SUSE bug 962220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565053" comment="pam-devel-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565054" comment="pam-devel-32bit-1.1.5-0.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37448" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<description>

This update for perl fixes the following issues:

- CVE-2016-6185: xsloader looking at a '(eval)' directory [bsc#988311]
  
- CVE-2016-1238: searching current directory for optional modules [bsc#987887]

- CVE-2015-8853: regex engine hanging on bad utf8 [bnc976584]

- CVE-2016-2381: environment dup handling bug [bsc#967082]

- perl panic with utf8_mg_pos_cache_update [bsc#929027]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565055" comment="perl-base-32bit-5.10.0-64.80.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37449" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003383.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the
  File-Path module before 2.13 for Perl allows attackers to set the mode on
  arbitrary files via vectors involving directory-permission loosening logic.
  (bnc#1047178)

Bug fixes:
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565056" comment="perl-base-32bit-5.10.0-64.81.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37450" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565057" comment="perl-base-32bit-5.10.0-64.81.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37451" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565058" comment="perl-base-32bit-5.10.0-64.81.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37452" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002543.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565059" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37453" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002559.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565060" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37454" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004092.html" source="SUSE-SU"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565061" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37455" version="1" class="patch">
	<metadata>
		<title>Security update for perl-SOAP-Lite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1011836" ref_url="https://bugzilla.suse.com/1011836" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8978" ref_url="https://www.suse.com/security/cve/CVE-2015-8978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002453.html" source="SUSE-SU"/>
		<description>

This update for perl-SOAP-Lite fixes the following issue:

Security issue fixed:
- CVE-2015-8978: XML exponential entity expansion denial-of-service (bsc#1011836)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011836">SUSE bug 1011836</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8978/">CVE-2015-8978</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565062" comment="perl-SOAP-Lite-0.710.08-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37456" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001558.html" source="SUSE-SU"/>
		<description>
PHP was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-5589: PHP could be crashed when processing an invalid file with the 'phar' extension with a segfault in Phar::convertToData, leading to Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due to a buffer overlow in phar_fix_filepath (bsc#938719)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563754" comment="php53-devel-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563755" comment="php53-imap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563756" comment="php53-posix-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563757" comment="php53-readline-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563758" comment="php53-sockets-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563759" comment="php53-sqlite-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563760" comment="php53-tidy-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37457" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942294" ref_url="https://bugzilla.suse.com/942294" source="BUGZILLA"/>
		<reference ref_id="942295" ref_url="https://bugzilla.suse.com/942295" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00022.html" source="SUSE-SU"/>
		<description>

This update of PHP5 brings several security fixes.

Security fixes:
* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]

It also includes a bugfix for the odbc module:
* compare with SQL_NULL_DATA correctly [bnc#935074]
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563761" comment="php53-devel-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563762" comment="php53-imap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563763" comment="php53-posix-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563764" comment="php53-readline-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563765" comment="php53-sockets-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563766" comment="php53-sqlite-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563767" comment="php53-tidy-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37458" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could lead to crashes. [bsc#968284]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar phar archives could potentially lead to code execution. [bsc#949961]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565063" comment="php53-devel-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565064" comment="php53-imap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565065" comment="php53-posix-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565066" comment="php53-readline-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565067" comment="php53-sockets-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565068" comment="php53-sqlite-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565069" comment="php53-tidy-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37459" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following security issues:

- CVE-2016-4073: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565070" comment="php53-devel-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565071" comment="php53-imap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565072" comment="php53-posix-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565073" comment="php53-readline-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565074" comment="php53-sockets-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565075" comment="php53-sqlite-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565076" comment="php53-tidy-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37460" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-5093: A get_icu_value_internal out-of-bounds read could crash the php interpreter (bsc#982010)
- CVE-2016-5094,CVE-2016-5095: Don't allow creating strings with lengths outside int range, avoids overflows (bsc#982011,bsc#982012)
- CVE-2016-5096: A int/size_t confusion in fread could corrupt memory (bsc#982013)
- CVE-2016-5114: A fpm_log.c memory leak and buffer overflow could leak information out of the php process or overwrite a buffer by 1 byte (bsc#982162)
- CVE-2016-4346: A heap overflow was fixed in ext/standard/string.c (bsc#977994)
- CVE-2016-4342: A heap corruption was fixed in tar/zip/phar parser (bsc#977991)
- CVE-2016-4537, CVE-2016-4538: bcpowmod accepted negative scale causing heap buffer overflow corrupting _one_ definition (bsc#978827)
- CVE-2016-4539: Malformed input causes segmentation fault in xml_parse_into_struct() function (bsc#978828)
- CVE-2016-4540, CVE-2016-4541: Out-of-bounds memory read in zif_grapheme_stripos when given negative offset (bsc#978829)
- CVE-2016-4542, CVE-2016-4543, CVE-2016-4544: Out-of-bounds heap memory
  read in exif_read_data() caused by malformed input (bsc#978830)
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert
  function  (bsc#980366)
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c (bsc#980373)
- CVE-2015-8874: Stack consumption vulnerability in GD (bsc#980375)
- CVE-2015-8879: odbc_bindcols function in ext/odbc/php_odbc.c mishandles
  driver behavior for SQL_WVARCHAR (bsc#981050)

Also fixed previously on SUSE Linux Enterprise 11 SP4, but not yet shipped to SUSE Linux Enterprise Server 11 SP3 LTSS:
- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion
  issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could
  lead to crashes. [bsc#968284]
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar
  phar archives could potentially lead to code execution. [bsc#949961]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
- CVE-2014-9767: A directory traversal when extracting zip files was
  fixed that could lead to overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4073: A remote attacker could have caused denial of service,
  or possibly execute arbitrary code, due to incorrect handling of string
  length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not
  return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared
  between threads, which could have resulted in XML external entity
  injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service
  due to incorrect handling of large strings in php_raw_url_encode()
  (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565077" comment="php53-devel-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565078" comment="php53-imap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565079" comment="php53-posix-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565080" comment="php53-readline-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565081" comment="php53-sockets-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565082" comment="php53-sqlite-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565083" comment="php53-tidy-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37461" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html" source="SUSE-SU"/>
		<description>
php53 was updated to fix five security issues.

These security issues were fixed:
- CVE-2016-5769: mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double Free Courruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565084" comment="php53-devel-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565085" comment="php53-imap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565086" comment="php53-posix-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565087" comment="php53-readline-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565088" comment="php53-sockets-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565089" comment="php53-sqlite-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565090" comment="php53-tidy-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37462" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- security update:
  * CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
  * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
  * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
  * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
  * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
  * CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
  * CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
  * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-01"/>
	<updated date="2016-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565091" comment="php53-devel-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565092" comment="php53-imap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565093" comment="php53-posix-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565094" comment="php53-readline-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565095" comment="php53-sockets-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565096" comment="php53-sqlite-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565097" comment="php53-tidy-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37463" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00006.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565098" comment="php53-devel-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565099" comment="php53-imap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565100" comment="php53-posix-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565101" comment="php53-readline-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565102" comment="php53-sockets-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565103" comment="php53-sqlite-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565104" comment="php53-tidy-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37464" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002378.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-31"/>
	<updated date="2016-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565105" comment="php53-devel-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565106" comment="php53-imap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565107" comment="php53-posix-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565108" comment="php53-readline-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565109" comment="php53-sockets-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565110" comment="php53-sqlite-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565111" comment="php53-tidy-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37465" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012232" ref_url="https://bugzilla.suse.com/1012232" source="BUGZILLA"/>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="974305" ref_url="https://bugzilla.suse.com/974305" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9912" ref_url="https://www.suse.com/security/cve/CVE-2014-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002552.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2014-9912: Stack-based buffer overflow in uloc_getDisplayName() [bsc#1012232]
* CVE-2016-9933: Possible stack overflow on truecolor images handling [bsc#1015187]
* CVE-2016-9934: Dereference from NULL pointer could lead to crash [bsc#1015188]
* CVE-2016-9935: Invalid read could lead to crash [bsc#1015189]
* Buffer overflow in libmagic, allowing attackers to crash the PHP interpreter [bsc#974305]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974305">SUSE bug 974305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9912/">CVE-2014-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565112" comment="php53-devel-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565113" comment="php53-imap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565114" comment="php53-posix-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565115" comment="php53-readline-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565116" comment="php53-sockets-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565117" comment="php53-sqlite-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565118" comment="php53-tidy-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37466" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1019550" ref_url="https://bugzilla.suse.com/1019550" source="BUGZILLA"/>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022255" ref_url="https://bugzilla.suse.com/1022255" source="BUGZILLA"/>
		<reference ref_id="1022257" ref_url="https://bugzilla.suse.com/1022257" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10159" ref_url="https://www.suse.com/security/cve/CVE-2016-10159/" source="CVE"/>
		<reference ref_id="CVE-2016-10160" ref_url="https://www.suse.com/security/cve/CVE-2016-10160/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-7478" ref_url="https://www.suse.com/security/cve/CVE-2016-7478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite
  loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10159/">CVE-2016-10159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10160/">CVE-2016-10160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7478/">CVE-2016-7478</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565119" comment="php53-devel-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565120" comment="php53-imap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565121" comment="php53-posix-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565122" comment="php53-readline-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565123" comment="php53-sockets-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565124" comment="php53-sqlite-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565125" comment="php53-tidy-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37467" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1035111" ref_url="https://bugzilla.suse.com/1035111" source="BUGZILLA"/>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6294" ref_url="https://www.suse.com/security/cve/CVE-2016-6294/" source="CVE"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002949.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

This security issue was fixed:

- CVE-2017-7272: PHP enabled potential SSRF in applications that accept an fsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax was recognized, fsockopen used the port number that is specified in the hostname argument, instead of the port number in the second argument of the function (bsc#1031246)
- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
- CVE-2017-9227: An issue was discovered in Oniguruma 6.2.0, as used in mbstring in PHP. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. (bsc#1040883)
- CVE-2017-9226: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. (bsc#1040889)
- CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6294/">CVE-2016-6294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565126" comment="php53-devel-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565127" comment="php53-imap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565128" comment="php53-posix-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565129" comment="php53-readline-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565130" comment="php53-sockets-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565131" comment="php53-sqlite-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565132" comment="php53-tidy-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37468" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1044976" ref_url="https://bugzilla.suse.com/1044976" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00039.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- The fix for CVE-2017-7272 was reverted, as it caused regressions in the mysql server connect module.  [bsc#1044976]
  The security fix tried to avoid a server side request forgery, and will be submitted when a better fix becomes available.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565133" comment="php53-devel-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565134" comment="php53-imap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565135" comment="php53-posix-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565136" comment="php53-readline-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565137" comment="php53-sockets-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565138" comment="php53-sqlite-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565139" comment="php53-tidy-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37469" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048094" ref_url="https://bugzilla.suse.com/1048094" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048111" ref_url="https://bugzilla.suse.com/1048111" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11146" ref_url="https://www.suse.com/security/cve/CVE-2017-11146/" source="CVE"/>
		<reference ref_id="CVE-2017-11147" ref_url="https://www.suse.com/security/cve/CVE-2017-11147/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the several issues.

These security issues were fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
- CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
- CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
- CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
- CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
- CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
- CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
- CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
- CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11146/">CVE-2017-11146</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11147/">CVE-2017-11147</cve>
	<cve impact="low" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565140" comment="php53-devel-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565141" comment="php53-imap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565142" comment="php53-posix-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565143" comment="php53-readline-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565144" comment="php53-sockets-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565145" comment="php53-sqlite-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565146" comment="php53-tidy-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37470" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1067441" ref_url="https://bugzilla.suse.com/1067441" source="BUGZILLA"/>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16642" ref_url="https://www.suse.com/security/cve/CVE-2017-16642/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2017-16642: Fix timelib_meridian error that could be used to leak information from the interpreter (bsc#1067441).
- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-02"/>
	<updated date="2018-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16642/">CVE-2017-16642</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565147" comment="php53-devel-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565148" comment="php53-imap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565149" comment="php53-posix-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565150" comment="php53-readline-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565151" comment="php53-sockets-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565152" comment="php53-sqlite-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565153" comment="php53-tidy-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37471" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1076220" ref_url="https://bugzilla.suse.com/1076220" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="986391" ref_url="https://bugzilla.suse.com/986391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2016-5771" ref_url="https://www.suse.com/security/cve/CVE-2016-5771/" source="CVE"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes several issues.

These security issues were fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data
  could be controlled if the input can be controlled (e.g., during file
  uploads).  (bsc#1080234)
- CVE-2018-5712: Prevent reflected XSS on the PHAR 404 error page via the
  URI of a request for a .phar file that allowed for information disclosure
  (bsc#1076220)
- CVE-2018-5711: Prevent integer signedness error that could have lead
  to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
- CVE-2016-5773: php_zip.c in the zip extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data containing a ZipArchive object.  (bsc#986247)
- CVE-2016-5771: spl_array.c in the SPL extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data.  (bsc#986391)
- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an
  HTTPresponse in the php_stream_url_wrap_http_ex.  (bsc#1083639)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5771/">CVE-2016-5771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565154" comment="php53-devel-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565155" comment="php53-imap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565156" comment="php53-posix-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565157" comment="php53-readline-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565158" comment="php53-sockets-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565159" comment="php53-sqlite-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565160" comment="php53-tidy-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37472" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091362" ref_url="https://bugzilla.suse.com/1091362" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="1091367" ref_url="https://bugzilla.suse.com/1091367" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10545" ref_url="https://www.suse.com/security/cve/CVE-2018-10545/" source="CVE"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2018-10545: Fix access controls in FPM child processes (bsc#1091367).
- CVE-2018-10547: Fix Reflected XSS on the PHAR 403 and 404 error pages (bsc#1091362).
- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10545/">CVE-2018-10545</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565161" comment="php53-devel-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565162" comment="php53-imap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565163" comment="php53-posix-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565164" comment="php53-readline-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565165" comment="php53-sockets-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565166" comment="php53-sqlite-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565167" comment="php53-tidy-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37473" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004301.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

The following security issue was fixed:

- An out-of-bounds read in the do_core_note function in readelf.c in libmagic.a
  allowed remote attackers to cause a denial of service via a crafted ELF file
  (CVE-2018-10360, bsc#1096984)
- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565168" comment="php53-devel-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565169" comment="php53-imap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565170" comment="php53-posix-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565171" comment="php53-readline-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565172" comment="php53-sockets-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565173" comment="php53-sqlite-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565174" comment="php53-tidy-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37474" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004547.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

The following security issues were fixed:

- CVE-2018-14851: Fixed an out-of-bound read in exif_process_IFD_in_MAKERNOTE,
  which could be exploited by an attacker via crafted JPG files, and could
  result in an application crash. (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow leading to a heap based buffer
  over-read in exif_thumbnail_extract of exif.c. (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565175" comment="php53-devel-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565176" comment="php53-imap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565177" comment="php53-posix-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565178" comment="php53-readline-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565179" comment="php53-sockets-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565180" comment="php53-sqlite-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565181" comment="php53-tidy-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37475" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004644.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565182" comment="php53-devel-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565183" comment="php53-imap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565184" comment="php53-posix-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565185" comment="php53-readline-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565186" comment="php53-sockets-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565187" comment="php53-sqlite-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565188" comment="php53-tidy-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37476" version="1" class="patch">
	<metadata>
		<title>Recommended update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004920.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565189" comment="php53-devel-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565190" comment="php53-imap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565191" comment="php53-posix-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565192" comment="php53-readline-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565193" comment="php53-sockets-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565194" comment="php53-sqlite-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565195" comment="php53-tidy-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37477" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005123.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565196" comment="php53-devel-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565197" comment="php53-imap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565198" comment="php53-posix-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565199" comment="php53-readline-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565200" comment="php53-sockets-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565201" comment="php53-sqlite-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565202" comment="php53-tidy-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37478" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126713" ref_url="https://bugzilla.suse.com/1126713" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1127122" ref_url="https://bugzilla.suse.com/1127122" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128886" ref_url="https://bugzilla.suse.com/1128886" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which could allow an attacker to read 
  allocated and unallocated memory when parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR reading functions which could allow an 
  attacker to read allocated and unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565203" comment="php53-devel-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565204" comment="php53-imap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565205" comment="php53-posix-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565206" comment="php53-readline-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565207" comment="php53-sockets-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565208" comment="php53-sqlite-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565209" comment="php53-tidy-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37479" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="991691" ref_url="https://bugzilla.suse.com/991691" source="BUGZILLA"/>
		<reference ref_id="991709" ref_url="https://bugzilla.suse.com/991709" source="BUGZILLA"/>
		<reference ref_id="991711" ref_url="https://bugzilla.suse.com/991711" source="BUGZILLA"/>
		<reference ref_id="991712" ref_url="https://bugzilla.suse.com/991712" source="BUGZILLA"/>
		<reference ref_id="991715" ref_url="https://bugzilla.suse.com/991715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2367" ref_url="https://www.suse.com/security/cve/CVE-2016-2367/" source="CVE"/>
		<reference ref_id="CVE-2016-2370" ref_url="https://www.suse.com/security/cve/CVE-2016-2370/" source="CVE"/>
		<reference ref_id="CVE-2016-2371" ref_url="https://www.suse.com/security/cve/CVE-2016-2371/" source="CVE"/>
		<reference ref_id="CVE-2016-2372" ref_url="https://www.suse.com/security/cve/CVE-2016-2372/" source="CVE"/>
		<reference ref_id="CVE-2016-2373" ref_url="https://www.suse.com/security/cve/CVE-2016-2373/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00035.html" source="SUSE-SU"/>
		<description>

This update for pidgin fixes the following issues:

Security issues fixed:
- CVE-2016-2367: Fixed a MXIT Avatar Length Memory Disclosure Vulnerability (bsc#991715).
- CVE-2016-2370: Fixed a MXIT Custom Resource Denial of Service Vulnerability (bsc#991712).
- CVE-2016-2371: Fixed a MXIT Extended Profiles Code Execution Vulnerability (bsc#991691).
- CVE-2016-2372: Fixed a MXIT File Transfer Length Memory Disclosure Vulnerability (bsc#991711).
- CVE-2016-2373: Fixed a MXIT Contact Mood Denial of Service Vulnerability (bsc#991709)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/991691">SUSE bug 991691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991709">SUSE bug 991709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991711">SUSE bug 991711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991712">SUSE bug 991712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991715">SUSE bug 991715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2367/">CVE-2016-2367</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2370/">CVE-2016-2370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2371/">CVE-2016-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2372/">CVE-2016-2372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2373/">CVE-2016-2373</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565210" comment="finch-2.6.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565211" comment="finch-devel-2.6.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565212" comment="libpurple-2.6.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565213" comment="libpurple-devel-2.6.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565214" comment="libpurple-lang-2.6.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565215" comment="pidgin-2.6.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565216" comment="pidgin-devel-2.6.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37480" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1028835" ref_url="https://bugzilla.suse.com/1028835" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004382.html" source="SUSE-SU"/>
		<description>
This update for pidgin fixes the following issues:

The following security vulnerability was fixed:

- CVE-2017-2640: Fixed an out of bound write in purple_markup_unescape_entity,
  which could be triggered by a server controlled by an attacker and could
  lead to crashes or, in some extreme cases, to remote code execution on the
  client side (bsc#1028835).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028835">SUSE bug 1028835</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565217" comment="finch-2.6.6-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565218" comment="finch-devel-2.6.6-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565219" comment="libpurple-2.6.6-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565220" comment="libpurple-devel-2.6.6-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565221" comment="libpurple-lang-2.6.6-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565222" comment="pidgin-2.6.6-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565223" comment="pidgin-devel-2.6.6-0.30.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37481" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002107.html" source="SUSE-SU"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565224" comment="libpoppler-devel-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565225" comment="libpoppler-glib-devel-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565226" comment="libpoppler-qt2-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565227" comment="libpoppler-qt3-devel-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565228" comment="libpoppler-qt4-devel-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565229" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37482" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565230" comment="libpoppler-devel-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565231" comment="libpoppler-glib-devel-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565232" comment="libpoppler-qt2-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565233" comment="libpoppler-qt3-devel-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565234" comment="libpoppler-qt4-devel-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565235" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37483" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563774" comment="postgresql94-devel-9.4.5-0.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37484" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565236" comment="postgresql94-devel-9.4.6-0.14.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37485" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00036.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565237" comment="postgresql94-devel-9.4.9-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37486" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565238" comment="postgresql94-devel-9.4.12-0.22.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37487" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565239" comment="postgresql94-devel-9.4.13-0.23.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37488" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565240" comment="postgresql94-devel-9.4.15-0.23.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37489" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003745.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565241" comment="postgresql94-devel-9.4.16-0.23.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37490" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003828.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565242" comment="postgresql94-devel-9.4.17-0.23.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37491" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565243" comment="postgresql94-devel-9.4.19-0.23.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37492" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002648.html" source="SUSE-SU"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565244" comment="ppp-devel-2.4.5.git-2.31.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37493" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565245" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565246" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565247" comment="python-devel-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565250" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565251" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565252" comment="python-tk-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37494" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0768-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180768-1.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565253" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565254" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565255" comment="python-devel-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565258" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565259" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565260" comment="python-tk-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37495" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004216.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565261" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565262" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565263" comment="python-devel-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565266" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565267" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565268" comment="python-tk-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37496" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565269" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565270" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565271" comment="python-devel-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565274" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565275" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565276" comment="python-tk-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37497" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565277" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565278" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565279" comment="python-devel-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565282" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565283" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565284" comment="python-tk-2.6.9-40.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37498" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005104.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issues:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565285" comment="python-numpy-devel-1.8.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37499" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
		<description>
python-setuptools was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2013-7440: Non-RFC6125-compliant host name matching was incorrect (bsc#930189)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563819" comment="python-setuptools-0.6c11-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37500" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001980.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565286" comment="quagga-0.99.15-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565287" comment="quagga-devel-0.99.15-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37501" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001982.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565288" comment="quagga-0.99.15-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565289" comment="quagga-devel-0.99.15-0.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37502" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002093.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565290" comment="quagga-0.99.15-0.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565291" comment="quagga-devel-0.99.15-0.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37503" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2569-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00032.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565292" comment="quagga-0.99.15-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565293" comment="quagga-devel-0.99.15-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37504" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565294" comment="quagga-0.99.15-0.30.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565295" comment="quagga-devel-0.99.15-0.30.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37505" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565296" comment="ruby-devel-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565297" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565298" comment="ruby-doc-ri-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565299" comment="ruby-examples-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565300" comment="ruby-test-suite-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565301" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37506" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963329" ref_url="https://bugzilla.suse.com/963329" source="BUGZILLA"/>
		<reference ref_id="963331" ref_url="https://bugzilla.suse.com/963331" source="BUGZILLA"/>
		<reference ref_id="963332" ref_url="https://bugzilla.suse.com/963332" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7576" ref_url="https://www.suse.com/security/cve/CVE-2015-7576/" source="CVE"/>
		<reference ref_id="CVE-2016-0751" ref_url="https://www.suse.com/security/cve/CVE-2016-0751/" source="CVE"/>
		<reference ref_id="CVE-2016-0752" ref_url="https://www.suse.com/security/cve/CVE-2016-0752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001901.html" source="SUSE-SU"/>
		<description>

This update for rubygem-actionpack-3_2 fixes the following issues:

- CVE-2016-0751: Object Leak DoS (bsc#963331)
- CVE-2016-0752: Directory traversal and information leak in Action View (bsc#963332)
- CVE-2015-7576: Timing attack vulnerability in basic authentication in Action Controller (bsc#963329)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963329">SUSE bug 963329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963331">SUSE bug 963331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963332">SUSE bug 963332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7576/">CVE-2015-7576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0751/">CVE-2016-0751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0752/">CVE-2016-0752</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565302" comment="rubygem-actionpack-3_2-3.2.12-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37507" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-3_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="968849" ref_url="https://bugzilla.suse.com/968849" source="BUGZILLA"/>
		<reference ref_id="968850" ref_url="https://bugzilla.suse.com/968850" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2097" ref_url="https://www.suse.com/security/cve/CVE-2016-2097/" source="CVE"/>
		<reference ref_id="CVE-2016-2098" ref_url="https://www.suse.com/security/cve/CVE-2016-2098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html" source="SUSE-SU"/>
		<description>

This update for rubygem-actionpack-3_2 fixes the following issues:

- CVE-2016-2097: rubygem-actionview: Possible Information
  Leak Vulnerability in Action View. (bsc#968850)

- CVE-2016-2098: rubygem-actionpack: Possible remote
  code execution vulnerability in Action Pack (bsc#968849)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-07"/>
	<updated date="2016-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/968849">SUSE bug 968849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968850">SUSE bug 968850</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2097/">CVE-2016-2097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2098/">CVE-2016-2098</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565303" comment="rubygem-actionpack-3_2-3.2.12-0.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37508" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963330" ref_url="https://bugzilla.suse.com/963330" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7577" ref_url="https://www.suse.com/security/cve/CVE-2015-7577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001902.html" source="SUSE-SU"/>
		<description>

This update for rubygem-activerecord-3_2 fixes the following issues:

- CVE-2015-7577: rubygem-activerecord: Nested attributes rejection proc bypass (bsc#963330) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963330">SUSE bug 963330</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7577/">CVE-2015-7577</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565304" comment="rubygem-activerecord-3_2-3.2.12-0.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37509" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="934800" ref_url="https://bugzilla.suse.com/934800" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3227" ref_url="https://www.suse.com/security/cve/CVE-2015-3227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001787.html" source="SUSE-SU"/>
		<description>
rubygem-activesupport-3_2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-3227: Possible Denial of Service attack in Active Support (bsc#934800).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-07"/>
	<updated date="2016-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934800">SUSE bug 934800</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3227/">CVE-2015-3227</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563832" comment="rubygem-activesupport-3_2-3.2.12-0.14.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37510" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="963329" ref_url="https://bugzilla.suse.com/963329" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7576" ref_url="https://www.suse.com/security/cve/CVE-2015-7576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001906.html" source="SUSE-SU"/>
		<description>

This update for rubygem-activesupport-3_2 fixes the following issues:

- CVE-2015-7576: Timing attack vulnerability in basic authentication in Action Controller (bsc#963329)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963329">SUSE bug 963329</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7576/">CVE-2015-7576</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563833" comment="rubygem-activesupport-3_2-3.2.12-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37511" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-3_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="970715" ref_url="https://bugzilla.suse.com/970715" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7576" ref_url="https://www.suse.com/security/cve/CVE-2015-7576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001989.html" source="SUSE-SU"/>
		<description>

This update for rubygem-activesupport-3_2 fixes the following issues:

The previous patch for CVE-2015-7576 was adding
the file lib/active_support/security_utils.rb but this file
was not being added into the gemspec,thus the final gem did not
contain that file.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-07"/>
	<updated date="2016-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970715">SUSE bug 970715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7576/">CVE-2015-7576</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565305" comment="rubygem-activesupport-3_2-3.2.12-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37512" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-mail-2_4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="959129" ref_url="https://bugzilla.suse.com/959129" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001833.html" source="SUSE-SU"/>
		<description>

This update for rubygem-mail-2_4 fixes the following issues:

* bsc#959129: SMTP Injection via recipient email addresses
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959129">SUSE bug 959129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565306" comment="rubygem-mail-2_4-2.4.4-0.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37513" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack-1_4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="934797" ref_url="https://bugzilla.suse.com/934797" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001584.html" source="SUSE-SU"/>
		<description>
rubygem-rack-1_4 was updated to fix one security issue.

This security issue was fixed:

- CVE-2015-3225: Crafted requests could have caused a SystemStackError leading to Denial of Service. (bsc#934797)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-04"/>
	<updated date="2015-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934797">SUSE bug 934797</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563838" comment="rubygem-rack-1_4-1.4.5-0.7.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37514" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565307" comment="libldb-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565308" comment="libnetapi-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565309" comment="libnetapi0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565310" comment="libsmbclient-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565311" comment="libsmbsharemodes-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565312" comment="libsmbsharemodes0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565313" comment="libtalloc-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565314" comment="libtdb-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565315" comment="libtevent-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565316" comment="libwbclient-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565317" comment="samba-devel-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565318" comment="samba-test-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37515" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565319" comment="libldb-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565320" comment="libnetapi-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565321" comment="libnetapi0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565322" comment="libsmbclient-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565323" comment="libsmbsharemodes-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565324" comment="libsmbsharemodes0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565325" comment="libtalloc-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565326" comment="libtdb-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565327" comment="libtevent-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565328" comment="libwbclient-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565329" comment="samba-devel-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565330" comment="samba-test-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37516" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565331" comment="libldb-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565332" comment="libnetapi-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565333" comment="libnetapi0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565334" comment="libsmbclient-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565335" comment="libsmbsharemodes-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565336" comment="libsmbsharemodes0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565337" comment="libtalloc-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565338" comment="libtdb-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565339" comment="libtevent-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565340" comment="libwbclient-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565341" comment="samba-devel-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565342" comment="samba-test-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37517" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00043.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565343" comment="libldb-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565344" comment="libnetapi-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565345" comment="libnetapi0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565346" comment="libsmbclient-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565347" comment="libsmbsharemodes-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565348" comment="libsmbsharemodes0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565349" comment="libtalloc-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565350" comment="libtdb-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565351" comment="libtevent-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565352" comment="libwbclient-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565353" comment="samba-devel-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565354" comment="samba-test-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37518" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1036283" ref_url="https://bugzilla.suse.com/1036283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00017.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
  For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression
  in the fix has been addressed (bsc#1036283, bso#12721).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-08"/>
	<updated date="2017-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565355" comment="libldb-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565356" comment="libnetapi-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565357" comment="libnetapi0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565358" comment="libsmbclient-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565359" comment="libsmbsharemodes-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565360" comment="libsmbsharemodes0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565361" comment="libtalloc-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565362" comment="libtdb-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565363" comment="libtevent-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565364" comment="libwbclient-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565365" comment="samba-devel-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565366" comment="samba-test-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37519" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00064.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565367" comment="libldb-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565368" comment="libnetapi-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565369" comment="libnetapi0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565370" comment="libsmbclient-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565371" comment="libsmbsharemodes-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565372" comment="libsmbsharemodes0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565373" comment="libtalloc-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565374" comment="libtdb-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565375" comment="libtevent-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565376" comment="libwbclient-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565377" comment="samba-devel-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565378" comment="samba-test-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37520" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed: 

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)

This non-security issue was fixed: 

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565379" comment="libldb-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565380" comment="libnetapi-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565381" comment="libnetapi0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565382" comment="libsmbclient-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565383" comment="libsmbsharemodes-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565384" comment="libsmbsharemodes0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565385" comment="libtalloc-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565386" comment="libtdb-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565387" comment="libtevent-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565388" comment="libwbclient-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565389" comment="samba-devel-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565390" comment="samba-test-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37521" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1016531" ref_url="https://bugzilla.suse.com/1016531" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);


- s3/libads: fix seal/signed ldap connections so they are reused;
  (bsc#1016531).		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016531">SUSE bug 1016531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565391" comment="libldb-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565392" comment="libnetapi-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565393" comment="libnetapi0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565394" comment="libsmbclient-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565395" comment="libsmbsharemodes-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565396" comment="libsmbsharemodes0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565397" comment="libtalloc-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565398" comment="libtdb-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565399" comment="libtevent-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565400" comment="libwbclient-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565401" comment="samba-devel-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565402" comment="samba-test-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37522" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0774-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180774-1.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565403" comment="libldb-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565404" comment="libnetapi-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565405" comment="libnetapi0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565406" comment="libsmbclient-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565407" comment="libsmbsharemodes-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565408" comment="libsmbsharemodes0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565409" comment="libtalloc-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565410" comment="libtdb-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565411" comment="libtevent-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565412" comment="libwbclient-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565413" comment="samba-devel-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565414" comment="samba-test-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37523" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1079449" ref_url="https://bugzilla.suse.com/1079449" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
  
The following other bugs were fixed:

- s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079449">SUSE bug 1079449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565415" comment="libldb-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565416" comment="libnetapi-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565417" comment="libnetapi0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565418" comment="libsmbclient-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565419" comment="libsmbsharemodes-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565420" comment="libsmbsharemodes0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565421" comment="libtalloc-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565422" comment="libtdb-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565423" comment="libtevent-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565424" comment="libwbclient-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565425" comment="samba-devel-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565426" comment="samba-test-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37524" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563864" comment="libldb-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563865" comment="libnetapi-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563866" comment="libnetapi0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563867" comment="libsmbclient-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563868" comment="libsmbsharemodes-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563869" comment="libsmbsharemodes0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563870" comment="libtalloc-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563871" comment="libtdb-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563872" comment="libtevent-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563873" comment="libwbclient-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563874" comment="samba-devel-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565427" comment="samba-test-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37525" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002704.html" source="SUSE-SU"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565428" comment="sane-backends-32bit-1.0.20-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565429" comment="sane-backends-autoconfig-1.0.20-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565430" comment="sane-backends-x86-1.0.20-7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37526" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="944460" ref_url="https://bugzilla.suse.com/944460" source="BUGZILLA"/>
		<reference ref_id="944787" ref_url="https://bugzilla.suse.com/944787" source="BUGZILLA"/>
		<reference ref_id="948976" ref_url="https://bugzilla.suse.com/948976" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<description>
Spice was updated to fix three security issues.
    
The following vulnerabilities were fixed:  
  
* CVE-2015-3247: heap corruption in the spice server (bsc#944460)
* CVE-2015-5261: Guest could have accessed host memory using crafted images (bsc#948976)
* CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-07"/>
	<updated date="2016-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565431" comment="libspice-server-devel-0.12.4-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37527" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1023078" ref_url="https://bugzilla.suse.com/1023078" source="BUGZILLA"/>
		<reference ref_id="1023079" ref_url="https://bugzilla.suse.com/1023079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00008.html" source="SUSE-SU"/>
		<description>

This security update for spice fixes the following issues:

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used 
by unauthenticated attackers to execute arbitrary code. (bsc#1023078)
CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message. (bsc#1023079)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565432" comment="libspice-server-devel-0.12.4-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37528" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00014.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2017-7506: A possible buffer overflow via invalid monitor configurations (bsc#1046779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565433" comment="libspice-server-devel-0.12.4-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37529" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565434" comment="libspice-server-devel-0.12.4-15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37530" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed an out-of-bounds read in the memslot_get_virt function 
  that could lead to denial-of-service or code-execution (bsc#1122706).
 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565435" comment="libspice-server-devel-0.12.4-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37531" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="987394" ref_url="https://bugzilla.suse.com/987394" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002203.html" source="SUSE-SU"/>
		<description>

This update for sqlite3 fixes the following issues: 

The following security issue was fixed:
- CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565436" comment="sqlite3-devel-3.7.6.3-1.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37532" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565437" comment="sqlite3-devel-3.7.6.3-1.4.7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37533" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="939517" ref_url="https://bugzilla.suse.com/939517" source="BUGZILLA"/>
		<reference ref_id="976849" ref_url="https://bugzilla.suse.com/976849" source="BUGZILLA"/>
		<reference ref_id="976850" ref_url="https://bugzilla.suse.com/976850" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187/" source="CVE"/>
		<reference ref_id="CVE-2016-2167" ref_url="https://www.suse.com/security/cve/CVE-2016-2167/" source="CVE"/>
		<reference ref_id="CVE-2016-2168" ref_url="https://www.suse.com/security/cve/CVE-2016-2168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002100.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2015-3187: svn_repos_trace_node_locations() reveals paths hidden by authz (bsc#939517)
- CVE-2016-2167: mod_authz_svn: DoS in MOVE/COPY authorization check (bsc#976849)
- CVE-2016-2168: svnserve/sasl may authenticate users using the wrong realm (bsc#976850)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939517">SUSE bug 939517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976849">SUSE bug 976849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976850">SUSE bug 976850</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2167/">CVE-2016-2167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2168/">CVE-2016-2168</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565438" comment="subversion-1.6.17-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565439" comment="subversion-devel-1.6.17-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565440" comment="subversion-perl-1.6.17-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565441" comment="subversion-python-1.6.17-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565442" comment="subversion-server-1.6.17-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565443" comment="subversion-tools-1.6.17-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37534" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1011552" ref_url="https://bugzilla.suse.com/1011552" source="BUGZILLA"/>
		<reference ref_id="1051362" ref_url="https://bugzilla.suse.com/1051362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8734" ref_url="https://www.suse.com/security/cve/CVE-2016-8734/" source="CVE"/>
		<reference ref_id="CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00045.html" source="SUSE-SU"/>
		<description>

This update for subversion fixes the following issue:

- CVE-2016-8734: Unrestricted XML entity expansion in mod_dontdothat and Subversion clients using http(s):// (bsc#1011552).

- CVE-2017-9800: client code execution via argument injection in SSH URL (bnc#1051362)		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-14"/>
	<updated date="2017-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1011552">SUSE bug 1011552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051362">SUSE bug 1051362</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8734/">CVE-2016-8734</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565444" comment="subversion-1.6.17-1.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565445" comment="subversion-devel-1.6.17-1.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565446" comment="subversion-perl-1.6.17-1.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565447" comment="subversion-python-1.6.17-1.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565448" comment="subversion-server-1.6.17-1.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565449" comment="subversion-tools-1.6.17-1.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37535" version="1" class="patch">
	<metadata>
		<title>Security update for tidy (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="933588" ref_url="https://bugzilla.suse.com/933588" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
		<description>

This update fixes two heap-based buffer overflows in tidy/libtidy. These vulnerabilities
could allow remote attackers to cause a denial of service (crash) via vectors involving
a command character in an href. (CVE-2015-5522, CVE-2015-5523)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-26"/>
	<updated date="2015-08-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563886" comment="libtidy-1.0-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563887" comment="libtidy-devel-1.0-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563888" comment="tidy-1.0-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37536" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563889" comment="libtiff-devel-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563890" comment="libtiff-devel-32bit-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37537" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565450" comment="libtiff-devel-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565451" comment="libtiff-devel-32bit-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37538" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565452" comment="libtiff-devel-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565453" comment="libtiff-devel-32bit-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37539" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565454" comment="libtiff-devel-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565455" comment="libtiff-devel-32bit-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37540" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565456" comment="libtiff-devel-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565457" comment="libtiff-devel-32bit-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37541" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565458" comment="libtiff-devel-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565459" comment="libtiff-devel-32bit-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37542" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565460" comment="libtiff-devel-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565461" comment="libtiff-devel-32bit-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37543" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565462" comment="libtiff-devel-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565463" comment="libtiff-devel-32bit-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37544" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565464" comment="libtiff-devel-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565465" comment="libtiff-devel-32bit-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37545" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004962.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565466" comment="libtiff-devel-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565467" comment="libtiff-devel-32bit-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37546" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565468" comment="libtiff-devel-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565469" comment="libtiff-devel-32bit-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37547" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565470" comment="wavpack-4.50.1-1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565471" comment="wavpack-devel-4.50.1-1.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37548" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005251.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565472" comment="wavpack-4.50.1-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565473" comment="wavpack-devel-4.50.1-1.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37549" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563894" comment="wireshark-devel-1.12.7-0.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37550" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563896" comment="wireshark-devel-1.12.9-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37551" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565474" comment="wireshark-1.12.11-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565475" comment="wireshark-devel-1.12.11-0.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37552" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565476" comment="wireshark-1.12.13-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565477" comment="wireshark-devel-1.12.13-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37553" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565478" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565479" comment="wireshark-devel-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565480" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37554" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565481" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565482" comment="wireshark-devel-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565483" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37555" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565484" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565485" comment="wireshark-devel-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565486" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37556" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565487" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565488" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565489" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565490" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565491" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565492" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565493" comment="portaudio-devel-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565494" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565495" comment="wireshark-devel-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565496" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37557" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565497" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565498" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565499" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565500" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565501" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565502" comment="wireshark-devel-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565503" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37558" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565504" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565505" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565506" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565507" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565508" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565509" comment="wireshark-devel-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565510" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37559" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565511" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565512" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565513" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565514" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565515" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565516" comment="wireshark-devel-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565517" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37560" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565518" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565519" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565520" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565521" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565522" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565523" comment="wireshark-devel-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565524" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37561" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565525" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565526" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565527" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565528" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565529" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565530" comment="wireshark-devel-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565531" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37562" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="925466" ref_url="https://bugzilla.suse.com/925466" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<description>
xen was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

This non-security issue was fixed:
- Kdump did not work in a XEN environment (bsc#925466).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925466">SUSE bug 925466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565532" comment="xen-devel-4.4.2_10-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37563" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945167" ref_url="https://bugzilla.suse.com/945167" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="949138" ref_url="https://bugzilla.suse.com/949138" source="BUGZILLA"/>
		<reference ref_id="949549" ref_url="https://bugzilla.suse.com/949549" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<description>
xen was updated to version 4.4.3 to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
- bsc#949549: xm create hangs when maxmen value is enclosed in quotes
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945167">SUSE bug 945167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949138">SUSE bug 949138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949549">SUSE bug 949549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565533" comment="xen-devel-4.4.3_02-26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37564" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 47 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565534" comment="xen-devel-4.4.4_02-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37565" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="958848" ref_url="https://bugzilla.suse.com/958848" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="964427" ref_url="https://bugzilla.suse.com/964427" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="974912" ref_url="https://bugzilla.suse.com/974912" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="975907" ref_url="https://bugzilla.suse.com/975907" source="BUGZILLA"/>
		<reference ref_id="976058" ref_url="https://bugzilla.suse.com/976058" source="BUGZILLA"/>
		<reference ref_id="976111" ref_url="https://bugzilla.suse.com/976111" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="979035" ref_url="https://bugzilla.suse.com/979035" source="BUGZILLA"/>
		<reference ref_id="979620" ref_url="https://bugzilla.suse.com/979620" source="BUGZILLA"/>
		<reference ref_id="979670" ref_url="https://bugzilla.suse.com/979670" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="981276" ref_url="https://bugzilla.suse.com/981276" source="BUGZILLA"/>
		<reference ref_id="982024" ref_url="https://bugzilla.suse.com/982024" source="BUGZILLA"/>
		<reference ref_id="982025" ref_url="https://bugzilla.suse.com/982025" source="BUGZILLA"/>
		<reference ref_id="982026" ref_url="https://bugzilla.suse.com/982026" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982286" ref_url="https://bugzilla.suse.com/982286" source="BUGZILLA"/>
		<reference ref_id="982695" ref_url="https://bugzilla.suse.com/982695" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983973" ref_url="https://bugzilla.suse.com/983973" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="986586" ref_url="https://bugzilla.suse.com/986586" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="989235" ref_url="https://bugzilla.suse.com/989235" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4962" ref_url="https://www.suse.com/security/cve/CVE-2016-4962/" source="CVE"/>
		<reference ref_id="CVE-2016-4963" ref_url="https://www.suse.com/security/cve/CVE-2016-4963/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the several issues.

These security issues were fixed:
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164).
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).
- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).
- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)

These non-security issues were fixed:
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#964427: Discarding device blocks: failed - Input/output error
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#982695: qemu fails to boot HVM guest from xvda
- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend. Additional memory adjustment made.
- bsc#974912: Persistent performance drop after live-migration using xend tool stack
- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399
- bsc#989235: xen dom0 xm create command only searched /etc/xen instead of /etc/xen/vm
- Live Migration SLES 11 SP3 to SP4 on AMD: 'xc: error: Couldn't set extended vcpu0 info'
- bsc#985503: Fixed vif-route
- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-18"/>
	<updated date="2016-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958848">SUSE bug 958848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964427">SUSE bug 964427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974912">SUSE bug 974912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976058">SUSE bug 976058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979035">SUSE bug 979035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979620">SUSE bug 979620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979670">SUSE bug 979670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982695">SUSE bug 982695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986586">SUSE bug 986586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989235">SUSE bug 989235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4962/">CVE-2016-4962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4963/">CVE-2016-4963</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565535" comment="xen-devel-4.4.4_07-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37566" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="966467" ref_url="https://bugzilla.suse.com/966467" source="BUGZILLA"/>
		<reference ref_id="970135" ref_url="https://bugzilla.suse.com/970135" source="BUGZILLA"/>
		<reference ref_id="971949" ref_url="https://bugzilla.suse.com/971949" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990970" ref_url="https://bugzilla.suse.com/990970" source="BUGZILLA"/>
		<reference ref_id="991934" ref_url="https://bugzilla.suse.com/991934" source="BUGZILLA"/>
		<reference ref_id="992224" ref_url="https://bugzilla.suse.com/992224" source="BUGZILLA"/>
		<reference ref_id="993507" ref_url="https://bugzilla.suse.com/993507" source="BUGZILLA"/>
		<reference ref_id="994136" ref_url="https://bugzilla.suse.com/994136" source="BUGZILLA"/>
		<reference ref_id="994421" ref_url="https://bugzilla.suse.com/994421" source="BUGZILLA"/>
		<reference ref_id="994625" ref_url="https://bugzilla.suse.com/994625" source="BUGZILLA"/>
		<reference ref_id="994761" ref_url="https://bugzilla.suse.com/994761" source="BUGZILLA"/>
		<reference ref_id="994772" ref_url="https://bugzilla.suse.com/994772" source="BUGZILLA"/>
		<reference ref_id="994775" ref_url="https://bugzilla.suse.com/994775" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995789" ref_url="https://bugzilla.suse.com/995789" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="997731" ref_url="https://bugzilla.suse.com/997731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6834" ref_url="https://www.suse.com/security/cve/CVE-2016-6834/" source="CVE"/>
		<reference ref_id="CVE-2016-6835" ref_url="https://www.suse.com/security/cve/CVE-2016-6835/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7154" ref_url="https://www.suse.com/security/cve/CVE-2016-7154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731)
- CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761)
- CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772)
- CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775)
- CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625)
- CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)

These non-security issues were fixed:
- bsc#993507: virsh detach-disk failing to detach disk
- bsc#991934: Xen hypervisor crash in csched_acct
- bsc#992224: During boot of Xen Hypervisor, Failed to get contiguous memory for DMA
- bsc#970135: New virtualization project clock test randomly fails on Xen 
- bsc#994136: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol
- bsc#994136: xen_platform: unplug also SCSI disks in qemu-xen
- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live
- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)
- bsc#966467: Live Migration SLES 11 SP3 to SP4 on AMD
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/966467">SUSE bug 966467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970135">SUSE bug 970135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971949">SUSE bug 971949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990970">SUSE bug 990970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991934">SUSE bug 991934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992224">SUSE bug 992224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993507">SUSE bug 993507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994136">SUSE bug 994136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994421">SUSE bug 994421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994625">SUSE bug 994625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997731">SUSE bug 997731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6834/">CVE-2016-6834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6835/">CVE-2016-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7154/">CVE-2016-7154</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565536" comment="xen-devel-4.4.4_08-40.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37567" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1004016" ref_url="https://bugzilla.suse.com/1004016" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009104" ref_url="https://bugzilla.suse.com/1009104" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1004016)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)

This non-security issue wasfixed:
- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit

This update also delivers man-pages-supplement since some of the man-pages in there
are now contained in the xen package itself.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565537" comment="xen-devel-4.4.4_10-43.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37568" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
  - CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
  - PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565538" comment="xen-devel-4.4.4_12-46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37569" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1000195" ref_url="https://bugzilla.suse.com/1000195" source="BUGZILLA"/>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014490" ref_url="https://bugzilla.suse.com/1014490" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022627" ref_url="https://bugzilla.suse.com/1022627" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024186" ref_url="https://bugzilla.suse.com/1024186" source="BUGZILLA"/>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="1025188" ref_url="https://bugzilla.suse.com/1025188" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="987002" ref_url="https://bugzilla.suse.com/987002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)

These non-security issues were fixed:

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#987002: Prevent crash of domU' after they were migrated from SP3 HV to SP4
 		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000195">SUSE bug 1000195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987002">SUSE bug 987002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565539" comment="xen-devel-4.4.4_14-51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37570" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1026636" ref_url="https://bugzilla.suse.com/1026636" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

These security issues were fixed:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
- CVE-2016-9603: A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
- CVE-2017-2633: The VNC display driver support was vulnerable to an out-of-bounds memory access issue. A user/process inside guest could use this flaw to cause DoS (bsc#1026636).

These non-security issues were fixed:

- bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827: Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-20"/>
	<updated date="2017-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565540" comment="xen-devel-4.4.4_16-54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37571" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

These non-security issues were fixed:

- bsc#1029827: Additional xenstore patch
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565541" comment="xen-devel-4.4.4_18-57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37572" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031460" ref_url="https://bugzilla.suse.com/1031460" source="BUGZILLA"/>
		<reference ref_id="1032148" ref_url="https://bugzilla.suse.com/1032148" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1036470" ref_url="https://bugzilla.suse.com/1036470" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042924" ref_url="https://bugzilla.suse.com/1042924" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="1043074" ref_url="https://bugzilla.suse.com/1043074" source="BUGZILLA"/>
		<reference ref_id="1043297" ref_url="https://bugzilla.suse.com/1043297" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's-&gt;ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
	
These non-security issues were fixed:

- bsc#1032148: Ensure that time doesn't goes backwards during live migration of HVM domU
- bsc#1031460: Fixed DomU Live Migration 
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031460">SUSE bug 1031460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032148">SUSE bug 1032148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036470">SUSE bug 1036470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042924">SUSE bug 1042924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043074">SUSE bug 1043074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565542" comment="xen-devel-4.4.4_20-60.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37573" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1032598" ref_url="https://bugzilla.suse.com/1032598" source="BUGZILLA"/>
		<reference ref_id="1037413" ref_url="https://bugzilla.suse.com/1037413" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1047675" ref_url="https://bugzilla.suse.com/1047675" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10806: Stack-based buffer overflow in hw/usb/redirect.c allowed
  local guest OS users to cause a denial of service via vectors related to
  logging debug messages (bsc#1047675).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

This non-security issue was fixed:

- bsc#1032598: Prevent removal of NVME devices
- bsc#1037413: Support for newer intel cpu's, mwait-idle driver and skylake
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-13"/>
	<updated date="2017-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032598">SUSE bug 1032598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037413">SUSE bug 1037413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565543" comment="xen-devel-4.4.4_22-61.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37574" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-20"/>
	<updated date="2017-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565544" comment="xen-devel-4.4.4_24-61.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37575" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1056336" ref_url="https://bugzilla.suse.com/1056336" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
- CVE-2017-13672: The VGA display emulator support allowed local guest OS
  privileged users to cause a denial of service (out-of-bounds read and QEMU
  process crash) via vectors involving display update (bsc#1056336)

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-08"/>
	<updated date="2017-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565545" comment="xen-devel-4.4.4_26-61.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37576" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

This new feature was included:

- add script and sysv service to watch for vcpu online/offline events in a HVM domU

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).

These non-security issues were fixed:

- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up
- bsc#1031382: Prevent VMs from crashing when migrating between dom0 hosts in
  case read() returns zero on the receiver side.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565546" comment="xen-devel-4.4.4_28-61.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37577" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1057493" ref_url="https://bugzilla.suse.com/1057493" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1086107" ref_url="https://bugzilla.suse.com/1086107" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).

These non-security issues were fixed:

- bsc#1072834: Prevent unchecked MSR access error
- bsc#1035442: Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds, allowing for more domUs to be shutdown in parallel
- bsc#1057493: Prevent DomU crash

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057493">SUSE bug 1057493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086107">SUSE bug 1086107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565547" comment="xen-devel-4.4.4_30-61.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37578" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

bsc#1027519
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565548" comment="xen-devel-4.4.4_32-61.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37579" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12617: Fix integer overflow that causes segmentation fault in qmp_guest_file_read() with g_malloc() (bsc#1098744).
- CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
- CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).

Bug fixes:

- bsc#1079730: Fix failed 'write' lock.
- bsc#1027519: Add upstream patches from January.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565549" comment="xen-devel-4.4.4_34-61.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37580" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1101684" ref_url="https://bugzilla.suse.com/1101684" source="BUGZILLA"/>
		<reference ref_id="1102116" ref_url="https://bugzilla.suse.com/1102116" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

This security issue was fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).

These non-security issues were fixed:

- bsc#1102116: SSBD is not virtualized for guests
- bsc#1092631: Preserve the xl dmesg output after boot for determining what speculative mitigations have been detected by the hypervisor.
- bsc#1101684: Make xen able to disable the visibility of the new CPU flags.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-22"/>
	<updated date="2018-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101684">SUSE bug 1101684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102116">SUSE bug 1102116</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565550" comment="xen-devel-4.4.4_36-61.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37581" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1056336" ref_url="https://bugzilla.suse.com/1056336" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1110924" ref_url="https://bugzilla.suse.com/1110924" source="BUGZILLA"/>
		<reference ref_id="1111007" ref_url="https://bugzilla.suse.com/1111007" source="BUGZILLA"/>
		<reference ref_id="1111011" ref_url="https://bugzilla.suse.com/1111011" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1112188" ref_url="https://bugzilla.suse.com/1112188" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047)
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)
- Fixed an integer overflow in ccid_card_vscard_read(), which allowed for
  memory corruption. (bsc#1112188)
- CVE-2017-13672: Fixed an out of bounds read access during display update
  (bsc#1056336)
- CVE-2018-17958: Fixed an integer overflow leading to a buffer overflow in the
  rtl8139 component (bsc#1111007)
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
  pcnet component (bsc#1111011)
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
  leading to a denial of service (DoS). (bsc#1111014)
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
  the ne2000 component (bsc#1110924)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Upstream bug fixes (bsc#1027519)
- Fixed crashing VMs when migrating between dom0 hosts (bsc#1031382)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-02"/>
	<updated date="2019-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565551" comment="xen-devel-4.4.4_38-61.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37582" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).

Other issues fixed: 

- Fixed an issue where VMs crashing when migrating between dom0 hosts (bsc#1031382).
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565552" comment="xen-devel-4.4.4_40-61.43.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37583" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:

- bsc#955399 -  Fix xm migrate --log_progress.
  Due to logic error progress was not logged when requested.

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#955399 -  Fix xm migrate --live.  The options were not passed
  due to a merge error. As a result the migration was not live,
  instead the suspended guest was migrated.

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)


- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565553" comment="xen-devel-4.4.3_06-29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37584" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003302.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565554" comment="xerces-j2-demo-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565555" comment="xerces-j2-scripts-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37585" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563912" comment="xfsprogs-devel-3.1.8-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37586" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003026.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565558" comment="xorg-x11-libICE-devel-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565559" comment="xorg-x11-libICE-devel-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37587" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563915" comment="xorg-x11-libX11-devel-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563916" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37588" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002455.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565560" comment="xorg-x11-libX11-devel-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565561" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37589" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002689.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565562" comment="xorg-x11-libX11-devel-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565563" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37590" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565564" comment="xorg-x11-libX11-devel-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565565" comment="xorg-x11-libX11-devel-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37591" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003035.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565566" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565567" comment="xorg-x11-libXdmcp-devel-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565568" comment="xorg-x11-libXdmcp-devel-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37592" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002491.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565569" comment="xorg-x11-libXfixes-devel-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565570" comment="xorg-x11-libXfixes-devel-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37593" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002646.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565571" comment="xorg-x11-libXpm-devel-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565572" comment="xorg-x11-libXpm-devel-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37594" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565573" comment="xorg-x11-libXrender-devel-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565574" comment="xorg-x11-libXrender-devel-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37595" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002477.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565575" comment="xorg-x11-libXv-devel-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565576" comment="xorg-x11-libXv-devel-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37596" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565577" comment="xorg-x11-devel-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565578" comment="xorg-x11-devel-32bit-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37597" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565579" comment="xorg-x11-devel-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565580" comment="xorg-x11-devel-32bit-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37598" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004579.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565581" comment="xorg-x11-devel-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565582" comment="xorg-x11-devel-32bit-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37599" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="981044" ref_url="https://bugzilla.suse.com/981044" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)

Non security issues:

- Use arc4random to generate cookies. (bsc#1025084)
- XDrawArc performance improvement (bsc#1019649)
- Fix byte swapping for gradeint stops (bsc#981044).
- Remove unused function with use-after-free issue. (bsc#1025035)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981044">SUSE bug 981044</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565583" comment="xorg-x11-server-sdk-7.4-27.118.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37600" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565584" comment="xorg-x11-server-sdk-7.4-27.121.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37601" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides several fixes.

These security issues were fixed:

- CVE-2017-13723: Prevent local DoS via unusual characters in XkbAtomText and
  XkbStringText (bsc#1051150).
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565585" comment="xorg-x11-server-sdk-7.4-27.122.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37602" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1078383" ref_url="https://bugzilla.suse.com/1078383" source="BUGZILLA"/>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fix:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

Non security issues fixed:

- Do not write past the allocated buffer. (bsc#1078383)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078383">SUSE bug 1078383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565586" comment="xorg-x11-server-sdk-7.4-27.122.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37603" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="937942" ref_url="https://bugzilla.suse.com/937942" source="BUGZILLA"/>
		<reference ref_id="984245" ref_url="https://bugzilla.suse.com/984245" source="BUGZILLA"/>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="996208" ref_url="https://bugzilla.suse.com/996208" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002284.html" source="SUSE-SU"/>
		<description>

This update for yast2-storage provides the following fixes:

Security issues fixed:
- Use standard IPC, and not temporary files, to pass passwords between processes.
  (bsc#986971, CVE-2016-5746)

Non security bugs fixed:
- Fix usage of complete multipath disk as LVM physical volume. (bsc#984245)
- Load the correct multipath module (dm-multipath). (bsc#937942)
- Improve message for creating volumes with a filesystem but without a mount point.
  (bsc#996208)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937942">SUSE bug 937942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984245">SUSE bug 984245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996208">SUSE bug 996208</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565587" comment="yast2-storage-devel-2.17.161-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37604" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
			<platform>SUSE Linux Enterprise Software Development Kit 11 SP4</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<description>

This update for zlib fixes the following issues:

  * Incompatible declarations for external linkage function deflate (bnc#1003577)
  * CVE-2016-9842: Undefined Left Shift of Negative Number (bnc#1003580) 
  * CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bnc#1003579)
  * CVE-2016-9843: Big-endian out-of-bounds pointer
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-sdk:11:sp4</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117399" comment="SUSE Linux Enterprise Software Development Kit 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565588" comment="zlib-devel-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565589" comment="zlib-devel-32bit-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37605" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657130" comment="clamav-openssl1-0.103.4-0.20.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37606" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010086.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664011" comment="clamav-openssl1-0.103.5-0.20.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37607" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565590" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565591" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565592" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565593" comment="libcurl4-openssl1-x86-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37608" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565594" comment="curl-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565595" comment="libcurl4-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565596" comment="libcurl4-openssl1-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565597" comment="libcurl4-openssl1-x86-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37609" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565598" comment="curl-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565599" comment="libcurl4-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565600" comment="libcurl4-openssl1-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565601" comment="libcurl4-openssl1-x86-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37610" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565602" comment="curl-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565603" comment="libcurl4-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565604" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565605" comment="libcurl4-openssl1-x86-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37611" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565606" comment="curl-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565607" comment="libcurl4-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565608" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565609" comment="libcurl4-openssl1-x86-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37612" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565610" comment="curl-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565611" comment="libcurl4-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565612" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37613" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565613" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565614" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565615" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565616" comment="libcurl4-openssl1-x86-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37614" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565617" comment="curl-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565618" comment="libcurl4-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565619" comment="libcurl4-openssl1-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565620" comment="libcurl4-openssl1-x86-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37615" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565621" comment="curl-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565622" comment="libcurl4-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565623" comment="libcurl4-openssl1-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565624" comment="libcurl4-openssl1-x86-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37616" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565625" comment="curl-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565626" comment="libcurl4-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565627" comment="libcurl4-openssl1-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565628" comment="libcurl4-openssl1-x86-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37617" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565629" comment="curl-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565630" comment="libcurl4-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565631" comment="libcurl4-openssl1-32bit-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565632" comment="libcurl4-openssl1-x86-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37618" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565633" comment="curl-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565634" comment="libcurl4-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565635" comment="libcurl4-openssl1-32bit-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565636" comment="libcurl4-openssl1-x86-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37619" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565637" comment="curl-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565638" comment="libcurl4-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565639" comment="libcurl4-openssl1-32bit-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565640" comment="libcurl4-openssl1-x86-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37620" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007337.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565641" comment="curl-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565642" comment="libcurl4-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565643" comment="libcurl4-openssl1-32bit-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565644" comment="libcurl4-openssl1-x86-7.37.0-70.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37621" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565645" comment="curl-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565646" comment="libcurl4-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565647" comment="libcurl4-openssl1-32bit-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565648" comment="libcurl4-openssl1-x86-7.37.0-70.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37622" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008684.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565649" comment="curl-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565650" comment="libcurl4-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565651" comment="libcurl4-openssl1-32bit-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565652" comment="libcurl4-openssl1-x86-7.37.0-70.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37623" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008844.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565653" comment="curl-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565654" comment="libcurl4-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565655" comment="libcurl4-openssl1-32bit-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565656" comment="libcurl4-openssl1-x86-7.37.0-70.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37624" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565657" comment="curl-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565658" comment="libcurl4-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565659" comment="libcurl4-openssl1-32bit-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565660" comment="libcurl4-openssl1-x86-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37625" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626165" comment="curl-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626166" comment="libcurl4-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626167" comment="libcurl4-openssl1-32bit-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626168" comment="libcurl4-openssl1-x86-7.37.0-70.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37626" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009504.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633933" comment="curl-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633934" comment="libcurl4-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633935" comment="libcurl4-openssl1-32bit-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633936" comment="libcurl4-openssl1-x86-7.37.0-70.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37627" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565661" comment="libcurl4-openssl1-7.19.7-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565662" comment="libcurl4-openssl1-32bit-7.19.7-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565663" comment="libcurl4-openssl1-x86-7.19.7-0.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37628" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008085.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565664" comment="cyrus-sasl-openssl1-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565665" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565666" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565667" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565668" comment="cyrus-sasl-openssl1-crammd5-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565669" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565670" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565671" comment="cyrus-sasl-openssl1-digestmd5-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565672" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565673" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565674" comment="cyrus-sasl-openssl1-gssapi-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565675" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565676" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565677" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565678" comment="cyrus-sasl-openssl1-otp-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565679" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565680" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565681" comment="cyrus-sasl-openssl1-plain-x86-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565682" comment="cyrus-sasl-openssl1-x86-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37629" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669432" comment="cyrus-sasl-openssl1-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669433" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669434" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669435" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669436" comment="cyrus-sasl-openssl1-crammd5-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669437" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669438" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669439" comment="cyrus-sasl-openssl1-digestmd5-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669440" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669441" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669442" comment="cyrus-sasl-openssl1-gssapi-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669443" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669444" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669445" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669446" comment="cyrus-sasl-openssl1-otp-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669447" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669448" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669449" comment="cyrus-sasl-openssl1-plain-x86-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669450" comment="cyrus-sasl-openssl1-x86-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37630" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * SRTP Memory Leak (CVE-2014-3513)
    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513&gt;
    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-23"/>
	<updated date="2014-10-23"/>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565683" comment="libopenssl1-devel-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565684" comment="libopenssl1_0_0-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565685" comment="libopenssl1_0_0-32bit-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565686" comment="libopenssl1_0_0-x86-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565687" comment="openssl1-1.0.1g-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565688" comment="openssl1-doc-1.0.1g-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37631" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565689" comment="libldap-openssl1-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565690" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565691" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37632" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194).
- CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565692" comment="libldap-openssl1-2_4-2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565693" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565694" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565695" comment="openldap2-client-openssl1-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565696" comment="openldap2-openssl1-2.4.26-0.74.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37633" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565697" comment="libldap-openssl1-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565698" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565699" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565700" comment="openldap2-client-openssl1-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565701" comment="openldap2-openssl1-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37634" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565702" comment="libldap-openssl1-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565703" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565704" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565705" comment="openldap2-client-openssl1-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565706" comment="openldap2-openssl1-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37635" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565707" comment="libldap-openssl1-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565708" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565709" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565710" comment="openldap2-client-openssl1-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565711" comment="openldap2-openssl1-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37636" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565712" comment="libldap-openssl1-2_4-2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565713" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565714" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565715" comment="openldap2-client-openssl1-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565716" comment="openldap2-openssl1-2.4.26-0.74.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37637" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565717" comment="libldap-openssl1-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565718" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565719" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565720" comment="openldap2-client-openssl1-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565721" comment="openldap2-openssl1-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37638" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-20"/>
	<updated date="2015-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565722" comment="libldap-openssl1-2_4-2-2.4.26-0.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565723" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565724" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37639" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565725" comment="libldap-openssl1-2_4-2-2.4.26-0.62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565726" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565727" comment="libldap-openssl1-2_4-2-x86-2.4.26-0.62.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37640" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565728" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37641" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<description>

This update for openssh-openssl1 fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565729" comment="openssh-openssl1-6.6p1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565730" comment="openssh-openssl1-helpers-6.6p1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37642" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="961494" ref_url="https://bugzilla.suse.com/961494" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<description>

This update for openssh-openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-6210: Prevent user enumeration through the timing of password
  processing (bsc#989363)
- CVE-2016-6515: limit accepted password length (prevents possible DoS)
  (bsc#992533)
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: prevent X11 SECURITY circumvention when forwarding X11
  connections (bsc#962313)
- CVE-2015-8325: ignore PAM environment when using login (bsc#975865)
- Disable DH parameters under 2048 bits by default and allow
  lowering the limit back to the RFC 4419 specified minimum
  through an option (bsc#932483, bsc#948902)
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)

Bugs fixed:
- avoid complaining about unset DISPLAY variable (bsc#981654)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- more verbose FIPS mode/CC related documentation in README.FIPS
  (bsc#965576, bsc#960414)
- fix PRNG re-seeding (bsc#960414, bsc#729190)
- Allow empty Match blocks (bsc#961494)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-17"/>
	<updated date="2016-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961494">SUSE bug 961494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565731" comment="openssh-openssl1-6.6p1-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565732" comment="openssh-openssl1-helpers-6.6p1-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37643" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:


- Properly verify CIDR masks in configuration (bsc#1005893)

- CVE-2016-10009: limit directories for loading PKCS11 modules (bsc#1016366)

- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege
  process handling authentication (bsc#1016369)

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)

- fix suggested command for removing conflicting server keys from
  the known_hosts file (bsc#1006221)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565733" comment="openssh-openssl1-6.6p1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565734" comment="openssh-openssl1-helpers-6.6p1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37644" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1017099" ref_url="https://bugzilla.suse.com/1017099" source="BUGZILLA"/>
		<reference ref_id="1023275" ref_url="https://bugzilla.suse.com/1023275" source="BUGZILLA"/>
		<reference ref_id="1053972" ref_url="https://bugzilla.suse.com/1053972" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

These security issues were fixed:

- CVE-2016-10708: Prevent NULL pointer dereference via an out-of-sequence
  NEWKEYS message allowed remote attackers to cause a denial of service
  (bsc#1076957).
- CVE-2017-15906: The process_open function did not properly prevent write
  operations in readonly mode, which allowed attackers to create zero-length
  files (bsc#1065000).
- CVE-2016-10012: The shared memory manager (associated with pre-authentication
  compression) did not ensure that a bounds check is enforced by all compilers,
  which might have allowed local users to gain privileges by leveraging access to
  a sandboxed privilege-separation process, related to the m_zback and m_zlib
  data structures (bsc#1016370).
- CVE-2008-1483: Prevent local users from hijacking forwarded X connections by
  causing ssh to set DISPLAY to :10, even when another process is listening on
  the associated port. This problem was reontroduced by another patch and was
  previously fixed by another update (bsc#1069509).

These non-security issues were fixed:

- Remove duplicate KEX method (bsc#1053972)
- New switch for printing diagnostic messages in sftp client's batch mode (bsc#1023275)
- Enable case-insensitive hostname matching (bsc#1017099)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017099">SUSE bug 1017099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023275">SUSE bug 1023275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053972">SUSE bug 1053972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565735" comment="openssh-openssl1-6.6p1-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565736" comment="openssh-openssl1-helpers-6.6p1-19.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37645" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004850.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Following non-security issues were fixed:

- Fix for sftp client because it returns wrong error code upon failure (bsc#1091396)
- Stop leaking File descriptors (bsc#964336)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565737" comment="openssh-openssl1-6.6p1-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565738" comment="openssh-openssl1-helpers-6.6p1-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37646" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009937.html" source="SUSE-SU"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659156" comment="openssh-openssl1-6.6p1-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659157" comment="openssh-openssl1-helpers-6.6p1-19.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37647" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="937085" ref_url="https://bugzilla.suse.com/937085" source="BUGZILLA"/>
		<reference ref_id="954256" ref_url="https://bugzilla.suse.com/954256" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="957813" ref_url="https://bugzilla.suse.com/957813" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security fixes:
- CVE-2015-3194: The signature verification routines will crash with a
  NULL pointer dereference if presented with an ASN.1 signature using the
  RSA PSS algorithm and absent mask generation function parameter. Since
  these routines are used to verify certificate signature algorithms
  this can be used to crash any certificate verification operation and
  exploited in a DoS attack. Any application which performs certificate
  verification is vulnerable including OpenSSL clients and servers which
  enable client authentication. (bsc#957815)
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure OpenSSL would leak
  memory. This structure is used by the PKCS#7 and CMS routines so any
  application which reads PKCS#7 or CMS data from untrusted sources is affected.
  SSL/TLS is not affected. (bsc#957812)
- CVE-2015-3196: If PSK identity hints are received by a multi-threaded client then
  the values were wrongly updated in the parent SSL_CTX structure. This could
  result in a race condition potentially leading to a double free of the
  identify hint data.  (bsc#957813)

Non security bugs fixed:
- Improve S/390 performance on IBM z196 and z13 (bsc#954256)
- Add support for 'ciphers' providing no encryption (bsc#937085)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-11"/>
	<updated date="2015-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937085">SUSE bug 937085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954256">SUSE bug 954256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565739" comment="libopenssl1-devel-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565740" comment="libopenssl1_0_0-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565741" comment="libopenssl1_0_0-32bit-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565742" comment="libopenssl1_0_0-x86-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565743" comment="openssl1-1.0.1g-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565744" comment="openssl1-doc-1.0.1g-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37648" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968265" ref_url="https://bugzilla.suse.com/968265" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0702 aka the 'CacheBleed' attack. (bsc#968050)
  Various changes in the modular exponentation code were added that
  make sure that it is not possible to recover RSA secret keys by
  analyzing cache-bank conflicts on the Intel Sandy-Bridge microarchitecture.

  Note that this was only exploitable if the malicious code was running
  on the same hyper threaded Intel Sandy Bridge processor as the victim
  thread performing decryptions.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0798 (bnc#968265)
  The SRP user database lookup method SRP_VBASE_get_by_user() had a memory
  leak that attackers could abuse to facility DoS attacks. To mitigate
  the issue, the seed handling in SRP_VBASE_get_by_user() was disabled
  even if the user has configured a seed. Applications are advised to
  migrate to SRP_VBASE_get1_by_user().

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Bugs fixed:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading. (bsc#952871)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565745" comment="libopenssl1-devel-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565746" comment="libopenssl1_0_0-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565747" comment="libopenssl1_0_0-32bit-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565748" comment="libopenssl1_0_0-x86-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565749" comment="openssl1-1.0.1g-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565750" comment="openssl1-doc-1.0.1g-0.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37649" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="971354" ref_url="https://bugzilla.suse.com/971354" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<description>

This update for openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#971354: libopenssl1_0_0 now Recommends: openssl1 to get correct SSL Root
  Certificate hashes
- bsc#889013: Rename README.SuSE to the new spelling README.SUSE
- bsc#976943: Fixed a buffer overrun in ASN1_parse.
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971354">SUSE bug 971354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565751" comment="libopenssl1-devel-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565752" comment="libopenssl1_0_0-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565753" comment="libopenssl1_0_0-32bit-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565754" comment="libopenssl1_0_0-x86-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565755" comment="openssl1-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565756" comment="openssl1-doc-1.0.1g-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37650" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<description>

This update for openssl1 fixes the following issues:

penSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565757" comment="libopenssl1-devel-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565758" comment="libopenssl1_0_0-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565759" comment="libopenssl1_0_0-32bit-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565760" comment="libopenssl1_0_0-x86-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565761" comment="openssl1-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565762" comment="openssl1-doc-1.0.1g-0.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37651" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001707" ref_url="https://bugzilla.suse.com/1001707" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022644" ref_url="https://bugzilla.suse.com/1022644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<description>

This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001707">SUSE bug 1001707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022644">SUSE bug 1022644</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565763" comment="libopenssl1-devel-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565764" comment="libopenssl1_0_0-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565765" comment="libopenssl1_0_0-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565766" comment="libopenssl1_0_0-x86-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565767" comment="openssl1-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565768" comment="openssl1-doc-1.0.1g-0.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37652" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1027908" ref_url="https://bugzilla.suse.com/1027908" source="BUGZILLA"/>
		<reference ref_id="1032261" ref_url="https://bugzilla.suse.com/1032261" source="BUGZILLA"/>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1057660" ref_url="https://bugzilla.suse.com/1057660" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="990592" ref_url="https://bugzilla.suse.com/990592" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2968-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00015.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
- Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

- support alternate root ca chains (bsc#1032261)
- Require openssl1, so c_rehash1 is available during %post to hash the certificates (bsc#1057660)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027908">SUSE bug 1027908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032261">SUSE bug 1032261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057660">SUSE bug 1057660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565769" comment="libopenssl1-devel-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565770" comment="libopenssl1_0_0-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565771" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565772" comment="libopenssl1_0_0-x86-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565773" comment="openssl1-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565774" comment="openssl1-doc-1.0.1g-0.58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37653" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00007.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565775" comment="libopenssl1-devel-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565776" comment="libopenssl1_0_0-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565777" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565778" comment="libopenssl1_0_0-x86-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565779" comment="openssl1-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565780" comment="openssl1-doc-1.0.1g-0.58.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37654" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565781" comment="libopenssl1-devel-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565782" comment="libopenssl1_0_0-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565783" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565784" comment="libopenssl1_0_0-x86-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565785" comment="openssl1-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565786" comment="openssl1-doc-1.0.1g-0.58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37655" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565787" comment="libopenssl1-devel-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565788" comment="libopenssl1_0_0-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565789" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565790" comment="libopenssl1_0_0-x86-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565791" comment="openssl1-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565792" comment="openssl1-doc-1.0.1g-0.58.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37656" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005585.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565793" comment="libopenssl1-devel-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565794" comment="libopenssl1_0_0-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565795" comment="openssl1-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565796" comment="openssl1-doc-1.0.1g-0.58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37657" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565797" comment="libopenssl1-devel-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565798" comment="libopenssl1_0_0-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565799" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565800" comment="libopenssl1_0_0-x86-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565801" comment="openssl1-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565802" comment="openssl1-doc-1.0.1g-0.58.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37658" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006518.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- Add missing commits fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory problem in 'BN_copy()'. (bsc#1160163)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565803" comment="libopenssl1-devel-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565804" comment="libopenssl1_0_0-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565805" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565806" comment="libopenssl1_0_0-x86-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565807" comment="openssl1-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565808" comment="openssl1-doc-1.0.1g-0.58.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37659" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007521.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565809" comment="libopenssl1-devel-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565810" comment="libopenssl1_0_0-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565811" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565812" comment="libopenssl1_0_0-x86-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565813" comment="openssl1-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565814" comment="openssl1-doc-1.0.1g-0.58.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37660" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565815" comment="libopenssl1-devel-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565816" comment="libopenssl1_0_0-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565817" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565818" comment="libopenssl1_0_0-x86-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565819" comment="openssl1-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565820" comment="openssl1-doc-1.0.1g-0.58.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37661" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565821" comment="libopenssl1-devel-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565822" comment="libopenssl1_0_0-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565823" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565824" comment="libopenssl1_0_0-x86-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565825" comment="openssl1-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565826" comment="openssl1-doc-1.0.1g-0.58.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37662" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009347.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631729" comment="libopenssl1-devel-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631730" comment="libopenssl1_0_0-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631731" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631732" comment="libopenssl1_0_0-x86-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631733" comment="openssl1-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631734" comment="openssl1-doc-1.0.1g-0.58.36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37663" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.                                                                                                                   
  Read buffer overruns processing ASN.1 strings (bsc#1189521).                                                                                                                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632537" comment="libopenssl1-devel-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632538" comment="libopenssl1_0_0-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632539" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632540" comment="libopenssl1_0_0-x86-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632541" comment="openssl1-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632542" comment="openssl1-doc-1.0.1g-0.58.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37664" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" source="SUSE-SU"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-0778: Fixed an infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673386" comment="libopenssl1-devel-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673387" comment="libopenssl1_0_0-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673388" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673389" comment="libopenssl1_0_0-x86-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673390" comment="openssl1-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673391" comment="openssl1-doc-1.0.1g-0.58.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37665" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="959511" ref_url="https://bugzilla.suse.com/959511" source="BUGZILLA"/>
		<reference ref_id="988522" ref_url="https://bugzilla.suse.com/988522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]

- The installed sample configuration file was updated to comply to FIPS
  requirements. [bsc#988522]

- Remedy large latencies on the openVPN server during authentication process.
  [bsc#959511]

- Fix potential denial-of-service attacks found during independent audits.
  [bsc#1038713, bsc#1038709, CVE-2017-7478, bsc#1038711, CVE-2017-7479]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959511">SUSE bug 959511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988522">SUSE bug 988522</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565827" comment="openvpn-openssl1-2.3.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565828" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37666" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00000.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

Security issue fixed:

- CVE-2017-12166: Fix remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565829" comment="openvpn-openssl1-2.3.2-0.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565830" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37667" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="959714" ref_url="https://bugzilla.suse.com/959714" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007310.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Fixed Out of bounds read on getaddrinfo() result (bsc#959714).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959714">SUSE bug 959714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565831" comment="openvpn-openssl1-2.3.2-0.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565832" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37668" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1085803" ref_url="https://bugzilla.suse.com/1085803" source="BUGZILLA"/>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008765.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565833" comment="openvpn-openssl1-2.3.2-0.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565834" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37669" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010663.html" source="SUSE-SU"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676886" comment="openvpn-openssl1-2.3.2-0.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676887" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37670" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1008130" ref_url="https://bugzilla.suse.com/1008130" source="BUGZILLA"/>
		<reference ref_id="1012814" ref_url="https://bugzilla.suse.com/1012814" source="BUGZILLA"/>
		<reference ref_id="923349" ref_url="https://bugzilla.suse.com/923349" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002800.html" source="SUSE-SU"/>
		<description>

This update for sblim-sfcb fixes the following issues:

Feature enhancements:
- A seperate sblim-sfcb-openssl1 package was added to the SECURITY Module.
  (fate#322032/bsc#1012814)

  This package can be installed additionaly, and the SysV Init script will
  pick the openssl1 variant on the next start, offering TLS 1.2 support
  on the WBEM SSL socket.

Bugfixes:
-  Add sslNoSSLv3 and sslNoTLSv1 configuration options (bsc#923349, bsc#1008130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008130">SUSE bug 1008130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012814">SUSE bug 1012814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923349">SUSE bug 923349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565835" comment="sblim-sfcb-openssl1-1.3.11-0.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37671" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565836" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37672" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002739.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565837" comment="wget-openssl1-1.11.4-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37673" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11-SECURITY</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:security</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117400" comment="SUSE Linux Enterprise Server 11-SECURITY is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565838" comment="wget-openssl1-1.11.4-1.41.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37674" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="754481" ref_url="https://bugzilla.suse.com/754481" source="BUGZILLA"/>
		<reference ref_id="773612" ref_url="https://bugzilla.suse.com/773612" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>

ImageMagick has been updated to fix an integer overflow (CVE-2012-3438).

Also a slowness in 'convert' when resizing JPEG images has been addressed 
(bnc#754481).

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-20"/>
	<updated date="2013-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/754481">SUSE bug 754481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565839" comment="ImageMagick-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565840" comment="libMagick++1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565841" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565842" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565843" comment="libMagickWand1-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37675" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821855" ref_url="https://bugzilla.suse.com/821855" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>

This update of Mesa fixes multiple integer overflows.

Security Issue reference:

    * CVE-2013-1993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565844" comment="Mesa-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565845" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37676" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37677" version="1" class="patch">
	<metadata>
		<title>Security update for acroread</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843835" ref_url="https://bugzilla.suse.com/843835" source="BUGZILLA"/>
		<description>

Adobe has discontinued the support of Adobe Reader for Linux in June 2013.

Newer security problems and bugs are no longer fixed.

As the Adobe Reader is binary only software and we cannot provide a 
replacement, SUSE declares the acroread package of Adobe Reader as being 
out of support and unmaintained.

If you do not need Acrobat Reader, we recommend to uninstall the 'acroread' 
package.

This update removes the Acrobat Reader PDF plugin to avoid automatic 
exploitation by clicking on web pages with embedded PDFs.

The stand alone 'acroread' binary is still available, but again, we do not 
recommend to use it.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/843835">SUSE bug 843835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565848" comment="acroread-9.5.5-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565849" comment="acroread-cmaps-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565850" comment="acroread-fonts-ja-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565851" comment="acroread-fonts-ko-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565852" comment="acroread-fonts-zh_CN-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565853" comment="acroread-fonts-zh_TW-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37678" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565855" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565856" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565857" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37679" version="1" class="patch">
	<metadata>
		<title>Security update for bogofilter</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="792939" ref_url="https://bugzilla.suse.com/792939" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<description>

A heap corruption in bogofilter's base64 decoding function, caused by 
incomplete multibyte characters, could have resulted in a Denial of Service 
(App. crash) or potentially allowed the execution of arbitrary code. This 
has been fixed.

Security Issue reference:

    * CVE-2012-5468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-05"/>
	<updated date="2012-12-05"/>
	<bugzilla href="https://bugzilla.suse.com/792939">SUSE bug 792939</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565858" comment="bogofilter-1.1.1-174.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37680" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="769799" ref_url="https://bugzilla.suse.com/769799" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>

Mono was updated to fix a cross site scripting attack in the System.Web 
class 'forbidden extensions' filtering has been fixed. (CVE-2012-3382)

Security Issue reference:

    * CVE-2012-3382
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-13"/>
	<updated date="2012-07-13"/>
	<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565859" comment="bytefx-data-mysql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565860" comment="ibm-data-db2-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565861" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565862" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565863" comment="mono-data-firebird-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565864" comment="mono-data-oracle-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565865" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565866" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565867" comment="mono-data-sybase-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565868" comment="mono-devel-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565869" comment="mono-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565870" comment="mono-jscript-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565871" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565872" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565873" comment="mono-wcf-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565874" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565875" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565876" comment="monodoc-core-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37681" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="817880" ref_url="https://bugzilla.suse.com/817880" source="BUGZILLA"/>
		<reference ref_id="838472" ref_url="https://bugzilla.suse.com/838472" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849226" ref_url="https://bugzilla.suse.com/849226" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="854520" ref_url="https://bugzilla.suse.com/854520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<description>

This update fixes the following security issues with Samba:

    * bnc#844720: DCERPC frag_len not checked (CVE-2013-4408)
    * bnc#853347: winbind pam security problem (CVE-2012-6150)
    * bnc#848101: No access check verification on stream files
      (CVE-2013-4475)

And fixes the following non-security issues:

    * bnc#853021: libsmbclient0 package description contains comments
    * bnc#817880: rpcclient adddriver and setdrive do not set all needed
      registry entries
    * bnc#838472: Client trying to delete print job fails: Samba returns:
      WERR_INVALID_PRINTER_NAME
    * bnc#854520 and bnc#849226: various upstream fixes

Security Issue references:

    * CVE-2012-6150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150&gt;
    * CVE-2013-4408
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408&gt;
    * CVE-2013-4475
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/817880">SUSE bug 817880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838472">SUSE bug 838472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849226">SUSE bug 849226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854520">SUSE bug 854520</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565877" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565878" comment="libldb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565879" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565880" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565881" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565882" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565883" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565884" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565885" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565886" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565887" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565888" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565889" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565890" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565891" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565892" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565893" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565894" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565896" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565897" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565898" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37682" version="1" class="patch">
	<metadata>
		<title>Security update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="816865" ref_url="https://bugzilla.suse.com/816865" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<description>

This update contains clamav 0.97.8 which fixes security issues 
(bnc#816865):

    * CVE-2013-2020: Fix heap corruption
    * CVE-2013-2021: Fix overflow due to PDF key length computation.

Security Issue references:

    * CVE-2013-2020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020&gt;
    * CVE-2013-2021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565899" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37683" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<description>

This compat-openssl097g rollup update contains various security fixes:

    * CVE-2012-2131,CVE-2012-2110: incorrect integer conversions in OpenSSL
      could have resulted in memory corruption during buffer management
      operations.

Security Issue reference:

    * CVE-2012-2110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37684" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="796243" ref_url="https://bugzilla.suse.com/796243" source="BUGZILLA"/>
		<reference ref_id="798538" ref_url="https://bugzilla.suse.com/798538" source="BUGZILLA"/>
		<reference ref_id="798541" ref_url="https://bugzilla.suse.com/798541" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>

This coreutils update fixes three minor security issues.

    * #798538 - VUL-1: CVE-2013-0221: segmentation fault in 'sort -d' and
      'sort -M' with long line input
    * #796243 - VUL-1: CVE-2013-0222: segmentation fault in 'uniq' with
      long line input
    * #798541 - VUL-1: CVE-2013-0223: segmentation fault in 'join -i' with
      long line input

Security Issue references:

    * CVE-2013-0221
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221&gt;
    * CVE-2013-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222&gt;
    * CVE-2013-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-17"/>
	<updated date="2013-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565902" comment="coreutils-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565903" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37685" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<description>

The following security issue has been fixed in the CUPS print daemon 
CVE-2012-5519:

The patch adds better default protection against misuse of privileges by 
normal users who have been specifically allowed by root to do cupsd 
configuration changes

The new ConfigurationChangeRestriction cupsd.conf directive specifies the 
level of restriction for cupsd.conf changes that happen via HTTP/IPP 
requests to the running cupsd (e.g. via CUPS web interface or via the 
cupsctl command).

By default certain cupsd.conf directives that deal with filenames, paths, 
and users can no longer be changed via requests to the running cupsd but 
only by manual editing the cupsd.conf file and its default file permissions 
permit only root to write the cupsd.conf file.

Those directives are: ConfigurationChangeRestriction, AccessLog, 
BrowseLDAPCACertFile, CacheDir, ConfigFilePerm, DataDir, DocumentRoot, 
ErrorLog, FileDevice, FontPath, Group, LogFilePerm, PageLog, Printcap, 
PrintcapFormat, PrintcapGUI, RemoteRoot, RequestRoot, ServerBin, 
ServerCertificate, ServerKey, ServerRoot, StateDir, SystemGroup, 
SystemGroupAuthKey, TempDir, User.

The default group of users who are allowed to do cupsd configuration 
changes
via requests to the running cupsd (i.e. the SystemGroup directive in 
cupsd.conf) is set to 'root' only.

Additionally the following bug has been fixed:

    * strip trailing '@REALM' from username for Kerberos authentication
      (CUPS STR#3972 bnc#827109)

Security Issue reference:

    * CVE-2012-5519
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565904" comment="cups-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565905" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565906" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565907" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37686" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<description>

This update fixes the re-use of wrong HTTP NTLM connections in libcurl. 
(CVE-2014-0015)

Security Issue reference:

    * CVE-2014-0015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-18"/>
	<updated date="2014-01-18"/>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565908" comment="curl-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565909" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565910" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37687" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="783002" ref_url="https://bugzilla.suse.com/783002" source="BUGZILLA"/>
		<reference ref_id="811934" ref_url="https://bugzilla.suse.com/811934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>

The ISC DHCP server had a denial of service issue in handling specific DDNS 
requests which could cause a out of memory usage situation. (CVE-2013-2266)

This update also adds a dhcp6-server service template for SuSEfirewall2 
(bnc#783002)

Security Issues:

    * CVE-2013-2266
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-27"/>
	<updated date="2013-03-27"/>
	<bugzilla href="https://bugzilla.suse.com/783002">SUSE bug 783002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565911" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565912" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37688" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="804742" ref_url="https://bugzilla.suse.com/804742" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<description>

pidgin was updated to fix 4 security issues:

    * Fixed a crash when receiving UPnP responses with abnormally long
      values. (CVE-2013-0274, bnc#804742)
    * Fixed a crash in Sametime protocol when a malicious server sends us
      an abnormally long user ID. (CVE-2013-0273, bnc#804742)
    * Fixed a bug where the MXit server or a man-in-the-middle could
      potentially send specially crafted data that could overflow a buffer
      and lead to a crash or remote code execution.(CVE-2013-0272,
      bnc#804742)
    * Fixed a bug where a remote MXit user could possibly specify a local
      file path to be written to. (CVE-2013-0271, bnc#804742)

Security Issue references:

    * CVE-2013-0271
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271&gt;
    * CVE-2013-0272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272&gt;
    * CVE-2013-0273
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273&gt;
    * CVE-2013-0274
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-27"/>
	<updated date="2013-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565913" comment="finch-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565914" comment="libpurple-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565915" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565916" comment="libpurple-meanwhile-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565917" comment="libpurple-tcl-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565918" comment="pidgin-2.6.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37689" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37690" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="783533" ref_url="https://bugzilla.suse.com/783533" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.9ESR security release which fixes 
bugs and security issues:

    * 

      MFSA 2012-73 / CVE-2012-3977: Security researchers Thai Duong and
      Juliano Rizzo reported that SPDY's request header compression leads
      to information leakage, which can allow the extraction of private
      data such as session cookies, even over an encrypted SSL connection.
      (This does not affect Firefox 10 as it does not feature the SPDY
      extension. It was silently fixed for Firefox 15.)

    * 

      MFSA 2012-74: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-3983: Henrik Skupin, Jesse Ruderman and moz_bug_r_a4
      reported memory safety problems and crashes that affect Firefox 15.

    * 

      CVE-2012-3982: Christian Holler and Jesse Ruderman reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      15.

    * 

      MFSA 2012-75 / CVE-2012-3984: Security researcher David Bloom of Cue
      discovered that 'select' elements are always-on-top chromeless
      windows and that navigation away from a page with an active 'select'
      menu does not remove this window.When another menu is opened
      programmatically on a new page, the original 'select' menu can be
      retained and arbitrary HTML content within it rendered, allowing an
      attacker to cover arbitrary portions of the new page through absolute
      positioning/scrolling, leading to spoofing attacks. Security
      researcher Jordi Chancel found a variation that would allow for
      click-jacking attacks was well.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Navigation away from a page with an active 'select' dropdown menu can
      be used for URL spoofing, other evil

      Firefox 10.0.1 : Navigation away from a page with multiple active
      'select' dropdown menu can be used for Spoofing And ClickJacking with
      XPI using window.open and geolocalisation

    * 

      MFSA 2012-76 / CVE-2012-3985: Security researcher Collin Jackson
      reported a violation of the HTML5 specifications for document.domain
      behavior. Specified behavior requires pages to only have access to
      windows in a new document.domain but the observed violation allowed
      pages to retain access to windows from the page's initial origin in
      addition to the new document.domain. This could potentially lead to
      cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-77 / CVE-2012-3986: Mozilla developer Johnny Stenback
      discovered that several methods of a feature used for testing
      (DOMWindowUtils) are not protected by existing security checks,
      allowing these methods to be called through script by web pages. This
      was addressed by adding the existing security checks to these
      methods.

    * 

      MFSA 2012-78 / CVE-2012-3987: Security researcher Warren He reported
      that when a page is transitioned into Reader Mode in Firefox for
      Android, the resulting page has chrome privileges and its content is
      not thoroughly sanitized. A successful attack requires user enabling
      of reader mode for a malicious page, which could then perform an
      attack similar to cross-site scripting (XSS) to gain the privileges
      allowed to Firefox on an Android device. This has been fixed by
      changing the Reader Mode page into an unprivileged page.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-79 / CVE-2012-3988: Security researcher Soroush Dalili
      reported that a combination of invoking full screen mode and
      navigating backwards in history could, in some circumstances, cause a
      hang or crash due to a timing dependent use-after-free pointer
      reference. This crash may be potentially exploitable.

    * 

      MFSA 2012-80 / CVE-2012-3989: Mozilla community member Ms2ger
      reported a crash due to an invalid cast when using the instanceof
      operator on certain types of JavaScript objects. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-81 / CVE-2012-3991: Mozilla community member Alice White
      reported that when the GetProperty function is invoked through JSAPI,
      security checking can be bypassed when getting cross-origin
      properties. This potentially allowed for arbitrary code execution.

    * 

      MFSA 2012-82 / CVE-2012-3994: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location and top can be shadowed by Object.defineProperty
      as well. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

    * 

      MFSA 2012-83: Security researcher Mariusz Mlynski reported that when
      InstallTrigger fails, it throws an error wrapped in a Chrome Object
      Wrapper (COW) that fails to specify exposed properties. These can
      then be added to the resulting object by an attacker, allowing access
      to chrome privileged functions through script.

      While investigating this issue, Mozilla security researcher
      moz_bug_r_a4 found that COW did not disallow accessing of properties
      from a standard prototype in some situations, even when the original
      issue had been fixed.

      These issues could allow for a cross-site scripting (XSS) attack or
      arbitrary code execution.

    * 

      CVE-2012-3993: XrayWrapper pollution via unsafe COW

    * 

      CVE-2012-4184: ChromeObjectWrapper is not implemented as intended

    * 

      MFSA 2012-84 / CVE-2012-3992: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, writes to location.hash can be used in concert with scripted
      history navigation to cause a specific website to be loaded into the
      history object. The baseURI can then be changed to this stored site,
      allowing an attacker to inject a script or intercept posted data
      posted to a location specified with a relative path.

    * 

      MFSA 2012-85: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series of use-after-free,
      buffer overflow, and out of bounds read issues using the Address
      Sanitizer tool in shipped software. These issues are potentially
      exploitable, allowing for remote code execution. We would also like
      to thank Abhishek for reporting two additional use-after-free flaws
      introduced during Firefox 16 development and fixed before general
      release.

    * 

      CVE-2012-3995: Out of bounds read in IsCSSWordSpacingSpace

    * 

      CVE-2012-4179: Heap-use-after-free in
      nsHTMLCSSUtils::CreateCSSPropertyTxn

    * 

      CVE-2012-4180: Heap-buffer-overflow in
      nsHTMLEditor::IsPrevCharInNodeWhitespace

    * 

      CVE-2012-4181: Heap-use-after-free in
      nsSMILAnimationController::DoSample

    * 

      CVE-2012-4182: Heap-use-after-free in nsTextEditRules::WillInsert

    * 

      CVE-2012-4183: Heap-use-after-free in
      DOMSVGTests::GetRequiredFeatures

    * 

      MFSA 2012-86: Security researcher Atte Kettunen from OUSPG reported
      several heap memory corruption issues found using the Address
      Sanitizer tool. These issues are potentially exploitable, allowing
      for remote code execution.

    * 

      CVE-2012-4185: Global-buffer-overflow in nsCharTraits::length

    * 

      CVE-2012-4186: Heap-buffer-overflow in nsWaveReader::DecodeAudioData

    * 

      CVE-2012-4187: Crash with ASSERTION: insPos too small

    * 

      CVE-2012-4188: Heap-buffer-overflow in Convolve3x3

    * 

      MFSA 2012-87 / CVE-2012-3990: Security researcher miaubiz used the
      Address Sanitizer tool to discover a use-after-free in the IME State
      Manager code. This could lead to a potentially exploitable crash.

    * 

      MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla security
      researcher moz_bug_r_a4 reported a regression where security wrappers
      are unwrapped without doing a security check in defaultValue(). This
      can allow for improper access access to the Location object. In
      versions 15 and earlier of affected products, there was also the
      potential for arbitrary code execution.

Security Issue reference:

    * CVE-2012-3977
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977&gt;
    * CVE-2012-3982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982&gt;
    * CVE-2012-3983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983&gt;
    * CVE-2012-3984
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984&gt;
    * CVE-2012-3985
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985&gt;
    * CVE-2012-3986
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986&gt;
    * CVE-2012-3987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987&gt;
    * CVE-2012-3988
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988&gt;
    * CVE-2012-3989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989&gt;
    * CVE-2012-3990
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990&gt;
    * CVE-2012-3991
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991&gt;
    * CVE-2012-3992
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992&gt;
    * CVE-2012-3993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993&gt;
    * CVE-2012-3994
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994&gt;
    * CVE-2012-3995
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995&gt;
    * CVE-2012-4179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179&gt;
    * CVE-2012-4180
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180&gt;
    * CVE-2012-4181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181&gt;
    * CVE-2012-4182
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182&gt;
    * CVE-2012-4183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183&gt;
    * CVE-2012-4184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184&gt;
    * CVE-2012-4185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185&gt;
    * CVE-2012-4186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186&gt;
    * CVE-2012-4187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187&gt;
    * CVE-2012-4188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188&gt;
    * CVE-2012-4192
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192&gt;
    * CVE-2012-4193
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37691" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issue has been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565932" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565933" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565934" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37692" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37693" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37694" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="808243" ref_url="https://bugzilla.suse.com/808243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.4ESR release which fixes one 
important security issue:

    * MFSA 2013-29 / CVE-2013-0787: VUPEN Security, via TippingPoint's Zero
      Day Initiative, reported a use-after-free within the HTML editor when
      content script is run by the document.execCommand() function while
      internal editor operations are occurring. This could allow for
      arbitrary code execution.

Security Issue reference:

    * CVE-2013-0787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-11"/>
	<updated date="2013-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565952" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565954" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37695" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android

    * 

      (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565968" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565970" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37696" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the17.0.6ESR security release.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-17"/>
	<updated date="2013-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37697" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, fixing bugs and 
security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

Security Issue references:

    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-28"/>
	<updated date="2013-06-28"/>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37698" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 17.0.10ESR release, fixing various bugs 
and security issues:

MFSA 2013-93: Mozilla developers identified and fixed several memory safety 
bugs in the browser engine used in Firefox and other Mozilla-based 
products. Some of these bugs showed evidence of memory corruption under 
certain circumstances, and we presume that with enough effort at least some 
of these could be exploited to run arbitrary code.

Jesse Ruderman and Christoph Diehl reported memory safety problems and 
crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox 24. 
(CVE-2013-5590)

Carsten Book reported a crash fixed in the NSS library used by 
Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and Firefox 
ESR 17.0.10.(CVE-2013-1739)

MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya (Inferno) 
of the Google Chrome Security Team used the Address Sanitizer tool to 
discover an access violation due to uninitialized data during Extensible 
Stylesheet Language Transformation (XSLT) processing. This leads to a 
potentially exploitable crash.

MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google 
discovered a flaw in the JavaScript engine where memory was being 
incorrectly allocated for some functions and the calls for allocations were 
not always properly checked for overflow, leading to potential buffer 
overflows. When combined with other vulnerabilities, these flaws could be 
potentially exploitable.

MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of 
Georgia Tech Information Security Center (GTISC) used the Address Sanitizer 
tool to discover a use-after-free during state change events while updating 
the offline cache. This leads to a potentially exploitable crash.

MFSA 2013-100: Security researcher Nils used the Address Sanitizer tool 
while fuzzing to discover missing strong references in browsing engine 
leading to use-after-frees. This can lead to a potentially exploitable 
crash.

    * ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
      canvas, onresize and mozTextStyle (CVE-2013-5599)
    * ASAN use-after-free in nsIOService::NewChannelFromURIWithProxyFlags
      with Blob URL (CVE-2013-5600)
    * ASAN use-after free in GC allocation in
      nsEventListenerManager::SetEventHandler (CVE-2013-5601)

MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the Address 
Sanitizer tool while fuzzing to discover a memory corruption issue with the 
JavaScript engine when using workers with direct proxies. This results in a 
potentially exploitable crash.

Security Issues:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-09"/>
	<updated date="2013-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565983" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565984" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565985" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37699" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="862288" ref_url="https://bugzilla.suse.com/862288" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0497" ref_url="https://www.suse.com/security/cve/CVE-2014-0497/" source="CVE"/>
		<description>

This update resolves an integer underflow vulnerability that could have 
been exploited to execute arbitrary code on the affected system 
(CVE-2014-0497).

More information: 
http://helpx.adobe.com/security/products/flash-player/apsb14-04.html
&lt;http://helpx.adobe.com/security/products/flash-player/apsb14-04.html&gt;

Security Issue references:

    * CVE-2014-0497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0497&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-06"/>
	<updated date="2014-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/862288">SUSE bug 862288</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0497/">CVE-2014-0497</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565986" comment="flash-player-11.2.202.336-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37700" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="795826" ref_url="https://bugzilla.suse.com/795826" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<description>

This update fixes:

    * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668
      and CVE-2012-5669)

As well as the following non-security bugs:

    * [bdf] Savannah bug #37905.
          o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero
            in case of allocation error; this value gets used in a loop in
    * [bdf] Fix Savannah bug #37906.
          o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size
            for checking `glyph_enc'.

Security Issue references:

    * CVE-2012-5668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668&gt;
    * CVE-2012-5669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-15"/>
	<updated date="2013-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565989" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565990" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565991" comment="freetype2-devel-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565992" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37701" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="779700" ref_url="https://bugzilla.suse.com/779700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>

This update fixes an array index error leading to a heap-based buffer 
overflow in ghostscript-library. CVE-2012-4405 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-4405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-12"/>
	<updated date="2012-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565993" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565994" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565995" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565996" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565997" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565998" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565999" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37702" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="791928" ref_url="https://bugzilla.suse.com/791928" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="811979" ref_url="https://bugzilla.suse.com/811979" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="818628" ref_url="https://bugzilla.suse.com/818628" source="BUGZILLA"/>
		<reference ref_id="819347" ref_url="https://bugzilla.suse.com/819347" source="BUGZILLA"/>
		<reference ref_id="822210" ref_url="https://bugzilla.suse.com/822210" source="BUGZILLA"/>
		<reference ref_id="827811" ref_url="https://bugzilla.suse.com/827811" source="BUGZILLA"/>
		<reference ref_id="828235" ref_url="https://bugzilla.suse.com/828235" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<description>

This update for glibc contains the following fixes:

    * Fix integer overflows in malloc (CVE-2013-4332, bnc#839870)
    * Fix buffer overflow in glob (bnc#691365)
    * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320)
    * Update mount flags in &lt;sys/mount.h&gt; (bnc#791928)
    * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246)
    * Fix memory leaks in dlopen (bnc#811979)
    * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914,
      bnc#813121)
    * Fix check for XEN build in glibc_post_upgrade that causes missing
      init re-exec (bnc#818628)
    * Don't raise UNDERFLOW in tan/tanf for small but normal argument
      (bnc#819347)
    * Properly cross page boundary in SSE4.2 implementation of strcmp
      (bnc#822210)
    * Fix robust mutex handling after fork (bnc#827811)
    * Fix missing character in IBM-943 charset (bnc#828235)
    * Fix use of alloca in gaih_inet (bnc#828637)
    * Initialize pointer guard also in static executables (CVE-2013-4788,
      bnc#830268)
    * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).

Security Issues:

    * CVE-2012-4412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412&gt;
    * CVE-2013-0242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242&gt;
    * CVE-2013-1914
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914&gt;
    * CVE-2013-4237
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237&gt;
    * CVE-2013-4332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332&gt;
    * CVE-2013-4788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-13"/>
	<updated date="2013-09-13"/>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791928">SUSE bug 791928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811979">SUSE bug 811979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818628">SUSE bug 818628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819347">SUSE bug 819347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822210">SUSE bug 822210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827811">SUSE bug 827811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828235">SUSE bug 828235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37703" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<description>

This update of GnuTLS fixes a regression introduced by the previous update 
that could have resulted in a Denial of Service (application crash).

Security Issue reference:

    * CVE-2013-2116
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-28"/>
	<updated date="2013-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566008" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566009" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566010" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37704" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840510" ref_url="https://bugzilla.suse.com/840510" source="BUGZILLA"/>
		<reference ref_id="844175" ref_url="https://bugzilla.suse.com/844175" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<description>

This GnuPG update fixes two security issues:

    * CVE-2013-4351: GnuPG treated no-usage-permitted keys as
      all-usages-permitted.
    * CVE-2013-4402: An infinite recursion in the compressed packet parser
      was fixed.

Security Issue reference:

    * CVE-2013-4351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351&gt;
    * CVE-2013-4402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566011" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566012" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37705" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566013" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566014" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566015" comment="gtk2-devel-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566016" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37706" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log)

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37707" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840572" ref_url="https://bugzilla.suse.com/840572" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<description>

This icedtea-web update adds a missing fix for an off-by-one heap-based 
buffer overflow.

bnc#840572: CVE-2013-4349: icedtea-web 1.4.1 fixes the missing patch for 
CVE-2012-4540.

Security Issues:

    * CVE-2012-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540&gt;
    * CVE-2013-4349
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-24"/>
	<updated date="2013-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/840572">SUSE bug 840572</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566019" comment="icedtea-web-1.4.1-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37708" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<description>

This update is rereleased because some architectures were missed on the 
first try. It fixes the following security issues:

    * Specially crafted strings could cause a buffer overflow in icu (
      CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt; )
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-19"/>
	<updated date="2012-12-19"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562934" comment="icu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566020" comment="libicu-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37709" version="1" class="patch">
	<metadata>
		<title>Security update for inkscape</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="794958" ref_url="https://bugzilla.suse.com/794958" source="BUGZILLA"/>
		<reference ref_id="796306" ref_url="https://bugzilla.suse.com/796306" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5656" ref_url="https://www.suse.com/security/cve/CVE-2012-5656/" source="CVE"/>
		<reference ref_id="CVE-2012-6076" ref_url="https://www.suse.com/security/cve/CVE-2012-6076/" source="CVE"/>
		<description>

inkscape was updated to fix a XXE (Xml eXternal Entity) attack during 
rasterization of SVG images (CVE-2012-5656), where the rendering of 
malicious SVG images could have connected from inkscape to internal hosts.

Also inkscape would have loaded .EPS files from untrusted /tmp occasionaly 
instead from the current directory. (CVE-2012-6076)

Security Issue references:

    * CVE-2012-6076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6076&gt;
    * CVE-2012-5656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-20"/>
	<updated date="2013-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/794958">SUSE bug 794958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796306">SUSE bug 796306</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5656/">CVE-2012-5656</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6076/">CVE-2012-6076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566021" comment="inkscape-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566022" comment="inkscape-extensions-dia-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566023" comment="inkscape-extensions-extra-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566024" comment="inkscape-extensions-fig-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566025" comment="inkscape-extensions-gimp-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566026" comment="inkscape-lang-0.46-62.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37710" version="1" class="patch">
	<metadata>
		<title>Security update for OpenJDK 1.6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="852367" ref_url="https://bugzilla.suse.com/852367" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<description>

OpenJDK 1.6 was updated to the new Icedtea release 1.12.7, which includes 
many fixes for bugs and security issues:

    * S8006900, CVE-2013-3829: Add new date/time capability
    * S8008589: Better MBean permission validation
    * S8011071, CVE-2013-5780: Better crypto provider handling
    * S8011081, CVE-2013-5772: Improve jhat
    * S8011157, CVE-2013-5814: Improve CORBA portablility
    * S8012071, CVE-2013-5790: Better Building of Beans
    * S8012147: Improve tool support
    * S8012277: CVE-2013-5849: Improve AWT DataFlavor
    * S8012425, CVE-2013-5802: Transform TransformerFactory
    * S8013503, CVE-2013-5851: Improve stream factories
    * S8013506: Better Pack200 data handling
    * S8013510, CVE-2013-5809: Augment image writing code
    * S8013514: Improve stability of cmap class
    * S8013739, CVE-2013-5817: Better LDAP resource management
    * S8013744, CVE-2013-5783: Better tabling for AWT
    * S8014085: Better serialization support in JMX classes
    * S8014093, CVE-2013-5782: Improve parsing of images
    * S8014102, CVE-2013-5778: Improve image conversion
    * S8014341, CVE-2013-5803: Better service from Kerberos servers
    * S8014349, CVE-2013-5840: (cl) Class.getDeclaredClass problematic in
      some class loader configurations
    * S8014530, CVE-2013-5825: Better digital signature processing
    * S8014534: Better profiling support
    * S8014987, CVE-2013-5842: Augment serialization handling
    * S8015614: Update build settings
    * S8015731: Subject java.security.auth.subject to improvements
    * S8015743, CVE-2013-5774: Address internet addresses
    * S8016256: Make finalization final
    * S8016653, CVE-2013-5804: javadoc should ignore ignoreable characters
      in names
    * S8016675, CVE-2013-5797: Make Javadoc pages more robust
    * S8017196, CVE-2013-5850: Ensure Proxies are handled appropriately
    * S8017287, CVE-2013-5829: Better resource disposal
    * S8017291, CVE-2013-5830: Cast Proxies Aside
    * S8017298, CVE-2013-4002: Better XML support
    * S8017300, CVE-2013-5784: Improve Interface Implementation
    * S8017505, CVE-2013-5820: Better Client Service
    * S8019292: Better Attribute Value Exceptions
    * S8019617: Better view of objects
    * S8020293: JVM crash
    * S8021290, CVE-2013-5823: Better signature validation
    * S8022940: Enhance CORBA translations
    * S8023683: Enhance class file parsing

Security issue references:

    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-4002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-29"/>
	<updated date="2013-11-29"/>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37711" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This kdelibs4 update fixes several security issues related to 
khtml/konqueror.

    * Fix security issues and null pointer references in khtml/konqueror
      (bnc#787520) (CVE-2012-4512, CVE-2012-4513, CVE-2012-4515)

Security Issue references:

    * CVE-2012-4512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512&gt;
    * CVE-2012-4513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513&gt;
    * CVE-2012-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-01"/>
	<updated date="2013-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566030" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566031" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566032" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566033" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37712" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="858831" ref_url="https://bugzilla.suse.com/858831" source="BUGZILLA"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 2 kernel was updated to fix a 
regression introduced by the previous update:

    * scsi_dh_alua: Incorrect reference counting in the SCSI ALUA
      initialization code lead to system crashes on boot (bnc#858831).

As the update introducing the regression was marked security, this is also 
marked security even though this bug is not security relevant.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-05"/>
	<updated date="2014-02-05"/>
	<bugzilla href="https://bugzilla.suse.com/858831">SUSE bug 858831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566034" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566035" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566036" comment="kernel-default-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566037" comment="kernel-default-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566042" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566043" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566044" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566045" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566046" comment="kernel-trace-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566047" comment="kernel-trace-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566050" comment="kernel-xen-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566051" comment="kernel-xen-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37713" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

    * If a KDC serves multiple realms, certain requests could cause
      setup_server_realm() to dereference a null pointer, crashing the KDC.
      (CVE-2013-1418)

Security Issues:

    * CVE-2013-1418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-08"/>
	<updated date="2013-11-08"/>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566055" comment="krb5-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566056" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566057" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37714" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="712137" ref_url="https://bugzilla.suse.com/712137" source="BUGZILLA"/>
		<reference ref_id="725008" ref_url="https://bugzilla.suse.com/725008" source="BUGZILLA"/>
		<reference ref_id="786813" ref_url="https://bugzilla.suse.com/786813" source="BUGZILLA"/>
		<reference ref_id="818182" ref_url="https://bugzilla.suse.com/818182" source="BUGZILLA"/>
		<reference ref_id="824340" ref_url="https://bugzilla.suse.com/824340" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<description>

This update fixes a file permission issue with qga (the QEMU Guest Agent) 
from the qemu/kvm package and includes several bug-fixes.

(bnc#818182) (CVE-2013-2007) (bnc#786813) (bnc#725008) (bnc#712137) 
(bnc#824340)

Security Issues:

    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-24"/>
	<updated date="2013-06-24"/>
	<bugzilla href="https://bugzilla.suse.com/712137">SUSE bug 712137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725008">SUSE bug 725008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786813">SUSE bug 786813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824340">SUSE bug 824340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37715" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566059" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566060" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37716" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="757576" ref_url="https://bugzilla.suse.com/757576" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<description>

This update of Samba fixes one security issue and several bugs.

The security fix is:

    * Ensure that users cannot hand out their own privileges to everyone,
      only administrators are allowed to do that. (CVE-2012-2111
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111&gt; )

The non-security bug fixes merged from upstream Samba are:

    * Fix default name resolve order. (docs-xml, bso#7564).
    * Fix a segfault in vfs_aio_fork. (s3-aio-fork, bso#8836).
    * Remove whitespace in example samba.ldif. (docs, bso#8789)
    * Move print_backend_init() behind init_system_info(). (s3-smbd,
      bso#8845)
    * Prepend '/' to filename argument. (s3-docs, bso#8826)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566062" comment="libldb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566063" comment="libldb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566064" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566065" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566066" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566067" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566068" comment="libtdb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566069" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566070" comment="libtevent0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566071" comment="libtevent0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566072" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566073" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566074" comment="samba-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566075" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566076" comment="samba-client-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566077" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566079" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566080" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566081" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37717" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="784197" ref_url="https://bugzilla.suse.com/784197" source="BUGZILLA"/>
		<reference ref_id="797006" ref_url="https://bugzilla.suse.com/797006" source="BUGZILLA"/>
		<reference ref_id="802634" ref_url="https://bugzilla.suse.com/802634" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>

libqt4 has been updated to fix several security issues.

    * An information disclosure via QSharedMemory was fixed which allowed
      local attackers to read information (e.g. bitmap content) from the
      attacked user (CVE-2013-0254).
    * openssl-incompatibility-fix.diff: Fix wrong error reporting when
      using a binary incompatible version of openSSL (bnc#797006,
      CVE-2012-6093)
    * Various compromised SSL root certificates were blacklisted.

Also a non-security bugfix has been applied:

    * Add fix for qdbusviewer not matching args (bnc#784197)

Security Issue reference:

    * CVE-2013-0254
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/784197">SUSE bug 784197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566082" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566083" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566084" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566085" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566086" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566087" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566088" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566089" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566090" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566091" comment="libqt4-sql-mysql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566092" comment="libqt4-sql-postgresql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566093" comment="libqt4-sql-postgresql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566094" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566095" comment="libqt4-sql-sqlite-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566096" comment="libqt4-sql-unixODBC-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566097" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566098" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566099" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37718" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="812525" ref_url="https://bugzilla.suse.com/812525" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>

This update to version 9.1.9 fixes:

    * CVE-2013-1899: Fix insecure parsing of server command-line switches.
    * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster
      child process.
    * CVE-2013-1901: Make REPLICATION privilege checks test current user
      not authenticated user.

Security Issue references:

    * CVE-2013-1899
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899&gt;
    * CVE-2013-1900
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900&gt;
    * CVE-2013-1901
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-02"/>
	<updated date="2013-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566100" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566101" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566102" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566103" comment="postgresql91-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37719" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566104" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566105" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37720" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="792444" ref_url="https://bugzilla.suse.com/792444" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<description>

A stack-based buffer overflow in MySQL has been fixed that could have 
caused a Denial of Service or potentially allowed the execution of 
arbitrary code (CVE-2012-5611).

Security Issue references:

    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613&gt;
    * CVE-2012-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612&gt;
    * CVE-2012-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-27"/>
	<updated date="2012-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566106" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566107" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566108" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566109" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566110" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566111" comment="mysql-client-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37721" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="802648" ref_url="https://bugzilla.suse.com/802648" source="BUGZILLA"/>
		<reference ref_id="802746" ref_url="https://bugzilla.suse.com/802746" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<description>

OpenSSL has been updated to fix several security issues:

    * CVE-2012-4929: Avoid the openssl CRIME attack by disabling SSL
      compression by default. Setting the environment variable
      'OPENSSL_NO_DEFAULT_ZLIB' to 'no' enables compression again.
    * CVE-2013-0169: Timing attacks against TLS could be used by physically
      local attackers to gain access to transmitted plain text or private
      keymaterial. This issue is also known as the 'Lucky-13' issue.
    * CVE-2013-0166: A OCSP invalid key denial of service issue was fixed.

Security Issue references:

    * CVE-2013-0169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169&gt;
    * CVE-2013-0166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-25"/>
	<updated date="2013-03-25"/>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566112" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566113" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566114" comment="openssl-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37722" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566115" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37723" version="1" class="patch">
	<metadata>
		<title>Security update for pcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="732763" ref_url="https://bugzilla.suse.com/732763" source="BUGZILLA"/>
		<reference ref_id="775009" ref_url="https://bugzilla.suse.com/775009" source="BUGZILLA"/>
		<reference ref_id="775010" ref_url="https://bugzilla.suse.com/775010" source="BUGZILLA"/>
		<reference ref_id="775011" ref_url="https://bugzilla.suse.com/775011" source="BUGZILLA"/>
		<reference ref_id="775013" ref_url="https://bugzilla.suse.com/775013" source="BUGZILLA"/>
		<reference ref_id="782967" ref_url="https://bugzilla.suse.com/782967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<description>

pcp was updated to version 3.6.10 which fixes security issues and also 
brings a lot of new features.

    * 

      Update to pcp-3.6.10.

          o Transition daemons to run under an unprivileged account.
          o Fixes for security advisory CVE-2012-5530: tmpfile flaws;
            (bnc#782967).
          o Fix pcp(1) command short-form pmlogger reporting.
          o Fix pmdalogger error handling for directory files.
          o Fix pmstat handling of odd corner case in CPU metrics.
          o Correct the python ctype used for pmAtomValue 32bit ints.
          o Add missing RPM spec dependency for python-ctypes.
          o Corrections to pmdamysql metrics units.
          o Add pmdamysql slave status metrics.
          o Improve pmcollectl error messages.
          o Parameterize pmcollectl CPU counts in interrupt subsys.
          o Fix generic RPM packaging for powerpc builds.
          o Fix python API use of reentrant libpcp string routines.
          o Python code backporting for RHEL5 in qa and pmcollectl.
          o Fix edge cases in capturing interrupt error counts.
    * 

      Update to pcp-3.6.9.

          o Python wrapper for the pmimport API
          o Make sar2pcp work with the sysstat versions from RHEL5, RHEL6,
            and all recent Fedora versions (which is almost all current
            versions of sysstat verified).
          o Added a number of additional metrics into the importer for
            people starting to use it to analyse sar data from real
            customer incidents.
          o Rework use of C99 'restrict' keyword in pmdalogger (Debian bug:
            689552)
          o Alot of work on the PCP QA suite, special thanks to Tomas
            Dohnalek for all his efforts there.
          o Win32 build updates
          o Add 'raw' disk active metrics so that existing tools like
            iostat can be emulated
          o Allow sar2pcp to accept XML input directly (.xml suffix),
            allowing it to not have to run on the same platform as the
            sadc/sadf that originally generated it.
          o Add PMI error codes into the PCP::LogImport perl module.
          o Fix a typo in pmiUnits man page synopsis section
          o Resolve pmdalinux ordering issue in NUMA/CPU indom setup
            (Redhat bug: 858384)
          o Remove unused pmcollectl imports (Redhat bug: 863210)
          o Allow event traces to be used in libpcp interpolate mode
    * 

      Update to pcp-3.6.8.

          o Corrects the disk/partition identification for the MMC driver,
            which makes disk indom handling correct on the Raspberry Pi
            (http://www.raspberrypi.org/)
          o Several minor/basic fixes for pmdaoracle.
          o Improve pmcollectl compatibility.
          o Make a few clarifications to pmcollectl.1.
          o Improve python API test coverage.
          o Numerous updates to the test suite in general.
          o Allow pmda Install scripts to specify own dso name again.
          o Reconcile spec file differences between PCP flavours.
          o Fix handling of multiple contexts with a remote namespace.
          o Core socket interface abstractions to support NSS (later).
          o Fix man page SYNOPSIS section for pmUnpackEventRecords.
          o Add --disable-shared build option for static builds.
    * 

      Update to pcp-3.6.6.

          o Added the python PMAPI bindings and an initial python client in
            pmcollectl. Separate, new package exists for python libs for
            those platforms that split out packages (rpm, deb).
          o Added a pcp-testsuite package for those platforms that might
            want this (rpm, deb again, mainly)
          o Re-introduced the pcp/qa subdirectory in pcp and deprecated the
            external pcpqa git tree.
          o Fix potential buffer overflow in pmlogger host name handling.
          o Reworked the configure --prefix handling to be more like the
            rest of the open source world.
          o Ensure the __pmDecodeText ident parameter is always set
            Resolves Red Hat bugzilla bug #841306.

Security Issue references:

    * CVE-2012-3418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418&gt;
    * CVE-2012-3419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419&gt;
    * CVE-2012-3420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420&gt;
    * CVE-2012-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-07"/>
	<updated date="2013-01-07"/>
	<bugzilla href="https://bugzilla.suse.com/732763">SUSE bug 732763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775010">SUSE bug 775010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775011">SUSE bug 775011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775013">SUSE bug 775013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782967">SUSE bug 782967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566116" comment="permissions-2013.1.7-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37724" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566117" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566118" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566119" comment="libpixman-1-0-devel-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37725" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="806793" ref_url="https://bugzilla.suse.com/806793" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>

This update of poppler fixes the following vulnerabilities:

    * CVE-2013-1788: Various invalid memory issues could be used by
      attackers supplying PDFs to crash the PDF viewer or potentially
      execute code.
    * CVE-2013-1789: A crash in poppler could be used by attackers
      providing PDFs to crash the PDF viewer.
    * CVE-2013-1790: An uninitialized memory read could be used by
      attackers providing PDFs to crash the PDF viewer.

Security Issue references:

    * CVE-2013-1788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788&gt;
    * CVE-2013-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789&gt;
    * CVE-2013-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-26"/>
	<updated date="2013-03-26"/>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566120" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566121" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566122" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563015" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37726" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could have 
allowed remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

Security Issue reference:

    * CVE-2012-4505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566123" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566124" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566125" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566126" comment="libproxy0-config-gnome-32bit-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566127" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566128" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566129" comment="libproxy0-networkmanager-32bit-0.3.1-2.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37727" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="719988" ref_url="https://bugzilla.suse.com/719988" source="BUGZILLA"/>
		<reference ref_id="734733" ref_url="https://bugzilla.suse.com/734733" source="BUGZILLA"/>
		<reference ref_id="741480" ref_url="https://bugzilla.suse.com/741480" source="BUGZILLA"/>
		<reference ref_id="744510" ref_url="https://bugzilla.suse.com/744510" source="BUGZILLA"/>
		<reference ref_id="757602" ref_url="https://bugzilla.suse.com/757602" source="BUGZILLA"/>
		<reference ref_id="758565" ref_url="https://bugzilla.suse.com/758565" source="BUGZILLA"/>
		<reference ref_id="759172" ref_url="https://bugzilla.suse.com/759172" source="BUGZILLA"/>
		<reference ref_id="759180" ref_url="https://bugzilla.suse.com/759180" source="BUGZILLA"/>
		<reference ref_id="760019" ref_url="https://bugzilla.suse.com/760019" source="BUGZILLA"/>
		<reference ref_id="760997" ref_url="https://bugzilla.suse.com/760997" source="BUGZILLA"/>
		<reference ref_id="768027" ref_url="https://bugzilla.suse.com/768027" source="BUGZILLA"/>
		<reference ref_id="770708" ref_url="https://bugzilla.suse.com/770708" source="BUGZILLA"/>
		<reference ref_id="772094" ref_url="https://bugzilla.suse.com/772094" source="BUGZILLA"/>
		<reference ref_id="773048" ref_url="https://bugzilla.suse.com/773048" source="BUGZILLA"/>
		<reference ref_id="773061" ref_url="https://bugzilla.suse.com/773061" source="BUGZILLA"/>
		<reference ref_id="773515" ref_url="https://bugzilla.suse.com/773515" source="BUGZILLA"/>
		<reference ref_id="774167" ref_url="https://bugzilla.suse.com/774167" source="BUGZILLA"/>
		<reference ref_id="774681" ref_url="https://bugzilla.suse.com/774681" source="BUGZILLA"/>
		<reference ref_id="774921" ref_url="https://bugzilla.suse.com/774921" source="BUGZILLA"/>
		<reference ref_id="775899" ref_url="https://bugzilla.suse.com/775899" source="BUGZILLA"/>
		<reference ref_id="775906" ref_url="https://bugzilla.suse.com/775906" source="BUGZILLA"/>
		<reference ref_id="777181" ref_url="https://bugzilla.suse.com/777181" source="BUGZILLA"/>
		<reference ref_id="778669" ref_url="https://bugzilla.suse.com/778669" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4233" ref_url="https://www.suse.com/security/cve/CVE-2012-4233/" source="CVE"/>
		<description>

LibreOffice was updated to SUSE 3.5 bugfix release 13 (based on upstream 
3.5.6-rc2) which fixes a lot of bugs.

The following bugs have been fixed:

    * polygon fill rule (bnc#759172)
    * open XML in Writer (bnc#777181)
    * undo in text objects (fdo#36138)
    * broken numbering level (bnc#760019)
    * better MathML detection (bnc#774921)
    * pictures in DOCX import (bnc#772094)
    * collapsing border painting (fdo#39415)
    * better DOCX text box export (fdo#45724)
    * hidden text in PPTX import (bnc#759180)
    * slide notes in PPTX import (bnc#768027)
    * RTL paragraphs in DOC import (fdo#43398)
    * better vertical text imports (bnc#744510)
    * HYPERLINK field in DOCX import (fdo#51034)
    * shadow color on partial redraw (bnc#773515)
    * floating objects in DOCX import (bnc#775899)
    * graphite2 hyphenation regression (fdo#49486)
    * missing shape position and size (bnc#760997)
    * page style attributes in ODF import (fdo#38056)
    * browsing in Template dialog crasher (fdo#46249)
    * wrong master slide shape being used (bnc#758565)
    * page borders regression in ODT import (fdo#38056)
    * invalidate bound rect after drag&amp;drop (fdo#44534)
    * rotated shape margins in PPTX import (bnc#773048)
    * pasting into more than 1 sheet crasher (fdo#47311)
    * crashers in PPT/PPTX import (bnc#768027, bnc#774167
    * missing footnote in DOCX/DOC/RTF export (fdo#46020)
    * checkbox no-label behaviour (fdo#51336, bnc#757602)
    * try somewhat harder to read w:position (bnc#773061)
    * FormatNumber can handle sal_uInt32 values (fdo#51793)
    * rectangle-paragraph tables in DOCX import (bnc#775899)
    * header and bullet in slideshow transition (bnc#759172)
    * default background color in DOC/DOCX export (fdo#45724)
    * font name / size attributes in DOCX import (bnc#774681)
    * zero rect. size causing wrong line positions (fdo#47434)
    * adjusted display of Bracket/BracePair in PPT (bnc#741480)
    * use Unicode functions for QuickStarter tooltip (fdo#52143)
    * TabRatio API and detect macro at group shape fixes (bnc#770708)
    * indented text in DOCX file does not wrap correctly (bnc#775906)
    * undocked toolbars do not show all icons in special ratio (fdo#47071)
    * cross-reference text when Caption order is Numbering first
      (fdo#50801)
    * bullet color same as following text by default (bnc#719988,
      bnc#734733)
    * misc RTF import fixes (rhbz#819304, fdo#49666, bnc#774681, fdo#51772,
      fdo#48033, fdo#52066, fdo#48335, fdo#48446, fdo#49892, fdo#46966)
    * libvisio was updated to 0.0.19:
    * file displays as blank page in Draw (fdo#50990)
    * Use the vendor SUSE instead of Novell, Inc.
    * Some NULL pointer dereferences were fixed. (CVE-2012-4233)

Security Issue reference:

    * CVE-2012-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4233&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-10"/>
	<updated date="2012-09-10"/>
	<bugzilla href="https://bugzilla.suse.com/719988">SUSE bug 719988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734733">SUSE bug 734733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741480">SUSE bug 741480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744510">SUSE bug 744510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757602">SUSE bug 757602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758565">SUSE bug 758565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759172">SUSE bug 759172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759180">SUSE bug 759180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760019">SUSE bug 760019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760997">SUSE bug 760997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768027">SUSE bug 768027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770708">SUSE bug 770708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772094">SUSE bug 772094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773048">SUSE bug 773048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773061">SUSE bug 773061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773515">SUSE bug 773515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774167">SUSE bug 774167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774681">SUSE bug 774681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774921">SUSE bug 774921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775899">SUSE bug 775899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775906">SUSE bug 775906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777181">SUSE bug 777181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778669">SUSE bug 778669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4233/">CVE-2012-4233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563017" comment="libreoffice-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563018" comment="libreoffice-base-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563019" comment="libreoffice-base-drivers-postgresql-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563020" comment="libreoffice-base-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563022" comment="libreoffice-calc-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563023" comment="libreoffice-calc-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563024" comment="libreoffice-draw-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563025" comment="libreoffice-draw-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563026" comment="libreoffice-filters-optional-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563027" comment="libreoffice-gnome-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563028" comment="libreoffice-help-cs-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563029" comment="libreoffice-help-da-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563030" comment="libreoffice-help-de-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563031" comment="libreoffice-help-en-GB-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563032" comment="libreoffice-help-en-US-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563033" comment="libreoffice-help-es-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563034" comment="libreoffice-help-fr-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563035" comment="libreoffice-help-gu-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563036" comment="libreoffice-help-hi-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563037" comment="libreoffice-help-hu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563038" comment="libreoffice-help-it-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563039" comment="libreoffice-help-ja-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563040" comment="libreoffice-help-ko-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563041" comment="libreoffice-help-nl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563042" comment="libreoffice-help-pl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563043" comment="libreoffice-help-pt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563044" comment="libreoffice-help-pt-BR-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563045" comment="libreoffice-help-ru-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563046" comment="libreoffice-help-sv-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563047" comment="libreoffice-help-zh-CN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563048" comment="libreoffice-help-zh-TW-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563049" comment="libreoffice-icon-themes-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563050" comment="libreoffice-impress-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563051" comment="libreoffice-impress-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563052" comment="libreoffice-kde-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563053" comment="libreoffice-kde4-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563054" comment="libreoffice-l10n-af-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563055" comment="libreoffice-l10n-ar-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563056" comment="libreoffice-l10n-ca-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563057" comment="libreoffice-l10n-cs-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563058" comment="libreoffice-l10n-da-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563059" comment="libreoffice-l10n-de-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563061" comment="libreoffice-l10n-en-GB-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563062" comment="libreoffice-l10n-es-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563063" comment="libreoffice-l10n-fi-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563064" comment="libreoffice-l10n-fr-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563065" comment="libreoffice-l10n-gu-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563066" comment="libreoffice-l10n-hi-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563067" comment="libreoffice-l10n-hu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563068" comment="libreoffice-l10n-it-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563069" comment="libreoffice-l10n-ja-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563070" comment="libreoffice-l10n-ko-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563071" comment="libreoffice-l10n-nb-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563072" comment="libreoffice-l10n-nl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563073" comment="libreoffice-l10n-nn-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563074" comment="libreoffice-l10n-pl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563076" comment="libreoffice-l10n-pt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563077" comment="libreoffice-l10n-pt-BR-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563078" comment="libreoffice-l10n-ru-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563079" comment="libreoffice-l10n-sk-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563080" comment="libreoffice-l10n-sv-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563081" comment="libreoffice-l10n-xh-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563082" comment="libreoffice-l10n-zh-CN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563083" comment="libreoffice-l10n-zh-TW-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563084" comment="libreoffice-l10n-zu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563085" comment="libreoffice-mailmerge-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563086" comment="libreoffice-math-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563087" comment="libreoffice-mono-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563088" comment="libreoffice-officebean-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563089" comment="libreoffice-pyuno-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563091" comment="libreoffice-writer-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563092" comment="libreoffice-writer-extensions-3.5.4.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37728" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="789827" ref_url="https://bugzilla.suse.com/789827" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4562" ref_url="https://www.suse.com/security/cve/CVE-2012-4562/" source="CVE"/>
		<description>

This update of libssh fixes multiple integer overflows. CVE-2012-4562 has 
been assigned to this issue.

Security Issue reference:

    * CVE-2012-4562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-20"/>
	<updated date="2012-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4562/">CVE-2012-4562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566130" comment="libssh2-0.2-5.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37729" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37730" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="817008" ref_url="https://bugzilla.suse.com/817008" source="BUGZILLA"/>
		<reference ref_id="838638" ref_url="https://bugzilla.suse.com/838638" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<description>

This libvirt update fixes a security issue.

    * bnc#838638: CVE-2013-4296: EMBARGOED: libvirt: Fix crash in
      remoteDispatchDomainMemoryStats
    * bnc#817008: Regression: vm-install fails to display on SLES 11 SP2
      UV2000

Security Issue reference:

    * CVE-2013-4296
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-23"/>
	<updated date="2013-09-23"/>
	<bugzilla href="https://bugzilla.suse.com/817008">SUSE bug 817008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566133" comment="libvirt-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566134" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566135" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566136" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566137" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37731" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="772586" ref_url="https://bugzilla.suse.com/772586" source="BUGZILLA"/>
		<reference ref_id="773621" ref_url="https://bugzilla.suse.com/773621" source="BUGZILLA"/>
		<reference ref_id="773626" ref_url="https://bugzilla.suse.com/773626" source="BUGZILLA"/>
		<reference ref_id="780432" ref_url="https://bugzilla.suse.com/780432" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

libvirt received security and bugfixes:

    * CVE-2012-4423: Fixed a libvirt remote denial of service (crash)
      problem.

The following bugs have been fixed:

    * qemu: Fix probing for guest capabilities
    * xen-xm: Generate UUID if not specified
    * xenParseXM: don't dereference NULL pointer when script is empty

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/772586">SUSE bug 772586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773621">SUSE bug 773621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773626">SUSE bug 773626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780432">SUSE bug 780432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37732" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in libxml2. CVE-2013-2877 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-2877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-06"/>
	<updated date="2014-01-06"/>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566143" comment="libxml2-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566144" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566145" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37733" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37734" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566148" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566149" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566150" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566151" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566152" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566153" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566154" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37735" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566155" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566156" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566159" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566160" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566161" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37736" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS has been updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was abused to create man in 
the middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566162" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566163" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566164" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566165" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566166" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37737" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSH</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="755505" ref_url="https://bugzilla.suse.com/755505" source="BUGZILLA"/>
		<reference ref_id="802639" ref_url="https://bugzilla.suse.com/802639" source="BUGZILLA"/>
		<reference ref_id="821039" ref_url="https://bugzilla.suse.com/821039" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<description>

This update for OpenSSH provides the following fixes:

    * Implement remote denial of service hardening. (bnc#802639,
      CVE-2010-5107)
    * Use only FIPS 140-2 approved algorithms when FIPS mode is detected.
      (bnc#755505, bnc#821039)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)

Security Issue reference:

    * CVE-2010-5107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-16"/>
	<updated date="2013-07-16"/>
	<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821039">SUSE bug 821039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566167" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566168" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37738" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

openssl-certs was updated with the current certificate data available from 
mozilla.org.

Changes:

    * Updated certificates to revision 1.95
    * Distrust a sub-ca that issued google.com certificates. 'Distrusted AC
      DG Tresor SSL' (bnc#854367)

Many CA updates from Mozilla:

    * new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt server
      auth, code signing, email signing
    * new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt server
      auth, code signing, email signing
    * new:
      China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt
      server auth
    * changed:
      Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt removed
      code signing and server auth abilities
    * changed:
      Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt
      removed code signing and server auth abilities
    * new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt server auth
    * new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt server auth
    * removed:
      Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.185.102.crt
    * new: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.crt
    * removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt
    * new: PSCProcert:2.1.11.crt server auth, code signing, email signing
    * new:
      Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt
      server auth, code signing, email signing
    * new:
      Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt
      server auth, code signing
    * changed:
      TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt
      removed all abilities
    * new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt
      server auth, code signing
    * changed: TWCA_Root_Certification_Authority:2.1.1.crt added code
      signing ability
    * new 'EE Certification Centre Root CA'
    * new 'T-TeleSec GlobalRoot Class 3'
    * revoke mis-issued intermediate CAs from TURKTRUST.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37739" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-31"/>
	<updated date="2013-10-31"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566170" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37740" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="789994" ref_url="https://bugzilla.suse.com/789994" source="BUGZILLA"/>
		<reference ref_id="796014" ref_url="https://bugzilla.suse.com/796014" source="BUGZILLA"/>
		<reference ref_id="797060" ref_url="https://bugzilla.suse.com/797060" source="BUGZILLA"/>
		<reference ref_id="804415" ref_url="https://bugzilla.suse.com/804415" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>

This update of Perl 5 fixes the following security issues:

    * fix rehash DoS [bnc#804415] [CVE-2013-1667]
    * improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
    * fix glob denial of service [bnc#796014] [CVE-2011-2728]
    * sanitize input in Maketext.pm [bnc#797060] [CVE-2012-6329]

Security Issue references:

    * CVE-2013-1667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566171" comment="perl-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566172" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566173" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566174" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37741" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>

PostgreSQL has been updated to version 8.3.23 which fixes various bugs and 
one security issue.

The security issue fixed in this release, CVE-2013-0255, allowed a 
previously authenticated user to crash the server by calling an internal 
function with invalid arguments. This issue was discovered by independent 
security researcher Sumit Soni this week and reported via Secunia SVCRP, 
and we are grateful for their efforts in making PostgreSQL more secure.

More information can be found at

http://www.postgresql.org/about/news/1446/
&lt;http://www.postgresql.org/about/news/1446/&gt;

Security Issue reference:

    * CVE-2013-0255
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-13"/>
	<updated date="2013-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566175" comment="postgresql-8.3.23-0.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37742" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="835122" ref_url="https://bugzilla.suse.com/835122" source="BUGZILLA"/>
		<reference ref_id="853982" ref_url="https://bugzilla.suse.com/853982" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<description>

This update for puppet fixes a remote code execution vulnerability in the 
'resource_type' service. (CVE-2013-4761)

Additionally, the update prevents puppet from executing initialization 
scripts that could trigger a system reboot when handling 'puppet resource 
service' calls.

Security Issue reference:

    * CVE-2013-4761
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-20"/>
	<updated date="2014-01-20"/>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853982">SUSE bug 853982</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566176" comment="puppet-2.6.18-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37743" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566177" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566179" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566180" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566182" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566183" comment="python-devel-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566184" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37744" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * CVE-2013-4164: heap overflow in float point parsing

Security Issue references:

    * CVE-2013-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164&gt;
    * CVE-2009-0689
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566185" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37745" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="833278" ref_url="https://bugzilla.suse.com/833278" source="BUGZILLA"/>
		<reference ref_id="840826" ref_url="https://bugzilla.suse.com/840826" source="BUGZILLA"/>
		<reference ref_id="847506" ref_url="https://bugzilla.suse.com/847506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<description>

This strongswan update fixes security issues and bugs:

    * CVE-2013-5018: Specially crafted XAuth usernames and EAP identities
      can cause a crash in strongswan.
    * CVE-2013-6075: A crafted ID packet can be used by remote attackers to
      crash the server or potentially gain authentication privileges under
      certain circumstances.

Also a bug with route recursion limits was fixed:

    * Charon SEGFAULT when left=%any / recursion limit. (bnc#840826)

Security Issues:

    * CVE-2013-5018
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840826">SUSE bug 840826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566186" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566187" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37746" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="806919" ref_url="https://bugzilla.suse.com/806919" source="BUGZILLA"/>
		<reference ref_id="806921" ref_url="https://bugzilla.suse.com/806921" source="BUGZILLA"/>
		<reference ref_id="817349" ref_url="https://bugzilla.suse.com/817349" source="BUGZILLA"/>
		<reference ref_id="817350" ref_url="https://bugzilla.suse.com/817350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<description>

This update fixes the following security issues which allowed to bypass the 
sudo authentication: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776 and 
CVE-2013-2777.

Security Issue references:

    * CVE-2013-1775
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775&gt;
    * CVE-2013-1776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776&gt;
    * CVE-2013-2776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776&gt;
    * CVE-2013-2777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-30"/>
	<updated date="2013-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566188" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37747" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-gabble</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="807449" ref_url="https://bugzilla.suse.com/807449" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1769" ref_url="https://www.suse.com/security/cve/CVE-2013-1769/" source="CVE"/>
		<description>

telepathy-gabble was updated to fix several remotely-triggerable NULL 
crashes (CVE-2013-1769)

Security Issues:

    * CVE-2013-1769
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-15"/>
	<updated date="2013-03-15"/>
	<bugzilla href="https://bugzilla.suse.com/807449">SUSE bug 807449</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1769/">CVE-2013-1769</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563167" comment="telepathy-gabble-0.7.10-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37748" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-idle</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="817120" ref_url="https://bugzilla.suse.com/817120" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>

Telepathy-idle did not check SSL certificates. CVE-2007-6746 was assigned 
to this issue.

Security Issue reference:

    * CVE-2007-6746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-15"/>
	<updated date="2013-08-15"/>
	<bugzilla href="https://bugzilla.suse.com/817120">SUSE bug 817120</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566189" comment="telepathy-idle-0.1.5-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37749" version="1" class="patch">
	<metadata>
		<title>Security update for usbmuxd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="742546" ref_url="https://bugzilla.suse.com/742546" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0065" ref_url="https://www.suse.com/security/cve/CVE-2012-0065/" source="CVE"/>
		<description>

This update of usbmuxd fixes a heap-based buffer overflow which could be 
triggered via an overly long 'SerialNumber' field (CVE-2012-0065).

Security Issue reference:

    * CVE-2012-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0065&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-23"/>
	<updated date="2012-02-23"/>
	<bugzilla href="https://bugzilla.suse.com/742546">SUSE bug 742546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0065/">CVE-2012-0065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566190" comment="usbmuxd-1.0.7-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37750" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566191" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566192" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37751" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<description>

wireshark was updated to security update version 1.8.12, fixing bugs and 
security issues.

    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html&gt;

Security Issue references:

    * CVE-2013-7112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112&gt;
    * CVE-2013-7113
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113&gt;
    * CVE-2013-7114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-27"/>
	<updated date="2013-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563168" comment="wireshark-1.8.12-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37752" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="793927" ref_url="https://bugzilla.suse.com/793927" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797014" ref_url="https://bugzilla.suse.com/797014" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="798188" ref_url="https://bugzilla.suse.com/798188" source="BUGZILLA"/>
		<reference ref_id="799694" ref_url="https://bugzilla.suse.com/799694" source="BUGZILLA"/>
		<reference ref_id="800156" ref_url="https://bugzilla.suse.com/800156" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="802690" ref_url="https://bugzilla.suse.com/802690" source="BUGZILLA"/>
		<reference ref_id="805094" ref_url="https://bugzilla.suse.com/805094" source="BUGZILLA"/>
		<reference ref_id="806736" ref_url="https://bugzilla.suse.com/806736" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<description>

XEN has been updated to fix various bugs and security issues:

    * 

      CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the
      Xen AMD IOMMU code by default choose to use a single interrupt
      remapping table for the whole system. This sharing implied that any
      guest with a passed through PCI device that is bus mastering capable
      can inject interrupts into other guests, including domain 0. This has
      been disabled for AMD chipsets not capable of it.

    * 

      CVE-2012-6075: qemu: The e1000 had overflows under some conditions,
      potentially corrupting memory.

    * 

      CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT
      (debug build only)

    * 

      CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation
      flaw was fixed.

Also the following bugs have been fixed:

    * bnc#805094 - xen hot plug attach/detach fails
    * bnc#802690 - domain locking can prevent a live migration from
      completing
    * bnc#797014 - no way to control live migrations
          o fix logic error in stdiostream_progress
          o restore logging in xc_save
          o add options to control migration tunables
    * bnc#806736: enabling xentrace crashes hypervisor
    * Upstream patches from Jan 26287-sched-credit-pick-idle.patch
      26501-VMX-simplify-CR0-update.patch
      26502-VMX-disable-SMEP-when-not-paging.patch
      26516-ACPI-parse-table-retval.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch
      (Replaces CVE-2013-0153-xsa36.patch)
      26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces
      CVE-2013-0153-xsa36.patch)
      26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
      26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
      CVE-2013-0153-xsa36.patch)
    * bnc#798188 - Add $network to xend initscript dependencies
    * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update
      Fixed with update to Xen version 4.1.4
    * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN
      kernel
    * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch
      26427-x86-AMD-enable-WC+.patch
    * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start
    * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch
      26333-x86-get_page_type-assert.patch (Replaces
      CVE-2013-0154-xsa37.patch)
      26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
      CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch
    * Update to Xen 4.1.4 c/s 23432
    * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid
      spurious build failures
    * Upstream patches from Jan 26179-PCI-find-next-cap.patch
      26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch
      26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch
      26229-gnttab-version-switch.patch (Replaces
      CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch
      (Replaces CVE-2012-5511-xsa27.patch)
      26231-memory-exchange-checks.patch (Replaces
      CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch
      (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
      (Replaces CVE-2012-5515-xsa31.patch)
      26235-IOMMU-ATS-max-queue-depth.patch
      26272-x86-EFI-makefile-cflags-filter.patch
      26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch
    * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI
      Makefile to do additional filtering.

Security Issue references:

    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-13"/>
	<updated date="2013-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/793927">SUSE bug 793927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797014">SUSE bug 797014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798188">SUSE bug 798188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799694">SUSE bug 799694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800156">SUSE bug 800156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802690">SUSE bug 802690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805094">SUSE bug 805094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806736">SUSE bug 806736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37753" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="764982" ref_url="https://bugzilla.suse.com/764982" source="BUGZILLA"/>
		<reference ref_id="766283" ref_url="https://bugzilla.suse.com/766283" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="773955" ref_url="https://bugzilla.suse.com/773955" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN has been fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * 

      vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

    * 

      virt-manager - SLE11-SP2 ONLY

    * bnc#764982 - virt-manager fails to start after upgrade to SLES11 SP2
      from SLES10

Security Issue reference:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-05"/>
	<updated date="2012-08-05"/>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764982">SUSE bug 764982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766283">SUSE bug 766283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37754" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="776300" ref_url="https://bugzilla.suse.com/776300" source="BUGZILLA"/>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777086" ref_url="https://bugzilla.suse.com/777086" source="BUGZILLA"/>
		<reference ref_id="777088" ref_url="https://bugzilla.suse.com/777088" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

XEN was updated 4.1.3 to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3495: xen: hypercall physdev_get_free_pirq vulnerability
      (XSA-13)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3498: xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

The following related bugs in vm-install 0.5.12 have been fixed:

    * bnc#776300 - vm-install does not pass --extra-args in --upgrade
    * Add for support Open Enterprise Server 11
    * Add support for Windows 8 and Windows Server 2012
    * Add support for Ubuntu 12 (Precise Pangolin)

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776300">SUSE bug 776300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566219" comment="vm-install-0.5.12-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37755" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="778105" ref_url="https://bugzilla.suse.com/778105" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="784087" ref_url="https://bugzilla.suse.com/784087" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786518" ref_url="https://bugzilla.suse.com/786518" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN was updated to fix various bugs and security issues:

The following security issues have been fixed:

    * CVE-2012-4544: xen: Domain builder Out-of-memory due to malicious
      kernel/ramdisk (XSA 25)
    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA 20)
    * CVE-2012-4536: xen: pirq range check DoS vulnerability (XSA 21)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA 22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA 23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA 24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Also the following bugs have been fixed and upstream patches have been 
applied:

    * 

      bnc#784087 - L3: Xen BUG at io_apic.c:129
      26102-x86-IOAPIC-legacy-not-first.patch

    * 

      Upstream patches merged:
      26054-x86-AMD-perf-ctr-init.patch
      26055-x86-oprof-hvm-mode.patch
      26056-page-alloc-flush-filter.patch
      26061-x86-oprof-counter-range.patch
      26062-ACPI-ERST-move-data.patch
      26063-x86-HPET-affinity-lock.patch
      26093-HVM-PoD-grant-mem-type.patch
      25931-x86-domctl-iomem-mapping-checks.patch
      25952-x86-MMIO-remap-permissions.patch
      25808-domain_create-return-value.patch
      25814-x86_64-set-debugreg-guest.patch
      25815-x86-PoD-no-bug-in-non-translated.patch
      25816-x86-hvm-map-pirq-range-check.patch
      25833-32on64-bogus-pt_base-adjust.patch
      25834-x86-S3-MSI-resume.patch
      25835-adjust-rcu-lock-domain.patch
      25836-VT-d-S3-MSI-resume.patch
      25850-tmem-xsa-15-1.patch
      25851-tmem-xsa-15-2.patch
      25852-tmem-xsa-15-3.patch
      25853-tmem-xsa-15-4.patch
      25854-tmem-xsa-15-5.patch
      25855-tmem-xsa-15-6.patch
      25856-tmem-xsa-15-7.patch
      25857-tmem-xsa-15-8.patch
      25858-tmem-xsa-15-9.patch
      25859-tmem-missing-break.patch
      25860-tmem-cleanup.patch
      25883-pt-MSI-cleanup.patch
      25927-x86-domctl-ioport-mapping-range.patch
      25929-tmem-restore-pool-version.patch

    * 

      bnc#778105 - first XEN-PV VM fails to spawn
      xend: Increase wait time for disk to appear in host bootloader
      Modified existing xen-domUloader.diff

      25752-ACPI-pm-op-valid-cpu.patch
      25754-x86-PoD-early-access.patch
      25755-x86-PoD-types.patch
      25756-x86-MMIO-max-mapped-pfn.patch

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778105">SUSE bug 778105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784087">SUSE bug 784087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37756" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="809662" ref_url="https://bugzilla.suse.com/809662" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="814709" ref_url="https://bugzilla.suse.com/814709" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<description>

XEN has been updated to 4.1.5 c/s 23509 to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2013-1918: Certain page table manipulation operations in Xen
      4.1.x, 4.2.x, and earlier were not preemptible, which allowed local
      PV kernels to cause a denial of service via vectors related to deep
      page table traversal.

    * 

      CVE-2013-1952: Xen 4.x, when using Intel VT-d for a bus mastering
      capable PCI device, did not properly check the source when accessing
      a bridge devices interrupt remapping table entries for MSI
      interrupts, which allowed local guest domains to cause a denial of
      service (interrupt injection) via unspecified vectors.

    * 

      CVE-2013-2076: A information leak in the XSAVE/XRSTOR instructions
      could be used to determine state of floating point operations in
      other domains.

    * 

      CVE-2013-2077: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XRSTOR, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2078: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XSETBV, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2072: Systems which allow untrusted administrators to
      configure guest vcpu affinity may be exploited to trigger a buffer
      overrun and corrupt memory.

    * 

      CVE-2013-1917: Xen 3.1 through 4.x, when running 64-bit hosts on
      Intel CPUs, did not clear the NT flag when using an IRET after a
      SYSENTER instruction, which allowed PV guest users to cause a denial
      of service (hypervisor crash) by triggering a #GP fault, which is not
      properly handled by another IRET instruction.

    * 

      CVE-2013-1919: Xen 4.2.x and 4.1.x did not properly restrict access
      to IRQs, which allowed local stub domain clients to gain access to
      IRQs and cause a denial of service via vectors related to
      'passed-through IRQs or PCI devices.'

    * 

      CVE-2013-1920: Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is
      running 'under memory pressure' and the Xen Security Module (XSM) is
      enabled, used the wrong ordering of operations when extending the
      per-domain event channel tracking table, which caused a
      use-after-free and allowed local guest kernels to inject arbitrary
      events and gain privileges via unspecified vectors.

    * 

      CVE-2013-1964: Xen 4.0.x and 4.1.x incorrectly released a grant
      reference when releasing a non-v1, non-transitive grant, which
      allowed local guest administrators to cause a denial of service (host
      crash), obtain sensitive information, or possible have other impacts
      via unspecified vectors.

Bugfixes:

    * 

      Upstream patches from Jan
      26956-x86-mm-preemptible-cleanup.patch
      27071-x86-IO-APIC-fix-guest-RTE-write-corner-cases.patch
      27072-x86-shadow-fix-off-by-one-in-MMIO-permission-check.patch
      27079-fix-XSA-46-regression-with-xend-xm.patch
      27083-AMD-iommu-SR56x0-Erratum-64-Reset-all-head-tail-pointers.patch

    * 

      Update to Xen 4.1.5 c/s 23509
      There were many xen.spec file patches dropped as now being included
      in the 4.1.5 tarball.

    * 

      bnc#809662 - can't use pv-grub to start domU (pygrub does work)
      xen.spec

    * 

      Upstream patches from Jan
      26702-powernow-add-fixups-for-AMD-P-state-figures.patch
      26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch
      26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch
      26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
      26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch
      26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
      26737-ACPI-APEI-Add-apei_exec_run_optional.patch
      26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch
      26743-VT-d-deal-with-5500-5520-X58-errata.patch
      26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch
      26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch
      26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
      26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch
      26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
      26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch
      26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch
      26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
      26851-iommu-crash-Interrupt-remapping-is-also-disabled-on-crash.patch

    * 

      bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on
      Kyoto
      xend-cpuinfo-model-name.patch

    * 

      Upstream patches from Jan
      26536-xenoprof-div-by-0.patch
      26578-AMD-IOMMU-replace-BUG_ON.patch
      26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch
      26659-AMD-IOMMU-erratum-746-workaround.patch
      26660-x86-fix-CMCI-injection.patch
      26672-vmx-fix-handling-of-NMI-VMEXIT.patch
      26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch
      26676-fix-compat-memory-exchange-op-splitting.patch
      26677-x86-make-certain-memory-sub-ops-return-valid-values.patch
      26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch
      26679-x86-defer-processing-events-on-the-NMI-exit-path.patch
      26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch
      26692-x86-MSI-fully-protect-MSI-X-table.patch

Security Issue references:

    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2078
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809662">SUSE bug 809662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814709">SUSE bug 814709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37757" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="803712" ref_url="https://bugzilla.suse.com/803712" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="823786" ref_url="https://bugzilla.suse.com/823786" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.1.6 which fixes various bugs and security 
issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies.
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling
      (CVE-2013-2194 CVE-2013-2195 CVE-2013-2196)

Various bugs have also been fixed:

    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage ,xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, xen
      hypervisor will panic on multiple blades nPar. (bnc#839600)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * migrate.py support of short options dropped by PTF (bnc#824676)
    * after live migration rcu_sched_state detected stalls add new option
      xm migrate --min_remaing (bnc#803712)
    * various upstream fixes have been included

Security Issue references:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/803712">SUSE bug 803712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823786">SUSE bug 823786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37758" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<description>

Xen has been updated to fix a security issue and a bug:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.

A non-security bug has also been fixed:

    * It is possible to start a VM twice on the same node (bnc#840997)

Security Issue references:

    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37759" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<description>

This update fixes the following security issue with xorg-x11-server:

    * bnc#853846: integer underflow when handling trapezoids
      (CVE-2013-6424)

Security Issue reference:

    * CVE-2013-6424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566269" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566270" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566271" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37760" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<description>

This update fixes a stack buffer overflow in xorg-x11 in the 
bdfReadCharacters() function. CVE-2013-6462 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2013-6462
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566272" comment="xorg-x11-devel-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566273" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566274" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37761" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues (bnc#815451, 
bnc#821664).

Security Issue references:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566277" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37762" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982)

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566278" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566279" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566280" comment="xorg-x11-libXext-devel-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37763" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566281" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566282" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566283" comment="xorg-x11-libXfixes-devel-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37764" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566284" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566285" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566286" comment="xorg-x11-libXp-devel-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37765" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566287" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566288" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566289" comment="xorg-x11-libXrender-devel-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37766" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566290" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566291" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566292" comment="xorg-x11-libXt-devel-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37767" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566293" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566294" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566295" comment="xorg-x11-libXv-devel-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37768" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following security issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issues:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566296" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566297" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566298" comment="xorg-x11-libxcb-devel-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37769" version="1" class="patch">
	<metadata>
		<title>Security update for zypper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="770630" ref_url="https://bugzilla.suse.com/770630" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420/" source="CVE"/>
		<description>

The following issue has been fixed:

    * The zypper setuid wrapper linked against libzypp. This is not needed
      and added unnecessary attack vectors. CVE-2012-0420 has been assigned
      to this issue.

Security Issue reference:

    * CVE-2012-0420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566299" comment="zypper-1.6.166-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566300" comment="zypper-log-1.6.166-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37770" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37771" version="1" class="patch">
	<metadata>
		<title>Security update for Image Magick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

ImageMagick has been updated to fix four security issues:

    * Crafted jpeg file could have lead to a Denial of Service
      (CVE-2014-8716).
    * Out-of-bounds memory access in resize code (CVE-2014-8354)
    * Out-of-bounds memory access in PCX parser (CVE-2014-8355).
    * Out-of-bounds memory error in DCM decode (CVE-2014-8562).

Security Issues:

    * CVE-2014-8716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716&gt;
    * CVE-2014-8355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355&gt;
    * CVE-2014-8354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354&gt;
    * CVE-2014-8562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566313" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566314" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566315" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566316" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566317" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37772" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37773" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566320" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566321" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37774" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37775" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This Mozilla Firefox and Mozilla NSS update to 24.5.0esr fixes the 
following several security and non-security issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to 3.16:

    * required for Firefox 29
    * CVE-2014-1492: In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37776" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.

The following vulnerabilities have been fixed:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37777" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37778" version="1" class="patch">
	<metadata>
		<title>Security update for a2ps</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="871097" ref_url="https://bugzilla.suse.com/871097" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>

The text to postscript converter a2ps received a security update.

The fixps script did not call ghostscript with the -DSAFER option, allowing 
command execution by attacker supplied postscript files.

Security Issue reference:

    * CVE-2014-0466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566349" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37779" version="1" class="patch">
	<metadata>
		<title>Security update for acroread</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843835" ref_url="https://bugzilla.suse.com/843835" source="BUGZILLA"/>
		<description>

Adobe has discontinued the support of Adobe Reader for Linux in June 2013.

Newer security problems and bugs are no longer fixed.

As the Adobe Reader is binary only software and we cannot provide a 
replacement, SUSE declares the acroread package of Adobe Reader as being 
out of support and unmaintained.

If you do not need Acrobat Reader, we recommend to uninstall the 'acroread' 
package.

This update removes the Acrobat Reader PDF plugin to avoid automatic 
exploitation by clicking on web pages with embedded PDFs.

The stand alone 'acroread' binary is still available, but again, we do not 
recommend to use it.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/843835">SUSE bug 843835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565848" comment="acroread-9.5.5-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565849" comment="acroread-cmaps-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565850" comment="acroread-fonts-ja-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565851" comment="acroread-fonts-ko-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565852" comment="acroread-fonts-zh_CN-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565853" comment="acroread-fonts-zh_TW-9.4.6-0.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37780" version="1" class="patch">
	<metadata>
		<title>Security update for augeas</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="853044" ref_url="https://bugzilla.suse.com/853044" source="BUGZILLA"/>
		<reference ref_id="871323" ref_url="https://bugzilla.suse.com/871323" source="BUGZILLA"/>
		<reference ref_id="876044" ref_url="https://bugzilla.suse.com/876044" source="BUGZILLA"/>
		<reference ref_id="885003" ref_url="https://bugzilla.suse.com/885003" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>

Augeas has been updated to fix a symlink overwrite problem (CVE-2012-0786, 
CVE-2013-6412).

Also a bug has been fixed where 'augtool -s set was failing' (bnc#876044)

Additionally parsing the multipath configuration has been fixed. bnc#871323

Security Issues:

    * CVE-2012-0786
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786&gt;
    * CVE-2013-6412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-30"/>
	<updated date="2014-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871323">SUSE bug 871323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876044">SUSE bug 876044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566350" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37781" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566351" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37782" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

The command-line shell 'bash' evaluates environment variables, which allows 
the injection of characters and might be used to access files on the system 
in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed 
vulnerability tracked under CVE-2014-6271 and is less serious due to the 
special, non-default system configuration that is needed to create an 
exploitable situation.

To remove further exploitation potential we now limit the 
function-in-environment variable to variables prefixed with BASH_FUNC_. 
This hardening feature is work in progress and might be improved in later 
updates.

Additionally, two other security issues have been fixed:

    * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
    * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

    * CVE-2014-7169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169&gt;
    * CVE-2014-7186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186&gt;
    * CVE-2014-7187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566352" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566353" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563235" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566354" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566355" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37783" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565855" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565856" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565857" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37784" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566356" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566357" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566358" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37785" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566359" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566360" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566361" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37786" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566362" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566363" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566364" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37787" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566365" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566366" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566367" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37788" version="1" class="patch">
	<metadata>
		<title>Security update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="902676" ref_url="https://bugzilla.suse.com/902676" source="BUGZILLA"/>
		<reference ref_id="902677" ref_url="https://bugzilla.suse.com/902677" source="BUGZILLA"/>
		<reference ref_id="903655" ref_url="https://bugzilla.suse.com/903655" source="BUGZILLA"/>
		<reference ref_id="905735" ref_url="https://bugzilla.suse.com/905735" source="BUGZILLA"/>
		<reference ref_id="905736" ref_url="https://bugzilla.suse.com/905736" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to fix eight security issues:

    * Lack of range checking leading to controlled write in
      _bfd_elf_setup_sections() (CVE-2014-8485).
    * Invalid read flaw in libbfd (CVE-2014-8484).
    * Write to uninitialized memory in the PE parser (CVE-2014-8501).
    * Crash in the PE parser (CVE-2014-8502).
    * Segfault in the ihex parser when it encounters a malformed ihex file
      (CVE-2014-8503).
    * Stack buffer overflow in srec_scan (CVE-2014-8504).
    * Out-of-bounds memory write while processing a crafted 'ar' archive
      (CVE-2014-8738).
    * Directory traversal vulnerability allowing random file
      deletion/creation (CVE-2014-8737).

Security Issues:

    * CVE-2014-8501
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501&gt;
    * CVE-2014-8502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502&gt;
    * CVE-2014-8503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503&gt;
    * CVE-2014-8504
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504&gt;
    * CVE-2014-8485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485&gt;
    * CVE-2014-8738
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738&gt;
    * CVE-2014-8484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484&gt;
    * CVE-2014-8737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37789" version="1" class="patch">
	<metadata>
		<title>Security update for cabextract</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="627753" ref_url="https://bugzilla.suse.com/627753" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<description>

cabextract was updated to fix two security issues:

    * CVE-2010-2800: A potential endless loop in decoding files.
    * CVE-2010-2801: Memory corruption due to integer overflows in buffer
      read handling.

Security Issues references:

    * CVE-2010-2800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800&gt;
    * CVE-2010-2801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-27"/>
	<updated date="2014-06-27"/>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566369" comment="cabextract-1.2-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37790" version="1" class="patch">
	<metadata>
		<title>Security update for cabextract (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<description>

This security update fixes the following issues:

- Fix possible infinite loop caused DoS (bsc919283, CVE-2014-9556)
- Fix zero dereference (bsc#934524, CVE-2014-9732)
- Fix off by one (bsc#934527, CVE-2015-4470)
- Fix buffer under-read crash (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-27"/>
	<updated date="2015-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37791" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<description>

OpenSSL was updated to fix several security issues:

    * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by
      rejecting connections with DH parameters shorter than 1024 bits.
      2048-bit DH parameters are now generated by default.
    * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
    * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
      was fixed.
    * Fixed a timing side channel in RSA decryption. (bsc#929678)

Additional changes:

    * In the default SSL cipher string EXPORT ciphers are now disabled.
      This will only get active if applications get rebuilt and actually
      use this string. (bsc#931698)

Security Issues:

    * CVE-2015-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789&gt;
    * CVE-2015-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790&gt;
    * CVE-2015-4000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-19"/>
	<updated date="2015-06-19"/>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566371" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37792" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566373" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37793" version="1" class="patch">
	<metadata>
		<title>Security update for compat-wireless, compat-wireless-debuginfo, compat-wireless-debugsource, compat-wireless-kmp-default, compat-wireless-kmp-pae, compat-wireless-kmp-trace, compat-wireless-kmp-xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="851021" ref_url="https://bugzilla.suse.com/851021" source="BUGZILLA"/>
		<reference ref_id="851426" ref_url="https://bugzilla.suse.com/851426" source="BUGZILLA"/>
		<reference ref_id="865475" ref_url="https://bugzilla.suse.com/865475" source="BUGZILLA"/>
		<reference ref_id="871148" ref_url="https://bugzilla.suse.com/871148" source="BUGZILLA"/>
		<reference ref_id="883209" ref_url="https://bugzilla.suse.com/883209" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672/" source="CVE"/>
		<description>

This update for the compat-wireless kernel modules provides many fixes and 
enhancements:

    * Fix potential crash problem in ath9k. (CVE-2014-2672, bnc#871148)
    * Fix improper updates of MAC addresses in ath9k_htc. (bnc#851426,
      CVE-2013-4579)
    * Fix stability issues in iwlwifi. (bnc#865475)
    * Improve support for Intel 7625 cards in iwlwifi. (bnc#51021)

Installation notes:

New driver modules may conflict with old modules, which are automatically 
loaded from the initrd file after reboot. To apply this maintenance update 
correctly, the following steps need to be executed on a SLEPOS system:

    * Rebuild image
    * Create specific scDistributionContainer with newly built initrd and
      kernel
    * Put the updated system image in it as a scPosImage object

Alternatively, you can use a kernel parameter to enforce using the kernel 
from the system image:

    * Rebuild image
    * Set the kernel parameter FORCE_KEXEC, by adding the scPxeFileTemplate
      object under the relevant scPosImage object, with the
      scKernelParameters attribute containing 'FORCE_KEXEC=yes'.

Security Issue references:

    * CVE-2014-2672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672&gt;
    * CVE-2013-4579
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-18"/>
	<updated date="2014-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/851021">SUSE bug 851021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865475">SUSE bug 865475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883209">SUSE bug 883209</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566375" comment="compat-wireless-kmp-default-3.13_3.0.101_0.31-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566376" comment="compat-wireless-kmp-pae-3.13_3.0.101_0.31-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566377" comment="compat-wireless-kmp-xen-3.13_3.0.101_0.31-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37794" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="907456" ref_url="https://bugzilla.suse.com/907456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>

This cpio update fixes the following security issue:

    * bnc#907456: heap-based buffer overflow flaw in list_file()
      (CVE-2014-9112)

Security Issues:

    * CVE-2014-9112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566378" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566379" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37795" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="887240" ref_url="https://bugzilla.suse.com/887240" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00002.html" source="SUSE-SU"/>
		<description>

This update fixes various issues in CUPS.

    * CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031: Various
      insufficient symbolic link checking could have lead to privilege
      escalation from the lp user to root.

Security Issues:

    * CVE-2014-3537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537&gt;
    * CVE-2014-5029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029&gt;
    * CVE-2014-5030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030&gt;
    * CVE-2014-5031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566380" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566381" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566382" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566383" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37796" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<description>

This curl update fixes the following security issues:

    * bnc#868627: wrong re-use of connections (CVE-2014-0138).
    * bnc#868629: IP address wildcard certificate validation
      (CVE-2014-0139).
    * bnc#870444: --insecure option inappropriately enforcing security
      safeguard.

Security Issue references:

    * CVE-2014-0138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138&gt;
    * CVE-2014-0139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566384" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566385" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566386" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37797" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566387" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566388" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566389" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37798" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566390" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566391" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566392" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37799" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="896453" ref_url="https://bugzilla.suse.com/896453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<description>

Various denial of service issues were fixed in the DBUS service.

    * CVE-2014-3638: dbus-daemon tracks whether method call messages expect
      a reply, so that unsolicited replies can be dropped. As currently
      implemented, if there are n parallel method calls in progress, each
      method reply takes O(n) CPU time. A malicious user could exploit this
      by opening the maximum allowed number of parallel connections and
      sending the maximum number of parallel method calls on each one,
      causing subsequent method calls to be unreasonably slow, a denial of
      service.
    * CVE-2014-3639: dbus-daemon allows a small number of 'incomplete'
      connections (64 by default) whose identity has not yet been
      confirmed. When this limit has been reached, subsequent connections
      are dropped. Alban's testing indicates that one malicious process
      that makes repeated connection attempts, but never completes the
      authentication handshake and instead waits for dbus-daemon to time
      out and disconnect it, can cause the majority of legitimate
      connection attempts to fail.

Security Issues:

    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;
    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-16"/>
	<updated date="2014-09-16"/>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566393" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566394" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566395" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37800" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566396" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566397" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37801" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37802" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, badblocks was enhanced to work with very large partitions. 
(bsc#932539)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-26"/>
	<updated date="2015-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566399" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566400" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009440332" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566401" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566402" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566403" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566404" comment="libuuid-devel-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566405" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009440334" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566406" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37803" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566407" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37804" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566409" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566410" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566411" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566412" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566413" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566414" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566415" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563274" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37805" version="1" class="patch">
	<metadata>
		<title>Security update for emacs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="854683" ref_url="https://bugzilla.suse.com/854683" source="BUGZILLA"/>
		<reference ref_id="876847" ref_url="https://bugzilla.suse.com/876847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<description>

Emacs has been updated to fix the following issues:

    * Several cases of insecure usage of temporary files. (CVE-2014-3421,
      CVE-2014-3422, CVE-2014-3423, CVE-2014-3424)
    * Use of vc-annotate for renamed files when using Git. (bnc#854683)

Security Issues:

    * CVE-2014-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421&gt;
    * CVE-2014-3422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422&gt;
    * CVE-2014-3423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423&gt;
    * CVE-2014-3424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<bugzilla href="https://bugzilla.suse.com/854683">SUSE bug 854683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566416" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566417" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566418" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37806" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901553" ref_url="https://bugzilla.suse.com/901553" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

evolution-data-server has been updated to disable support for SSLv3.

This security issues has been fixed:

    * SSLv3 POODLE attack (CVE-2014-3566)

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/901553">SUSE bug 901553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566419" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566420" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566421" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37807" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>

file was updated to fix one security issue.

    * An out-of-bounds read flaw file's donote() function. This could
      possibly lead to file executable crash (CVE-2014-3710).

Security Issues:

    * CVE-2014-3710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566422" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566423" comment="file-32bit-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37808" version="1" class="patch">
	<metadata>
		<title>Security update for finch</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="861019" ref_url="https://bugzilla.suse.com/861019" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2013-6489" ref_url="https://www.suse.com/security/cve/CVE-2013-6489/" source="CVE"/>
		<reference ref_id="CVE-2013-6490" ref_url="https://www.suse.com/security/cve/CVE-2013-6490/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<description>

The pidgin Instant Messenger has been updated to fix various security 
issues:

    * CVE-2014-0020: Remotely triggerable crash in IRC argument parsing
    * CVE-2013-6490: Buffer overflow in SIMPLE header parsing
    * CVE-2013-6489: Buffer overflow in MXit emoticon parsing
    * CVE-2013-6487: Buffer overflow in Gadu-Gadu HTTP parsing
    * CVE-2013-6486: Pidgin uses clickable links to untrusted executables
    * CVE-2013-6485: Buffer overflow parsing chunked HTTP responses
    * CVE-2013-6484: Crash reading response from STUN server
    * CVE-2013-6483: XMPP doesn't verify 'from' on some iq replies
    * CVE-2013-6482: NULL pointer dereference parsing SOAP data in MSN
    * CVE-2013-6482: NULL pointer dereference parsing OIM data in MSN
    * CVE-2013-6482: NULL pointer dereference parsing headers in MSN
    * CVE-2013-6481: Remote crash reading Yahoo! P2P message
    * CVE-2013-6479: Remote crash parsing HTTP responses
    * CVE-2013-6478: Crash when hovering pointer over a long URL
    * CVE-2013-6477: Crash handling bad XMPP timestamp
    * CVE-2012-6152: Yahoo! remote crash from incorrect character encoding

Security Issue references:

    * CVE-2014-0020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020&gt;
    * CVE-2013-6490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490&gt;
    * CVE-2013-6489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489&gt;
    * CVE-2013-6487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487&gt;
    * CVE-2013-6486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486&gt;
    * CVE-2013-6485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485&gt;
    * CVE-2013-6484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484&gt;
    * CVE-2013-6483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483&gt;
    * CVE-2013-6482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482&gt;
    * CVE-2013-6481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481&gt;
    * CVE-2013-6479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479&gt;
    * CVE-2013-6478
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478&gt;
    * CVE-2013-6477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477&gt;
    * CVE-2012-6152
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-08"/>
	<updated date="2014-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6489/">CVE-2013-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6490/">CVE-2013-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37809" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

    * 

      MFSA 2013-41: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      References

          o Christoph Diehl, Christian Holler, Jesse Ruderman, Timothy
            Nikkel, and Jeff Walden reported memory safety problems and
            crashes that affect Firefox ESR 17, and Firefox 20.
          o Bob Clary, Ben Turner, Benoit Jacob, Bobby Holley, Christoph
            Diehl, Christian Holler, Andrew McCreight, Gary Kwong, Jason
            Orendorff, Jesse Ruderman, Matt Wobensmith, and Mats Palmgren
            reported memory safety problems and crashes that affect Firefox
            20.
    * 

      MFSA 2013-42 / CVE-2013-1670: Security researcher Cody Crews reported
      a method to call a content level constructor that allows for this
      constructor to have chrome privileged accesss. This affects chrome
      object wrappers (COW) and allows for write actions on objects when
      only read actions should be allowed. This can lead to cross-site
      scripting (XSS) attacks.

    * 

      MFSA 2013-43 / CVE-2013-1671: Mozilla security researcher
      moz_bug_r_a4 reported a mechanism to exploit the control when set to
      the file type in order to get the full path. This can lead to
      information leakage and could be combined with other exploits to
      target attacks on the local file system.

    * 

      MFSA 2013-44 / CVE-2013-1672: Security researcher Seb Patane reported
      an issue with the Mozilla Maintenance Service on Windows. This issue
      allows unprivileged users to local privilege escalation through the
      system privileges used by the service when interacting with local
      malicious software. This allows the user to bypass integrity checks
      leading to local privilege escalation. Local file system access is
      necessary in order for this issue to be exploitable and it cannot be
      triggered through web content.

    * 

      MFSA 2013-45: Security researcher Robert Kugler discovered that in
      some instances the Mozilla Maintenance Service on Windows will be
      vulnerable to some previously fixed privilege escalation attacks that
      allowed for local privilege escalation. This was caused by the
      Mozilla Updater not updating Windows Registry entries for the Mozilla
      Maintenance Service, which fixed the earlier issues present if
      Firefox 12 had been installed. New installations of Firefox after
      version 12 are not affected by this issue. Local file system access
      is necessary in order for this issue to be exploitable and it cannot
      be triggered through web content. References: - old
      MozillaMaintenance Service registry entry not updated leading to
      Trusted Path Privilege Escalation (CVE-2013-1673) - Possible
      Arbitrary Code Execution by Update Service (CVE-2012-1942)

    * 

      MFSA 2013-46 / CVE-2013-1674: Security researcher Nils reported a
      use-after-free when resizing video while playing. This could allow
      for arbitrary code execution.

    * 

      MFSA 2013-47 / CVE-2013-1675: Mozilla community member Ms2ger
      discovered that some DOMSVGZoomEvent functions are used without being
      properly initialized, causing uninitialized memory to be used when
      they are called by web content. This could lead to a information
      leakage to sites depending on the contents of this uninitialized
      memory.

    * 

      MFSA 2013-48: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and invalid
      write problems rated as moderate to critical as security issues in
      shipped software. Some of these issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting additional use-after-free flaws in dir=auto
      code introduced during Firefox development. These were fixed before
      general release.

      References

          o Out of Bounds Read in SelectionIterator::GetNextSegment
            (CVE-2013-1676)
          o Out-of-bound read in gfxSkipCharsIterator::SetOffsets
            (CVE-2013-1677))
          o Invalid write in _cairo_xlib_surface_add_glyph (CVE-2013-1678)
          o Heap-use-after-free in mozilla::plugins::child::_geturlnotify
            (CVE-2013-1679)
          o Heap-use-after-free in nsFrameList::FirstChild (CVE-2013-1680)
          o Heap-use-after-free in nsContentUtils::RemoveScriptBlocker
            (CVE-2013-1681)
    * 

      CVE-2012-1942
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942&gt;

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;
    * CVE-2013-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801&gt;
    * CVE-2013-1669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669&gt;
    * CVE-2013-1670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670&gt;
    * CVE-2013-1671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671&gt;
    * CVE-2013-1672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672&gt;
    * CVE-2013-1673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673&gt;
    * CVE-2013-1674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674&gt;
    * CVE-2013-1675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675&gt;
    * CVE-2013-1676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676&gt;
    * CVE-2013-1677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677&gt;
    * CVE-2013-1678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678&gt;
    * CVE-2013-1679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679&gt;
    * CVE-2013-1680
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680&gt;
    * CVE-2013-1681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681&gt;
    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-02"/>
	<updated date="2013-07-02"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37810" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566433" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566434" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566435" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37811" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

This updates the Mozilla Firefox browser to the 24.3.0ESR security release. 
The Mozilla NSS libraries are now on version 3.15.4.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-07"/>
	<updated date="2014-02-07"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37812" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37813" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37814" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566458" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566459" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566460" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566461" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566462" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566463" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566464" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566465" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566466" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566467" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566468" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37815" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37816" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-27"/>
	<updated date="2015-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37817" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566480" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566481" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37818" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37819" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37820" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37821" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37822" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="854370" ref_url="https://bugzilla.suse.com/854370" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 24.2.0 ESR security release.

This is a major upgrade from the 17 ESR release branch.

Security issues fixed:

    * CVE-2013-5611 Application Installation doorhanger persists on
      navigation (MFSA 2013-105)
    * CVE-2013-5609 Miscellaneous memory safety hazards (rv:24.2) (MFSA
      2013-104)
    * CVE-2013-5610 Miscellaneous memory safety hazards (rv:26.0) (MFSA
      2013-104)
    * CVE-2013-5612 Character encoding cross-origin XSS attack (MFSA
      2013-106)
    * CVE-2013-5614 Sandbox restrictions not applied to nested object
      elements (MFSA 2013-107)
    * CVE-2013-5616 Use-after-free in event listeners (MFSA 2013-108)
    * CVE-2013-5619 Potential overflow in JavaScript binary search
      algorithms (MFSA 2013-110)
    * CVE-2013-6671 Segmentation violation when replacing ordered list
      elements (MFSA 2013-111)
    * CVE-2013-6673 Trust settings for built-in roots ignored during EV
      certificate validation (MFSA 2013-113)
    * CVE-2013-5613 Use-after-free in synthetic mouse movement (MFSA
      2013-114)
    * CVE-2013-5615 GetElementIC typed array stubs can be generated outside
      observed typesets (MFSA 2013-115)
    * CVE-2013-6672 Linux clipboard information disclosure though selection
      paste (MFSA 2013-112)
    * CVE-2013-5618 Use-after-free during Table Editing (MFSA 2013-109)

Security Issue references:

    * CVE-2013-5609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609&gt;
    * CVE-2013-5610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610&gt;
    * CVE-2013-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611&gt;
    * CVE-2013-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612&gt;
    * CVE-2013-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613&gt;
    * CVE-2013-5614
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614&gt;
    * CVE-2013-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615&gt;
    * CVE-2013-5616
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616&gt;
    * CVE-2013-5618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618&gt;
    * CVE-2013-5619
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619&gt;
    * CVE-2013-6671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671&gt;
    * CVE-2013-6672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672&gt;
    * CVE-2013-6673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37823" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37824" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37825" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566532" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566533" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566534" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37826" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="905032" ref_url="https://bugzilla.suse.com/905032" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0573" ref_url="https://www.suse.com/security/cve/CVE-2014-0573/" source="CVE"/>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-0576" ref_url="https://www.suse.com/security/cve/CVE-2014-0576/" source="CVE"/>
		<reference ref_id="CVE-2014-0577" ref_url="https://www.suse.com/security/cve/CVE-2014-0577/" source="CVE"/>
		<reference ref_id="CVE-2014-0581" ref_url="https://www.suse.com/security/cve/CVE-2014-0581/" source="CVE"/>
		<reference ref_id="CVE-2014-0582" ref_url="https://www.suse.com/security/cve/CVE-2014-0582/" source="CVE"/>
		<reference ref_id="CVE-2014-0583" ref_url="https://www.suse.com/security/cve/CVE-2014-0583/" source="CVE"/>
		<reference ref_id="CVE-2014-0584" ref_url="https://www.suse.com/security/cve/CVE-2014-0584/" source="CVE"/>
		<reference ref_id="CVE-2014-0585" ref_url="https://www.suse.com/security/cve/CVE-2014-0585/" source="CVE"/>
		<reference ref_id="CVE-2014-0586" ref_url="https://www.suse.com/security/cve/CVE-2014-0586/" source="CVE"/>
		<reference ref_id="CVE-2014-0588" ref_url="https://www.suse.com/security/cve/CVE-2014-0588/" source="CVE"/>
		<reference ref_id="CVE-2014-0589" ref_url="https://www.suse.com/security/cve/CVE-2014-0589/" source="CVE"/>
		<reference ref_id="CVE-2014-0590" ref_url="https://www.suse.com/security/cve/CVE-2014-0590/" source="CVE"/>
		<reference ref_id="CVE-2014-8437" ref_url="https://www.suse.com/security/cve/CVE-2014-8437/" source="CVE"/>
		<reference ref_id="CVE-2014-8438" ref_url="https://www.suse.com/security/cve/CVE-2014-8438/" source="CVE"/>
		<reference ref_id="CVE-2014-8440" ref_url="https://www.suse.com/security/cve/CVE-2014-8440/" source="CVE"/>
		<reference ref_id="CVE-2014-8441" ref_url="https://www.suse.com/security/cve/CVE-2014-8441/" source="CVE"/>
		<reference ref_id="CVE-2014-8442" ref_url="https://www.suse.com/security/cve/CVE-2014-8442/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<description>

flash-player was updated to version 11.2.202.418 to fix 18 security issues:

    * Memory corruption vulnerabilities that could lead to code execution
      (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).
    * Use-after-free vulnerabilities that could lead to code execution
      (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).
    * A double free vulnerability that could lead to code execution
      (CVE-2014-0574).
    * Type confusion vulnerabilities that could lead to code execution
      (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
      CVE-2014-0590).
    * Heap buffer overflow vulnerabilities that could lead to code
      execution (CVE-2014-0582, CVE-2014-0589).
    * An information disclosure vulnerability that could be exploited to
      disclose session tokens (CVE-2014-8437).
    * A heap buffer overflow vulnerability that could be exploited to
      perform privilege escalation from low to medium integrity level
      (CVE-2014-0583).
    * A permission issue that could be exploited to perform privilege
      escalation from low to medium integrity level (CVE-2014-8442).

Further information can be found at 
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
&lt;http://helpx.adobe.com/security/products/flash-player/apsb14-24.html&gt; .

Security Issues:

    * CVE-2014-0576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576&gt;
    * CVE-2014-0581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581&gt;
    * CVE-2014-8440
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440&gt;
    * CVE-2014-8441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441&gt;
    * CVE-2014-0573
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573&gt;
    * CVE-2014-0588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588&gt;
    * CVE-2014-8438
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438&gt;
    * CVE-2014-0574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574&gt;
    * CVE-2014-0577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577&gt;
    * CVE-2014-0584
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584&gt;
    * CVE-2014-0585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585&gt;
    * CVE-2014-0586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586&gt;
    * CVE-2014-0590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590&gt;
    * CVE-2014-0582
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582&gt;
    * CVE-2014-0589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589&gt;
    * CVE-2014-8437
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437&gt;
    * CVE-2014-0583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583&gt;
    * CVE-2014-8442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0573/">CVE-2014-0573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0576/">CVE-2014-0576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0577/">CVE-2014-0577</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0581/">CVE-2014-0581</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0582/">CVE-2014-0582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0583/">CVE-2014-0583</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0584/">CVE-2014-0584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0585/">CVE-2014-0585</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0586/">CVE-2014-0586</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0588/">CVE-2014-0588</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0589/">CVE-2014-0589</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0590/">CVE-2014-0590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8437/">CVE-2014-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8438/">CVE-2014-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8440/">CVE-2014-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8441/">CVE-2014-8441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8442/">CVE-2014-8442</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37827" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="937339" ref_url="https://bugzilla.suse.com/937339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578/" source="CVE"/>
		<reference ref_id="CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114/" source="CVE"/>
		<reference ref_id="CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115/" source="CVE"/>
		<reference ref_id="CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116/" source="CVE"/>
		<reference ref_id="CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117/" source="CVE"/>
		<reference ref_id="CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118/" source="CVE"/>
		<reference ref_id="CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119/" source="CVE"/>
		<reference ref_id="CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120/" source="CVE"/>
		<reference ref_id="CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121/" source="CVE"/>
		<reference ref_id="CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122/" source="CVE"/>
		<reference ref_id="CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123/" source="CVE"/>
		<reference ref_id="CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124/" source="CVE"/>
		<reference ref_id="CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125/" source="CVE"/>
		<reference ref_id="CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126/" source="CVE"/>
		<reference ref_id="CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127/" source="CVE"/>
		<reference ref_id="CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128/" source="CVE"/>
		<reference ref_id="CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129/" source="CVE"/>
		<reference ref_id="CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130/" source="CVE"/>
		<reference ref_id="CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131/" source="CVE"/>
		<reference ref_id="CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132/" source="CVE"/>
		<reference ref_id="CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133/" source="CVE"/>
		<reference ref_id="CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134/" source="CVE"/>
		<reference ref_id="CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135/" source="CVE"/>
		<reference ref_id="CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136/" source="CVE"/>
		<reference ref_id="CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137/" source="CVE"/>
		<reference ref_id="CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428/" source="CVE"/>
		<reference ref_id="CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429/" source="CVE"/>
		<reference ref_id="CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430/" source="CVE"/>
		<reference ref_id="CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431/" source="CVE"/>
		<reference ref_id="CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432/" source="CVE"/>
		<reference ref_id="CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433/" source="CVE"/>
		<reference ref_id="CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116/" source="CVE"/>
		<reference ref_id="CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117/" source="CVE"/>
		<reference ref_id="CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118/" source="CVE"/>
		<reference ref_id="CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119/" source="CVE"/>
		<description>
flash-player was updated to fix 35 security issues.

These security issues were fixed:
- CVE-2015-3135, CVE-2015-4432, CVE-2015-5118: Heap buffer overflow vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431: Memory corruption vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3126, CVE-2015-4429: Null pointer dereference issues (bsc#937339).
- CVE-2015-3114: A security bypass vulnerability that could lead to information disclosure (bsc#937339).
- CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433: Type confusion vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119: Use-after-free vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116: Vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (bsc#937339).
 		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37828" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="937752" ref_url="https://bugzilla.suse.com/937752" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122/" source="CVE"/>
		<reference ref_id="CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function (bsc#937752).
- CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property (bsc#937752).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-16"/>
	<updated date="2015-07-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566541" comment="flash-player-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566542" comment="flash-player-gnome-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566543" comment="flash-player-kde4-11.2.202.491-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37829" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="941239" ref_url="https://bugzilla.suse.com/941239" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124/" source="CVE"/>
		<reference ref_id="CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125/" source="CVE"/>
		<reference ref_id="CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127/" source="CVE"/>
		<reference ref_id="CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128/" source="CVE"/>
		<reference ref_id="CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131/" source="CVE"/>
		<reference ref_id="CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132/" source="CVE"/>
		<reference ref_id="CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133/" source="CVE"/>
		<reference ref_id="CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134/" source="CVE"/>
		<reference ref_id="CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539/" source="CVE"/>
		<reference ref_id="CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540/" source="CVE"/>
		<reference ref_id="CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541/" source="CVE"/>
		<reference ref_id="CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544/" source="CVE"/>
		<reference ref_id="CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545/" source="CVE"/>
		<reference ref_id="CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546/" source="CVE"/>
		<reference ref_id="CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547/" source="CVE"/>
		<reference ref_id="CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548/" source="CVE"/>
		<reference ref_id="CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549/" source="CVE"/>
		<reference ref_id="CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550/" source="CVE"/>
		<reference ref_id="CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551/" source="CVE"/>
		<reference ref_id="CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552/" source="CVE"/>
		<reference ref_id="CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553/" source="CVE"/>
		<reference ref_id="CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554/" source="CVE"/>
		<reference ref_id="CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555/" source="CVE"/>
		<reference ref_id="CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556/" source="CVE"/>
		<reference ref_id="CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557/" source="CVE"/>
		<reference ref_id="CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558/" source="CVE"/>
		<reference ref_id="CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559/" source="CVE"/>
		<reference ref_id="CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560/" source="CVE"/>
		<reference ref_id="CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561/" source="CVE"/>
		<reference ref_id="CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562/" source="CVE"/>
		<reference ref_id="CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<description>


This security update to 11.2.202.508 (bsc#941239) fixes the
following issues:

  * APSB15-19: CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
    CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548,
    CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552,
    CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
    CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560,
    CVE-2015-5561, CVE-2015-5562, CVE-2015-5563
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37830" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="946880" ref_url="https://bugzilla.suse.com/946880" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567/" source="CVE"/>
		<reference ref_id="CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568/" source="CVE"/>
		<reference ref_id="CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570/" source="CVE"/>
		<reference ref_id="CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571/" source="CVE"/>
		<reference ref_id="CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572/" source="CVE"/>
		<reference ref_id="CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573/" source="CVE"/>
		<reference ref_id="CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574/" source="CVE"/>
		<reference ref_id="CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575/" source="CVE"/>
		<reference ref_id="CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576/" source="CVE"/>
		<reference ref_id="CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577/" source="CVE"/>
		<reference ref_id="CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578/" source="CVE"/>
		<reference ref_id="CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579/" source="CVE"/>
		<reference ref_id="CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580/" source="CVE"/>
		<reference ref_id="CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581/" source="CVE"/>
		<reference ref_id="CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582/" source="CVE"/>
		<reference ref_id="CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584/" source="CVE"/>
		<reference ref_id="CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587/" source="CVE"/>
		<reference ref_id="CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588/" source="CVE"/>
		<reference ref_id="CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676/" source="CVE"/>
		<reference ref_id="CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677/" source="CVE"/>
		<reference ref_id="CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678/" source="CVE"/>
		<reference ref_id="CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679/" source="CVE"/>
		<reference ref_id="CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<description>

Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues:

More information can be found on:

  https://helpx.adobe.com/security/products/flash-player/apsb15-23.html

		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37831" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="950169" ref_url="https://bugzilla.suse.com/950169" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569/" source="CVE"/>
		<reference ref_id="CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625/" source="CVE"/>
		<reference ref_id="CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626/" source="CVE"/>
		<reference ref_id="CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627/" source="CVE"/>
		<reference ref_id="CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628/" source="CVE"/>
		<reference ref_id="CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629/" source="CVE"/>
		<reference ref_id="CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630/" source="CVE"/>
		<reference ref_id="CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631/" source="CVE"/>
		<reference ref_id="CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632/" source="CVE"/>
		<reference ref_id="CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633/" source="CVE"/>
		<reference ref_id="CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634/" source="CVE"/>
		<reference ref_id="CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643/" source="CVE"/>
		<reference ref_id="CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<description>
flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169).

These security issues were fixed:
- A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
- A defense-in-depth feature in the Flash broker API (CVE-2015-5569).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).
- A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37832" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="950474" ref_url="https://bugzilla.suse.com/950474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-16"/>
	<updated date="2015-10-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566553" comment="flash-player-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566554" comment="flash-player-gnome-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566555" comment="flash-player-kde4-11.2.202.540-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37833" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954512" ref_url="https://bugzilla.suse.com/954512" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651/" source="CVE"/>
		<reference ref_id="CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652/" source="CVE"/>
		<reference ref_id="CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653/" source="CVE"/>
		<reference ref_id="CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654/" source="CVE"/>
		<reference ref_id="CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655/" source="CVE"/>
		<reference ref_id="CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656/" source="CVE"/>
		<reference ref_id="CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657/" source="CVE"/>
		<reference ref_id="CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658/" source="CVE"/>
		<reference ref_id="CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659/" source="CVE"/>
		<reference ref_id="CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660/" source="CVE"/>
		<reference ref_id="CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661/" source="CVE"/>
		<reference ref_id="CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662/" source="CVE"/>
		<reference ref_id="CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663/" source="CVE"/>
		<reference ref_id="CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042/" source="CVE"/>
		<reference ref_id="CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043/" source="CVE"/>
		<reference ref_id="CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044/" source="CVE"/>
		<reference ref_id="CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<description>
The flash-player package was updated to fix the following security issues:

- Security update to 11.2.202.548 (bsc#954512):
  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
    CVE-2015-8044, CVE-2015-8046
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-11"/>
	<updated date="2015-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37834" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="958324" ref_url="https://bugzilla.suse.com/958324" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045/" source="CVE"/>
		<reference ref_id="CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047/" source="CVE"/>
		<reference ref_id="CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048/" source="CVE"/>
		<reference ref_id="CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049/" source="CVE"/>
		<reference ref_id="CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050/" source="CVE"/>
		<reference ref_id="CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055/" source="CVE"/>
		<reference ref_id="CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056/" source="CVE"/>
		<reference ref_id="CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057/" source="CVE"/>
		<reference ref_id="CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058/" source="CVE"/>
		<reference ref_id="CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059/" source="CVE"/>
		<reference ref_id="CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060/" source="CVE"/>
		<reference ref_id="CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061/" source="CVE"/>
		<reference ref_id="CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062/" source="CVE"/>
		<reference ref_id="CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063/" source="CVE"/>
		<reference ref_id="CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064/" source="CVE"/>
		<reference ref_id="CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065/" source="CVE"/>
		<reference ref_id="CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066/" source="CVE"/>
		<reference ref_id="CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067/" source="CVE"/>
		<reference ref_id="CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068/" source="CVE"/>
		<reference ref_id="CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069/" source="CVE"/>
		<reference ref_id="CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070/" source="CVE"/>
		<reference ref_id="CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071/" source="CVE"/>
		<reference ref_id="CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401/" source="CVE"/>
		<reference ref_id="CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402/" source="CVE"/>
		<reference ref_id="CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403/" source="CVE"/>
		<reference ref_id="CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404/" source="CVE"/>
		<reference ref_id="CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405/" source="CVE"/>
		<reference ref_id="CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406/" source="CVE"/>
		<reference ref_id="CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407/" source="CVE"/>
		<reference ref_id="CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408/" source="CVE"/>
		<reference ref_id="CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409/" source="CVE"/>
		<reference ref_id="CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410/" source="CVE"/>
		<reference ref_id="CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411/" source="CVE"/>
		<reference ref_id="CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412/" source="CVE"/>
		<reference ref_id="CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413/" source="CVE"/>
		<reference ref_id="CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414/" source="CVE"/>
		<reference ref_id="CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415/" source="CVE"/>
		<reference ref_id="CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416/" source="CVE"/>
		<reference ref_id="CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417/" source="CVE"/>
		<reference ref_id="CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418/" source="CVE"/>
		<reference ref_id="CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419/" source="CVE"/>
		<reference ref_id="CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420/" source="CVE"/>
		<reference ref_id="CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421/" source="CVE"/>
		<reference ref_id="CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422/" source="CVE"/>
		<reference ref_id="CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423/" source="CVE"/>
		<reference ref_id="CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424/" source="CVE"/>
		<reference ref_id="CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425/" source="CVE"/>
		<reference ref_id="CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426/" source="CVE"/>
		<reference ref_id="CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427/" source="CVE"/>
		<reference ref_id="CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428/" source="CVE"/>
		<reference ref_id="CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429/" source="CVE"/>
		<reference ref_id="CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430/" source="CVE"/>
		<reference ref_id="CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431/" source="CVE"/>
		<reference ref_id="CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432/" source="CVE"/>
		<reference ref_id="CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433/" source="CVE"/>
		<reference ref_id="CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434/" source="CVE"/>
		<reference ref_id="CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435/" source="CVE"/>
		<reference ref_id="CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436/" source="CVE"/>
		<reference ref_id="CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437/" source="CVE"/>
		<reference ref_id="CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438/" source="CVE"/>
		<reference ref_id="CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439/" source="CVE"/>
		<reference ref_id="CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440/" source="CVE"/>
		<reference ref_id="CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441/" source="CVE"/>
		<reference ref_id="CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442/" source="CVE"/>
		<reference ref_id="CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443/" source="CVE"/>
		<reference ref_id="CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444/" source="CVE"/>
		<reference ref_id="CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445/" source="CVE"/>
		<reference ref_id="CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446/" source="CVE"/>
		<reference ref_id="CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447/" source="CVE"/>
		<reference ref_id="CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448/" source="CVE"/>
		<reference ref_id="CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449/" source="CVE"/>
		<reference ref_id="CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450/" source="CVE"/>
		<reference ref_id="CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451/" source="CVE"/>
		<reference ref_id="CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452/" source="CVE"/>
		<reference ref_id="CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453/" source="CVE"/>
		<reference ref_id="CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454/" source="CVE"/>
		<reference ref_id="CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.554 fixes the following security issues
in Adobe security advisory APSB15-32.

* These updates resolve heap buffer overflow vulnerabilities that could
  lead to code execution (CVE-2015-8438, CVE-2015-8446).
* These updates resolve memory corruption vulnerabilities that could
  lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417,
  CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045,
  CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
* These updates resolve security bypass vulnerabilities (CVE-2015-8453,
  CVE-2015-8440, CVE-2015-8409).
* These updates resolve a stack overflow vulnerability that could lead
  to code execution (CVE-2015-8407).
* These updates resolve a type confusion vulnerability that could lead
  to code execution (CVE-2015-8439).
* These updates resolve an integer overflow vulnerability that could
  lead to code execution (CVE-2015-8445).
* These updates resolve a buffer overflow vulnerability that could lead
  to code execution (CVE-2015-8415)
* These updates resolve use-after-free vulnerabilities that could
  lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437,
  CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452,
  CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411,
  CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423,
  CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426,
  CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434,
  CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058,
  CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067,
  CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065,
  CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403,
  CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070,
  CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).

Please also see
        https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-09"/>
	<updated date="2015-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37835" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960317" ref_url="https://bugzilla.suse.com/960317" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459/" source="CVE"/>
		<reference ref_id="CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460/" source="CVE"/>
		<reference ref_id="CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634/" source="CVE"/>
		<reference ref_id="CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635/" source="CVE"/>
		<reference ref_id="CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636/" source="CVE"/>
		<reference ref_id="CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638/" source="CVE"/>
		<reference ref_id="CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640/" source="CVE"/>
		<reference ref_id="CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642/" source="CVE"/>
		<reference ref_id="CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644/" source="CVE"/>
		<reference ref_id="CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645/" source="CVE"/>
		<reference ref_id="CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646/" source="CVE"/>
		<reference ref_id="CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647/" source="CVE"/>
		<reference ref_id="CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648/" source="CVE"/>
		<reference ref_id="CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649/" source="CVE"/>
		<reference ref_id="CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650/" source="CVE"/>
		<reference ref_id="CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

   - CVE-2015-8644: Type confusion vulnerability that could lead to code execution.
   - CVE-2015-8651: Integer overflow vulnerability that could lead to code execution.
   - CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650: Use-after-free vulnerabilities that could lead to code execution.
   - CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645: Memory corruption vulnerabilities that could lead to code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37836" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566565" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37837" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37838" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<description>

This update for FUSE fixes the following security issue:

    * CVE-2015-3202: FUSE did not clear the environment upon execution of
      external programs.

Security Issues:

    * CVE-2015-3202
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-20"/>
	<updated date="2015-05-20"/>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566569" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566570" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37839" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566571" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37840" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566572" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37841" version="1" class="patch">
	<metadata>
		<title>Security update for gimp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="791372" ref_url="https://bugzilla.suse.com/791372" source="BUGZILLA"/>
		<reference ref_id="853423" ref_url="https://bugzilla.suse.com/853423" source="BUGZILLA"/>
		<reference ref_id="853425" ref_url="https://bugzilla.suse.com/853425" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2013-1913" ref_url="https://www.suse.com/security/cve/CVE-2013-1913/" source="CVE"/>
		<reference ref_id="CVE-2013-1978" ref_url="https://www.suse.com/security/cve/CVE-2013-1978/" source="CVE"/>
		<description>

This update fixes the following security issues with gimp:

    * bnc#853423: XWD plugin g_new() integer overflow (CVE-2013-1913)
    * bnc#853425: XWD plugin color map heap-based buffer overflow
      (CVE-2013-1978)
    * bnc#791372: memory corruption via XWD files (CVE-2012-5576)

Security Issue references:

    * CVE-2013-1913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913&gt;
    * CVE-2012-5576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576&gt;
    * CVE-2013-1978
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-03"/>
	<updated date="2014-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/791372">SUSE bug 791372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853423">SUSE bug 853423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853425">SUSE bug 853425</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1913/">CVE-2013-1913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1978/">CVE-2013-1978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566574" comment="gimp-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566575" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566576" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37842" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="888347" ref_url="https://bugzilla.suse.com/888347" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<description>

This glibc update fixes a critical privilege escalation problem and two 
non-security issues:

    * bnc#892073: An off-by-one error leading to a heap-based buffer
      overflow was found in __gconv_translit_find(). An exploit that
      targets the problem is publicly available. (CVE-2014-5119)
    * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv.
    * bnc#888347: printf-multibyte-format.patch: Don't parse %s format
      argument as multi-byte string.

Security Issues:

    * CVE-2014-5119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-29"/>
	<updated date="2014-08-29"/>
	<bugzilla href="https://bugzilla.suse.com/888347">SUSE bug 888347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566577" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566578" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566579" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566580" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566581" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566582" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566583" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566584" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37843" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37844" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37845" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have 
been fixed.

Further information is available at 
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566601" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566602" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566603" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37846" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566604" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566605" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37847" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37848" version="1" class="patch">
	<metadata>
		<title>Security update for GPG2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="884130" ref_url="https://bugzilla.suse.com/884130" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>

GPG2 has been updated to fix a possible denial of service.

This security issue has been fixed:

    * Denial of service through infinite loop with garbled compressed data
      packets (CVE-2014-4617)

Security Issues:

    * CVE-2014-4617
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-26"/>
	<updated date="2014-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566610" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566611" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37849" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566612" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566613" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37850" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566614" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566615" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37851" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Bugs fixed:
- Expand list of grub.cfg search path in PV Xen guests for systems installed on btrfs
  snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37852" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="927559" ref_url="https://bugzilla.suse.com/927559" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-bad was updated to fix a security issue, a buffer 
overflow in mp4 parsing (bnc#927559 CVE-2015-0797).

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-27"/>
	<updated date="2015-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566618" comment="gstreamer-0_10-plugins-bad-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566619" comment="gstreamer-0_10-plugins-bad-lang-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566620" comment="libgstbasecamerabinsrc-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566621" comment="libgstbasecamerabinsrc-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566622" comment="libgstbasevideo-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566623" comment="libgstbasevideo-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566624" comment="libgstphotography-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566625" comment="libgstphotography-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566626" comment="libgstsignalprocessor-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566627" comment="libgstsignalprocessor-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566628" comment="libgstvdp-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566629" comment="libgstvdp-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37853" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566630" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566631" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566632" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37854" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566633" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566634" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566635" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37855" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log).

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37856" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="864364" ref_url="https://bugzilla.suse.com/864364" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6493" ref_url="https://www.suse.com/security/cve/CVE-2013-6493/" source="CVE"/>
		<description>

The OpenJDK Java Plugin IcedTea Web was released to fix a temporary file 
access problem.

Changes:

    * Dialogs center on screen before becoming visible.
    * Support for u45 new manifest attributes (Application-Name).
    * Custom applet permission policies panel in itweb-settings control
      panel.
    * Plugin fixes:
          o PR1271: icedtea-web does not handle 'javascript:'-protocol URLs
          o RH976833: Multiple applets on one page cause deadlock
          o Enabled javaconsole.
    * Security fixes:
          o CVE-2013-6493/RH1010958: Insecure temporary file use flaw in
            LiveConnect implementation.
    * Additional fixes and changes:
          o Christmas splashscreen extension
          o Fixed classloading deadlocks
          o Cleaned code from warnings
          o Pipes moved to XDG runtime dir.

Security Issue references:

    * CVE-2013-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-04"/>
	<updated date="2014-03-04"/>
	<bugzilla href="https://bugzilla.suse.com/864364">SUSE bug 864364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6493/">CVE-2013-6493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566636" comment="icedtea-web-1.4.2-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37857" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue in icu:

    * CVE-2014-9654: insufficient size limit checks in regular expression
      compiler (bsc#917129)

Security Issues:

    * CVE-2014-9654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-18"/>
	<updated date="2015-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563371" comment="icu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566637" comment="libicu-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37858" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following security issues:

    * 

      CVE-2014-8137: Double free in jas_iccattrval_destroy(). Double call
      to free() allowed attackers to cause a denial of service or possibly
      have unspecified other impact via unknown vectors. (bsc#909474)

    * 

      CVE-2014-8138: Heap overflow in jas_decode(). This could be used to
      do an arbitrary write and could result in arbitrary code execution.
      (bsc#909475)

    * 

      CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot(). Could
      allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image, which
      triggers a heap-based buffer overflow. (bsc#911837)

    * 

      CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c.
      Could allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image.
      (bsc#911837)

Security Issues:

    * CVE-2014-8138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138&gt;
    * CVE-2014-8137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137&gt;
    * CVE-2014-8157
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157&gt;
    * CVE-2014-8158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-03"/>
	<updated date="2015-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566638" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566639" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37859" version="1" class="patch">
	<metadata>
		<title>Security update for Java OpenJDK</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901242" ref_url="https://bugzilla.suse.com/901242" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6468" ref_url="https://www.suse.com/security/cve/CVE-2014-6468/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6485" ref_url="https://www.suse.com/security/cve/CVE-2014-6485/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6562" ref_url="https://www.suse.com/security/cve/CVE-2014-6562/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<description>

Oracle Critical Patch Update Advisory - October 2014

Description:

A Critical Patch Update (CPU) is a collection of patches for multiple 
security vulnerabilities.

Find more information here: 
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
&lt;http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-24"/>
	<updated date="2014-10-24"/>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6468/">CVE-2014-6468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6485/">CVE-2014-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6562/">CVE-2014-6562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37860" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="938248" ref_url="https://bugzilla.suse.com/938248" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<description>
OpenJDK was updated to 2.6.1 - OpenJDK 7u85 to fix security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2596: Difficult to exploit vulnerability in the Hotspot component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data.
* CVE-2015-2597: Easily exploitable vulnerability in the Install component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2627: Very difficult to exploit vulnerability in the Install component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2628: Easily exploitable vulnerability in the CORBA component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. 
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4736: Difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-22"/>
	<updated date="2015-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37861" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="951376" ref_url="https://bugzilla.suse.com/951376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u91 to fix 17 security issues.

These security issues were fixed:
- CVE-2015-4843: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4842: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JAXP (bsc#951376).
- CVE-2015-4840: Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4872: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect integrity via unknown vectors related to Security (bsc#951376).
- CVE-2015-4860: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883 (bsc#951376).
- CVE-2015-4844: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4883: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860 (bsc#951376).
- CVE-2015-4893: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4911: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893 (bsc#951376).
- CVE-2015-4882: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect availability via vectors related to CORBA (bsc#951376).
- CVE-2015-4881: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835 (bsc#951376).
- CVE-2015-4734: Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JGSS (bsc#951376).
- CVE-2015-4806: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4805: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization (bsc#951376).
- CVE-2015-4803: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4835: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881 (bsc#951376).
- CVE-2015-4903: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to RMI (bsc#951376).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-23"/>
	<updated date="2015-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37862" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37863" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566652" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566654" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566655" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566656" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566657" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37864" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001292.html" source="SUSE-SU"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566661" comment="kde4-l10n-da-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566662" comment="kde4-l10n-da-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563389" comment="kde4-l10n-de-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563390" comment="kde4-l10n-de-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566666" comment="kde4-l10n-es-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566667" comment="kde4-l10n-es-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566669" comment="kde4-l10n-fr-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566670" comment="kde4-l10n-fr-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566673" comment="kde4-l10n-it-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566674" comment="kde4-l10n-it-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566679" comment="kde4-l10n-nl-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566680" comment="kde4-l10n-nl-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566682" comment="kde4-l10n-pl-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566683" comment="kde4-l10n-pl-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566686" comment="kde4-l10n-pt_BR-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566687" comment="kde4-l10n-pt_BR-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566689" comment="kde4-l10n-ru-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566690" comment="kde4-l10n-ru-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566692" comment="kde4-l10n-sv-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566693" comment="kde4-l10n-sv-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566696" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566697" comment="kdebase4-runtime-xine-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37865" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566698" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566700" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566701" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566702" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566703" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37866" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the kdelibs4 KSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566704" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566705" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566706" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563393" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566707" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563395" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37867" version="1" class="patch">
	<metadata>
		<title>Security update for kdirstat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868682" ref_url="https://bugzilla.suse.com/868682" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527/" source="CVE"/>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in
      kcleanup

Security Issues:

    * CVE-2014-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527&gt;
    * CVE-2014-2528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566708" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37868" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871134" ref_url="https://bugzilla.suse.com/871134" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879304" ref_url="https://bugzilla.suse.com/879304" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891281" ref_url="https://bugzilla.suse.com/891281" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="891746" ref_url="https://bugzilla.suse.com/891746" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895608" ref_url="https://bugzilla.suse.com/895608" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux 
kernel through 3.14.5 does not ensure that calls have two different futex 
addresses, which allows local users to gain privileges via a crafted 
FUTEX_REQUEUE command that facilitates unsafe waiter modification. 
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs 
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec 
(bnc#891746). - Add option to automatically enforce module signatures when 
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). 
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported 
new patches of Lock down functions for UEFI secure boot Also updated 
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file 
system snapshot. - Btrfs: abort the transaction when we does not find our 
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - 
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile 
flags on seqlock retry. - Btrfs: does not check nodes for extent items. - 
Btrfs: fix a possible deadlock between scrub and transaction committing. - 
Btrfs: fix corruption after write/fsync failure + fsync + log recovery 
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated 
checksums (bnc#891619). - Btrfs: fix double free in 
find_lock_delalloc_range. - Btrfs: fix possible memory leak in 
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config 
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected 
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when 
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) 
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - 
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - 
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - 
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - 
drm/i915: create functions for the 'unclaimed register' checks 
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks 
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory 
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - 
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). 
- hibernate: Disable in a signed modules environment (bnc#884333). - 
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init 
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory 
barriers for send / receive (bnc#885382). - inet: add a redirect generation 
id in inetpeer (bnc#860593). - inetpeer: initialize -&gt;redirect_genid in 
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() 
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base 
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: 
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - 
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). 
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - 
kexec: Disable at runtime if the kernel enforces module loading 
restrictions (bnc#884333). - md/raid6: avoid data corruption during 
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of 
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized 
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE 
check in vma_has_reserves() - mm, hugetlb: change variable name 
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE 
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus 
pages - mm, hugetlb: do not use a page in page cache for cow optimization - 
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, 
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting 
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: 
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which 
check availability of free huge page - mm, hugetlb: protect reserved pages 
when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets 
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy 
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples 
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - 
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: 
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid 
escalating the SCSI error handler if the command is not found in firmware 
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost 
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware 
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue 
abort command for outstanding commands during cleanup when only firmware is 
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to 
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host 
can_queue value based on available resources (bnc#859840). - restore 
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy 
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the 
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: 
Enable integrated ASCII console per default (bnc#885262, LTC#112035). - 
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start 
(bnc#833820). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix 
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - 
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add 
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity 
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - 
x86/UV: Update UV support for external NMI signals (bnc#888847). - 
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number 
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port 
access when module security is enabled (bnc#884333). - x86: Restrict MSR 
access when module loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871134">SUSE bug 871134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879304">SUSE bug 879304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891281">SUSE bug 891281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891746">SUSE bug 891746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895608">SUSE bug 895608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37869" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="851068" ref_url="https://bugzilla.suse.com/851068" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="927786" ref_url="https://bugzilla.suse.com/927786" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930761" ref_url="https://bugzilla.suse.com/930761" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931538" ref_url="https://bugzilla.suse.com/931538" source="BUGZILLA"/>
		<reference ref_id="932348" ref_url="https://bugzilla.suse.com/932348" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934742" ref_url="https://bugzilla.suse.com/934742" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:

- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel allowed local users to bypass intended
  size restrictions and trigger read operations on additional memory
  locations by changing the handle_bytes value of a file handle during
  the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
  to a crash which could occur while fetching inode information from a
  corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
  issues in handling UDF filesystems in the Linux kernel allowed the
  corruption of kernel memory and other issues. An attacker able to mount
  a corrupted/malicious UDF file system image could cause the kernel to
  crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
  PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
  kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
  to obtain sensitive information from uninitialized locations in host OS
  kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
  read and write functionality did not take into account the I/O vectors
  that were already processed when retrying after a failed atomic access
  operation, potentially resulting in memory corruption due to an I/O vector
  array overrun. A local, unprivileged user could use this flaw to crash
  the system or, potentially, escalate their privileges on the system.
  (bsc#933429).


Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler  (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851068">SUSE bug 851068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927786">SUSE bug 927786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930761">SUSE bug 930761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931538">SUSE bug 931538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932348">SUSE bug 932348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934742">SUSE bug 934742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37870" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - Add option to automatically enforce module 
signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() 
call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() 
(bnc#880344). - Backported new patches of Lock down functions for UEFI 
secure boot Also updated series.conf and removed old patches. - Btrfs: 
Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction 
when we does not find our extent ref. - Btrfs: avoid warning bomb of 
btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - 
Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not 
check nodes for extent items. - Btrfs: fix a possible deadlock between 
scrub and transaction committing. - Btrfs: fix corruption after write/fsync 
failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree 
corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix 
double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak 
in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if 
enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at 
driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed 
register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed 
register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map 
fbdev memory (bnc #806990). - e1000e: enable support for new device IDs 
(bnc#885509). - fs/fscache: remove spin_lock() from the condition in 
while() (bnc#880344). - hibernate: Disable in a signed modules environment 
(bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - 
ibmvscsi: Abort init sequence during error recovery (bnc#885382). - 
ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add 
a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize 
-&gt;redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix 
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of 
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang 
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading 
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load 
of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty 
reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if 
the kernel enforces module loading restrictions (bnc#884333). - md/raid6: 
avoid data corruption during recovery of double-degraded RAID6. - memcg, 
vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - mm, 
hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change 
variable name reservations to resv - mm, hugetlb: decrement reserve count 
if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when 
gathering surplus pages - mm, hugetlb: do not use a page in page cache for 
cow optimization - mm, hugetlb: fix and clean-up node iteration code to 
alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix 
subpool accounting handling - mm, hugetlb: improve page-fault scalability - 
mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up 
the code which check availability of free huge page - mm, hugetlb: protect 
reserved pages when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114). - 
perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add 
memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic 
memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the 
SCSI error handler if the command is not found in firmware (bnc#859840). - 
qla2xxx: Clear loop_id for ports that are marked lost during fabric 
scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during 
the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command 
for outstanding commands during cleanup when only firmware is alive 
(bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete 
during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue 
value based on available resources (bnc#859840). - restore smp_mb() in 
unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing 
for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical 
signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable 
integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: 
use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86/UV: Add call to 
KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI 
handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI 
handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: 
Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix 
Sparse warnings (bnc#888847). - x86: Lock down IO port access when module 
security is enabled (bnc#884333). - x86: Restrict MSR access when module 
loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566743" comment="kernel-bigsmp-devel-3.0.101-0.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37871" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="926007" ref_url="https://bugzilla.suse.com/926007" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).

The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926007">SUSE bug 926007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37872" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="891082" ref_url="https://bugzilla.suse.com/891082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<description>

This MIT krb5 update fixes a buffer overrun problem in kadmind:

    * bnc#891082: buffer overrun in kadmind with LDAP back end
      (MITKRB5-SA-2014-001) (CVE-2014-4345)

MIT krb5 Security Advisory 2014-001

    * http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt

Security Issues:

    * CVE-2014-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566760" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566761" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566762" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37873" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566763" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566764" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566765" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37874" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566766" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566768" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37875" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566769" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566770" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566771" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37876" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566772" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566774" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37877" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37878" version="1" class="patch">
	<metadata>
		<title>Security update for kvm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="876842" ref_url="https://bugzilla.suse.com/876842" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="877645" ref_url="https://bugzilla.suse.com/877645" source="BUGZILLA"/>
		<reference ref_id="878541" ref_url="https://bugzilla.suse.com/878541" source="BUGZILLA"/>
		<reference ref_id="886535" ref_url="https://bugzilla.suse.com/886535" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html" source="SUSE-SU"/>
		<description>

kvm has been updated to fix issues in the embedded qemu:

    * 

      CVE-2014-0223: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could potentially have
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

    * 

      CVE-2014-3461: A user able to alter the savevm data (either on the
      disk or over the wire during migration) could have used this flaw to
      to corrupt QEMU process memory on the (destination) host, which could
      have potentially resulted in arbitrary code execution on the host
      with the privileges of the QEMU process.

    * 

      CVE-2014-0222: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could have potentially
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

Non-security bugs fixed:

    * Fix exceeding IRQ routes that could have caused freezes of guests.
      (bnc#876842)
    * Fix CPUID emulation bugs that may have broken Windows guests with
      newer -cpu types (bnc#886535)

Security Issues:

    * CVE-2014-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222&gt;
    * CVE-2014-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223&gt;
    * CVE-2014-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-19"/>
	<updated date="2014-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/876842">SUSE bug 876842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886535">SUSE bug 886535</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566778" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37879" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00000.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566779" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37880" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Bugs fixed:
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566780" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37881" version="1" class="patch">
	<metadata>
		<title>Security update for kvm and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843074" ref_url="https://bugzilla.suse.com/843074" source="BUGZILLA"/>
		<reference ref_id="852397" ref_url="https://bugzilla.suse.com/852397" source="BUGZILLA"/>
		<reference ref_id="878350" ref_url="https://bugzilla.suse.com/878350" source="BUGZILLA"/>
		<reference ref_id="879665" ref_url="https://bugzilla.suse.com/879665" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="897783" ref_url="https://bugzilla.suse.com/897783" source="BUGZILLA"/>
		<reference ref_id="899144" ref_url="https://bugzilla.suse.com/899144" source="BUGZILLA"/>
		<reference ref_id="899484" ref_url="https://bugzilla.suse.com/899484" source="BUGZILLA"/>
		<reference ref_id="900084" ref_url="https://bugzilla.suse.com/900084" source="BUGZILLA"/>
		<reference ref_id="904176" ref_url="https://bugzilla.suse.com/904176" source="BUGZILLA"/>
		<reference ref_id="905097" ref_url="https://bugzilla.suse.com/905097" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="908381" ref_url="https://bugzilla.suse.com/908381" source="BUGZILLA"/>
		<reference ref_id="910145" ref_url="https://bugzilla.suse.com/910145" source="BUGZILLA"/>
		<reference ref_id="911742" ref_url="https://bugzilla.suse.com/911742" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<description>

This collective update for KVM and libvirt provides fixes for security and 
non-security issues.

kvm:

    * Fix NULL pointer dereference because of uninitialized UDP socket.
      (bsc#897654, CVE-2014-3640)
    * Fix performance degradation after migration. (bsc#878350)
    * Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag
      in FS_IOC_FIEMAP ioctl. (bsc#908381)
    * Add validate hex properties for qdev. (bsc#852397)
    * Add boot option to do strict boot (bsc#900084)
    * Add query-command-line-options QMP command. (bsc#899144)
    * Fix incorrect return value of migrate_cancel. (bsc#843074)
    * Fix insufficient parameter validation during ram load. (bsc#905097,
      CVE-2014-7840)
    * Fix insufficient blit region checks in qemu/cirrus. (bsc#907805,
      CVE-2014-8106)

libvirt:

    * Fix security hole with migratable flag in dumpxml. (bsc#904176,
      CVE-2014-7823)
    * Fix domain deadlock. (bsc#899484, CVE-2014-3657)
    * Use correct definition when looking up disk in qemu blkiotune.
      (bsc#897783, CVE-2014-3633)
    * Fix undefined symbol when starting virtlockd. (bsc#910145)
    * Add '-boot strict' to qemu's commandline whenever possible.
      (bsc#900084)
    * Add support for 'reboot-timeout' in qemu. (bsc#899144)
    * Increase QEMU's monitor timeout to 30sec. (bsc#911742)
    * Allow setting QEMU's migration max downtime any time. (bsc#879665)

Security Issues:

    * CVE-2014-7823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823&gt;
    * CVE-2014-3657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657&gt;
    * CVE-2014-3633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633&gt;
    * CVE-2014-3640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640&gt;
    * CVE-2014-7840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840&gt;
    * CVE-2014-8106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/843074">SUSE bug 843074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852397">SUSE bug 852397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878350">SUSE bug 878350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879665">SUSE bug 879665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899144">SUSE bug 899144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900084">SUSE bug 900084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908381">SUSE bug 908381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910145">SUSE bug 910145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911742">SUSE bug 911742</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37882" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566059" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566060" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37883" version="1" class="patch">
	<metadata>
		<title>Security update for lcms2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="826097" ref_url="https://bugzilla.suse.com/826097" source="BUGZILLA"/>
		<description>

lcms2 has been updated to the version 2.5 which is a maintenance release to 
fix various security and other bugs.

    * User defined parametric curves can now be saved in ICC profiles.
    * RGB profiles using same tone curves for several channels are storing
      now only one copy of the curve
    * update black point detection algorithm to reflect ICC changes
    * Added new cmsPlugInTHR() and fixed some race conditions
    * Added error descriptions on cmsSmoothToneCurve
    * Several improvements in cgats parser.
    * Fixed devicelink generation for 8 bits
    * Added a reference for Mac MLU tag
    * Added a way to read the profile creator from header
    * Added identity curves support for write V2 LUT
    * Added TIFF Lab16 handling on tifficc
    * Fixed a bug in parametric curves
    * Rendering intent used when creating the transform is now propagated
      to profile header in cmsTransform2Devicelink.
    * Transform2Devicelink now keeps white point when guessing deviceclass
      is enabled
    * Added some checks for non-happy path, mostly failing mallocs
      (bnc#826097).

For further changes please see the ChangeLog in the RPM.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-19"/>
	<updated date="2013-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/826097">SUSE bug 826097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566787" comment="lcms2-2.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566788" comment="liblcms2-2-2.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37884" version="1" class="patch">
	<metadata>
		<title>Security update for libQt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="856832" ref_url="https://bugzilla.suse.com/856832" source="BUGZILLA"/>
		<reference ref_id="859158" ref_url="https://bugzilla.suse.com/859158" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<description>

The Qt library was updated to fix a XML entity expansion attack (XXE). 
(CVE-2013-4549)

Security Issue reference:

    * CVE-2013-4549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859158">SUSE bug 859158</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566789" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566790" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566791" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566792" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566793" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566794" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566795" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566796" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566797" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566798" comment="libqt4-sql-mysql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566799" comment="libqt4-sql-postgresql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566800" comment="libqt4-sql-postgresql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566801" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566802" comment="libqt4-sql-sqlite-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566803" comment="libqt4-sql-unixODBC-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566804" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566805" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566806" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37885" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37886" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566812" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37887" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery 
issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566813" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566814" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566815" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566816" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566817" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566818" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566819" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37888" version="1" class="patch">
	<metadata>
		<title>Security update for libgadu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="878540" ref_url="https://bugzilla.suse.com/878540" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<description>

A memory corruption vulnerability has been fixed in libgadu. CVE-2013-6487 
has been assigned to this issue.

Security Issue reference:

    * CVE-2013-6487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/878540">SUSE bug 878540</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566820" comment="libgadu-1.8.2-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37889" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566104" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566105" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37890" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37891" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566823" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566824" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37892" version="1" class="patch">
	<metadata>
		<title>Security update for libjasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>

This update for libjasper fixes multiple off-by-one errors which could 
allow remote attackers to execute arbitrary code via a heap-based buffer 
overflow triggered by a crafted jp2 (JPEG 2000) file. (bsc#906364, 
CVE-2014-9029)

Security Issues:

    * CVE-2014-9029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566825" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566826" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37893" version="1" class="patch">
	<metadata>
		<title>Security update for libksba
</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566827" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37894" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566828" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37895" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566829" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566830" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37896" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566831" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37897" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could have been exploited causing a denial of service (endless loop)
      (bnc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566832" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37898" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37899" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="887580" ref_url="https://bugzilla.suse.com/887580" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<description>

This MySQL update provides the following:

    * upgrade to version 5.5.39, [bnc#887580]
    * CVE's fixed: CVE-2014-2484, CVE-2014-4258, CVE-2014-4260,
      CVE-2014-2494, CVE-2014-4238, CVE-2014-4207, CVE-2014-4233,
      CVE-2014-4240, CVE-2014-4214, CVE-2014-4243

See also:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
&lt;http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html&gt;

Security Issues:

    * CVE-2014-2484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484&gt;
    * CVE-2014-4258
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258&gt;
    * CVE-2014-4260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260&gt;
    * CVE-2014-2494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494&gt;
    * CVE-2014-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238&gt;
    * CVE-2014-4207
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207&gt;
    * CVE-2014-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233&gt;
    * CVE-2014-4240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240&gt;
    * CVE-2014-4214
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214&gt;
    * CVE-2014-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37900" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-25"/>
	<updated date="2014-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566844" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566845" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566846" comment="openssl-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37901" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566847" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566848" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37902" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="873123" ref_url="https://bugzilla.suse.com/873123" source="BUGZILLA"/>
		<reference ref_id="873124" ref_url="https://bugzilla.suse.com/873124" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>

This libpng update fixes the following two overflow security issues.

    * bnc#873123: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_sPLT() and png_set_text_2()
      (CVE-2013-7354).
    * bnc#873124: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_unknown_chunks()
      (CVE-2013-7353).

Security Issue references:

    * CVE-2013-7353
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353&gt;
    * CVE-2013-7354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-29"/>
	<updated date="2014-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566849" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566850" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37903" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566851" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37904" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566853" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37905" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="845765" ref_url="https://bugzilla.suse.com/845765" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<description>

This update fixes problems in DCTStream error handling in poppler.

Security Issue reference:

    * CVE-2010-5110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566855" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566856" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566857" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563470" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37906" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

The following security issue is fixed in this update:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv.

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566858" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566859" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566860" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566861" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566862" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566863" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566864" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566865" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566866" comment="pulseaudio-module-bluetooth-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566867" comment="pulseaudio-module-gconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566868" comment="pulseaudio-module-jack-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566869" comment="pulseaudio-module-lirc-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566870" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566871" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566872" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37907" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the QT4 QSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566873" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566874" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566875" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566876" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566877" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566878" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566879" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566880" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566881" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566882" comment="libqt4-sql-mysql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566883" comment="libqt4-sql-postgresql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566884" comment="libqt4-sql-postgresql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566885" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566886" comment="libqt4-sql-sqlite-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566887" comment="libqt4-sql-unixODBC-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566888" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566889" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566890" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37908" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<description>

The libqt4 library was updated to fix several security issues:

    * CVE-2015-0295: Division by zero when processing malformed BMP files.
      (bsc#921999)
    * CVE-2015-1858: Segmentation fault in BMP Qt Image Format Handling.
      (bsc#927806)
    * CVE-2015-1859: Segmentation fault in ICO Qt Image Format Handling.
      (bsc#927807)
    * CVE-2015-1860: Segmentation fault in GIF Qt Image Format Handling.
      (bsc#927808)

Security Issues:

    * CVE-2015-1858
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858&gt;
    * CVE-2015-1859
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859&gt;
    * CVE-2015-1860
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860&gt;
    * CVE-2015-0295
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566891" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566892" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566893" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566894" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566895" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566896" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566897" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566898" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566899" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566900" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566901" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566902" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566903" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566904" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566905" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566906" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566907" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566908" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37909" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="900214" ref_url="https://bugzilla.suse.com/900214" source="BUGZILLA"/>
		<reference ref_id="900218" ref_url="https://bugzilla.suse.com/900218" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>

LibreOffice was updated to fix two security issues.

These security issues have been fixed:

    * 'Document as E-mail' vulnerability (bnc#900218).
    * Impress remote control use-after-free vulnerability (CVE-2014-3693).

Security Issues:

    * CVE-2014-3693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-20"/>
	<updated date="2014-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/900214">SUSE bug 900214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900218">SUSE bug 900218</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563504" comment="libreoffice-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563505" comment="libreoffice-base-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563506" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563507" comment="libreoffice-base-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563509" comment="libreoffice-calc-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563510" comment="libreoffice-calc-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563511" comment="libreoffice-draw-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563512" comment="libreoffice-draw-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563513" comment="libreoffice-filters-optional-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563514" comment="libreoffice-gnome-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563515" comment="libreoffice-help-cs-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563516" comment="libreoffice-help-da-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563517" comment="libreoffice-help-de-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563518" comment="libreoffice-help-en-GB-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563519" comment="libreoffice-help-en-US-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563520" comment="libreoffice-help-es-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563521" comment="libreoffice-help-fr-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563522" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563523" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563524" comment="libreoffice-help-hu-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563525" comment="libreoffice-help-it-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563526" comment="libreoffice-help-ja-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563527" comment="libreoffice-help-ko-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563528" comment="libreoffice-help-nl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563529" comment="libreoffice-help-pl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563530" comment="libreoffice-help-pt-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563531" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563532" comment="libreoffice-help-ru-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563533" comment="libreoffice-help-sv-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563534" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563535" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563536" comment="libreoffice-icon-themes-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563537" comment="libreoffice-impress-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563538" comment="libreoffice-impress-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563539" comment="libreoffice-kde-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563540" comment="libreoffice-kde4-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563541" comment="libreoffice-l10n-af-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563542" comment="libreoffice-l10n-ar-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563543" comment="libreoffice-l10n-ca-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563544" comment="libreoffice-l10n-cs-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563545" comment="libreoffice-l10n-da-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563546" comment="libreoffice-l10n-de-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563548" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563549" comment="libreoffice-l10n-es-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563550" comment="libreoffice-l10n-fi-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563551" comment="libreoffice-l10n-fr-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563552" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563553" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563554" comment="libreoffice-l10n-hu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563555" comment="libreoffice-l10n-it-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563556" comment="libreoffice-l10n-ja-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563557" comment="libreoffice-l10n-ko-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563558" comment="libreoffice-l10n-nb-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563559" comment="libreoffice-l10n-nl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563560" comment="libreoffice-l10n-nn-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563561" comment="libreoffice-l10n-pl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563563" comment="libreoffice-l10n-pt-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563564" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563565" comment="libreoffice-l10n-ru-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563566" comment="libreoffice-l10n-sk-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563567" comment="libreoffice-l10n-sv-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563568" comment="libreoffice-l10n-xh-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563569" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563570" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563571" comment="libreoffice-l10n-zu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563572" comment="libreoffice-mailmerge-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563573" comment="libreoffice-math-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563574" comment="libreoffice-mono-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563575" comment="libreoffice-officebean-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563576" comment="libreoffice-pyuno-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563578" comment="libreoffice-writer-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563579" comment="libreoffice-writer-extensions-4.0.3.3.26-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37910" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="382137" ref_url="https://bugzilla.suse.com/382137" source="BUGZILLA"/>
		<reference ref_id="593612" ref_url="https://bugzilla.suse.com/593612" source="BUGZILLA"/>
		<reference ref_id="654230" ref_url="https://bugzilla.suse.com/654230" source="BUGZILLA"/>
		<reference ref_id="753460" ref_url="https://bugzilla.suse.com/753460" source="BUGZILLA"/>
		<reference ref_id="757432" ref_url="https://bugzilla.suse.com/757432" source="BUGZILLA"/>
		<reference ref_id="779620" ref_url="https://bugzilla.suse.com/779620" source="BUGZILLA"/>
		<reference ref_id="779642" ref_url="https://bugzilla.suse.com/779642" source="BUGZILLA"/>
		<reference ref_id="780044" ref_url="https://bugzilla.suse.com/780044" source="BUGZILLA"/>
		<reference ref_id="783433" ref_url="https://bugzilla.suse.com/783433" source="BUGZILLA"/>
		<reference ref_id="802888" ref_url="https://bugzilla.suse.com/802888" source="BUGZILLA"/>
		<reference ref_id="816593" ref_url="https://bugzilla.suse.com/816593" source="BUGZILLA"/>
		<reference ref_id="817956" ref_url="https://bugzilla.suse.com/817956" source="BUGZILLA"/>
		<reference ref_id="819614" ref_url="https://bugzilla.suse.com/819614" source="BUGZILLA"/>
		<reference ref_id="819822" ref_url="https://bugzilla.suse.com/819822" source="BUGZILLA"/>
		<reference ref_id="819865" ref_url="https://bugzilla.suse.com/819865" source="BUGZILLA"/>
		<reference ref_id="820077" ref_url="https://bugzilla.suse.com/820077" source="BUGZILLA"/>
		<reference ref_id="820273" ref_url="https://bugzilla.suse.com/820273" source="BUGZILLA"/>
		<reference ref_id="820503" ref_url="https://bugzilla.suse.com/820503" source="BUGZILLA"/>
		<reference ref_id="820504" ref_url="https://bugzilla.suse.com/820504" source="BUGZILLA"/>
		<reference ref_id="820509" ref_url="https://bugzilla.suse.com/820509" source="BUGZILLA"/>
		<reference ref_id="820788" ref_url="https://bugzilla.suse.com/820788" source="BUGZILLA"/>
		<reference ref_id="820800" ref_url="https://bugzilla.suse.com/820800" source="BUGZILLA"/>
		<reference ref_id="820819" ref_url="https://bugzilla.suse.com/820819" source="BUGZILLA"/>
		<reference ref_id="820836" ref_url="https://bugzilla.suse.com/820836" source="BUGZILLA"/>
		<reference ref_id="821567" ref_url="https://bugzilla.suse.com/821567" source="BUGZILLA"/>
		<reference ref_id="821795" ref_url="https://bugzilla.suse.com/821795" source="BUGZILLA"/>
		<reference ref_id="822908" ref_url="https://bugzilla.suse.com/822908" source="BUGZILLA"/>
		<reference ref_id="823626" ref_url="https://bugzilla.suse.com/823626" source="BUGZILLA"/>
		<reference ref_id="823651" ref_url="https://bugzilla.suse.com/823651" source="BUGZILLA"/>
		<reference ref_id="823655" ref_url="https://bugzilla.suse.com/823655" source="BUGZILLA"/>
		<reference ref_id="823675" ref_url="https://bugzilla.suse.com/823675" source="BUGZILLA"/>
		<reference ref_id="823935" ref_url="https://bugzilla.suse.com/823935" source="BUGZILLA"/>
		<reference ref_id="825305" ref_url="https://bugzilla.suse.com/825305" source="BUGZILLA"/>
		<reference ref_id="825891" ref_url="https://bugzilla.suse.com/825891" source="BUGZILLA"/>
		<reference ref_id="825976" ref_url="https://bugzilla.suse.com/825976" source="BUGZILLA"/>
		<reference ref_id="828390" ref_url="https://bugzilla.suse.com/828390" source="BUGZILLA"/>
		<reference ref_id="828598" ref_url="https://bugzilla.suse.com/828598" source="BUGZILLA"/>
		<reference ref_id="829017" ref_url="https://bugzilla.suse.com/829017" source="BUGZILLA"/>
		<reference ref_id="830205" ref_url="https://bugzilla.suse.com/830205" source="BUGZILLA"/>
		<reference ref_id="831457" ref_url="https://bugzilla.suse.com/831457" source="BUGZILLA"/>
		<reference ref_id="831578" ref_url="https://bugzilla.suse.com/831578" source="BUGZILLA"/>
		<reference ref_id="834035" ref_url="https://bugzilla.suse.com/834035" source="BUGZILLA"/>
		<reference ref_id="834705" ref_url="https://bugzilla.suse.com/834705" source="BUGZILLA"/>
		<reference ref_id="834720" ref_url="https://bugzilla.suse.com/834720" source="BUGZILLA"/>
		<reference ref_id="834722" ref_url="https://bugzilla.suse.com/834722" source="BUGZILLA"/>
		<reference ref_id="835985" ref_url="https://bugzilla.suse.com/835985" source="BUGZILLA"/>
		<reference ref_id="837302" ref_url="https://bugzilla.suse.com/837302" source="BUGZILLA"/>
		<reference ref_id="839727" ref_url="https://bugzilla.suse.com/839727" source="BUGZILLA"/>
		<reference ref_id="862510" ref_url="https://bugzilla.suse.com/862510" source="BUGZILLA"/>
		<reference ref_id="863021" ref_url="https://bugzilla.suse.com/863021" source="BUGZILLA"/>
		<reference ref_id="864396" ref_url="https://bugzilla.suse.com/864396" source="BUGZILLA"/>
		<reference ref_id="870234" ref_url="https://bugzilla.suse.com/870234" source="BUGZILLA"/>
		<reference ref_id="878854" ref_url="https://bugzilla.suse.com/878854" source="BUGZILLA"/>
		<reference ref_id="893141" ref_url="https://bugzilla.suse.com/893141" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4156" ref_url="https://www.suse.com/security/cve/CVE-2013-4156/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<description>

LibreOffice was updated to version 4.0.3.3.26. (SUSE 4.0-patch26, tag 
suse-4.0-26, based on upstream 4.0.3.3).

Two security issues have been fixed:

    * DOCM memory corruption vulnerability. (CVE-2013-4156, bnc#831578)
    * Data exposure using crafted OLE objects. (CVE-2014-3575, bnc#893141)

The following non-security issues have been fixed:

    * chart shown flipped (bnc#834722)
    * chart missing dataset (bnc#839727)
    * import new line in text (bnc#828390)
    * lines running off screens (bnc#819614)
    * add set-all language menu (bnc#863021)
    * text rotation (bnc#783433, bnc#862510)
    * page border shadow testcase (bnc#817956)
    * one more clickable field fix (bnc#802888)
    * multilevel labels are rotated (bnc#820273)
    * incorrect nested table margins (bnc#816593)
    * use BitmapURL only if its valid (bnc#821567)
    * import gradfill for text colors (bnc#870234)
    * fix undo of paragraph attributes (bnc#828598)
    * stop-gap solution to avoid crash (bnc#830205)
    * import images with duotone filter (bnc#820077)
    * missing drop downs for autofilter (bnc#834705)
    * typos in first page style creation (bnc#820836)
    * labels wrongly interpreted as dates (bnc#834720)
    * RTF import of fFilled shape property (bnc#825305)
    * placeholders text size is not correct (bnc#831457)
    * cells value formatted with wrong output (bnc#821795)
    * RTF import of freeform shape coordinates (bnc#823655)
    * styles (rename &amp;) copy to different decks (bnc#757432)
    * XLSX Chart import with internal data table (bnc#819822)
    * handle M.d.yyyy date format in DOCX import (bnc#820509)
    * paragraph style in empty first page header (bnc#823651)
    * copying slides having same master page name (bnc#753460)
    * printing handouts using the default, 'Order' (bnc#835985)
    * wrap polygon was based on dest size of picture (bnc#820800)
    * added common flags support for SEQ field import (bnc#825976)
    * hyperlinks of illustration index in DOCX export (bnc#834035)
    * allow insertion of redlines with an empty author (bnc#837302)
    * handle drawinglayer rectangle inset in VML import (bnc#779642)
    * don't apply complex font size to non-complex font (bnc#820819)
    * issue with negative seeks in win32 shell extension (bnc#829017)
    * slide appears quite garbled when imported from PPTX (bnc#593612)
    * initial MCE support in writerfilter ooxml tokenizer (bnc#820503)
    * MSWord uses \xb for linebreaks in DB fields, take 2 (bnc#878854)
    * try harder to convert floating tables to text frames (bnc#779620)
    * itemstate in parent style incorrectly reported as set (bnc#819865)
    * default color hidden by Default style in writerfilter (bnc#820504)
    * DOCX document crashes when using internal OOXML filter (bnc#382137)
    * ugly workaround for external leading with symbol fonts (bnc#823626)
    * followup fix for exported xlsx causes errors for mso2007 (bnc#823935)
    * we only support simple labels in the InternalDataProvider
      (bnc#864396)
    * RTF import: fix import of numbering bullet associated font
      (bnc#823675)
    * page specific footer extended to every pages in DOCX export
      (bnc#654230)
    * v:textbox mso-fit-shape-to-text style property in VML import
      (bnc#820788)
    * w:spacing in a paragraph should also apply to as-char objects
      (bnc#780044)
    * compatibility setting for MS Word wrapping text in less space
      (bnc#822908)
    * fix SwWrtShell::SelAll() to work with empty table at doc start
      (bnc#825891)

Security Issues:

    * CVE-2014-3575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575&gt;
    * CVE-2013-4156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/382137">SUSE bug 382137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/593612">SUSE bug 593612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654230">SUSE bug 654230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753460">SUSE bug 753460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757432">SUSE bug 757432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779620">SUSE bug 779620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779642">SUSE bug 779642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780044">SUSE bug 780044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783433">SUSE bug 783433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802888">SUSE bug 802888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816593">SUSE bug 816593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817956">SUSE bug 817956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819614">SUSE bug 819614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819822">SUSE bug 819822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819865">SUSE bug 819865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820077">SUSE bug 820077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820273">SUSE bug 820273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820503">SUSE bug 820503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820504">SUSE bug 820504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820509">SUSE bug 820509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820788">SUSE bug 820788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820800">SUSE bug 820800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820819">SUSE bug 820819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820836">SUSE bug 820836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821567">SUSE bug 821567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821795">SUSE bug 821795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822908">SUSE bug 822908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823626">SUSE bug 823626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823651">SUSE bug 823651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823655">SUSE bug 823655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823675">SUSE bug 823675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823935">SUSE bug 823935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825305">SUSE bug 825305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825891">SUSE bug 825891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825976">SUSE bug 825976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828390">SUSE bug 828390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828598">SUSE bug 828598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829017">SUSE bug 829017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830205">SUSE bug 830205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831457">SUSE bug 831457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831578">SUSE bug 831578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834035">SUSE bug 834035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834705">SUSE bug 834705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834720">SUSE bug 834720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834722">SUSE bug 834722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835985">SUSE bug 835985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837302">SUSE bug 837302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839727">SUSE bug 839727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862510">SUSE bug 862510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863021">SUSE bug 863021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864396">SUSE bug 864396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870234">SUSE bug 870234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878854">SUSE bug 878854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4156/">CVE-2013-4156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563580" comment="libreoffice-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563581" comment="libreoffice-base-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563582" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563583" comment="libreoffice-base-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563585" comment="libreoffice-calc-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563586" comment="libreoffice-calc-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563587" comment="libreoffice-draw-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563588" comment="libreoffice-draw-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563589" comment="libreoffice-filters-optional-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563590" comment="libreoffice-gnome-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563591" comment="libreoffice-help-cs-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563592" comment="libreoffice-help-da-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563593" comment="libreoffice-help-de-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563594" comment="libreoffice-help-en-GB-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563595" comment="libreoffice-help-en-US-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563596" comment="libreoffice-help-es-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563597" comment="libreoffice-help-fr-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563598" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563599" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563600" comment="libreoffice-help-hu-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563601" comment="libreoffice-help-it-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563602" comment="libreoffice-help-ja-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563603" comment="libreoffice-help-ko-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563604" comment="libreoffice-help-nl-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563605" comment="libreoffice-help-pl-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563606" comment="libreoffice-help-pt-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563607" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563608" comment="libreoffice-help-ru-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563609" comment="libreoffice-help-sv-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563610" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563611" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563612" comment="libreoffice-icon-themes-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563613" comment="libreoffice-impress-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563614" comment="libreoffice-impress-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563615" comment="libreoffice-kde-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563616" comment="libreoffice-kde4-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563617" comment="libreoffice-l10n-af-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563618" comment="libreoffice-l10n-ar-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563619" comment="libreoffice-l10n-ca-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563620" comment="libreoffice-l10n-cs-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563621" comment="libreoffice-l10n-da-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563622" comment="libreoffice-l10n-de-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563624" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563625" comment="libreoffice-l10n-es-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563626" comment="libreoffice-l10n-fi-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563627" comment="libreoffice-l10n-fr-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563628" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563629" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563630" comment="libreoffice-l10n-hu-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563631" comment="libreoffice-l10n-it-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563632" comment="libreoffice-l10n-ja-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563633" comment="libreoffice-l10n-ko-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563634" comment="libreoffice-l10n-nb-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563635" comment="libreoffice-l10n-nl-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563636" comment="libreoffice-l10n-nn-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563637" comment="libreoffice-l10n-pl-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563639" comment="libreoffice-l10n-pt-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563640" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563641" comment="libreoffice-l10n-ru-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563642" comment="libreoffice-l10n-sk-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563643" comment="libreoffice-l10n-sv-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563644" comment="libreoffice-l10n-xh-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563645" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563646" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563647" comment="libreoffice-l10n-zu-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563648" comment="libreoffice-mailmerge-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563649" comment="libreoffice-math-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563650" comment="libreoffice-mono-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563651" comment="libreoffice-officebean-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563652" comment="libreoffice-pyuno-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563654" comment="libreoffice-writer-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563655" comment="libreoffice-writer-extensions-4.0.3.3.26-0.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37911" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566909" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566911" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37912" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

This update for libsndfile fixes two buffer read overflows in 
sd2_parse_rsrc_fork(). (CVE-2014-9496, bsc#911796)

Security Issues:

    * CVE-2014-9496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566912" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566913" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37913" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566914" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37914" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865222" ref_url="https://bugzilla.suse.com/865222" source="BUGZILLA"/>
		<reference ref_id="894361" ref_url="https://bugzilla.suse.com/894361" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>

This update for net-snmp fixes a remote denial of service problem inside 
snmptrapd when it is started with the '-OQ' option. (CVE-2014-3565, 
bnc#894361)

Additionally, a timeout issue during SNMP MIB walk on OID 1.3.6.1.2.1.4.24 
when using newer (v5.5+) versions of snmpwalk has been fixed. (bnc#865222)

Security Issues:

    * CVE-2014-3565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865222">SUSE bug 865222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566916" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563659" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566917" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566918" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566919" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37915" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="866278" ref_url="https://bugzilla.suse.com/866278" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<description>

This update of libssh fixes the following security issue:

    * When libssh operates in server mode, the randomness pool was not
      switched on fork, so two pools could operate on the same randomness
      and could generate the same keys.

Security Issue references:

    * CVE-2014-0017
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-07"/>
	<updated date="2014-03-07"/>
	<bugzilla href="https://bugzilla.suse.com/866278">SUSE bug 866278</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566920" comment="libssh2-0.2-5.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37916" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<description>

The ssh client library libssh2_org was updated to fix a security issue:

    * CVE-2015-1782: A malicious server could send a crafted
      SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a
      crash of the application using libssh2_org.

Security Issues:

    * CVE-2015-1782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563663" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37917" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566921" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566922" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37918" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37919" version="1" class="patch">
	<metadata>
		<title>Security update for libvdpau (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="943967" ref_url="https://bugzilla.suse.com/943967" source="BUGZILLA"/>
		<reference ref_id="943968" ref_url="https://bugzilla.suse.com/943968" source="BUGZILLA"/>
		<reference ref_id="943969" ref_url="https://bugzilla.suse.com/943969" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<description>

libvdpau was updated to use secure_getenv() instead of getenv() for several variables
so it can be more safely used in setuid applications.

* CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
* CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
* CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-08"/>
	<updated date="2015-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37920" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="857490" ref_url="https://bugzilla.suse.com/857490" source="BUGZILLA"/>
		<reference ref_id="873705" ref_url="https://bugzilla.suse.com/873705" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<description>

libvirt has been patched to fix two security issues.

Further information is available at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179&gt; and
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456&gt;

These security issues have been fixed:

    * Unsafe parsing of XML documents allows arbitrary file read or denial
      of service (CVE-2014-0179)
    * Ability to delete or create arbitrary host devices (CVE-2013-6456)

Security Issue references:

    * CVE-2014-0179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179&gt;
    * CVE-2013-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-07"/>
	<updated date="2014-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566926" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566927" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566928" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566929" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566930" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37921" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37922" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37923" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566933" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566934" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566935" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37924" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>

This update fixes a denial of service via recursive entity expansion. 
(CVE-2014-3660)

Security Issues:

    * CVE-2014-3660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-20"/>
	<updated date="2014-10-20"/>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566936" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566937" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566938" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37925" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37926" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566942" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566944" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37927" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37928" version="1" class="patch">
	<metadata>
		<title>Security update for lxc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="839653" ref_url="https://bugzilla.suse.com/839653" source="BUGZILLA"/>
		<reference ref_id="839663" ref_url="https://bugzilla.suse.com/839663" source="BUGZILLA"/>
		<reference ref_id="855809" ref_url="https://bugzilla.suse.com/855809" source="BUGZILLA"/>
		<reference ref_id="869663" ref_url="https://bugzilla.suse.com/869663" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>

The container framework LXC has been updated to fix various bugs and a 
security issue:

    * CVE-2013-6441: The sshd template allowed privilege escalation on the
      host.
    * SLES container time not aligned with host time (bnc#839653)
    * SLES container boot takes ages (bnc#839663)
    * lxc mounts /dev/pts with wrong options (bnc#869663)

Security Issues:

    * CVE-2013-6441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/839653">SUSE bug 839653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839663">SUSE bug 839663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869663">SUSE bug 869663</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563694" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37929" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37930" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37931" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566955" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566956" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37932" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566957" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566958" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566959" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566960" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566961" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566962" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566963" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37933" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-30"/>
	<updated date="2013-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566964" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566965" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566966" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566967" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566150" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566151" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566968" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566969" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566970" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37934" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868115" ref_url="https://bugzilla.suse.com/868115" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<description>

The mailreader mutt was updated to fix a security issue in displaying mail 
headers, where a crafted e-mail could cause a heap overflow, which in turn 
might be used by attackers to crash mutt or potentially even execute code.

Security Issues references:

    * CVE-2014-0467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-17"/>
	<updated date="2014-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566971" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37935" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37936" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37937" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37938" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566990" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566991" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566992" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566993" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37939" version="1" class="patch">
	<metadata>
		<title>Security update for novell-qtgui, novell-ui-base</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872796" ref_url="https://bugzilla.suse.com/872796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0595" ref_url="https://www.suse.com/security/cve/CVE-2014-0595/" source="CVE"/>
		<description>

Packages novell-ui-base and novell-qtgui were updated to prevent erroneous 
rights assignment when a user is granted 'File Scan' rights (F). In this 
case nwrights was assigning Supervisor (S) rights. (CVE-2014-0595)

Further information is available at 
https://bugzilla.novell.com/show_bug.cgi?id=872796
&lt;https://bugzilla.novell.com/show_bug.cgi?id=872796&gt; .

Security Issue reference:

    * CVE-2014-0595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-19"/>
	<updated date="2014-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/872796">SUSE bug 872796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0595/">CVE-2014-0595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566994" comment="novell-qtgui-3.0.0-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566995" comment="novell-qtgui-cli-3.0.0-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566996" comment="novell-ui-base-3.0.0-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37940" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566997" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566998" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566999" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567000" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567001" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567002" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567003" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37941" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567004" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567005" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567006" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37942" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-13"/>
	<updated date="2015-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567007" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567008" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567009" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37943" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567010" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567011" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567012" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37944" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSLP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="778508" ref_url="https://bugzilla.suse.com/778508" source="BUGZILLA"/>
		<reference ref_id="855385" ref_url="https://bugzilla.suse.com/855385" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001397.html" source="SUSE-SU"/>
		<description>

This update for OpenSLP fixes a bug in SLPIntersectStringList that could 
lead to an out-of-bounds read (CVE-2012-4428). Additionally, the SLP daemon 
now always use localtime(3) when writing to log files to avoid having 
timestamps with different timezones.

Security Issues:

    * CVE-2012-4428
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-06"/>
	<updated date="2015-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855385">SUSE bug 855385</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567013" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567014" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37945" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="826427" ref_url="https://bugzilla.suse.com/826427" source="BUGZILLA"/>
		<reference ref_id="833605" ref_url="https://bugzilla.suse.com/833605" source="BUGZILLA"/>
		<reference ref_id="847710" ref_url="https://bugzilla.suse.com/847710" source="BUGZILLA"/>
		<reference ref_id="869101" ref_url="https://bugzilla.suse.com/869101" source="BUGZILLA"/>
		<reference ref_id="870532" ref_url="https://bugzilla.suse.com/870532" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<description>

This update for OpenSSH fixes the following issues:

    * Exit sshd normally when port is already in use. (bnc#832628)
    * Use hardware crypto engines where available. (bnc#826427)
    * Use correct options for login when it is used. (bnc#833605)
    * Move FIPS messages to higher debug level. (bnc#862875)
    * Fix forwarding with IPv6 addresses in DISPLAY. (bnc#847710)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)
    * Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)
    * Check SSHFP DNS records even for server certificates. (bnc#870532,
      CVE-2014-2653)

Security Issues references:

    * CVE-2014-2532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532&gt;
    * CVE-2014-2653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-07"/>
	<updated date="2014-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/826427">SUSE bug 826427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833605">SUSE bug 833605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847710">SUSE bug 847710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567015" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567016" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567017" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37946" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="916549" ref_url="https://bugzilla.suse.com/916549" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix several security issues and bugs.

These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
  in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
  the refusal deadline for X connections, which made it easier for remote
  attackers to bypass intended access restrictions via a connection outside
  of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd in OpenSSH did not properly restrict the processing of
  keyboard-interactive devices within a single connection, which made it
  easier for remote attackers to conduct brute-force attacks or cause a
  denial of service (CPU consumption) via a long and duplicative list in
  the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
  client that provides a different password for each pam element on this
  list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
  extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
  allowed local users to conduct impersonation attacks by leveraging any SSH
  login access in conjunction with control of the sshd uid to send a crafted
  MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
* CVE-2015-6564: Use-after-free vulnerability in the
  mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
  have allowed local users to gain privileges by leveraging control of the
  sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
- bsc#916549: Fixed support for aesXXX-gcm@openssh.com.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916549">SUSE bug 916549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37947" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567021" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567022" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567023" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37948" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567024" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567026" comment="openssl-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37949" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="875647" ref_url="https://bugzilla.suse.com/875647" source="BUGZILLA"/>
		<reference ref_id="881241" ref_url="https://bugzilla.suse.com/881241" source="BUGZILLA"/>
		<description>

openssl-certs has been updated to include four new and remove two 
certificates:

    * new: Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.crt
    * new:
      E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.crt
    * new:
      TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.250.139.205.150.crt
    * new: T-TeleSec_GlobalRoot_Class_2:2.1.1.crt
    * removed: Firmaprofesional_Root_CA:2.1.1.crt
    * removed: TDC_OCES_Root_CA:2.4.62.72.189.196.crt

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/875647">SUSE bug 875647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881241">SUSE bug 881241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37950" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567028" comment="openvpn-2.0.9-143.40.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37951" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567029" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567030" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37952" version="1" class="patch">
	<metadata>
		<title>Security update for pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="848417" ref_url="https://bugzilla.suse.com/848417" source="BUGZILLA"/>
		<reference ref_id="870433" ref_url="https://bugzilla.suse.com/870433" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>

This update changes the broken default behavior of pam_pwhistory to not 
enforce checks when the root user requests password changes. In order to 
enforce pwhistory checks on the root user, the 'enforce_for_root' parameter 
needs to be set for the pam_pwhistory.so module.

This pam update fixes the following security and non-security issues:

    * bnc#870433: Fixed pam_timestamp path injection problem
      (CVE-2014-2583)
    * bnc#848417: Fixed pam_pwhistory root password enforcement when
      resetting non-root user's password

Security Issue references:

    * CVE-2014-2583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/848417">SUSE bug 848417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567031" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567032" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567033" comment="pam-doc-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37953" version="1" class="patch">
	<metadata>
		<title>Security update for perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="838333" ref_url="https://bugzilla.suse.com/838333" source="BUGZILLA"/>
		<reference ref_id="896715" ref_url="https://bugzilla.suse.com/896715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>

This update fixes a memory leak and an infinite recursion in Data::Dumper. 
(CVE-2014-4330)

Security Issues:

    * CVE-2014-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/838333">SUSE bug 838333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567034" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567035" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567036" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567037" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567038" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567039" comment="perl-doc-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37954" version="1" class="patch">
	<metadata>
		<title>Security update for popt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>

This rpm update fixes the following security and non security issues.

    * bnc#908128: check for bad invalid name sizes (CVE-2014-8118)
    * bnc#906803: create files with mode 0 (CVE-2013-6435)
    * bnc#892431: honor --noglob in install mode

Security Issues:

    * CVE-2014-8118
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118&gt;
    * CVE-2013-6435
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567040" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567041" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567042" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567043" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37955" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567044" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567045" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567047" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567048" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37956" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567049" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567050" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567052" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567053" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37957" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567054" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567055" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37958" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567056" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567057" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37959" version="1" class="patch">
	<metadata>
		<title>Security update for ppp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="891489" ref_url="https://bugzilla.suse.com/891489" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>

This ppp update fixes a potential security issue that an unprivileged 
attacker could access privileged options:

    * integer overflow in option parsing (CVE-2014-3158, bnc#891489)

Security Issues:

    * CVE-2014-3158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-26"/>
	<updated date="2014-08-26"/>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567058" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37960" version="1" class="patch">
	<metadata>
		<title>Security update for procmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="894999" ref_url="https://bugzilla.suse.com/894999" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>

procmail was updated to fix a security issue in its formail helper.

    * When formail processed specially crafted e-mail headers a heap
      corruption could be triggered, which would lead to a crash of
      formail. (CVE-2014-3618)

Security Issues:

    * CVE-2014-3618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-04"/>
	<updated date="2014-09-04"/>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567059" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37961" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="856843" ref_url="https://bugzilla.suse.com/856843" source="BUGZILLA"/>
		<reference ref_id="879913" ref_url="https://bugzilla.suse.com/879913" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<description>

Puppet was updated to fix the following security issues:

    * Unsafe use of temporary files. (CVE-2013-4969)
    * Arbitrary code execution with required social engineering.
      (CVE-2014-3248, CVE-2014-3250)

Security Issues references:

    * CVE-2014-3248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248&gt;
    * CVE-2013-4969
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969&gt;
    * CVE-2014-3250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567060" comment="puppet-2.6.18-0.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37962" version="1" class="patch">
	<metadata>
		<title>Security update for pwlib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="809917" ref_url="https://bugzilla.suse.com/809917" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1864" ref_url="https://www.suse.com/security/cve/CVE-2013-1864/" source="CVE"/>
		<description>

This update fixes a XML DoS vulnerability in pwlib. CVE-2013-1864 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-1864
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1864&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/809917">SUSE bug 809917</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1864/">CVE-2013-1864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567061" comment="pwlib-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567062" comment="pwlib-plugins-avc-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567063" comment="pwlib-plugins-dc-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567064" comment="pwlib-plugins-v4l2-1.10.10-120.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37963" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566177" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566179" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566180" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566182" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566183" comment="python-devel-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566184" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37964" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python was updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 has been disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567065" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567066" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567067" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567068" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567069" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567070" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567071" comment="python-devel-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563788" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567072" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37965" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567073" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567074" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567075" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567076" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567077" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567078" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567079" comment="python-devel-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563796" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567080" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37966" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567081" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567082" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567083" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567084" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567085" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567086" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567087" comment="python-devel-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563804" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567088" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37967" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The 'urlparse' module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567089" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567090" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567091" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567092" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567093" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567094" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567095" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563812" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567096" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37968" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="877258" ref_url="https://bugzilla.suse.com/877258" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>

This security update for python-lxml fixes a input sanitization flaw in 
clean_html. (CVE-2014-3146)

Security Issues:

    * CVE-2014-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-01"/>
	<updated date="2014-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567097" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37969" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843759" ref_url="https://bugzilla.suse.com/843759" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1633" ref_url="https://www.suse.com/security/cve/CVE-2013-1633/" source="CVE"/>
		<description>

python-setuptools so far used only HTTP to retrieve packages, which could 
have lead to man in the middle attacks on newly installed python code.

This update adjusts it to use HTTPS, guaranteeing better connection 
integrity.

Security Issue reference:

    * CVE-2013-1633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1633&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-09"/>
	<updated date="2014-04-09"/>
	<bugzilla href="https://bugzilla.suse.com/843759">SUSE bug 843759</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1633/">CVE-2013-1633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567098" comment="python-setuptools-0.6c8-10.19.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37970" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
		<description>
python-setuptools was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2013-7440: Non-RFC6125-compliant host name matching was incorrect (bsc#930189)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567099" comment="python-setuptools-0.6c11-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37971" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567100" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37972" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567101" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37973" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<description>

This Ruby update fixes the following security issue:

    * bnc#808137: Fixed entity expansion DoS vulnerability in REXML
      (CVE-2013-1821).

Security Issue reference:

    * CVE-2013-1821
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567102" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37974" version="1" class="patch">
	<metadata>
		<title>Security update for rxvt-unicode</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="876101" ref_url="https://bugzilla.suse.com/876101" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3121" ref_url="https://www.suse.com/security/cve/CVE-2014-3121/" source="CVE"/>
		<description>

rxvt-unicode was updated to ensure that window property values can not be 
queried in secure mode. (CVE-2014-3121)

Security Issue reference:

    * CVE-2014-3121
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-20"/>
	<updated date="2014-06-20"/>
	<bugzilla href="https://bugzilla.suse.com/876101">SUSE bug 876101</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3121/">CVE-2014-3121</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567103" comment="rxvt-unicode-9.05-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37975" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="899558" ref_url="https://bugzilla.suse.com/899558" source="BUGZILLA"/>
		<reference ref_id="913001" ref_url="https://bugzilla.suse.com/913001" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<description>

Samba has been updated to fix one security issue:

    * CVE-2015-0240: Don't call talloc_free on an uninitialized pointer
      (bnc#917376).

Additionally, these non-security issues have been fixed:

    * Realign the winbind request structure following require_membership_of
      field expansion (bnc#913001).
    * Reuse connections derived from DFS referrals (bso#10123,
      fate#316512).
    * Set domain/workgroup based on authentication callback value
      (bso#11059).
    * Fix spoolss error response marshalling (bso#10984).
    * Fix spoolss EnumJobs and GetJob responses (bso#10905, bnc#898031).
    * Fix handling of bad EnumJobs levels (bso#10898).
    * Fix small memory-leak in the background print process; (bnc#899558).
    * Prune idle or hung connections older than 'winbind request timeout'
      (bso#3204, bnc#872912).

Security Issues:

    * CVE-2015-0240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-17"/>
	<updated date="2015-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899558">SUSE bug 899558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913001">SUSE bug 913001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567104" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567105" comment="libldb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567106" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567107" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567108" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567109" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567110" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567111" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567112" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567113" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567114" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567115" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567116" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567117" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567118" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567119" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567121" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567122" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567123" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37976" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37977" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567144" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37978" version="1" class="patch">
	<metadata>
		<title>Security update for shim</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="813448" ref_url="https://bugzilla.suse.com/813448" source="BUGZILLA"/>
		<reference ref_id="863205" ref_url="https://bugzilla.suse.com/863205" source="BUGZILLA"/>
		<reference ref_id="866690" ref_url="https://bugzilla.suse.com/866690" source="BUGZILLA"/>
		<reference ref_id="875385" ref_url="https://bugzilla.suse.com/875385" source="BUGZILLA"/>
		<reference ref_id="889332" ref_url="https://bugzilla.suse.com/889332" source="BUGZILLA"/>
		<reference ref_id="889765" ref_url="https://bugzilla.suse.com/889765" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>

shim has been updated to fix three security issues:

    * OOB read access when parsing DHCPv6 packets (remote DoS)
      (CVE-2014-3675).
    * Heap overflow when parsing IPv6 addresses provided by tftp:// DHCPv6
      boot option (RCE) (CVE-2014-3676).
    * Memory corruption when processing user provided MOK lists
      (CVE-2014-3677).

Security Issues:

    * CVE-2014-3675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675&gt;
    * CVE-2014-3676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676&gt;
    * CVE-2014-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/813448">SUSE bug 813448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863205">SUSE bug 863205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866690">SUSE bug 866690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875385">SUSE bug 875385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889765">SUSE bug 889765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37979" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="876449" ref_url="https://bugzilla.suse.com/876449" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<description>

This update fixes a NULL ptr dereference (DoS) via ID_DER_ASN1_DN ID 
payloads.

Security Issue reference:

    * CVE-2014-2891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-14"/>
	<updated date="2014-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567146" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567147" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37980" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567148" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567149" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37981" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="863025" ref_url="https://bugzilla.suse.com/863025" source="BUGZILLA"/>
		<reference ref_id="866503" ref_url="https://bugzilla.suse.com/866503" source="BUGZILLA"/>
		<reference ref_id="868444" ref_url="https://bugzilla.suse.com/868444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<description>

This collective update for sudo provides fixes for the following issues:

    * Security policy bypass when env_reset is disabled. (CVE-2014-0106,
      bnc#866503)
    * Regression in the previous update that causes a segmentation fault
      when running 'sudo -s'. (bnc#868444)
    * Command 'who -m' prints no output when using log_input/log_output
      sudo options. (bnc#863025)

Security Issues references:

    * CVE-2014-0106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/863025">SUSE bug 863025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868444">SUSE bug 868444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567150" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37982" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<description>

When running tcpdump, a remote unauthenticated user could have crashed the 
application or, potentially, execute arbitrary code by injecting crafted 
packages into the network.

The following vulnerabilities in protocol printers have been fixed:

    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

    * CVE-2015-0261
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261&gt;
    * CVE-2015-2154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154&gt;
    * CVE-2014-9140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567151" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37983" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-idle</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="817120" ref_url="https://bugzilla.suse.com/817120" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>

Telepathy-idle did not check SSL certificates. CVE-2007-6746 was assigned 
to this issue.

Security Issue reference:

    * CVE-2007-6746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-15"/>
	<updated date="2013-08-15"/>
	<bugzilla href="https://bugzilla.suse.com/817120">SUSE bug 817120</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566189" comment="telepathy-idle-0.1.5-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37984" version="1" class="patch">
	<metadata>
		<title>Security update for tidy (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="933588" ref_url="https://bugzilla.suse.com/933588" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
		<description>

This update fixes two heap-based buffer overflows in tidy/libtidy. These vulnerabilities
could allow remote attackers to cause a denial of service (crash) via vectors involving
a command character in an href. (CVE-2015-5522, CVE-2015-5523)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-26"/>
	<updated date="2015-08-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567152" comment="libtidy-1.0-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37985" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37986" version="1" class="patch">
	<metadata>
		<title>Security update for unzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

    * CVE-2014-8139: input sanitization errors (bnc#909214)
    * CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
      (bnc#914442)

Security Issues:

    * CVE-2014-9636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636&gt;
    * CVE-2014-8139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567155" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37987" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566191" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566192" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37988" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="914439" ref_url="https://bugzilla.suse.com/914439" source="BUGZILLA"/>
		<reference ref_id="914441" ref_url="https://bugzilla.suse.com/914441" source="BUGZILLA"/>
		<reference ref_id="943795" ref_url="https://bugzilla.suse.com/943795" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<description>

vorbis-tools was updated to fix several security issues.

- A buffer overflow in aiff_open() that could be triggered
  by opening prepared malicious files (CVE-2015-6749, bsc#943795).

- A division by zero and integer overflow by crafted WAV files was fixed
  (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37989" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget has been updated to fix one security issue and two non-security 
issues.

This security issue has been fixed:

    * FTP symlink arbitrary filesystem access (CVE-2014-4877).

These non-security issues have been fixed:

    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567157" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37990" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="899303" ref_url="https://bugzilla.suse.com/899303" source="BUGZILLA"/>
		<reference ref_id="905245" ref_url="https://bugzilla.suse.com/905245" source="BUGZILLA"/>
		<reference ref_id="905246" ref_url="https://bugzilla.suse.com/905246" source="BUGZILLA"/>
		<reference ref_id="905247" ref_url="https://bugzilla.suse.com/905247" source="BUGZILLA"/>
		<reference ref_id="905248" ref_url="https://bugzilla.suse.com/905248" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<description>

wireshark has been updated to version 1.10.11 to fix five security issues.

These security issues have been fixed:

    * SigComp UDVM buffer overflow (CVE-2014-8710).
    * AMQP dissector crash (CVE-2014-8711).
    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
    * TN5250 infinite loops (CVE-2014-8714).

This non-security issue has been fixed:

    * enable zlib (bnc#899303).

Further bug fixes and updated protocol support as listed in:

https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html&gt;

Security Issues:

    * CVE-2014-8711
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711&gt;
    * CVE-2014-8710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710&gt;
    * CVE-2014-8714
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714&gt;
    * CVE-2014-8712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712&gt;
    * CVE-2014-8713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/899303">SUSE bug 899303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37991" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37992" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37993" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868937" ref_url="https://bugzilla.suse.com/868937" source="BUGZILLA"/>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>

This update fixes a remote code execution vulnerability in wpa_supplicant's 
wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this 
issue.

Additionally, password based authentication with PKCS#5v2 has been enabled.

Security Issues:

    * CVE-2014-3686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-15"/>
	<updated date="2014-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/868937">SUSE bug 868937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567158" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567159" comment="wpa_supplicant-gui-0.7.1-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37994" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567160" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567161" comment="wpa_supplicant-gui-0.7.1-6.17.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37995" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37996" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="910441" ref_url="https://bugzilla.suse.com/910441" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix two security issues and a bug:

    * CVE-2015-3456: A buffer overflow in the floppy drive emulation, which
      could be used to carry out denial of service attacks or potential
      code execution against the host. This vulnerability is also known as
      VENOM.
    * CVE-2015-3340: Xen did not initialize certain fields, which allowed
      certain remote service domains to obtain sensitive information from
      memory via a (1) XEN_DOMCTL_gettscinfo or (2)
      XEN_SYSCTL_getdomaininfolist request.
    * An exception in setCPUAffinity when restoring guests. (bsc#910441)

Security Issues:

    * CVE-2015-3456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456&gt;
    * CVE-2015-3340
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-13"/>
	<updated date="2015-05-13"/>
	<bugzilla href="https://bugzilla.suse.com/910441">SUSE bug 910441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37997" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="866902" ref_url="https://bugzilla.suse.com/866902" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="896023" ref_url="https://bugzilla.suse.com/896023" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

Xen has been updated to version 4.2.5 with additional patches to fix six 
security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).

These non-security issues have been fixed:

    * Xen save/restore of HVM guests cuts off disk and networking
      (bnc#866902).
    * Windows 2012 R2 fails to boot up with greater than 60 vcpus
      (bnc#882089).
    * Increase limit domUloader to 32MB (bnc#901317).
    * Adjust xentop column layout (bnc#896023).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-27"/>
	<updated date="2014-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/866902">SUSE bug 866902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896023">SUSE bug 896023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37998" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<description>

xen was updated to fix the following security issues:

* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140)
* CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139)
* CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127)
* CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137)
* CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136)
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37999" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="941074" ref_url="https://bugzilla.suse.com/941074" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<description>
xen was updated to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bsc#941074: Device 51728 could not be connected. Hotplug scripts not working
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941074">SUSE bug 941074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38000" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="808085" ref_url="https://bugzilla.suse.com/808085" source="BUGZILLA"/>
		<reference ref_id="808269" ref_url="https://bugzilla.suse.com/808269" source="BUGZILLA"/>
		<reference ref_id="817210" ref_url="https://bugzilla.suse.com/817210" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<description>

The Xen hypervisor and toolset has been updated to 4.2.2_06 to fix various 
bugs and security issues:

The following security issues have been addressed:

    * CVE-2013-2194: Various integer overflows in the ELF loader were
      fixed. (XSA-55)
    * CVE-2013-2195: Various pointer dereferences issues in the ELF loader
      were fixed. (XSA-55)
    * CVE-2013-2196: Various other problems in the ELF loader were fixed.
      (XSA-55)
    * CVE-2013-2078: A Hypervisor crash due to missing exception recovery
      on XSETBV was fixed. (XSA-54)
    * CVE-2013-2077: A Hypervisor crash due to missing exception recovery
      on XRSTOR was fixed. (XSA-53)
    * CVE-2013-2211: libxl allowed guest write access to sensitive console
      related xenstore keys. (XSA-57)
    * CVE-2013-2076: An information leak on XSAVE/XRSTOR capable AMD CPUs
      (XSA-52) was fixed, where parts of this state could leak to other
      VMs.

Also the following bugs have been fixed:

    * performance issues in mirror lvm (bnc#801663)
    * aacraid driver panics mapping INT A when booting kernel-xen
      (bnc#808085)
    * Fully Virtualized Windows VM install failed on Ivy Bridge platforms
      with Xen kernel (bnc#808269)
    * Did not boot with i915 graphics controller with VT-d enabled
      (bnc#817210)

Security Issue references:

    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-15"/>
	<updated date="2013-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808085">SUSE bug 808085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808269">SUSE bug 808269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817210">SUSE bug 817210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38001" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="817799" ref_url="https://bugzilla.suse.com/817799" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="835896" ref_url="https://bugzilla.suse.com/835896" source="BUGZILLA"/>
		<reference ref_id="836239" ref_url="https://bugzilla.suse.com/836239" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="842512" ref_url="https://bugzilla.suse.com/842512" source="BUGZILLA"/>
		<reference ref_id="842513" ref_url="https://bugzilla.suse.com/842513" source="BUGZILLA"/>
		<reference ref_id="842514" ref_url="https://bugzilla.suse.com/842514" source="BUGZILLA"/>
		<reference ref_id="842515" ref_url="https://bugzilla.suse.com/842515" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.2.3 c/s 26170, fixing various bugs and 
security issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-4369: XSA-68: Fixed possible null dereference when parsing
      vif ratelimiting info
    * CVE-2013-4370: XSA-69: Fixed misplaced free in ocaml
      xc_vcpu_getaffinity stub
    * CVE-2013-4371: XSA-70: Fixed use-after-free in libxl_list_cpupool
      under memory pressure
    * CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-1432: XSA-58: Page reference counting error due to
      XSA-45/CVE-2013-1918 fixes.

Various bugs have also been fixed:

    * Boot failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage, xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform with xen environment, xen hypervisor
      will panic on multiple blades nPar. (bnc#839600)
    * vcpus not started after upgrading Dom0 from SLES 11 SP2 to SP3
      (bnc#835896)
    * SLES 11 SP3 Xen security patch does not automatically update UEFI
      boot binary (bnc#836239)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * SLES 9 SP4 guest fails to start after upgrading to SLES 11 SP3
      (bnc#817799)
    * Various upstream fixes have been included.

Security Issues:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4369
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369&gt;
    * CVE-2013-4370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370&gt;
    * CVE-2013-4371
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/817799">SUSE bug 817799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835896">SUSE bug 835896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836239">SUSE bug 836239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38002" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849665" ref_url="https://bugzilla.suse.com/849665" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="851386" ref_url="https://bugzilla.suse.com/851386" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<description>

The Xen hypervisor and tool-suite have been updated to fix security issues 
and bugs:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.
    * CVE-2013-4553: XSA-74: A lock order reversal between page_alloc_lock
      and mm_rwlock could lead to deadlocks.
    * CVE-2013-4554: XSA-76: Hypercalls exposed to privilege rings 1 and 2
      of HVM guests which might lead to Hypervisor escalation under
      specific circumstances.
    * CVE-2013-6375: XSA-78: Insufficient TLB flushing in VT-d (iommu) code
      could lead to access of memory that was revoked.
    * CVE-2013-4551: XSA-75: A host crash due to guest VMX instruction
      execution was fixed.

Non-security bugs have also been fixed:

    * bnc#840997: It is possible to start a VM twice on the same node.
    * bnc#842417: In HP's UEFI x86_64 platform and SLES 11-SP3, dom0 will
      could lock-up on multiple blades nPar.
    * bnc#848014: Xen Hypervisor panics on 8-blades nPar with 46-bit memory
      addressing.
    * bnc#846849: Soft lock-up with PCI pass-through and many VCPUs.
    * bnc#833483: Boot Failure with Xen kernel in UEFI mode with error 'No
      memory for trampoline'.
    * Increase the maximum supported CPUs in the Hypervisor to 512.

Security Issues:

    * CVE-2013-1922
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922&gt;
    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4551
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-27"/>
	<updated date="2013-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851386">SUSE bug 851386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38003" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="853048" ref_url="https://bugzilla.suse.com/853048" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="858311" ref_url="https://bugzilla.suse.com/858311" source="BUGZILLA"/>
		<reference ref_id="860092" ref_url="https://bugzilla.suse.com/860092" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860165" ref_url="https://bugzilla.suse.com/860165" source="BUGZILLA"/>
		<reference ref_id="860300" ref_url="https://bugzilla.suse.com/860300" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="863297" ref_url="https://bugzilla.suse.com/863297" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1642" ref_url="https://www.suse.com/security/cve/CVE-2014-1642/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1895" ref_url="https://www.suse.com/security/cve/CVE-2014-1895/" source="CVE"/>
		<reference ref_id="CVE-2014-1896" ref_url="https://www.suse.com/security/cve/CVE-2014-1896/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 3 Xen hypervisor and 
toolset has been updated to 4.2.4 to fix various bugs and security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when using Intel VT-d and
      a PCI device has been assigned, does not clear the flag that
      suppresses IOMMU TLB flushes when unspecified errors occur, which
      causes the TLB entries to not be flushed and allows local guest
      administrators to cause a denial of service (host crash) or gain
      privileges via unspecified vectors. (bnc#853048)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and 4.3.x, when
      using device passthrough and configured to support a large number of
      CPUs, frees certain memory that may still be intended for use, which
      allows local guest administrators to cause a denial of service
      (memory corruption and hypervisor crash) and possibly execute
      arbitrary code via vectors related to an out-of-memory error that
      triggers a (1) use-after-free or (2) double free. (bnc#860092)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-85: CVE-2014-1895: The FLASK_AVC_CACHESTAT hypercall, which
      provides access to per-cpu statistics on the Flask security policy,
      incorrectly validates the CPU for which statistics are being
      requested. (bnc#860165)

    * 

      XSA-86: CVE-2014-1896: libvchan (a library for inter-domain
      communication) does not correctly handle unusual or malicious
      contents in the xenstore ring. A malicious guest can exploit this to
      cause a libvchan-using facility to read or write past the end of the
      ring. (bnc#860300)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

Also the following non-security bugs have been fixed:

    * Fixed boot problems with Xen kernel. '(XEN) setup 0000:00:18.0 for d0
      failed (-19)' (bnc#858311)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * Fixed Xen hypervisor panic in HP's UEFI x86_64 platform and with xen
      environment, in booting stage. (bnc#833251)
    * xend/pvscsi: recognize also SCSI CDROM devices (bnc#863297)
    * pygrub: Support (/dev/xvda) style disk specifications

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-6400
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895&gt;
    * CVE-2014-1896
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-27"/>
	<updated date="2014-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858311">SUSE bug 858311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863297">SUSE bug 863297</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1642/">CVE-2014-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1895/">CVE-2014-1895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1896/">CVE-2014-1896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38004" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="798770" ref_url="https://bugzilla.suse.com/798770" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842006" ref_url="https://bugzilla.suse.com/842006" source="BUGZILLA"/>
		<reference ref_id="858178" ref_url="https://bugzilla.suse.com/858178" source="BUGZILLA"/>
		<reference ref_id="862608" ref_url="https://bugzilla.suse.com/862608" source="BUGZILLA"/>
		<reference ref_id="864801" ref_url="https://bugzilla.suse.com/864801" source="BUGZILLA"/>
		<reference ref_id="865682" ref_url="https://bugzilla.suse.com/865682" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="878841" ref_url="https://bugzilla.suse.com/878841" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="881900" ref_url="https://bugzilla.suse.com/881900" source="BUGZILLA"/>
		<reference ref_id="882092" ref_url="https://bugzilla.suse.com/882092" source="BUGZILLA"/>
		<reference ref_id="891539" ref_url="https://bugzilla.suse.com/891539" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to fix 
various bugs and security issues.

The following security issues have been fixed:

    * XSA-108: CVE-2014-7188: Improper MSR range used for x2APIC emulation
      (bnc#897657)
    * XSA-106: CVE-2014-7156: Missing privilege level checks in x86
      emulation of software interrupts (bnc#895802)
    * XSA-105: CVE-2014-7155: Missing privilege level checks in x86 HLT,
      LGDT, LIDT, and LMSW emulation (bnc#895799)
    * XSA-104: CVE-2014-7154: Race condition in HVMOP_track_dirty_vram
      (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)
    * XSA-96: CVE-2014-3967, CVE-2014-3968: Vulnerabilities in HVM MSI
      injection (bnc#878841)
    * XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not preemptible
      (bnc#867910)
    * XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer overflow
      (bnc#842006)
    * CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load
      (bnc#864801)

The following non-security issues have been fixed:

    * xend: Fix netif convertToDeviceNumber for running domains
      (bnc#891539)
    * Installing SLES12 as a VM on SLES11 SP3 fails because of btrfs in the
      VM (bnc#882092)
    * XEN kernel panic do_device_not_available() (bnc#881900)
    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * SLES 11 SP3 vm-install should get RHEL 7 support when released
      (bnc#862608)
    * SLES 11 SP3 XEN kiso version cause softlockup on 8 blades npar(480
      cpu) (bnc#858178)
    * Local attach support for PHY backends using scripts
      local_attach_support_for_phy.patch (bnc#865682)
    * Improve multipath support for npiv devices block-npiv (bnc#798770)

Security Issues:

    * CVE-2013-4344
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344&gt;
    * CVE-2013-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-3967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967&gt;
    * CVE-2014-3968
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/798770">SUSE bug 798770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858178">SUSE bug 858178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862608">SUSE bug 862608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865682">SUSE bug 865682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881900">SUSE bug 881900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882092">SUSE bug 882092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891539">SUSE bug 891539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38005" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919341" ref_url="https://bugzilla.suse.com/919341" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Fully virtualized guest install from network source failed with
      'cannot find guest domain' in XEN. (bsc#919341)

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919341">SUSE bug 919341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38006" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932790" ref_url="https://bugzilla.suse.com/932790" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix seven security vulnerabilities:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bnc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bnc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bnc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bnc#931628)
    * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
      (XSA-134, bnc#932790)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bnc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bnc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38007" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:
      
- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38008" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567270" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38009" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="855685" ref_url="https://bugzilla.suse.com/855685" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

The multiplexing system xinetd was updated to fix security issues and a 
bug.

Security issues fixed:

    * CVE-2013-4342: xinetd ignores user and group directives for tcpmux
      services.
    * CVE-2012-0862: xinetd enables all services when tcp multiplexing is
      used.

Bug fixed:

    * Services started by xinetd were limited to 1024 open file
      descriptors. (bnc#855685)

Security Issues references:

    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;
    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567271" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38010" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567272" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567273" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38011" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues.

Bug 815451/821664

CVE-2013-1981 CVE-2013-1997 CVE-2013-2004

Security Issues:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38012" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-27"/>
	<updated date="2015-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567274" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567275" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38013" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues.

Bug 815451/821665 CVE-2013-1982

Security Issues:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567276" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567277" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38014" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixed a integer overflow issue.

Bug 815451/821667 CVE-2013-1983

Security Issues:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567278" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567279" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38015" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues.

Bug 815451/821668 CVE-2013-2062

Security Issues:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566284" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566285" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38016" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues.

Bug 815451/821669 CVE-2013-1987

Security Issues:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567280" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567281" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38017" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues.

Bug 815451/821670 CVE-2013-2002/CVE-2013-2005

Security Issues:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567282" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567283" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38018" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues.

Bug 815451/821671 CVE-2013-1989/CVE-2013-2066

Security Issues:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567284" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567285" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38019" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567286" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38020" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566320" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566321" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38021" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38022" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567287" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567288" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38023" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38024" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38025" version="1" class="patch">
	<metadata>
		<title>security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<description>


This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#939709 (XSA-139):  Use after free in QEMU/Xen
  block unplug protocol (CVE-2015-5166)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38026" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566351" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38027" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566356" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566357" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566358" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38028" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566359" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566360" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566361" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38029" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566362" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566363" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566364" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38030" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566365" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566366" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566367" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38031" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567308" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567309" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567310" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38032" version="1" class="patch">
	<metadata>
		<title>Security update for cabextract (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<description>

This security update fixes the following issues:

- Fix possible infinite loop caused DoS (bsc919283, CVE-2014-9556)
- Fix zero dereference (bsc#934524, CVE-2014-9732)
- Fix off by one (bsc#934527, CVE-2015-4470)
- Fix buffer under-read crash (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-27"/>
	<updated date="2015-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38033" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566373" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38034" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-02"/>
	<updated date="2016-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38035" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566387" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566388" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566389" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38036" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566396" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566397" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38037" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38038" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566407" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38039" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567313" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38040" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38041" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38042" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38043" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38044" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="937339" ref_url="https://bugzilla.suse.com/937339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578/" source="CVE"/>
		<reference ref_id="CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114/" source="CVE"/>
		<reference ref_id="CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115/" source="CVE"/>
		<reference ref_id="CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116/" source="CVE"/>
		<reference ref_id="CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117/" source="CVE"/>
		<reference ref_id="CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118/" source="CVE"/>
		<reference ref_id="CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119/" source="CVE"/>
		<reference ref_id="CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120/" source="CVE"/>
		<reference ref_id="CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121/" source="CVE"/>
		<reference ref_id="CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122/" source="CVE"/>
		<reference ref_id="CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123/" source="CVE"/>
		<reference ref_id="CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124/" source="CVE"/>
		<reference ref_id="CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125/" source="CVE"/>
		<reference ref_id="CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126/" source="CVE"/>
		<reference ref_id="CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127/" source="CVE"/>
		<reference ref_id="CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128/" source="CVE"/>
		<reference ref_id="CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129/" source="CVE"/>
		<reference ref_id="CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130/" source="CVE"/>
		<reference ref_id="CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131/" source="CVE"/>
		<reference ref_id="CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132/" source="CVE"/>
		<reference ref_id="CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133/" source="CVE"/>
		<reference ref_id="CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134/" source="CVE"/>
		<reference ref_id="CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135/" source="CVE"/>
		<reference ref_id="CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136/" source="CVE"/>
		<reference ref_id="CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137/" source="CVE"/>
		<reference ref_id="CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428/" source="CVE"/>
		<reference ref_id="CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429/" source="CVE"/>
		<reference ref_id="CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430/" source="CVE"/>
		<reference ref_id="CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431/" source="CVE"/>
		<reference ref_id="CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432/" source="CVE"/>
		<reference ref_id="CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433/" source="CVE"/>
		<reference ref_id="CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116/" source="CVE"/>
		<reference ref_id="CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117/" source="CVE"/>
		<reference ref_id="CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118/" source="CVE"/>
		<reference ref_id="CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119/" source="CVE"/>
		<description>
flash-player was updated to fix 35 security issues.

These security issues were fixed:
- CVE-2015-3135, CVE-2015-4432, CVE-2015-5118: Heap buffer overflow vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431: Memory corruption vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3126, CVE-2015-4429: Null pointer dereference issues (bsc#937339).
- CVE-2015-3114: A security bypass vulnerability that could lead to information disclosure (bsc#937339).
- CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433: Type confusion vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119: Use-after-free vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116: Vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (bsc#937339).
 		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38045" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="937752" ref_url="https://bugzilla.suse.com/937752" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122/" source="CVE"/>
		<reference ref_id="CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function (bsc#937752).
- CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property (bsc#937752).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-16"/>
	<updated date="2015-07-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566541" comment="flash-player-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566542" comment="flash-player-gnome-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566543" comment="flash-player-kde4-11.2.202.491-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38046" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="941239" ref_url="https://bugzilla.suse.com/941239" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124/" source="CVE"/>
		<reference ref_id="CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125/" source="CVE"/>
		<reference ref_id="CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127/" source="CVE"/>
		<reference ref_id="CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128/" source="CVE"/>
		<reference ref_id="CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131/" source="CVE"/>
		<reference ref_id="CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132/" source="CVE"/>
		<reference ref_id="CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133/" source="CVE"/>
		<reference ref_id="CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134/" source="CVE"/>
		<reference ref_id="CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539/" source="CVE"/>
		<reference ref_id="CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540/" source="CVE"/>
		<reference ref_id="CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541/" source="CVE"/>
		<reference ref_id="CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544/" source="CVE"/>
		<reference ref_id="CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545/" source="CVE"/>
		<reference ref_id="CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546/" source="CVE"/>
		<reference ref_id="CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547/" source="CVE"/>
		<reference ref_id="CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548/" source="CVE"/>
		<reference ref_id="CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549/" source="CVE"/>
		<reference ref_id="CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550/" source="CVE"/>
		<reference ref_id="CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551/" source="CVE"/>
		<reference ref_id="CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552/" source="CVE"/>
		<reference ref_id="CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553/" source="CVE"/>
		<reference ref_id="CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554/" source="CVE"/>
		<reference ref_id="CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555/" source="CVE"/>
		<reference ref_id="CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556/" source="CVE"/>
		<reference ref_id="CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557/" source="CVE"/>
		<reference ref_id="CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558/" source="CVE"/>
		<reference ref_id="CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559/" source="CVE"/>
		<reference ref_id="CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560/" source="CVE"/>
		<reference ref_id="CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561/" source="CVE"/>
		<reference ref_id="CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562/" source="CVE"/>
		<reference ref_id="CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<description>


This security update to 11.2.202.508 (bsc#941239) fixes the
following issues:

  * APSB15-19: CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
    CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548,
    CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552,
    CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
    CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560,
    CVE-2015-5561, CVE-2015-5562, CVE-2015-5563
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38047" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="946880" ref_url="https://bugzilla.suse.com/946880" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567/" source="CVE"/>
		<reference ref_id="CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568/" source="CVE"/>
		<reference ref_id="CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570/" source="CVE"/>
		<reference ref_id="CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571/" source="CVE"/>
		<reference ref_id="CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572/" source="CVE"/>
		<reference ref_id="CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573/" source="CVE"/>
		<reference ref_id="CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574/" source="CVE"/>
		<reference ref_id="CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575/" source="CVE"/>
		<reference ref_id="CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576/" source="CVE"/>
		<reference ref_id="CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577/" source="CVE"/>
		<reference ref_id="CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578/" source="CVE"/>
		<reference ref_id="CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579/" source="CVE"/>
		<reference ref_id="CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580/" source="CVE"/>
		<reference ref_id="CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581/" source="CVE"/>
		<reference ref_id="CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582/" source="CVE"/>
		<reference ref_id="CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584/" source="CVE"/>
		<reference ref_id="CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587/" source="CVE"/>
		<reference ref_id="CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588/" source="CVE"/>
		<reference ref_id="CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676/" source="CVE"/>
		<reference ref_id="CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677/" source="CVE"/>
		<reference ref_id="CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678/" source="CVE"/>
		<reference ref_id="CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679/" source="CVE"/>
		<reference ref_id="CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<description>

Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues:

More information can be found on:

  https://helpx.adobe.com/security/products/flash-player/apsb15-23.html

		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38048" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="950169" ref_url="https://bugzilla.suse.com/950169" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569/" source="CVE"/>
		<reference ref_id="CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625/" source="CVE"/>
		<reference ref_id="CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626/" source="CVE"/>
		<reference ref_id="CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627/" source="CVE"/>
		<reference ref_id="CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628/" source="CVE"/>
		<reference ref_id="CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629/" source="CVE"/>
		<reference ref_id="CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630/" source="CVE"/>
		<reference ref_id="CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631/" source="CVE"/>
		<reference ref_id="CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632/" source="CVE"/>
		<reference ref_id="CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633/" source="CVE"/>
		<reference ref_id="CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634/" source="CVE"/>
		<reference ref_id="CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643/" source="CVE"/>
		<reference ref_id="CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<description>
flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169).

These security issues were fixed:
- A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
- A defense-in-depth feature in the Flash broker API (CVE-2015-5569).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).
- A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38049" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="950474" ref_url="https://bugzilla.suse.com/950474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-16"/>
	<updated date="2015-10-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566553" comment="flash-player-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566554" comment="flash-player-gnome-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566555" comment="flash-player-kde4-11.2.202.540-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38050" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954512" ref_url="https://bugzilla.suse.com/954512" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651/" source="CVE"/>
		<reference ref_id="CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652/" source="CVE"/>
		<reference ref_id="CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653/" source="CVE"/>
		<reference ref_id="CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654/" source="CVE"/>
		<reference ref_id="CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655/" source="CVE"/>
		<reference ref_id="CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656/" source="CVE"/>
		<reference ref_id="CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657/" source="CVE"/>
		<reference ref_id="CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658/" source="CVE"/>
		<reference ref_id="CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659/" source="CVE"/>
		<reference ref_id="CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660/" source="CVE"/>
		<reference ref_id="CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661/" source="CVE"/>
		<reference ref_id="CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662/" source="CVE"/>
		<reference ref_id="CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663/" source="CVE"/>
		<reference ref_id="CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042/" source="CVE"/>
		<reference ref_id="CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043/" source="CVE"/>
		<reference ref_id="CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044/" source="CVE"/>
		<reference ref_id="CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<description>
The flash-player package was updated to fix the following security issues:

- Security update to 11.2.202.548 (bsc#954512):
  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
    CVE-2015-8044, CVE-2015-8046
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-11"/>
	<updated date="2015-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38051" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="958324" ref_url="https://bugzilla.suse.com/958324" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045/" source="CVE"/>
		<reference ref_id="CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047/" source="CVE"/>
		<reference ref_id="CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048/" source="CVE"/>
		<reference ref_id="CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049/" source="CVE"/>
		<reference ref_id="CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050/" source="CVE"/>
		<reference ref_id="CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055/" source="CVE"/>
		<reference ref_id="CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056/" source="CVE"/>
		<reference ref_id="CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057/" source="CVE"/>
		<reference ref_id="CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058/" source="CVE"/>
		<reference ref_id="CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059/" source="CVE"/>
		<reference ref_id="CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060/" source="CVE"/>
		<reference ref_id="CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061/" source="CVE"/>
		<reference ref_id="CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062/" source="CVE"/>
		<reference ref_id="CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063/" source="CVE"/>
		<reference ref_id="CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064/" source="CVE"/>
		<reference ref_id="CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065/" source="CVE"/>
		<reference ref_id="CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066/" source="CVE"/>
		<reference ref_id="CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067/" source="CVE"/>
		<reference ref_id="CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068/" source="CVE"/>
		<reference ref_id="CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069/" source="CVE"/>
		<reference ref_id="CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070/" source="CVE"/>
		<reference ref_id="CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071/" source="CVE"/>
		<reference ref_id="CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401/" source="CVE"/>
		<reference ref_id="CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402/" source="CVE"/>
		<reference ref_id="CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403/" source="CVE"/>
		<reference ref_id="CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404/" source="CVE"/>
		<reference ref_id="CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405/" source="CVE"/>
		<reference ref_id="CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406/" source="CVE"/>
		<reference ref_id="CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407/" source="CVE"/>
		<reference ref_id="CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408/" source="CVE"/>
		<reference ref_id="CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409/" source="CVE"/>
		<reference ref_id="CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410/" source="CVE"/>
		<reference ref_id="CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411/" source="CVE"/>
		<reference ref_id="CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412/" source="CVE"/>
		<reference ref_id="CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413/" source="CVE"/>
		<reference ref_id="CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414/" source="CVE"/>
		<reference ref_id="CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415/" source="CVE"/>
		<reference ref_id="CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416/" source="CVE"/>
		<reference ref_id="CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417/" source="CVE"/>
		<reference ref_id="CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418/" source="CVE"/>
		<reference ref_id="CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419/" source="CVE"/>
		<reference ref_id="CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420/" source="CVE"/>
		<reference ref_id="CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421/" source="CVE"/>
		<reference ref_id="CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422/" source="CVE"/>
		<reference ref_id="CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423/" source="CVE"/>
		<reference ref_id="CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424/" source="CVE"/>
		<reference ref_id="CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425/" source="CVE"/>
		<reference ref_id="CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426/" source="CVE"/>
		<reference ref_id="CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427/" source="CVE"/>
		<reference ref_id="CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428/" source="CVE"/>
		<reference ref_id="CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429/" source="CVE"/>
		<reference ref_id="CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430/" source="CVE"/>
		<reference ref_id="CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431/" source="CVE"/>
		<reference ref_id="CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432/" source="CVE"/>
		<reference ref_id="CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433/" source="CVE"/>
		<reference ref_id="CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434/" source="CVE"/>
		<reference ref_id="CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435/" source="CVE"/>
		<reference ref_id="CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436/" source="CVE"/>
		<reference ref_id="CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437/" source="CVE"/>
		<reference ref_id="CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438/" source="CVE"/>
		<reference ref_id="CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439/" source="CVE"/>
		<reference ref_id="CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440/" source="CVE"/>
		<reference ref_id="CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441/" source="CVE"/>
		<reference ref_id="CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442/" source="CVE"/>
		<reference ref_id="CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443/" source="CVE"/>
		<reference ref_id="CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444/" source="CVE"/>
		<reference ref_id="CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445/" source="CVE"/>
		<reference ref_id="CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446/" source="CVE"/>
		<reference ref_id="CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447/" source="CVE"/>
		<reference ref_id="CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448/" source="CVE"/>
		<reference ref_id="CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449/" source="CVE"/>
		<reference ref_id="CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450/" source="CVE"/>
		<reference ref_id="CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451/" source="CVE"/>
		<reference ref_id="CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452/" source="CVE"/>
		<reference ref_id="CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453/" source="CVE"/>
		<reference ref_id="CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454/" source="CVE"/>
		<reference ref_id="CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.554 fixes the following security issues
in Adobe security advisory APSB15-32.

* These updates resolve heap buffer overflow vulnerabilities that could
  lead to code execution (CVE-2015-8438, CVE-2015-8446).
* These updates resolve memory corruption vulnerabilities that could
  lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417,
  CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045,
  CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
* These updates resolve security bypass vulnerabilities (CVE-2015-8453,
  CVE-2015-8440, CVE-2015-8409).
* These updates resolve a stack overflow vulnerability that could lead
  to code execution (CVE-2015-8407).
* These updates resolve a type confusion vulnerability that could lead
  to code execution (CVE-2015-8439).
* These updates resolve an integer overflow vulnerability that could
  lead to code execution (CVE-2015-8445).
* These updates resolve a buffer overflow vulnerability that could lead
  to code execution (CVE-2015-8415)
* These updates resolve use-after-free vulnerabilities that could
  lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437,
  CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452,
  CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411,
  CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423,
  CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426,
  CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434,
  CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058,
  CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067,
  CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065,
  CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403,
  CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070,
  CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).

Please also see
        https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-09"/>
	<updated date="2015-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38052" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960317" ref_url="https://bugzilla.suse.com/960317" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459/" source="CVE"/>
		<reference ref_id="CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460/" source="CVE"/>
		<reference ref_id="CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634/" source="CVE"/>
		<reference ref_id="CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635/" source="CVE"/>
		<reference ref_id="CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636/" source="CVE"/>
		<reference ref_id="CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638/" source="CVE"/>
		<reference ref_id="CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640/" source="CVE"/>
		<reference ref_id="CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642/" source="CVE"/>
		<reference ref_id="CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644/" source="CVE"/>
		<reference ref_id="CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645/" source="CVE"/>
		<reference ref_id="CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646/" source="CVE"/>
		<reference ref_id="CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647/" source="CVE"/>
		<reference ref_id="CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648/" source="CVE"/>
		<reference ref_id="CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649/" source="CVE"/>
		<reference ref_id="CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650/" source="CVE"/>
		<reference ref_id="CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

   - CVE-2015-8644: Type confusion vulnerability that could lead to code execution.
   - CVE-2015-8651: Integer overflow vulnerability that could lead to code execution.
   - CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650: Use-after-free vulnerabilities that could lead to code execution.
   - CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645: Memory corruption vulnerabilities that could lead to code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38053" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="965901" ref_url="https://bugzilla.suse.com/965901" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0964" ref_url="https://www.suse.com/security/cve/CVE-2016-0964/" source="CVE"/>
		<reference ref_id="CVE-2016-0965" ref_url="https://www.suse.com/security/cve/CVE-2016-0965/" source="CVE"/>
		<reference ref_id="CVE-2016-0966" ref_url="https://www.suse.com/security/cve/CVE-2016-0966/" source="CVE"/>
		<reference ref_id="CVE-2016-0967" ref_url="https://www.suse.com/security/cve/CVE-2016-0967/" source="CVE"/>
		<reference ref_id="CVE-2016-0968" ref_url="https://www.suse.com/security/cve/CVE-2016-0968/" source="CVE"/>
		<reference ref_id="CVE-2016-0969" ref_url="https://www.suse.com/security/cve/CVE-2016-0969/" source="CVE"/>
		<reference ref_id="CVE-2016-0970" ref_url="https://www.suse.com/security/cve/CVE-2016-0970/" source="CVE"/>
		<reference ref_id="CVE-2016-0971" ref_url="https://www.suse.com/security/cve/CVE-2016-0971/" source="CVE"/>
		<reference ref_id="CVE-2016-0972" ref_url="https://www.suse.com/security/cve/CVE-2016-0972/" source="CVE"/>
		<reference ref_id="CVE-2016-0973" ref_url="https://www.suse.com/security/cve/CVE-2016-0973/" source="CVE"/>
		<reference ref_id="CVE-2016-0974" ref_url="https://www.suse.com/security/cve/CVE-2016-0974/" source="CVE"/>
		<reference ref_id="CVE-2016-0975" ref_url="https://www.suse.com/security/cve/CVE-2016-0975/" source="CVE"/>
		<reference ref_id="CVE-2016-0976" ref_url="https://www.suse.com/security/cve/CVE-2016-0976/" source="CVE"/>
		<reference ref_id="CVE-2016-0977" ref_url="https://www.suse.com/security/cve/CVE-2016-0977/" source="CVE"/>
		<reference ref_id="CVE-2016-0978" ref_url="https://www.suse.com/security/cve/CVE-2016-0978/" source="CVE"/>
		<reference ref_id="CVE-2016-0979" ref_url="https://www.suse.com/security/cve/CVE-2016-0979/" source="CVE"/>
		<reference ref_id="CVE-2016-0980" ref_url="https://www.suse.com/security/cve/CVE-2016-0980/" source="CVE"/>
		<reference ref_id="CVE-2016-0981" ref_url="https://www.suse.com/security/cve/CVE-2016-0981/" source="CVE"/>
		<reference ref_id="CVE-2016-0982" ref_url="https://www.suse.com/security/cve/CVE-2016-0982/" source="CVE"/>
		<reference ref_id="CVE-2016-0983" ref_url="https://www.suse.com/security/cve/CVE-2016-0983/" source="CVE"/>
		<reference ref_id="CVE-2016-0984" ref_url="https://www.suse.com/security/cve/CVE-2016-0984/" source="CVE"/>
		<reference ref_id="CVE-2016-0985" ref_url="https://www.suse.com/security/cve/CVE-2016-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

- Security update to 11.2.202.569 (bsc#965901):
  * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966,
    CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970,
    CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974,
    CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978,
    CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982,
    CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0964/">CVE-2016-0964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0965/">CVE-2016-0965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0966/">CVE-2016-0966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0967/">CVE-2016-0967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0968/">CVE-2016-0968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0969/">CVE-2016-0969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0970/">CVE-2016-0970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0971/">CVE-2016-0971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0972/">CVE-2016-0972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0973/">CVE-2016-0973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0974/">CVE-2016-0974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0975/">CVE-2016-0975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0976/">CVE-2016-0976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0977/">CVE-2016-0977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0978/">CVE-2016-0978</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0979/">CVE-2016-0979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0980/">CVE-2016-0980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0981/">CVE-2016-0981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0982/">CVE-2016-0982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0983/">CVE-2016-0983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0984/">CVE-2016-0984</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0985/">CVE-2016-0985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38054" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="970547" ref_url="https://bugzilla.suse.com/970547" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0960" ref_url="https://www.suse.com/security/cve/CVE-2016-0960/" source="CVE"/>
		<reference ref_id="CVE-2016-0961" ref_url="https://www.suse.com/security/cve/CVE-2016-0961/" source="CVE"/>
		<reference ref_id="CVE-2016-0962" ref_url="https://www.suse.com/security/cve/CVE-2016-0962/" source="CVE"/>
		<reference ref_id="CVE-2016-0963" ref_url="https://www.suse.com/security/cve/CVE-2016-0963/" source="CVE"/>
		<reference ref_id="CVE-2016-0986" ref_url="https://www.suse.com/security/cve/CVE-2016-0986/" source="CVE"/>
		<reference ref_id="CVE-2016-0987" ref_url="https://www.suse.com/security/cve/CVE-2016-0987/" source="CVE"/>
		<reference ref_id="CVE-2016-0988" ref_url="https://www.suse.com/security/cve/CVE-2016-0988/" source="CVE"/>
		<reference ref_id="CVE-2016-0989" ref_url="https://www.suse.com/security/cve/CVE-2016-0989/" source="CVE"/>
		<reference ref_id="CVE-2016-0990" ref_url="https://www.suse.com/security/cve/CVE-2016-0990/" source="CVE"/>
		<reference ref_id="CVE-2016-0991" ref_url="https://www.suse.com/security/cve/CVE-2016-0991/" source="CVE"/>
		<reference ref_id="CVE-2016-0992" ref_url="https://www.suse.com/security/cve/CVE-2016-0992/" source="CVE"/>
		<reference ref_id="CVE-2016-0993" ref_url="https://www.suse.com/security/cve/CVE-2016-0993/" source="CVE"/>
		<reference ref_id="CVE-2016-0994" ref_url="https://www.suse.com/security/cve/CVE-2016-0994/" source="CVE"/>
		<reference ref_id="CVE-2016-0995" ref_url="https://www.suse.com/security/cve/CVE-2016-0995/" source="CVE"/>
		<reference ref_id="CVE-2016-0996" ref_url="https://www.suse.com/security/cve/CVE-2016-0996/" source="CVE"/>
		<reference ref_id="CVE-2016-0997" ref_url="https://www.suse.com/security/cve/CVE-2016-0997/" source="CVE"/>
		<reference ref_id="CVE-2016-0998" ref_url="https://www.suse.com/security/cve/CVE-2016-0998/" source="CVE"/>
		<reference ref_id="CVE-2016-0999" ref_url="https://www.suse.com/security/cve/CVE-2016-0999/" source="CVE"/>
		<reference ref_id="CVE-2016-1000" ref_url="https://www.suse.com/security/cve/CVE-2016-1000/" source="CVE"/>
		<reference ref_id="CVE-2016-1001" ref_url="https://www.suse.com/security/cve/CVE-2016-1001/" source="CVE"/>
		<reference ref_id="CVE-2016-1002" ref_url="https://www.suse.com/security/cve/CVE-2016-1002/" source="CVE"/>
		<reference ref_id="CVE-2016-1005" ref_url="https://www.suse.com/security/cve/CVE-2016-1005/" source="CVE"/>
		<reference ref_id="CVE-2016-1010" ref_url="https://www.suse.com/security/cve/CVE-2016-1010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 11.2.202.577 to fix the following
list of security issues (bsc#970547):

These updates resolve integer overflow vulnerabilities that could lead
to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).

These updates resolve use-after-free vulnerabilities that could
lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990,
CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997,
CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).

These updates resolve a heap overflow vulnerability that could lead to
code execution (CVE-2016-1001).

These updates resolve memory corruption vulnerabilities that could
lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962,
CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002,
CVE-2016-1005).

Adobe advisory with more information:
https://helpx.adobe.com/security/products/flash-player/apsb16-08.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0960/">CVE-2016-0960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0961/">CVE-2016-0961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0962/">CVE-2016-0962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0963/">CVE-2016-0963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0986/">CVE-2016-0986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0987/">CVE-2016-0987</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0988/">CVE-2016-0988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0989/">CVE-2016-0989</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0990/">CVE-2016-0990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0991/">CVE-2016-0991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0992/">CVE-2016-0992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0993/">CVE-2016-0993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0994/">CVE-2016-0994</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0995/">CVE-2016-0995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0996/">CVE-2016-0996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0997/">CVE-2016-0997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0998/">CVE-2016-0998</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0999/">CVE-2016-0999</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1000/">CVE-2016-1000</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1001/">CVE-2016-1001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1002/">CVE-2016-1002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1005/">CVE-2016-1005</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1010/">CVE-2016-1010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38055" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566565" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38056" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567320" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567321" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567322" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567323" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567324" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567325" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567326" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567328" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567329" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567330" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38057" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566572" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38058" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38059" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38060" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566604" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566605" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38061" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38062" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566612" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566613" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38063" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Also following bugs were fixed:
- Fix buffer overflows when reading username and password. (bsc#956631, CVE-2015-8370)
- Expand list of grub.cfg search path in PV Xen guests for systems installed
  on btrfs snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38064" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566630" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566631" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566632" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38065" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566633" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566634" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566635" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38066" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="944208" ref_url="https://bugzilla.suse.com/944208" source="BUGZILLA"/>
		<reference ref_id="944209" ref_url="https://bugzilla.suse.com/944209" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html" source="SUSE-SU"/>
		<description>

The Java Plugin IcedTea Web was updated to 1.5.2, fixing bugs and security issues.

* permissions sandbox and signed app and unsigned app with
  permissions all-permissions now run in sandbox instead of not at
  all.
* fixed DownloadService
* RH1231441 Unable to read the text of the buttons of the
  security dialogue
* Fixed RH1233697 icedtea-web: applet origin spoofing
  (CVE-2015-5235, bsc#944208)
* Fixed RH1233667 icedtea-web: unexpected permanent authorization
  of unsigned applets (CVE-2015-5234, bsc#944209)
* MissingALACAdialog made available also for unsigned applications (but ignoring actual manifest value) and fixed
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944208">SUSE bug 944208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944209">SUSE bug 944209</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567333" comment="icedtea-web-1.5.3-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38067" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<description>
icu was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-15"/>
	<updated date="2015-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564553" comment="icu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567334" comment="libicu-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38068" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="938248" ref_url="https://bugzilla.suse.com/938248" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<description>
OpenJDK was updated to 2.6.1 - OpenJDK 7u85 to fix security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2596: Difficult to exploit vulnerability in the Hotspot component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data.
* CVE-2015-2597: Easily exploitable vulnerability in the Install component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2627: Very difficult to exploit vulnerability in the Install component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2628: Easily exploitable vulnerability in the CORBA component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. 
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4736: Difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-22"/>
	<updated date="2015-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38069" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="951376" ref_url="https://bugzilla.suse.com/951376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u91 to fix 17 security issues.

These security issues were fixed:
- CVE-2015-4843: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4842: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JAXP (bsc#951376).
- CVE-2015-4840: Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4872: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect integrity via unknown vectors related to Security (bsc#951376).
- CVE-2015-4860: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883 (bsc#951376).
- CVE-2015-4844: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4883: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860 (bsc#951376).
- CVE-2015-4893: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4911: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893 (bsc#951376).
- CVE-2015-4882: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect availability via vectors related to CORBA (bsc#951376).
- CVE-2015-4881: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835 (bsc#951376).
- CVE-2015-4734: Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JGSS (bsc#951376).
- CVE-2015-4806: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4805: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization (bsc#951376).
- CVE-2015-4803: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4835: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881 (bsc#951376).
- CVE-2015-4903: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to RMI (bsc#951376).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-23"/>
	<updated date="2015-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38070" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38071" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="972468" ref_url="https://bugzilla.suse.com/972468" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html" source="SUSE-SU"/>
		<description>

The OpenJDK Java java-1_7_0-openjdk was updated to 2.6.5 to fix the following issues:

Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
* Security fixes
  - S8152335, CVE-2016-0636: Improve MethodHandle consistency, which could be used by attackers to inject code.
* Import of OpenJDK 7 u99 build 0
  - S6425769, PR2858: Allow specifying an address to bind JMX
    remote connector
  - S6961123: setWMClass fails to null-terminate WM_CLASS string
  - S8145982, PR2858: JMXInterfaceBindingTest is failing
    intermittently
  - S8146015, PR2858: JMXInterfaceBindingTest is failing
    intermittently for IPv6 addresses
* Backports
  - S8028727, PR2814: [parfait] warnings from b116 for
   jdk.src.share.native.sun.security.ec: JNI pending exceptions
  - S8048512, PR2814: Uninitialised memory in
    jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
  - S8071705. PR2819, RH1182694: Java application menu misbehaves
    when running multiple screen stacked vertically
  - S8150954, PR2866, RH1176206: AWT Robot not compatible with
    GNOME Shell
* Bug fixes
  - PR2803: Make system CUPS optional
  - PR2886: Location of 'stap' executable is hard-coded
  - PR2893: test/tapset/jstaptest.pl should be executable
  - PR2894: Add missing test directory in make check.
* CACAO
  - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
    Assertion `dest &amp;&amp; result &amp;&amp; x.any &amp;&amp; y.any' failed
* AArch64 port
  - PR2852: Add support for large code cache
  - PR2852: Apply ReservedCodeCacheSize default limiting to
    AArch64 only.
  - S8081289, PR2852: aarch64: add support for
    RewriteFrequentPairs in interpreter
  - S8131483, PR2852: aarch64: illegal stlxr instructions
  - S8133352, PR2852: aarch64: generates constrained unpredictable
    instructions
  - S8133842, PR2852: aarch64: C2 generates illegal instructions
    with int shifts &gt;=32
  - S8134322, PR2852: AArch64: Fix several errors in C2 biased
    locking implementation
  - S8136615, PR2852: aarch64: elide DecodeN when followed by
    CmpP 0
  - S8138575, PR2852: Improve generated code for profile counters
  - S8138641, PR2852: Disable C2 peephole by default for aarch64
  - S8138966, PR2852: Intermittent SEGV running ParallelGC
  - S8143067, PR2852: aarch64: guarantee failure in javac
  - S8143285, PR2852: aarch64: Missing load acquire when checking
    if ConstantPoolCacheEntry is resolved
  - S8143584, PR2852: Load constant pool tag and class status with
 load acquire
  - S8144201, PR2852: aarch64:
    jdk/test/com/sun/net/httpserver/Test6a.java fails with
    --enable-unlimited-crypto
  - S8144582, PR2852: AArch64 does not generate correct branch
    profile data
  - S8146709, PR2852: AArch64: Incorrect use of ADRP for
    byte_map_base
  - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
    Unsafe.getAndSetObject
  - S8148240, PR2852: aarch64: random infrequent null pointer
    exceptions in javac
* PPC &amp; AIX port
  - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
    os_aix.cpp after 8028280
  - S8139258, PR2851: PPC64LE: argument passing problem when
    passing 15 floats in native call
  - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
    kill register R12
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567335" comment="java-1_7_0-openjdk-1.7.0.99-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567336" comment="java-1_7_0-openjdk-demo-1.7.0.99-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567337" comment="java-1_7_0-openjdk-devel-1.7.0.99-0.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38072" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566698" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566700" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566701" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566702" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566703" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38073" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="891116" ref_url="https://bugzilla.suse.com/891116" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917968" ref_url="https://bugzilla.suse.com/917968" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="923431" ref_url="https://bugzilla.suse.com/923431" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="928988" ref_url="https://bugzilla.suse.com/928988" source="BUGZILLA"/>
		<reference ref_id="929076" ref_url="https://bugzilla.suse.com/929076" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="932882" ref_url="https://bugzilla.suse.com/932882" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935055" ref_url="https://bugzilla.suse.com/935055" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936095" ref_url="https://bugzilla.suse.com/936095" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936921" ref_url="https://bugzilla.suse.com/936921" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942404" ref_url="https://bugzilla.suse.com/942404" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943477" ref_url="https://bugzilla.suse.com/943477" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.

Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
  VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
  system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 do not properly consider yielding a
  processor, which allowed remote attackers to cause a denial of service
  (system hang) via incorrect checksums within a UDP packet flood
  (bsc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
  values, which allowed remote attackers to cause a denial of service
  (EPOLLET epoll application read outage) via an incorrect checksum in a
  UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
  bypass intended size restrictions and trigger read operations on
  additional memory locations by changing the handle_bytes value of a
  file handle during the execution of this function (bsc#915517).
* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel before 3.16 do not properly consider the
  side effects of failed __copy_to_user_inatomic and
  __copy_from_user_inatomic calls, which allows local users to cause a
  denial of service (system crash) or possibly gain privileges via a
  crafted application, aka an 'I/O' vector array overrun. (bsc#933429)
* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through
  3.19.1 do not properly restrict access to PCI command registers, which
  might allow local guest users to cause a denial of service
  (non-maskable interrupt and host crash) by disabling the (1) memory or
  (2) I/O decoding for a PCI Express device and then accessing the
  device, which triggers an Unsupported Request (UR) response.
  (bsc#919463)
* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before
  3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode
  task, which might allow local users to bypass the seccomp or audit
  protection mechanism via a crafted application that uses the (1) fork
  or (2) close system call, as demonstrated by an attack against seccomp
  before 3.16. (bsc#926240)
* CVE-2015-4700: The bpf_int_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
  local users to cause a denial of service (system crash) by creating a
  packet filter and then loading crafted BPF instructions that trigger
  late convergence by the JIT compiler (bsc#935705).
* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.19.1 did not validate certain length values,
  which allowed local users to cause a denial of service (incorrect data
  representation or integer overflow, and OOPS) via a crafted UDF
  filesystem (bsc#933907).
* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0
  (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as
  used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,
  allows guest OS users to obtain sensitive information from
  uninitialized locations in host OS kernel memory via unspecified
  vectors. (bsc#917830)
* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not validate certain lengths, which allowed local
  users to cause a denial of service (buffer over-read and system crash)
  via a crafted filesystem image, related to fs/udf/inode.c and
  fs/udf/symlink.c (bsc#933904).
* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the
  Linux kernel before 3.18.2 relies on component lengths that are unused,
  which allowed local users to cause a denial of service (system crash)
  via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.18.2 did not ensure a certain data-structure size
  consistency, which allowed local users to cause a denial of service
  (system crash) via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not ensure that space is available for storing a
  symlink target's name along with a trailing \0 character, which allowed
  local users to obtain sensitive information via a crafted filesystem
  image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).

The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- Apparmor: fix file_permission if profile is updated (bsc#917968).
- block: Discard bios do not have data (bsc#928988).
- cifs: Fix missing crypto allocation (bnc#937402).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).
- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm-&gt;def_flags setting in load_elf_binary() (fate#317831,bnc#891116)).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637). 
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn.
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- supported.conf: enable sch_mqprio (bsc#932882)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-08"/>
	<updated date="2015-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891116">SUSE bug 891116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917968">SUSE bug 917968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923431">SUSE bug 923431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928988">SUSE bug 928988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929076">SUSE bug 929076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932882">SUSE bug 932882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935055">SUSE bug 935055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936095">SUSE bug 936095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936921">SUSE bug 936921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942404">SUSE bug 942404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943477">SUSE bug 943477</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38074" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="912738" ref_url="https://bugzilla.suse.com/912738" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="933782" ref_url="https://bugzilla.suse.com/933782" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951815" ref_url="https://bugzilla.suse.com/951815" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955837" ref_url="https://bugzilla.suse.com/955837" source="BUGZILLA"/>
		<reference ref_id="955925" ref_url="https://bugzilla.suse.com/955925" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959649" ref_url="https://bugzilla.suse.com/959649" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963561" ref_url="https://bugzilla.suse.com/963561" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964818" ref_url="https://bugzilla.suse.com/964818" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966137" ref_url="https://bugzilla.suse.com/966137" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320200)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of service
  or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
  Linux kernel did not verify an address length, which allowed local users
  to obtain sensitive information from kernel memory and bypass the KASLR
  protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in
  the umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in
  ALSA that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
  CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
  handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
  bsc#968012, bsc#968013).

The following non-security bugs were fixed:
- alsa: hda - Add one more node in the EAPD supporting candidate list (bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too (bsc#951815).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also address bsc#966094).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- xen: Update Xen config files (enable upstream block frontend).
- ec2: Update kabi files and start tracking ec2
- xen: consolidate and simplify struct xenbus_driver instantiation (bsc#961658 fate#320200).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658 fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#961658 fate#320200).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. (bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry (bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- s390/cio: collect format 1 channel-path description data (bnc#958000, LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000, LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000, LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation (bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of indirect segments (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed (XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent (bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658 fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658 fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658 fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path (bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658 fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658 fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend (bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658 fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658 fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support (bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together (bsc#961658 fate#320200).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658 fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658 fate#320200).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Skip dirty pages in -&gt;releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912738">SUSE bug 912738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933782">SUSE bug 933782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951815">SUSE bug 951815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955925">SUSE bug 955925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959649">SUSE bug 959649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963561">SUSE bug 963561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964818">SUSE bug 964818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966137">SUSE bug 966137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38075" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="921081" ref_url="https://bugzilla.suse.com/921081" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="930835" ref_url="https://bugzilla.suse.com/930835" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944677" ref_url="https://bugzilla.suse.com/944677" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946214" ref_url="https://bugzilla.suse.com/946214" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="950298" ref_url="https://bugzilla.suse.com/950298" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953799" ref_url="https://bugzilla.suse.com/953799" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="954950" ref_url="https://bugzilla.suse.com/954950" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921081">SUSE bug 921081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930835">SUSE bug 930835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944677">SUSE bug 944677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946214">SUSE bug 946214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950298">SUSE bug 950298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953799">SUSE bug 953799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954950">SUSE bug 954950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38076" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566763" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566764" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566765" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38077" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566766" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566768" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38078" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567383" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567385" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38079" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38080" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html" source="SUSE-SU"/>
		<description>

kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567386" comment="kvm-1.4.2-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38081" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Other bugs fixed:
- To assist users past the migration incompatibility discussed in
  bsc#950590 (restore migration compatibility with SLE11 SP3 and
  SLE12, at the unfortunate expense to prior SLE11 SP4 kvm release
  compatability when a virtio-net device is used), print a message
  which references the support document TID 7017048.
  See https://www.suse.com/support/kb/doc.php?id=7017048
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
- Fix kvm live migration fails between sles11 sp3 and sp4 (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-04"/>
	<updated date="2016-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567387" comment="kvm-1.4.2-35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38082" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38083" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566828" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38084" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38085" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567388" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38086" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566851" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38087" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566853" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38088" version="1" class="patch">
	<metadata>
		<title>Recommended update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="306333" ref_url="https://bugzilla.suse.com/306333" source="BUGZILLA"/>
		<reference ref_id="547549" ref_url="https://bugzilla.suse.com/547549" source="BUGZILLA"/>
		<reference ref_id="668145" ref_url="https://bugzilla.suse.com/668145" source="BUGZILLA"/>
		<reference ref_id="679938" ref_url="https://bugzilla.suse.com/679938" source="BUGZILLA"/>
		<reference ref_id="681560" ref_url="https://bugzilla.suse.com/681560" source="BUGZILLA"/>
		<reference ref_id="688200" ref_url="https://bugzilla.suse.com/688200" source="BUGZILLA"/>
		<reference ref_id="718113" ref_url="https://bugzilla.suse.com/718113" source="BUGZILLA"/>
		<reference ref_id="73544" ref_url="https://bugzilla.suse.com/73544" source="BUGZILLA"/>
		<reference ref_id="806250" ref_url="https://bugzilla.suse.com/806250" source="BUGZILLA"/>
		<reference ref_id="857026" ref_url="https://bugzilla.suse.com/857026" source="BUGZILLA"/>
		<reference ref_id="889755" ref_url="https://bugzilla.suse.com/889755" source="BUGZILLA"/>
		<reference ref_id="890735" ref_url="https://bugzilla.suse.com/890735" source="BUGZILLA"/>
		<reference ref_id="907636" ref_url="https://bugzilla.suse.com/907636" source="BUGZILLA"/>
		<reference ref_id="907966" ref_url="https://bugzilla.suse.com/907966" source="BUGZILLA"/>
		<reference ref_id="910805" ref_url="https://bugzilla.suse.com/910805" source="BUGZILLA"/>
		<reference ref_id="910806" ref_url="https://bugzilla.suse.com/910806" source="BUGZILLA"/>
		<reference ref_id="914911" ref_url="https://bugzilla.suse.com/914911" source="BUGZILLA"/>
		<reference ref_id="934423" ref_url="https://bugzilla.suse.com/934423" source="BUGZILLA"/>
		<reference ref_id="936188" ref_url="https://bugzilla.suse.com/936188" source="BUGZILLA"/>
		<reference ref_id="936190" ref_url="https://bugzilla.suse.com/936190" source="BUGZILLA"/>
		<reference ref_id="939996" ref_url="https://bugzilla.suse.com/939996" source="BUGZILLA"/>
		<reference ref_id="940838" ref_url="https://bugzilla.suse.com/940838" source="BUGZILLA"/>
		<reference ref_id="943075" ref_url="https://bugzilla.suse.com/943075" source="BUGZILLA"/>
		<reference ref_id="945047" ref_url="https://bugzilla.suse.com/945047" source="BUGZILLA"/>
		<reference ref_id="945692" ref_url="https://bugzilla.suse.com/945692" source="BUGZILLA"/>
		<reference ref_id="951579" ref_url="https://bugzilla.suse.com/951579" source="BUGZILLA"/>
		<reference ref_id="954345" ref_url="https://bugzilla.suse.com/954345" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<description>

This update brings LibreOffice to version 5.0.4, a major version update.

It brings lots of new features, bug fixes and also security fixes.

Features as seen on http://www.libreoffice.org/discover/new-features/

* LibreOffice 5.0 ships an impressive number of new features for
  its spreadsheet module, Calc: complex formulae image cropping, new
  functions, more powerful conditional formatting, table addressing
  and much more. Calc's blend of performance and features makes it
  an enterprise-ready, heavy duty spreadsheet application capable of
  handling all kinds of workload for an impressive range of use cases
* New icons, major improvements to menus and sidebar : no other
  LibreOffice version has looked that good and helped you be creative and
  get things done the right way. In addition, style management is now more
  intuitive thanks to the visualization of styles right in the interface.
* LibreOffice 5 ships with numerous improvements to document import and
  export filters for MS Office, PDF, RTF, and more. You can now timestamp
  PDF documents generated with LibreOffice and enjoy enhanced document
  conversion fidelity all around.

The Pentaho Flow Reporting Engine is now added and used.

Security issues fixed:

* CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 did not properly
  track directionally isolated pieces of text, which allowed remote
  attackers to cause a denial of service (heap-based buffer overflow)
  or possibly execute arbitrary code via crafted text.
* CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 used an integer
  data type that is inconsistent with a header file, which allowed remote
  attackers to cause a denial of service (incorrect malloc followed by
  invalid free) or possibly execute arbitrary code via crafted text.
* CVE-2015-4551: An arbitrary file disclosure vulnerability in Libreoffice
  and Openoffice Calc and Writer was fixed.
* CVE-2015-5212: A LibreOffice 'PrinterSetup Length' integer underflow
  vulnerability could be used by attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5213: A LibreOffice 'Piece Table Counter' invalid check design
  error vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5214: Multiple Vendor LibreOffice Bookmark Status Memory
  Corruption Vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/306333">SUSE bug 306333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547549">SUSE bug 547549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668145">SUSE bug 668145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679938">SUSE bug 679938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681560">SUSE bug 681560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688200">SUSE bug 688200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718113">SUSE bug 718113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/73544">SUSE bug 73544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806250">SUSE bug 806250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857026">SUSE bug 857026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889755">SUSE bug 889755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890735">SUSE bug 890735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907636">SUSE bug 907636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907966">SUSE bug 907966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914911">SUSE bug 914911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939996">SUSE bug 939996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943075">SUSE bug 943075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945047">SUSE bug 945047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945692">SUSE bug 945692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951579">SUSE bug 951579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954345">SUSE bug 954345</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38089" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566909" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566911" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38090" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566914" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38091" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="965875" ref_url="https://bugzilla.suse.com/965875" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001905.html" source="SUSE-SU"/>
		<description>

This update for libssh fixes the following issues: 

CVE-2016-0739: Fix Weakness in diffie-hellman secret key generation. (bsc#965875)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567389" comment="libssh2-0.2-5.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38092" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564877" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38093" version="1" class="patch">
	<metadata>
		<title>Security update for libvdpau (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="943967" ref_url="https://bugzilla.suse.com/943967" source="BUGZILLA"/>
		<reference ref_id="943968" ref_url="https://bugzilla.suse.com/943968" source="BUGZILLA"/>
		<reference ref_id="943969" ref_url="https://bugzilla.suse.com/943969" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<description>

libvdpau was updated to use secure_getenv() instead of getenv() for several variables
so it can be more safely used in setuid applications.

* CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
* CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
* CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-08"/>
	<updated date="2015-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38094" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="948516" ref_url="https://bugzilla.suse.com/948516" source="BUGZILLA"/>
		<reference ref_id="948686" ref_url="https://bugzilla.suse.com/948686" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="959094" ref_url="https://bugzilla.suse.com/959094" source="BUGZILLA"/>
		<reference ref_id="960305" ref_url="https://bugzilla.suse.com/960305" source="BUGZILLA"/>
		<reference ref_id="961173" ref_url="https://bugzilla.suse.com/961173" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issue:
- CVE-2015-5313: directory directory traversal privilege
  escalation vulnerability. (bsc#953110)

Bugs fixed:
- bsc#960305: xenxs: support parsing and formatting vif bandwidth
- bsc#961173: xen: use correct domctl version in domaininfolist union
- bsc#959094: xen: Disable building xen-inotify subdriver. It is unmaintained
  and contains bugs that can cause client connection failures.
- bsc#948686: qemu: Use PAUSED state for domains that are starting up
- bsc#948516: Fix profile_status to distringuish between errors and unconfined
  domains.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-01"/>
	<updated date="2016-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948516">SUSE bug 948516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948686">SUSE bug 948686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959094">SUSE bug 959094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960305">SUSE bug 960305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961173">SUSE bug 961173</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567390" comment="libvirt-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567391" comment="libvirt-client-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567392" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567393" comment="libvirt-doc-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38095" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38096" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38097" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38098" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566942" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566944" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38099" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38100" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567394" comment="bytefx-data-mysql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567395" comment="ibm-data-db2-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567396" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567397" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567398" comment="mono-data-firebird-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567399" comment="mono-data-oracle-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567400" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567401" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567402" comment="mono-data-sybase-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567403" comment="mono-devel-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567404" comment="mono-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567405" comment="mono-jscript-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567406" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567407" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567408" comment="mono-wcf-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567409" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567410" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567411" comment="monodoc-core-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38101" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38102" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566955" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566956" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38103" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566957" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566958" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566959" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566960" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566961" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566962" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566963" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38104" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38105" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38106" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38107" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566990" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566991" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566992" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566993" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38108" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<description>
This ntp update provides the following security and non security fixes:

- Update to 4.2.8p4 to fix several security issues (bsc#951608):
  * CVE-2015-7871: NAK to the Future: Symmetric association
    authentication bypass via crypto-NAK
  * CVE-2015-7855: decodenetnum() will ASSERT botch instead of
    returning FAIL on some bogus values
  * CVE-2015-7854: Password Length Memory Corruption Vulnerability
  * CVE-2015-7853: Invalid length data provided by a custom
    refclock driver could cause a buffer overflow
  * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
  * CVE-2015-7851 saveconfig Directory Traversal Vulnerability
  * CVE-2015-7850 remote config logfile-keyfile
  * CVE-2015-7849 trusted key use-after-free
  * CVE-2015-7848 mode 7 loop counter underrun
  * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
  * CVE-2015-7703 configuration directives 'pidfile' and
    'driftfile' should only be allowed locally
  * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
    validate the origin timestamp field
  * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
    data packet length checks
- Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
- Add a controlkey to ntp.conf to make the above work.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Fix the comment regarding addserver in ntp.conf (bnc#910063).
- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz.
  The rest is partially irrelevant, partially redundant and
  potentially outdated (bsc#942587).
- Remove 'kod' from the restrict line in ntp.conf (bsc#944300).
- Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
- Require perl-Socket6 (bsc#942441).
- Fix incomplete backporting of 'rcntp ntptimemset'.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38109" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567004" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567005" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567006" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38110" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567010" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567011" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567012" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38111" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="939932" ref_url="https://bugzilla.suse.com/939932" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945484" ref_url="https://bugzilla.suse.com/945484" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="947458" ref_url="https://bugzilla.suse.com/947458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<description>
OpenSSH was updated to fix several security issues and bugs.

Please note that due to a bug in the previous shipped openssh version, sshd might
not correctly restart. Please verify that the ssh daemon is running after installing
this update.

These security issues were fixed:

* CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode
  is not used, lacked a check of the refusal deadline for X connections,
  which made it easier for remote attackers to bypass intended access
  restrictions via a connection outside of the permitted time window.
  (bsc#936695)

* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd did not properly restrict the processing of keyboard-interactive
  devices within a single connection, which made it easier for remote
  attackers to conduct brute-force attacks or cause a denial of service
  (CPU consumption) via a long and duplicative list in the ssh
  -oKbdInteractiveDevices option, as demonstrated by a modified client
  that provides a different password for each pam element on this list.
  (bsc#938746)

* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM.
  (bsc#932483)

* Hardening patch to fix sftp RCE. (bsc#903649)

* CVE-2015-6563: The monitor component in sshd accepted extraneous username
  data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to
  conduct impersonation attacks by leveraging any SSH login access in
  conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM
  request, related to monitor.c and monitor_wrap.c.

* CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx
  function in monitor.c in sshd might have allowed local users to gain
  privileges by leveraging control of the sshd uid to send an unexpectedly
  early MONITOR_REQ_PAM_FREE_CTX request.

Additional a bug was fixed that could lead to openssh not working in 
chroot (bsc#947458).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939932">SUSE bug 939932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945484">SUSE bug 945484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947458">SUSE bug 947458</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38112" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567417" comment="openssh-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567418" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567419" comment="openssh-helpers-6.6p1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38113" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567024" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567026" comment="openssl-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38114" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38115" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567029" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567030" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38116" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567044" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567045" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567047" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567048" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38117" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38118" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
		<description>
python-setuptools was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2013-7440: Non-RFC6125-compliant host name matching was incorrect (bsc#930189)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567099" comment="python-setuptools-0.6c11-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38119" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567100" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38120" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567101" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38121" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567428" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567429" comment="libldb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567430" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567431" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567432" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567433" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567434" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567435" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567436" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567437" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567438" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567439" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567440" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567441" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567442" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567443" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567445" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567446" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567447" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38122" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38123" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567144" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38124" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567448" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38125" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567148" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567149" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38126" version="1" class="patch">
	<metadata>
		<title>Security update for tidy (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="933588" ref_url="https://bugzilla.suse.com/933588" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
		<description>

This update fixes two heap-based buffer overflows in tidy/libtidy. These vulnerabilities
could allow remote attackers to cause a denial of service (crash) via vectors involving
a command character in an href. (CVE-2015-5522, CVE-2015-5523)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-26"/>
	<updated date="2015-08-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567152" comment="libtidy-1.0-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38127" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38128" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567449" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38129" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="914439" ref_url="https://bugzilla.suse.com/914439" source="BUGZILLA"/>
		<reference ref_id="914441" ref_url="https://bugzilla.suse.com/914441" source="BUGZILLA"/>
		<reference ref_id="943795" ref_url="https://bugzilla.suse.com/943795" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<description>

vorbis-tools was updated to fix several security issues.

- A buffer overflow in aiff_open() that could be triggered
  by opening prepared malicious files (CVE-2015-6749, bsc#943795).

- A division by zero and integer overflow by crafted WAV files was fixed
  (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38130" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38131" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38132" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567160" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567161" comment="wpa_supplicant-gui-0.7.1-6.17.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38133" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="925466" ref_url="https://bugzilla.suse.com/925466" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<description>
xen was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

This non-security issue was fixed:
- Kdump did not work in a XEN environment (bsc#925466).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925466">SUSE bug 925466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38134" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945167" ref_url="https://bugzilla.suse.com/945167" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="949138" ref_url="https://bugzilla.suse.com/949138" source="BUGZILLA"/>
		<reference ref_id="949549" ref_url="https://bugzilla.suse.com/949549" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<description>
xen was updated to version 4.4.3 to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
- bsc#949549: xm create hangs when maxmen value is enclosed in quotes
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945167">SUSE bug 945167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949138">SUSE bug 949138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949549">SUSE bug 949549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38135" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 47 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38136" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:

- bsc#955399 -  Fix xm migrate --log_progress.
  Due to logic error progress was not logged when requested.

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#955399 -  Fix xm migrate --live.  The options were not passed
  due to a merge error. As a result the migration was not live,
  instead the suspended guest was migrated.

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)


- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38137" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567270" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38138" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-27"/>
	<updated date="2015-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567274" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567275" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38139" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567286" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38140" version="1" class="patch">
	<metadata>
		<title>Security update for conntrack-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="942149" ref_url="https://bugzilla.suse.com/942149" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001614.html" source="SUSE-SU"/>
		<description>

Fix a possible crash if conntrackd sees DCCP, SCTP and ICMPv6 traffic
and the corresponding kernel modules that track this traffic are not
available. (bsc#942149, CVE-2015-6496)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-19"/>
	<updated date="2015-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942149">SUSE bug 942149</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567483" comment="conntrack-tools-1.0.0-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38141" version="1" class="patch">
	<metadata>
		<title>Security update for ctdb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="836064" ref_url="https://bugzilla.suse.com/836064" source="BUGZILLA"/>
		<reference ref_id="867815" ref_url="https://bugzilla.suse.com/867815" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4159" ref_url="https://www.suse.com/security/cve/CVE-2013-4159/" source="CVE"/>
		<description>

This update for ctdb provides fixes for the following issues:

    * Insecure temporary file creation potentially allows for exploitation
      via symbolic links. (CVE-2013-4159)
    * Excessive lock contention can result in severe performance
      degradation when a CTDB cluster is under load.

Security Issue reference:

    * CVE-2013-4159
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4159&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-16"/>
	<updated date="2014-06-16"/>
	<bugzilla href="https://bugzilla.suse.com/836064">SUSE bug 836064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867815">SUSE bug 867815</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4159/">CVE-2013-4159</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567484" comment="ctdb-1.0.114.6-0.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38142" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have 
been fixed.

Further information is available at 
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38143" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38144" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38145" version="1" class="patch">
	<metadata>
		<title>Security update for hawk</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="846239" ref_url="https://bugzilla.suse.com/846239" source="BUGZILLA"/>
		<reference ref_id="853625" ref_url="https://bugzilla.suse.com/853625" source="BUGZILLA"/>
		<reference ref_id="853627" ref_url="https://bugzilla.suse.com/853627" source="BUGZILLA"/>
		<reference ref_id="853632" ref_url="https://bugzilla.suse.com/853632" source="BUGZILLA"/>
		<reference ref_id="853633" ref_url="https://bugzilla.suse.com/853633" source="BUGZILLA"/>
		<reference ref_id="854060" ref_url="https://bugzilla.suse.com/854060" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4389" ref_url="https://www.suse.com/security/cve/CVE-2013-4389/" source="CVE"/>
		<reference ref_id="CVE-2013-4491" ref_url="https://www.suse.com/security/cve/CVE-2013-4491/" source="CVE"/>
		<reference ref_id="CVE-2013-6414" ref_url="https://www.suse.com/security/cve/CVE-2013-6414/" source="CVE"/>
		<reference ref_id="CVE-2013-6415" ref_url="https://www.suse.com/security/cve/CVE-2013-6415/" source="CVE"/>
		<reference ref_id="CVE-2013-6417" ref_url="https://www.suse.com/security/cve/CVE-2013-6417/" source="CVE"/>
		<description>

hawk has been updated to fix security issues in the embedded rubygems:

    * CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS vulnerability
      in the log subscriber component (bnc#846239)
    * CVE-2013-4491: rubygem-actionpack: i18n missing translation XSS
      (bnc#853625).
    * CVE-2013-6414: rubygem-actionpack: Action View DoS (bnc#853633).
    * CVE-2013-6415: rubygem-actionpack: number_to_currency XSS
      (bnc#853632).
    * CVE-2013-6417: rubygem-actionpack: unsafe query generation risk
      (incomplete fix for CVE-2013-0155) (bnc#853627).

Also a minor bug has been fixed:

    * Misc: hb_report: Catch ArgumentError when parsing hb_report output
      (bnc#854060)

Security Issue references:

    * CVE-2013-4389
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389&gt;
    * CVE-2013-4491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491&gt;
    * CVE-2013-6414
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414&gt;
    * CVE-2013-6415
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415&gt;
    * CVE-2013-6417
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-08"/>
	<updated date="2014-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/846239">SUSE bug 846239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853625">SUSE bug 853625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853627">SUSE bug 853627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853632">SUSE bug 853632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853633">SUSE bug 853633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854060">SUSE bug 854060</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4389/">CVE-2013-4389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4491/">CVE-2013-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6414/">CVE-2013-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6415/">CVE-2013-6415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6417/">CVE-2013-6417</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567485" comment="hawk-0.6.1-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567486" comment="hawk-templates-0.6.1-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38146" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871134" ref_url="https://bugzilla.suse.com/871134" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879304" ref_url="https://bugzilla.suse.com/879304" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891281" ref_url="https://bugzilla.suse.com/891281" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="891746" ref_url="https://bugzilla.suse.com/891746" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895608" ref_url="https://bugzilla.suse.com/895608" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux 
kernel through 3.14.5 does not ensure that calls have two different futex 
addresses, which allows local users to gain privileges via a crafted 
FUTEX_REQUEUE command that facilitates unsafe waiter modification. 
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs 
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec 
(bnc#891746). - Add option to automatically enforce module signatures when 
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). 
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported 
new patches of Lock down functions for UEFI secure boot Also updated 
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file 
system snapshot. - Btrfs: abort the transaction when we does not find our 
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - 
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile 
flags on seqlock retry. - Btrfs: does not check nodes for extent items. - 
Btrfs: fix a possible deadlock between scrub and transaction committing. - 
Btrfs: fix corruption after write/fsync failure + fsync + log recovery 
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated 
checksums (bnc#891619). - Btrfs: fix double free in 
find_lock_delalloc_range. - Btrfs: fix possible memory leak in 
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config 
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected 
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when 
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) 
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - 
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - 
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - 
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - 
drm/i915: create functions for the 'unclaimed register' checks 
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks 
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory 
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - 
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). 
- hibernate: Disable in a signed modules environment (bnc#884333). - 
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init 
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory 
barriers for send / receive (bnc#885382). - inet: add a redirect generation 
id in inetpeer (bnc#860593). - inetpeer: initialize -&gt;redirect_genid in 
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() 
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base 
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: 
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - 
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). 
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - 
kexec: Disable at runtime if the kernel enforces module loading 
restrictions (bnc#884333). - md/raid6: avoid data corruption during 
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of 
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized 
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE 
check in vma_has_reserves() - mm, hugetlb: change variable name 
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE 
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus 
pages - mm, hugetlb: do not use a page in page cache for cow optimization - 
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, 
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting 
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: 
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which 
check availability of free huge page - mm, hugetlb: protect reserved pages 
when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets 
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy 
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples 
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - 
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: 
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid 
escalating the SCSI error handler if the command is not found in firmware 
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost 
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware 
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue 
abort command for outstanding commands during cleanup when only firmware is 
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to 
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host 
can_queue value based on available resources (bnc#859840). - restore 
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy 
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the 
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: 
Enable integrated ASCII console per default (bnc#885262, LTC#112035). - 
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start 
(bnc#833820). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix 
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - 
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add 
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity 
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - 
x86/UV: Update UV support for external NMI signals (bnc#888847). - 
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number 
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port 
access when module security is enabled (bnc#884333). - x86: Restrict MSR 
access when module loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871134">SUSE bug 871134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879304">SUSE bug 879304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891281">SUSE bug 891281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891746">SUSE bug 891746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895608">SUSE bug 895608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567487" comment="cluster-network-kmp-bigsmp-1.4_3.0.101_0.47.55-2.28.1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567488" comment="cluster-network-kmp-default-1.4_3.0.101_0.40-2.27.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567489" comment="cluster-network-kmp-pae-1.4_3.0.101_0.40-2.27.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567490" comment="cluster-network-kmp-ppc64-1.4_3.0.101_0.40-2.27.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567491" comment="cluster-network-kmp-trace-1.4_3.0.101_0.40-2.27.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567492" comment="cluster-network-kmp-xen-1.4_3.0.101_0.40-2.27.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567493" comment="gfs2-kmp-bigsmp-2_3.0.101_0.47.55-0.17.1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567494" comment="gfs2-kmp-default-2_3.0.101_0.40-0.16.104 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567495" comment="gfs2-kmp-pae-2_3.0.101_0.40-0.16.104 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567496" comment="gfs2-kmp-ppc64-2_3.0.101_0.40-0.16.104 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567497" comment="gfs2-kmp-trace-2_3.0.101_0.40-0.16.104 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567498" comment="gfs2-kmp-xen-2_3.0.101_0.40-0.16.104 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567499" comment="ocfs2-kmp-bigsmp-1.6_3.0.101_0.47.55-0.21.1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567500" comment="ocfs2-kmp-default-1.6_3.0.101_0.40-0.20.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567501" comment="ocfs2-kmp-pae-1.6_3.0.101_0.40-0.20.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567502" comment="ocfs2-kmp-ppc64-1.6_3.0.101_0.40-0.20.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567503" comment="ocfs2-kmp-trace-1.6_3.0.101_0.40-0.20.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567504" comment="ocfs2-kmp-xen-1.6_3.0.101_0.40-0.20.98 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38147" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - Add option to automatically enforce module 
signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() 
call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() 
(bnc#880344). - Backported new patches of Lock down functions for UEFI 
secure boot Also updated series.conf and removed old patches. - Btrfs: 
Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction 
when we does not find our extent ref. - Btrfs: avoid warning bomb of 
btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - 
Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not 
check nodes for extent items. - Btrfs: fix a possible deadlock between 
scrub and transaction committing. - Btrfs: fix corruption after write/fsync 
failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree 
corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix 
double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak 
in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if 
enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at 
driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed 
register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed 
register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map 
fbdev memory (bnc #806990). - e1000e: enable support for new device IDs 
(bnc#885509). - fs/fscache: remove spin_lock() from the condition in 
while() (bnc#880344). - hibernate: Disable in a signed modules environment 
(bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - 
ibmvscsi: Abort init sequence during error recovery (bnc#885382). - 
ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add 
a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize 
-&gt;redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix 
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of 
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang 
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading 
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load 
of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty 
reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if 
the kernel enforces module loading restrictions (bnc#884333). - md/raid6: 
avoid data corruption during recovery of double-degraded RAID6. - memcg, 
vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - mm, 
hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change 
variable name reservations to resv - mm, hugetlb: decrement reserve count 
if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when 
gathering surplus pages - mm, hugetlb: do not use a page in page cache for 
cow optimization - mm, hugetlb: fix and clean-up node iteration code to 
alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix 
subpool accounting handling - mm, hugetlb: improve page-fault scalability - 
mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up 
the code which check availability of free huge page - mm, hugetlb: protect 
reserved pages when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114). - 
perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add 
memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic 
memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the 
SCSI error handler if the command is not found in firmware (bnc#859840). - 
qla2xxx: Clear loop_id for ports that are marked lost during fabric 
scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during 
the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command 
for outstanding commands during cleanup when only firmware is alive 
(bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete 
during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue 
value based on available resources (bnc#859840). - restore smp_mb() in 
unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing 
for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical 
signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable 
integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: 
use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86/UV: Add call to 
KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI 
handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI 
handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: 
Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix 
Sparse warnings (bnc#888847). - x86: Lock down IO port access when module 
security is enabled (bnc#884333). - x86: Restrict MSR access when module 
loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567505" comment="cluster-network-kmp-bigsmp-1.4_3.0.101_0.40-2.27.98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567506" comment="drbd-kmp-bigsmp-8.4.4_3.0.101_0.40-0.22.64 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567507" comment="gfs2-kmp-bigsmp-2_3.0.101_0.40-0.16.104 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567508" comment="ocfs2-kmp-bigsmp-1.6_3.0.101_0.40-0.20.98 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38148" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="867350" ref_url="https://bugzilla.suse.com/867350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2323" ref_url="https://www.suse.com/security/cve/CVE-2014-2323/" source="CVE"/>
		<reference ref_id="CVE-2014-2324" ref_url="https://www.suse.com/security/cve/CVE-2014-2324/" source="CVE"/>
		<description>

The HTTP server lighttpd was updated to fix the following security issues:

    * CVE-2014-2323: SQL injection vulnerability in mod_mysql_vhost.c in
      lighttpd allowed remote attackers to execute arbitrary SQL commands
      via the host name.
    * CVE-2014-2323: Multiple directory traversal vulnerabilities in
      mod_evhost and mod_simple_vhost in lighttpd allowed remote attackers
      to read arbitrary files via .. (dot dot) in the host name.

More information can be found on the lighttpd advisory page: 
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
&lt;http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt&gt;

Security Issues references:

    * CVE-2014-2323
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2323&gt;
    * CVE-2014-2324
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2324&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-19"/>
	<updated date="2014-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/867350">SUSE bug 867350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2323/">CVE-2014-2323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2324/">CVE-2014-2324</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563687" comment="lighttpd-1.4.20-2.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38149" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-bundler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
		</affected>
		<reference ref_id="898205" ref_url="https://bugzilla.suse.com/898205" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0334" ref_url="https://www.suse.com/security/cve/CVE-2013-0334/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001365.html" source="SUSE-SU"/>
		<description>

The Rubygem Bundler was updated to 1.7.0.

Bundler 1.7 is a security-only release to address CVE-2013-0334, a 
vulnerability where a gem might be installed from an unintended source 
server, particularly while using both rubygems.org and gems.github.com.

Upstream changes entry with more explanations:

Any Gemfile with multiple top-level source lines cannot reliably control 
the gem server that a particular gem is fetched from. As a result, Bundler 
might install the wrong gem if more than one source provides a gem with the 
same name.

This is especially possible in the case of Github's legacy gem server, 
hosted at gems.github.com. An attacker might create a malicious gem on 
Rubygems.org with the same name as a commonly-used Github gem. From that 
point forward, running bundle install might result in the malicious gem 
being used instead of the expected gem.

To mitigate this, the Bundler and Rubygems.org teams worked together to 
copy almost every gem hosted on gems.github.com to rubygems.org, reducing 
the number of gems that can be used for such an attack.

Resolution:

To resolve this issue, upgrade to Bundler 1.7 by running gem install 
bundler. The next time you run bundle install for any Gemfile that contains 
multiple sources, each gem available from multiple sources will print a 
warning.

For every warning printed, edit the Gemfile to either specify a :source 
option for that gem, or move the gem line into a block that is passed to a 
source method call.

For detailed information about the changes to how sources are handled in 
Bundler version 1.7, see the release announcement.

Security Issues:

    * CVE-2013-0334
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0334&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-11"/>
	<updated date="2015-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/898205">SUSE bug 898205</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0334/">CVE-2013-0334</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117402" comment="SUSE Linux Enterprise High Availability Extension 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563834" comment="rubygem-bundler-1.7.0-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38150" version="1" class="patch">
	<metadata>
		<title>Security update for conntrack-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="942149" ref_url="https://bugzilla.suse.com/942149" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001614.html" source="SUSE-SU"/>
		<description>

Fix a possible crash if conntrackd sees DCCP, SCTP and ICMPv6 traffic
and the corresponding kernel modules that track this traffic are not
available. (bsc#942149, CVE-2015-6496)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-19"/>
	<updated date="2015-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942149">SUSE bug 942149</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567483" comment="conntrack-tools-1.0.0-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38151" version="1" class="patch">
	<metadata>
		<title>Security update for csync2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1145032" ref_url="https://bugzilla.suse.com/1145032" source="BUGZILLA"/>
		<reference ref_id="1147137" ref_url="https://bugzilla.suse.com/1147137" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15522" ref_url="https://www.suse.com/security/cve/CVE-2019-15522/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009126.html" source="SUSE-SU"/>
		<description>
This update for csync2 fixes the following issues:

- CVE-2019-15522: Fixed an issue where daemon fails to enforce TLS (bsc#1147137)
- Fixed an issue where the TLS keys were not created correctly during installation (bsc#1145032) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145032">SUSE bug 1145032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147137">SUSE bug 1147137</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-15522/">CVE-2019-15522</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624155" comment="csync2-1.34-0.13.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38152" version="1" class="patch">
	<metadata>
		<title>Security update for ctdb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="969522" ref_url="https://bugzilla.suse.com/969522" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:1640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00043.html" source="SUSE-SU"/>
		<description>
ctdb was updated to fix one security issue.

This security issue was fixed:
- bsc#969522: ctdb opening sockets with htons(IPPROTO_RAW)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567509" comment="ctdb-1.0.114.6-0.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38153" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38154" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38155" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564541" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38156" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564544" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38157" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- CVE-2018-10846: Improve mitigations against Lucky 13 class of attacks (PRIME + PROBE) (bsc#1105460).
- CVE-2017-10790: Fixed a denial of service in the _asn1_check_identifier() function (bsc#1047002).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567510" comment="libgnutls-extra26-2.4.1-24.39.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38158" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1093447" ref_url="https://bugzilla.suse.com/1093447" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007677.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2018-10196: Fixed a null dereference in rebuild_vlis (bsc#1093447).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567511" comment="graphviz-python-2.20.2-8.3.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38159" version="1" class="patch">
	<metadata>
		<title>Security update for hawk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="957369" ref_url="https://bugzilla.suse.com/957369" source="BUGZILLA"/>
		<reference ref_id="984619" ref_url="https://bugzilla.suse.com/984619" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002258.html" source="SUSE-SU"/>
		<description>

This update for hawk fixes the following issues:

- Set Content-Security-Policy to frame-ancestors 'self' (bsc#984619)

- Colocation: Fix NameError when creating 2-resource constraints (bsc#957369)


		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957369">SUSE bug 957369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984619">SUSE bug 984619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567512" comment="hawk-0.7.0+git.1430140184.8e872c5-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567513" comment="hawk-templates-0.7.0+git.1430140184.8e872c5-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38160" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1000365" ref_url="https://bugzilla.suse.com/1000365" source="BUGZILLA"/>
		<reference ref_id="1000380" ref_url="https://bugzilla.suse.com/1000380" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1029140" ref_url="https://bugzilla.suse.com/1029140" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030814" ref_url="https://bugzilla.suse.com/1030814" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035721" ref_url="https://bugzilla.suse.com/1035721" source="BUGZILLA"/>
		<reference ref_id="1035777" ref_url="https://bugzilla.suse.com/1035777" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1036056" ref_url="https://bugzilla.suse.com/1036056" source="BUGZILLA"/>
		<reference ref_id="1036288" ref_url="https://bugzilla.suse.com/1036288" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037191" ref_url="https://bugzilla.suse.com/1037191" source="BUGZILLA"/>
		<reference ref_id="1037193" ref_url="https://bugzilla.suse.com/1037193" source="BUGZILLA"/>
		<reference ref_id="1037227" ref_url="https://bugzilla.suse.com/1037227" source="BUGZILLA"/>
		<reference ref_id="1037232" ref_url="https://bugzilla.suse.com/1037232" source="BUGZILLA"/>
		<reference ref_id="1037233" ref_url="https://bugzilla.suse.com/1037233" source="BUGZILLA"/>
		<reference ref_id="1037356" ref_url="https://bugzilla.suse.com/1037356" source="BUGZILLA"/>
		<reference ref_id="1037358" ref_url="https://bugzilla.suse.com/1037358" source="BUGZILLA"/>
		<reference ref_id="1037359" ref_url="https://bugzilla.suse.com/1037359" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039258" ref_url="https://bugzilla.suse.com/1039258" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041762" ref_url="https://bugzilla.suse.com/1041762" source="BUGZILLA"/>
		<reference ref_id="1041975" ref_url="https://bugzilla.suse.com/1041975" source="BUGZILLA"/>
		<reference ref_id="1042045" ref_url="https://bugzilla.suse.com/1042045" source="BUGZILLA"/>
		<reference ref_id="1042615" ref_url="https://bugzilla.suse.com/1042615" source="BUGZILLA"/>
		<reference ref_id="1042633" ref_url="https://bugzilla.suse.com/1042633" source="BUGZILLA"/>
		<reference ref_id="1042687" ref_url="https://bugzilla.suse.com/1042687" source="BUGZILLA"/>
		<reference ref_id="1042832" ref_url="https://bugzilla.suse.com/1042832" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044216" ref_url="https://bugzilla.suse.com/1044216" source="BUGZILLA"/>
		<reference ref_id="1044230" ref_url="https://bugzilla.suse.com/1044230" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044882" ref_url="https://bugzilla.suse.com/1044882" source="BUGZILLA"/>
		<reference ref_id="1044913" ref_url="https://bugzilla.suse.com/1044913" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045356" ref_url="https://bugzilla.suse.com/1045356" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1045525" ref_url="https://bugzilla.suse.com/1045525" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1045547" ref_url="https://bugzilla.suse.com/1045547" source="BUGZILLA"/>
		<reference ref_id="1045615" ref_url="https://bugzilla.suse.com/1045615" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1046192" ref_url="https://bugzilla.suse.com/1046192" source="BUGZILLA"/>
		<reference ref_id="1046715" ref_url="https://bugzilla.suse.com/1046715" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047053" ref_url="https://bugzilla.suse.com/1047053" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049688" ref_url="https://bugzilla.suse.com/1049688" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050154" ref_url="https://bugzilla.suse.com/1050154" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051515" ref_url="https://bugzilla.suse.com/1051515" source="BUGZILLA"/>
		<reference ref_id="1051770" ref_url="https://bugzilla.suse.com/1051770" source="BUGZILLA"/>
		<reference ref_id="1055680" ref_url="https://bugzilla.suse.com/1055680" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="792863" ref_url="https://bugzilla.suse.com/792863" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="938352" ref_url="https://bugzilla.suse.com/938352" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-10277" ref_url="https://www.suse.com/security/cve/CVE-2016-10277/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2016-10277: Potential privilege escalation due to a missing bounds check in the lp driver. A kernel command-line adversary can overflow the parport_nr array to execute code (bsc#1039456).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7533: Bug in inotify code allowing privilege escalation (bsc#1049483).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bsc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-1000365: The Linux Kernel imposed a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354)
- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bnc#1032340)
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-1000380: sound/core/timer.c was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents could have bene disclosed when a read and an ioctl happen at the same time (bnc#1044125)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431)
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used by local console attackers to bypass certain secure boot settings. (bnc#1039456)
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885)
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069)
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883)
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879)
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850)

The following non-security bugs were fixed:

- 8250: use callbacks to access UART_DLL/UART_DLM.
- ALSA: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- ALSA: hda - using uninitialized data (bsc#1045538).
- ALSA: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- ALSA: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- ALSA: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- ALSA: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- Add CVE tag to references
- CIFS: backport prepath matching fix (bsc#799133).
- Drop CONFIG_PPC_CELL from bigmem (bsc#1049128).
- EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr().
- Fix scripts/bigmem-generate-ifdef-guard to work on all branches
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- IB/mlx4: Demote mcg message from warning to debug (bsc#919382).
- IB/mlx4: Fix ib device initialization error flow (bsc#919382).
- IB/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- IB/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- IB/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- IB/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- Input: cm109 - validate number of endpoints before using them (bsc#1037193).
- Input: hanwang - validate number of endpoints before using them (bsc#1037232).
- Input: yealink - validate number of endpoints before using them (bsc#1037227).
- KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- NFS: Avoid getting confused by confused server (bsc#1045416).
- NFS: Fix another OPEN_DOWNGRADE bug (git-next).
- NFS: Fix size of NFSACL SETACL operations (git-fixes).
- NFS: Make nfs_readdir revalidate less often (bsc#1048232).
- NFS: tidy up nfs_show_mountd_netid (git-fixes).
- NFSD: Do not use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- NFSv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- NFSv4: Fix another bug in the close/open_downgrade code (git-fixes).
- NFSv4: Fix problems with close in the presence of a delegation (git-fixes).
- NFSv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- SUNRPC: Fix a memory leak in the backchannel code (git-fixes).
- Staging: vt6655-6: potential NULL dereference in hostap_disable_hostapd() (bsc#1045479).
- USB: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- USB: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- USB: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- USB: iowarrior: fix NULL-deref in write (bsc#1037359).
- USB: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- USB: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- USB: serial: ark3116: fix register-accessor error handling (git-fixes).
- USB: serial: ch341: fix open error handling (bsc#1037441).
- USB: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- USB: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- USB: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- USB: serial: io_ti: fix information leak in completion handler (git-fixes).
- USB: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- USB: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- USB: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- USB: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- USB: usbip: fix nonconforming hub descriptor (bsc#1047487).
- USB: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- USB: usbtmc: Change magic number to constant (bsc#1036288).
- USB: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- USB: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- USB: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- USB: usbtmc: add missing endpoint sanity check (bsc#1036288).
- USB: usbtmc: fix DMA on stack (bsc#1036288).
- USB: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- USB: usbtmc: fix probe error path (bsc#1036288).
- USB: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- USB: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- Use make --output-sync feature when available (bsc#1012422).
- Xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- blacklist b50a6c584bb4 powerpc/perf: Clear MMCR2 when enabling PMU (bsc#1035721). 
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: Blacklist 847fa1a6d3d0 ('ftrace/x86_32: Set ftrace_stub to weak to prevent gcc from using short jumps to it') The released kernels are not build with a gas new enough to optimize the jmps so that this patch would be required. (bsc#1051478)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- cifs: do not compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975). backporting upstream commit 2f2591a34db6c9361faa316c91a6e320cb4e6aee
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- dentry name snapshots (bsc#1049483).
- devres: fix a for loop bounds check (git-fixes).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216)
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport-&gt;dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fuse: add missing FR_FORCE (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- initial cr0 bits (bnc#1036056, LTC#153612).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jsm: add support for additional Neo cards (bsc#1045615).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush -&gt;event_work before stopping array (git-fixes).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- powerpc/ibmebus: Fix device reference leaks in sysfs interface (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/ibmebus: Fix further device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (bsc#1032471).
- powerpc/mm/slice: Update the function prototype (bsc#1032471).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (bsc#1032471).
- powerpc/pci/rpadlpar: Fix device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Drop support for pre-POWER4 cpus (bsc#1032471).
- powerpc: Remove STAB code (bsc#1032471).
- random32: fix off-by-one in seeding requirement (git-fixes).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev-&gt;stime underflow (bnc#938352).
- sched: Do not account bogus utime (bnc#938352).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of -&gt;host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- sfc: do not device_attach if a reset is pending (bsc#909618).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression greater than 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000365">SUSE bug 1000365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000380">SUSE bug 1000380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029140">SUSE bug 1029140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030814">SUSE bug 1030814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035721">SUSE bug 1035721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035777">SUSE bug 1035777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036056">SUSE bug 1036056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036288">SUSE bug 1036288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037191">SUSE bug 1037191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037193">SUSE bug 1037193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037227">SUSE bug 1037227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037232">SUSE bug 1037232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037233">SUSE bug 1037233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037356">SUSE bug 1037356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037358">SUSE bug 1037358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037359">SUSE bug 1037359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039258">SUSE bug 1039258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041762">SUSE bug 1041762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041975">SUSE bug 1041975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042045">SUSE bug 1042045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042615">SUSE bug 1042615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042633">SUSE bug 1042633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042687">SUSE bug 1042687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042832">SUSE bug 1042832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044216">SUSE bug 1044216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044230">SUSE bug 1044230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044882">SUSE bug 1044882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044913">SUSE bug 1044913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045356">SUSE bug 1045356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045525">SUSE bug 1045525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045547">SUSE bug 1045547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045615">SUSE bug 1045615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046192">SUSE bug 1046192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046715">SUSE bug 1046715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047053">SUSE bug 1047053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049688">SUSE bug 1049688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050154">SUSE bug 1050154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051515">SUSE bug 1051515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051770">SUSE bug 1051770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055680">SUSE bug 1055680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792863">SUSE bug 792863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938352">SUSE bug 938352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-10277/">CVE-2016-10277</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567514" comment="cluster-network-kmp-bigmem-1.4_3.0.101_108.7-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567515" comment="cluster-network-kmp-default-1.4_3.0.101_108.7-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567516" comment="cluster-network-kmp-pae-1.4_3.0.101_108.7-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567517" comment="cluster-network-kmp-ppc64-1.4_3.0.101_108.7-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567518" comment="cluster-network-kmp-trace-1.4_3.0.101_108.7-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567519" comment="cluster-network-kmp-xen-1.4_3.0.101_108.7-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567520" comment="drbd-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567521" comment="drbd-bash-completion-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567522" comment="drbd-heartbeat-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567523" comment="drbd-kmp-bigmem-8.4.4_3.0.101_108.7-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567524" comment="drbd-kmp-default-8.4.4_3.0.101_108.7-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567525" comment="drbd-kmp-pae-8.4.4_3.0.101_108.7-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567526" comment="drbd-kmp-ppc64-8.4.4_3.0.101_108.7-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567527" comment="drbd-kmp-trace-8.4.4_3.0.101_108.7-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567528" comment="drbd-kmp-xen-8.4.4_3.0.101_108.7-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567529" comment="drbd-pacemaker-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567530" comment="drbd-udev-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567531" comment="drbd-utils-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567532" comment="drbd-xen-8.4.4-0.27.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567533" comment="gfs2-kmp-bigmem-2_3.0.101_108.7-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567534" comment="gfs2-kmp-default-2_3.0.101_108.7-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567535" comment="gfs2-kmp-pae-2_3.0.101_108.7-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567536" comment="gfs2-kmp-ppc64-2_3.0.101_108.7-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567537" comment="gfs2-kmp-trace-2_3.0.101_108.7-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567538" comment="gfs2-kmp-xen-2_3.0.101_108.7-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567539" comment="ocfs2-kmp-bigmem-1.6_3.0.101_108.7-0.28.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567540" comment="ocfs2-kmp-default-1.6_3.0.101_108.7-0.28.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567541" comment="ocfs2-kmp-pae-1.6_3.0.101_108.7-0.28.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567542" comment="ocfs2-kmp-ppc64-1.6_3.0.101_108.7-0.28.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567543" comment="ocfs2-kmp-trace-1.6_3.0.101_108.7-0.28.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567544" comment="ocfs2-kmp-xen-1.6_3.0.101_108.7-0.28.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38161" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1059174" ref_url="https://bugzilla.suse.com/1059174" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069508" ref_url="https://bugzilla.suse.com/1069508" source="BUGZILLA"/>
		<reference ref_id="1070623" ref_url="https://bugzilla.suse.com/1070623" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074880" ref_url="https://bugzilla.suse.com/1074880" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076437" ref_url="https://bugzilla.suse.com/1076437" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077191" ref_url="https://bugzilla.suse.com/1077191" source="BUGZILLA"/>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077487" ref_url="https://bugzilla.suse.com/1077487" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078875" ref_url="https://bugzilla.suse.com/1078875" source="BUGZILLA"/>
		<reference ref_id="1079917" ref_url="https://bugzilla.suse.com/1079917" source="BUGZILLA"/>
		<reference ref_id="1080133" ref_url="https://bugzilla.suse.com/1080133" source="BUGZILLA"/>
		<reference ref_id="1080359" ref_url="https://bugzilla.suse.com/1080359" source="BUGZILLA"/>
		<reference ref_id="1080363" ref_url="https://bugzilla.suse.com/1080363" source="BUGZILLA"/>
		<reference ref_id="1080372" ref_url="https://bugzilla.suse.com/1080372" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080685" ref_url="https://bugzilla.suse.com/1080685" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building
  the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
  did not validate a value that is used during DMA page allocation, leading
  to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
  function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
  net/rds/rdma.c mishandled cases where page pinning fails or an invalid
  address is supplied, leading to an rds_atomic_free_op NULL pointer
  dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in
  net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
  to cause a denial of service (use-after-free and memory corruption)
  or possibly have unspecified other impact by leveraging the presence of
  xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's
  assigned to guests to send ethernet flow control pause frames via the
  PF. (bnc#1077355).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
  attackers to obtain potentially sensitive information from kernel
  memory, aka a write_mmio stack-based out-of-bounds read, related to
  arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream
  kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
  existed in the sound system, this can lead to a deadlock and denial of
  service condition (bnc#1076017).

The following non-security bugs were fixed:

- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache  (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,  bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags &amp; wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,  bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca  (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the  sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059174">SUSE bug 1059174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069508">SUSE bug 1069508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070623">SUSE bug 1070623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074880">SUSE bug 1074880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076437">SUSE bug 1076437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077191">SUSE bug 1077191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077487">SUSE bug 1077487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078875">SUSE bug 1078875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079917">SUSE bug 1079917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080133">SUSE bug 1080133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080359">SUSE bug 1080359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080363">SUSE bug 1080363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080372">SUSE bug 1080372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080685">SUSE bug 1080685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567545" comment="cluster-network-kmp-bigmem-1.4_3.0.101_108.35-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567546" comment="cluster-network-kmp-default-1.4_3.0.101_108.35-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567547" comment="cluster-network-kmp-pae-1.4_3.0.101_108.35-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567548" comment="cluster-network-kmp-ppc64-1.4_3.0.101_108.35-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567549" comment="cluster-network-kmp-trace-1.4_3.0.101_108.35-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567550" comment="cluster-network-kmp-xen-1.4_3.0.101_108.35-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567551" comment="drbd-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567552" comment="drbd-bash-completion-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567553" comment="drbd-heartbeat-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567554" comment="drbd-kmp-bigmem-8.4.4_3.0.101_108.35-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567555" comment="drbd-kmp-default-8.4.4_3.0.101_108.35-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567556" comment="drbd-kmp-pae-8.4.4_3.0.101_108.35-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567557" comment="drbd-kmp-ppc64-8.4.4_3.0.101_108.35-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567558" comment="drbd-kmp-trace-8.4.4_3.0.101_108.35-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567559" comment="drbd-kmp-xen-8.4.4_3.0.101_108.35-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567560" comment="drbd-pacemaker-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567561" comment="drbd-udev-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567562" comment="drbd-utils-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567563" comment="drbd-xen-8.4.4-0.27.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567564" comment="gfs2-kmp-bigmem-2_3.0.101_108.35-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567565" comment="gfs2-kmp-default-2_3.0.101_108.35-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567566" comment="gfs2-kmp-pae-2_3.0.101_108.35-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567567" comment="gfs2-kmp-ppc64-2_3.0.101_108.35-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567568" comment="gfs2-kmp-trace-2_3.0.101_108.35-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567569" comment="gfs2-kmp-xen-2_3.0.101_108.35-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567570" comment="ocfs2-kmp-bigmem-1.6_3.0.101_108.35-0.28.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567571" comment="ocfs2-kmp-default-1.6_3.0.101_108.35-0.28.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567572" comment="ocfs2-kmp-pae-1.6_3.0.101_108.35-0.28.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567573" comment="ocfs2-kmp-ppc64-1.6_3.0.101_108.35-0.28.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567574" comment="ocfs2-kmp-trace-1.6_3.0.101_108.35-0.28.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567575" comment="ocfs2-kmp-xen-1.6_3.0.101_108.35-0.28.5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38162" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031572" ref_url="https://bugzilla.suse.com/1031572" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1086695" ref_url="https://bugzilla.suse.com/1086695" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1114440" ref_url="https://bugzilla.suse.com/1114440" source="BUGZILLA"/>
		<reference ref_id="1114672" ref_url="https://bugzilla.suse.com/1114672" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1115827" ref_url="https://bugzilla.suse.com/1115827" source="BUGZILLA"/>
		<reference ref_id="1115828" ref_url="https://bugzilla.suse.com/1115828" source="BUGZILLA"/>
		<reference ref_id="1115829" ref_url="https://bugzilla.suse.com/1115829" source="BUGZILLA"/>
		<reference ref_id="1115830" ref_url="https://bugzilla.suse.com/1115830" source="BUGZILLA"/>
		<reference ref_id="1115831" ref_url="https://bugzilla.suse.com/1115831" source="BUGZILLA"/>
		<reference ref_id="1115832" ref_url="https://bugzilla.suse.com/1115832" source="BUGZILLA"/>
		<reference ref_id="1115833" ref_url="https://bugzilla.suse.com/1115833" source="BUGZILLA"/>
		<reference ref_id="1115834" ref_url="https://bugzilla.suse.com/1115834" source="BUGZILLA"/>
		<reference ref_id="1115835" ref_url="https://bugzilla.suse.com/1115835" source="BUGZILLA"/>
		<reference ref_id="1115836" ref_url="https://bugzilla.suse.com/1115836" source="BUGZILLA"/>
		<reference ref_id="1115837" ref_url="https://bugzilla.suse.com/1115837" source="BUGZILLA"/>
		<reference ref_id="1115838" ref_url="https://bugzilla.suse.com/1115838" source="BUGZILLA"/>
		<reference ref_id="1115839" ref_url="https://bugzilla.suse.com/1115839" source="BUGZILLA"/>
		<reference ref_id="1115840" ref_url="https://bugzilla.suse.com/1115840" source="BUGZILLA"/>
		<reference ref_id="1115841" ref_url="https://bugzilla.suse.com/1115841" source="BUGZILLA"/>
		<reference ref_id="1115842" ref_url="https://bugzilla.suse.com/1115842" source="BUGZILLA"/>
		<reference ref_id="1115843" ref_url="https://bugzilla.suse.com/1115843" source="BUGZILLA"/>
		<reference ref_id="1115844" ref_url="https://bugzilla.suse.com/1115844" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117796" ref_url="https://bugzilla.suse.com/1117796" source="BUGZILLA"/>
		<reference ref_id="1117802" ref_url="https://bugzilla.suse.com/1117802" source="BUGZILLA"/>
		<reference ref_id="1117805" ref_url="https://bugzilla.suse.com/1117805" source="BUGZILLA"/>
		<reference ref_id="1117806" ref_url="https://bugzilla.suse.com/1117806" source="BUGZILLA"/>
		<reference ref_id="1117943" ref_url="https://bugzilla.suse.com/1117943" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118760" ref_url="https://bugzilla.suse.com/1118760" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120056" ref_url="https://bugzilla.suse.com/1120056" source="BUGZILLA"/>
		<reference ref_id="1120077" ref_url="https://bugzilla.suse.com/1120077" source="BUGZILLA"/>
		<reference ref_id="1120086" ref_url="https://bugzilla.suse.com/1120086" source="BUGZILLA"/>
		<reference ref_id="1120093" ref_url="https://bugzilla.suse.com/1120093" source="BUGZILLA"/>
		<reference ref_id="1120094" ref_url="https://bugzilla.suse.com/1120094" source="BUGZILLA"/>
		<reference ref_id="1120105" ref_url="https://bugzilla.suse.com/1120105" source="BUGZILLA"/>
		<reference ref_id="1120107" ref_url="https://bugzilla.suse.com/1120107" source="BUGZILLA"/>
		<reference ref_id="1120109" ref_url="https://bugzilla.suse.com/1120109" source="BUGZILLA"/>
		<reference ref_id="1120217" ref_url="https://bugzilla.suse.com/1120217" source="BUGZILLA"/>
		<reference ref_id="1120223" ref_url="https://bugzilla.suse.com/1120223" source="BUGZILLA"/>
		<reference ref_id="1120226" ref_url="https://bugzilla.suse.com/1120226" source="BUGZILLA"/>
		<reference ref_id="1120336" ref_url="https://bugzilla.suse.com/1120336" source="BUGZILLA"/>
		<reference ref_id="1120347" ref_url="https://bugzilla.suse.com/1120347" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1121997" ref_url="https://bugzilla.suse.com/1121997" source="BUGZILLA"/>
		<reference ref_id="1122874" ref_url="https://bugzilla.suse.com/1122874" source="BUGZILLA"/>
		<reference ref_id="1123505" ref_url="https://bugzilla.suse.com/1123505" source="BUGZILLA"/>
		<reference ref_id="1123702" ref_url="https://bugzilla.suse.com/1123702" source="BUGZILLA"/>
		<reference ref_id="1123706" ref_url="https://bugzilla.suse.com/1123706" source="BUGZILLA"/>
		<reference ref_id="1124010" ref_url="https://bugzilla.suse.com/1124010" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125931" ref_url="https://bugzilla.suse.com/1125931" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="969471" ref_url="https://bugzilla.suse.com/969471" source="BUGZILLA"/>
		<reference ref_id="969473" ref_url="https://bugzilla.suse.com/969473" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741/" source="CVE"/>
		<reference ref_id="CVE-2017-18360" ref_url="https://www.suse.com/security/cve/CVE-2017-18360/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-18360: In change_port_settings in drivers/usb/serial/io_ti.c local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates (bnc#1123706).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2019-7222: A information leak in exception handling in KVM could be used to expose host memory to guests. (bnc#1124735).

The following non-security bugs were fixed:

- aacraid: Fix memory leak in aac_fib_map_free (bsc#1115827).
- arcmsr: upper 32 of dma address lost (bsc#1115828).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (bsc#1121997).
- block/swim: Fix array bounds check (Git-fix).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- dasd: fix deadlock in dasd_times_out (bnc#1117943, LTC#174111).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106886)
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106886)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106886)
- Fix kabi break cased by NFS: Cache state owners after files are closed (bsc#1031572).
- fork: record start_time late (bsc#1121872).
- fscache: Fix dead object requeue (bsc#1107371).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (git-fixes).
- fs-cache: Move fscache_report_unexpected_submission() to make it more available (bsc#1107371).
- fs-cache: When submitting an op, cancel it if the target object is dying (bsc#1107371).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (git-fixes).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: Fix oops at process_init_reply() (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: umount should wait for all requests (git-fixes).
- igb: do not unmap NULL hw_addr (bsc#969471 bsc#969473 ) (bsc#1123702).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382) (bsc#1123702).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- kvm: x86: Fix the duplicated failure path handling in vmx_init (bsc#1104367).
- lib: add 'on'/'off' support to strtobool (bsc#1125931).
- megaraid_sas: Fix probing cards without io port (bsc#1115829).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114440, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114440, LTC#172679).
- nfs: Cache state owners after files are closed (bsc#1031572).
- nfs: Do not drop CB requests with invalid principals (git-fixes).
- nfsv4.1: Fix a kfree() of uninitialised pointers in decode_cb_sequence_args (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- nfsv4: Keep dropped state owners on the LRU list for a while (bsc#1031572).
- nlm: Ensure callback code also checks that the files match (git-fixes).
- ocfs2: fix three small problems in the patch (bsc#1086695)
- omap2fb: Fix stack memory disclosure (bsc#1106886)
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- powerpc/fadump: handle crash memory ranges array index overflow (git-fixes).
- powerpc/fadump: Return error when fadump registration fails (git-fixes).
- powerpc/fadump: Unregister fadump on kexec down path (git-fixes).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- Revert 'NFS: Make close(2) asynchronous when closing NFS O_DIRECT files' (git-fixes).
- ring-buffer: Always reset iterator to reader page (bsc#1120107).
- ring-buffer: Fix first commit on sub-buffer having non-zero delta (bsc#1120077).
- ring-buffer: Fix infinite spin in reading buffer (bsc#1120107).
- ring-buffer: Have ring_buffer_iter_empty() return true when empty (bsc#1120107).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- ring-buffer: Up rb_iter_peek() loop count to 3 (bsc#1120105).
- rpm/modprobe-xen.conf: Add --ignore-install.
- s390: always save and restore all registers on context switch (git-fixes).
- s390/dasd: fix using offset into zero size array error (git-fixes).
- s390/decompressor: fix initrd corruption caused by bss clear (git-fixes).
- s390/qdio: do not release memory in qdio_setup_irq() (git-fixes).
- s390/qdio: reset old sbal_state flags (bnc#1114440, LTC#171525).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114440, LTC#172682).
- s390/qeth: fix length check in SNMP processing (bnc#1117943, LTC#173657).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114440, LTC#172682).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/qeth: remove outdated portname debug msg (bnc#1117943, LTC#172960).
- s390/qeth: sanitize strings in debug messages (bnc#1117943, LTC#172960).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: aacraid: Fix typo in blink status (bsc#1115830).
- scsi: aacraid: Reorder Adapter status check (bsc#1115830).
- scsi: aic94xx: fix an error code in aic94xx_init() (bsc#1115831).
- scsi: bfa: integer overflow in debugfs (bsc#1115832).
- scsi: esp_scsi: Track residual for PIO transfers (bsc#1115833).
- scsi: fas216: fix sense buffer initialization (bsc#1115834).
- scsi: libfc: Revert ' libfc: use offload EM instance again instead jumping to next EM' (bsc#1115835).
- scsi: libsas: fix ata xfer length (bsc#1115836).
- scsi: libsas: fix error when getting phy events (bsc#1115837).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1115838).
- scsi: megaraid_sas: Fix data integrity failure for JBOD (passthrough) devices (bsc#1115839).
- scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression (bsc#1115839).
- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1115840).
- scsi: qla2xxx: shutdown chip if reset fail (bsc#1115841).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1115842).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bsc#1115843).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (git-fixes).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1123505, LTC#174581).
- sg: fix dxferp in from_to case (bsc#1115844).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- svc: Avoid garbage replies when pc_func() returns rpc_drop_reply (git-fixes).
- svcrpc: do not leak contexts on PROC_DESTROY (git-fixes).
- tracepoints: Do not trace when cpu is offline (bsc#1120109).
- tracing: Add #undef to fix compile error (bsc#1120226).
- tracing: Allow events to have NULL strings (bsc#1120056).
- tracing: Do not add event files for modules that fail tracepoints (bsc#1120086).
- tracing: Fix check for cpu online when event is disabled (bsc#1120109).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing/kprobes: Allow to create probe with a module name starting with a digit (bsc#1120336).
- tracing: Move mutex to protect against resetting of seq data (bsc#1120217).
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1120347).
- usb: keyspan: fix overrun-error reporting (bsc#1114672).
- usb: keyspan: fix tty line-status reporting (bsc#1114672).
- usb: option: fix Cinterion AHxx enumeration (bsc#1114672).
- usb: serial: ark3116: fix open error handling (bsc#1114672).
- usb: serial: ch341: fix control-message error handling (bsc#1114672).
- usb: serial: ch341: fix initial modem-control state (bsc#1114672).
- usb: serial: ch341: fix modem-status handling (bsc#1114672).
- usb: serial: ch341: fix open and resume after B0 (bsc#1114672).
- usb: serial: ch341: fix resume after reset (bsc#1114672).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1114672).
- usb: serial: cyberjack: fix NULL-deref at open (bsc#1114672).
- usb: serial: fix tty-device error handling at probe (bsc#1114672).
- usb: serial: ftdi_sio: fix modem-status error handling (bsc#1114672).
- usb: serial: io_ti: fix another NULL-deref at open (bsc#1114672).
- usb: serial: io_ti: fix NULL-deref at open (bsc#1114672).
- usb: serial: keyspan_pda: verify endpoints at probe (bsc#1114672).
- usb: serial: kl5kusb105: abort on open exception path (bsc#1114672).
- usb: serial: kl5kusb105: fix open error path (bsc#1114672).
- usb: serial: kobil_sct: fix NULL-deref in write (bsc#1114672).
- usb: serial: mct_u232: fix modem-status error handling (bsc#1114672).
- usb: serial: omninet: fix NULL-derefs at open and disconnect.
- usb: serial: pl2303: fix NULL-deref at open (bsc#1114672).
- usb: serial: ti_usb_3410_5052: fix NULL-deref at open (bsc#1114672).
- vmcore: Remove 'weak' from function declarations (git-fixes).
- x86, kvm: Remove incorrect redundant assembly constraint (bnc#931850).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081, bnc#1104684).
- xen: kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen: x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen/x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/process: Re-export start_thread() (bsc#1110006).
- xen/x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen/x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- xen/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen/x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix the logspace waiting algorithm (bsc#1122874).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031572">SUSE bug 1031572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086695">SUSE bug 1086695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114440">SUSE bug 1114440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114672">SUSE bug 1114672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115827">SUSE bug 1115827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115828">SUSE bug 1115828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115829">SUSE bug 1115829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115830">SUSE bug 1115830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115831">SUSE bug 1115831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115832">SUSE bug 1115832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115833">SUSE bug 1115833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115834">SUSE bug 1115834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115835">SUSE bug 1115835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115836">SUSE bug 1115836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115837">SUSE bug 1115837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115838">SUSE bug 1115838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115839">SUSE bug 1115839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115840">SUSE bug 1115840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115841">SUSE bug 1115841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115842">SUSE bug 1115842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115843">SUSE bug 1115843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115844">SUSE bug 1115844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117796">SUSE bug 1117796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117802">SUSE bug 1117802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117805">SUSE bug 1117805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117806">SUSE bug 1117806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117943">SUSE bug 1117943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118760">SUSE bug 1118760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120056">SUSE bug 1120056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120077">SUSE bug 1120077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120086">SUSE bug 1120086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120093">SUSE bug 1120093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120094">SUSE bug 1120094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120105">SUSE bug 1120105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120107">SUSE bug 1120107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120109">SUSE bug 1120109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120217">SUSE bug 1120217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120223">SUSE bug 1120223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120226">SUSE bug 1120226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120336">SUSE bug 1120336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120347">SUSE bug 1120347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121997">SUSE bug 1121997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122874">SUSE bug 1122874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123505">SUSE bug 1123505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123702">SUSE bug 1123702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125931">SUSE bug 1125931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969471">SUSE bug 969471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969473">SUSE bug 969473</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18360/">CVE-2017-18360</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567576" comment="ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567577" comment="ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567578" comment="ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567579" comment="ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567580" comment="ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567581" comment="ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38163" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1101061" ref_url="https://bugzilla.suse.com/1101061" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1143327" ref_url="https://bugzilla.suse.com/1143327" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146678" ref_url="https://bugzilla.suse.com/1146678" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150599" ref_url="https://bugzilla.suse.com/1150599" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152779" ref_url="https://bugzilla.suse.com/1152779" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152786" ref_url="https://bugzilla.suse.com/1152786" source="BUGZILLA"/>
		<reference ref_id="1152789" ref_url="https://bugzilla.suse.com/1152789" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11-SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).
- CVE-2019-17052: ax25_create in the AF_AX25 network module in the Linux kernel
  did not enforce CAP_NET_RAW, which meant that unprivileged users could create
  a raw socket, aka CID-0614e2b73768. (bnc#1152779)
- CVE-2019-17055: base_sock_create in the AF_ISDN network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users can create
  a raw socket,  aka CID-b91ee4aa2a21. (bnc#1152782)
- CVE-2019-17054: atalk_create in the AF_APPLETALK network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users can create
  a raw socket, aka CID-6cc03e8aa36c. (bnc#1152786)
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17053: ieee802154_create in the AF_IEEE802154 network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users could create
  a raw socket, aka CID-e69dbd4619e7. (bnc#1152789)
- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly, which caused an
  i_size_read() infinite loop and denial of service on SMP systems. (bnc#1151347)
- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the
  flexcop_usb_probe function. (bnc#1146540)
- CVE-2019-15807: There was a memory leak in the SAS expander driver when SAS expander discovery
  fails. This could cause a denial of service. (bnc#1148938)
- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux the kernel's KVM hypervisor
  implemented the Coalesced MMIO write operation. It operated on an MMIO ring buffer
  'struct kvm_coalesced_mmio' object, wherein write indices value could be supplied by a
   host user-space process. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of service
  or potentially escalating privileges on the system. (bnc#1151350)
- CVE-2019-15505: The Linux kernel had an out-of-bounds read via crafted USB device traffic
  (which may have been remote via usbip or usbredir). (bnc#1147122)
- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel's vhost functionality
  that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A
  privileged guest user able to pass descriptors with invalid length to the host when migration
  is underway, could have used this flaw to increase their privileges on the host. (bnc#1150112)
- CVE-2019-15216: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/usb/misc/yurex.c driver. (bnc#1146361)
- CVE-2019-9456: In the Android kernel in Pixel C USB monitor driver there was a possible
  OOB write due to a missing bounds check. This could lead to local escalation of privilege
  with System execution privileges needed. User interaction was not needed for exploitation. (bnc#1150025)
- CVE-2019-15927: An out-of-bounds access existed in the function build_audio_procunit in the
  file sound/usb/mixer.c. (bnc#1149522)
- CVE-2019-15902:  Misuse of the upstream 'x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()'
  commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two (correctly ordered)\
  code lines were swapped. (bnc#1149376)
- CVE-2019-15219: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/usb/misc/sisusbvga/sisusb.c driver. (bnc#1146524)
- CVE-2017-18509: An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel By setting a specific
  socket option, an attacker could control a pointer in kernel land and cause an inet_csk_listen_stop
  general protection fault, or potentially execute arbitrary code under certain circumstances. The issue
  could be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability)
  or after namespace unsharing. This occurred because sk_type and protocol were not checked in the
  appropriate part of the ip6_mroute_* functions. (bnc#1145477)
- CVE-2019-15212: There was a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. (bnc#1146391)
- CVE-2019-15292: There was a use-after-free in atalk_proc_exit. (bnc#1146678)
- CVE-2019-15217: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/media/usb/zr364xx/zr364xx.c driver. (bnc#1146547)
- CVE-2018-20976: A use after free was discovered in fs/xfs/xfs_super.c, related to xfs_fs_fill_super
  failure. (bnc#1146285)
- CVE-2017-18551: There was an out of bounds write in the function i2c_smbus_xfer_emulated. (bnc#1146163)
- CVE-2019-15118: check_input_term in sound/usb/mixer.c mishandled recursion, leading to kernel stack
  exhaustion. (bnc#1145922)

The following non-security bugs were fixed:

- add a missing lfence in kernel error entry and remove a superfluous lfence in userspace interrupt exit paths
- Documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- array_index_nospec: Sanitize speculative array (bsc#1155671)
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- IB/core: Add mitigation for Spectre V1 (bsc#1155671)
- inet_diag: fix oops for IPv4 AF_INET6 TCP SYN-RECV state (bsc#1101061).
- kABI Fix for IFU Patches (bsc#1117665).
- kthread: Implement park/unpark facility (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).
- kvm: MMU: fast invalidate all pages (bsc1117665).
- kvm: VMX: export PFEC.P bit on ept (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- mm/readahead.c: fix readahead failure for memoryless NUMA nodes and limit readahead pages (bsc#1143327).
- mm: use only per-device readahead limit (bsc#1143327).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Update Spectre v2 reporting (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- xfs: xfs_remove deadlocks due to inverted AGF vs AGI lock ordering (bsc#1150599).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101061">SUSE bug 1101061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143327">SUSE bug 1143327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150599">SUSE bug 1150599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567582" comment="ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567583" comment="ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567584" comment="ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567585" comment="ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567586" comment="ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567587" comment="ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38164" version="1" class="patch">
	<metadata>
		<title>Security update for various KMPs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1095824" ref_url="https://bugzilla.suse.com/1095824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<description>

This update rebuilds missing kernel modules (KMP) to use 'retpolines'
mitigations for Spectre Variant 2 (CVE-2017-5715).

Rebuilt KMP packages:

- cluster-network
- drbd
- gfs2
- iscsitarget
- ocfs2
- ofed
- oracleasm

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095824">SUSE bug 1095824</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567588" comment="cluster-network-kmp-bigmem-1.4_3.0.101_108.87-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567589" comment="cluster-network-kmp-default-1.4_3.0.101_108.87-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567590" comment="cluster-network-kmp-pae-1.4_3.0.101_108.87-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567591" comment="cluster-network-kmp-ppc64-1.4_3.0.101_108.87-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567592" comment="cluster-network-kmp-trace-1.4_3.0.101_108.87-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567593" comment="cluster-network-kmp-xen-1.4_3.0.101_108.87-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567594" comment="drbd-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567595" comment="drbd-bash-completion-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567596" comment="drbd-heartbeat-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567597" comment="drbd-kmp-bigmem-8.4.4_3.0.101_108.87-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567598" comment="drbd-kmp-default-8.4.4_3.0.101_108.87-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567599" comment="drbd-kmp-pae-8.4.4_3.0.101_108.87-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567600" comment="drbd-kmp-ppc64-8.4.4_3.0.101_108.87-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567601" comment="drbd-kmp-trace-8.4.4_3.0.101_108.87-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567602" comment="drbd-kmp-xen-8.4.4_3.0.101_108.87-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567603" comment="drbd-pacemaker-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567604" comment="drbd-udev-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567605" comment="drbd-utils-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567606" comment="drbd-xen-8.4.4-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567607" comment="gfs2-kmp-bigmem-2_3.0.101_108.87-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567608" comment="gfs2-kmp-default-2_3.0.101_108.87-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567609" comment="gfs2-kmp-pae-2_3.0.101_108.87-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567610" comment="gfs2-kmp-ppc64-2_3.0.101_108.87-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567611" comment="gfs2-kmp-trace-2_3.0.101_108.87-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567612" comment="gfs2-kmp-xen-2_3.0.101_108.87-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567613" comment="ocfs2-kmp-bigmem-1.6_3.0.101_108.87-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567614" comment="ocfs2-kmp-default-1.6_3.0.101_108.87-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567615" comment="ocfs2-kmp-pae-1.6_3.0.101_108.87-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567616" comment="ocfs2-kmp-ppc64-1.6_3.0.101_108.87-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567617" comment="ocfs2-kmp-trace-1.6_3.0.101_108.87-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567618" comment="ocfs2-kmp-xen-1.6_3.0.101_108.87-0.28.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38165" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="932286" ref_url="https://bugzilla.suse.com/932286" source="BUGZILLA"/>
		<reference ref_id="981347" ref_url="https://bugzilla.suse.com/981347" source="BUGZILLA"/>
		<reference ref_id="990847" ref_url="https://bugzilla.suse.com/990847" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3200" ref_url="https://www.suse.com/security/cve/CVE-2015-3200/" source="CVE"/>
		<reference ref_id="CVE-2016-1000212" ref_url="https://www.suse.com/security/cve/CVE-2016-1000212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002711.html" source="SUSE-SU"/>
		<description>

This update for lighttpd fixes the following issues:

Security issues fixed:

- CVE-2016-1000212: Don't allow requests to set the HTTP_PROXY variable. As *CGI apps
  might pick it up and use it for outgoing requests. (bsc#990847)
- CVE-2015-3200: Log injection via malformed base64 string in Authentication header.
  (bsc#932286)

Bug fixes:

- Add su directive to logrotate file as the directory is owned by lighttpd. (bsc#981347)
- Fix out of bounds read in mod_scgi.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932286">SUSE bug 932286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981347">SUSE bug 981347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990847">SUSE bug 990847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3200/">CVE-2015-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000212/">CVE-2016-1000212</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564923" comment="lighttpd-1.4.20-2.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38166" version="1" class="patch">
	<metadata>
		<title>Security update for pacemaker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1000743" ref_url="https://bugzilla.suse.com/1000743" source="BUGZILLA"/>
		<reference ref_id="1002767" ref_url="https://bugzilla.suse.com/1002767" source="BUGZILLA"/>
		<reference ref_id="1003565" ref_url="https://bugzilla.suse.com/1003565" source="BUGZILLA"/>
		<reference ref_id="1007433" ref_url="https://bugzilla.suse.com/1007433" source="BUGZILLA"/>
		<reference ref_id="1009076" ref_url="https://bugzilla.suse.com/1009076" source="BUGZILLA"/>
		<reference ref_id="953192" ref_url="https://bugzilla.suse.com/953192" source="BUGZILLA"/>
		<reference ref_id="970733" ref_url="https://bugzilla.suse.com/970733" source="BUGZILLA"/>
		<reference ref_id="971129" ref_url="https://bugzilla.suse.com/971129" source="BUGZILLA"/>
		<reference ref_id="972187" ref_url="https://bugzilla.suse.com/972187" source="BUGZILLA"/>
		<reference ref_id="974108" ref_url="https://bugzilla.suse.com/974108" source="BUGZILLA"/>
		<reference ref_id="975079" ref_url="https://bugzilla.suse.com/975079" source="BUGZILLA"/>
		<reference ref_id="976271" ref_url="https://bugzilla.suse.com/976271" source="BUGZILLA"/>
		<reference ref_id="976865" ref_url="https://bugzilla.suse.com/976865" source="BUGZILLA"/>
		<reference ref_id="977258" ref_url="https://bugzilla.suse.com/977258" source="BUGZILLA"/>
		<reference ref_id="977675" ref_url="https://bugzilla.suse.com/977675" source="BUGZILLA"/>
		<reference ref_id="977800" ref_url="https://bugzilla.suse.com/977800" source="BUGZILLA"/>
		<reference ref_id="981489" ref_url="https://bugzilla.suse.com/981489" source="BUGZILLA"/>
		<reference ref_id="981731" ref_url="https://bugzilla.suse.com/981731" source="BUGZILLA"/>
		<reference ref_id="986056" ref_url="https://bugzilla.suse.com/986056" source="BUGZILLA"/>
		<reference ref_id="986201" ref_url="https://bugzilla.suse.com/986201" source="BUGZILLA"/>
		<reference ref_id="986265" ref_url="https://bugzilla.suse.com/986265" source="BUGZILLA"/>
		<reference ref_id="986644" ref_url="https://bugzilla.suse.com/986644" source="BUGZILLA"/>
		<reference ref_id="986676" ref_url="https://bugzilla.suse.com/986676" source="BUGZILLA"/>
		<reference ref_id="986931" ref_url="https://bugzilla.suse.com/986931" source="BUGZILLA"/>
		<reference ref_id="987348" ref_url="https://bugzilla.suse.com/987348" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7035" ref_url="https://www.suse.com/security/cve/CVE-2016-7035/" source="CVE"/>
		<reference ref_id="CVE-2016-7797" ref_url="https://www.suse.com/security/cve/CVE-2016-7797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002489.html" source="SUSE-SU"/>
		<description>

This update for pacemaker fixes one security issue and several non-security issues.

The following security issue has been fixed:

- libcrmcommon: Fix improper IPC guarding. (bsc#1007433, CVE-2016-7035)

The following non-security issues have been fixed:

- Add logrotate to reqs of pacemaker-cli.
- Add $remote_fs dependencies to the init scripts.
- all: Clarify licensing and copyrights.
- attrd,ipc: Prevent possible segfault on exit. (bsc#986056)
- attrd, libcrmcommon: Validate attrd requests better.
- attrd_updater: Fix usage of HAVE_ATOMIC_ATTRD.
- cib/fencing: Set status callback before connecting to cluster. (bsc#974108)
- ClusterMon: Fix to avoid matching other process with the same PID.
- crmd: Acknowledge cancellation operations for remote connection resources. (bsc#976865)
- crmd: Avoid timeout on older peers when cancelling a resource operation.
- crmd: Record pending operations in the CIB before they are performed. (bsc#1003565)
- crmd: Clear remote node operation history only when it comes up.
- crmd: Clear remote node transient attributes on disconnect. (bsc#981489)
- crmd: Don't abort transitions for CIB comment changes.
- crmd: Ensure the R_SHUTDOWN is set whenever we ask the DC to shut us down.
- crmd: Get full action information earlier. (bsc#981731)
- crmd: Graceful proxy shutdown is now tested. (bsc#981489)
- crmd: Keep a state of LRMD in the DC node latest.
- crmd,lrmd,liblrmd: Use defined constants for lrmd IPC operations. (bsc#981489)
- crmd: Mention that graceful remote shutdowns may cause connection failures. (bsc#981489)
- crmd/pengine: Handle on-fail=ignore properly. (bsc#981731)
- crmd/pengine: Implement on-fail=ignore without allow-fail. (bsc#981731)
- crmd: Remove dead code. (bsc#981731)
- crmd: Rename action number variable in process_graph_event(). (bsc#981731)
- crmd: Resend the shutdown request if the DC forgets.
- crmd: Respect start-failure-is-fatal even for artificially injected events. (bsc#981731)
- crmd: Set remote flag when gracefully shutting down remote nodes. (bsc#981489)
- crmd: Set the shutdown transient attribute in response to LRMD_IPC_OP_SHUTDOWN_REQ from remote nodes. (bsc#981489)
- crmd: Support graceful pacemaker_remote stops. (bsc#981489)
- crmd: Take start-delay into account for the timeout of the action timer. (bsc#977258)
- crmd: Use defined constant for magic 'direct nack' RC. (bsc#981731)
- crmd: Use proper resource agent name when caching metadata.
- crmd: When node load was reduced, crmd carries out a feasible action.
- crm_mon: Avoid logging errors for any CIB changes that we don't care about. (bsc#986931)
- crm_mon: Consistently print ms resource state.
- crm_mon: Do not call setenv with null value.
- crm_mon: Do not log errors for the known CIB changes that should be ignored. (bsc#986931)
- crm_mon: Fix time formatting on x32.
- cts: Avoid kill usage error if DummySD stop called when already stopped.
- CTS: Get Reattach test working again and up-to-date. (bsc#953192)
- cts: Simulate pacemaker_remote failure with kill. (bsc#981489)
- fencing/fence_legacy: Search capable devices by querying them through 'list' action for cluster-glue stonith 
  agents. (bsc#986265)
- fencing: Record the last known names of nodes to make sure fencing requested with nodeid works. (bsc#974108)
- libais,libcluster,libcrmcommon,liblrmd: Don't use %z specifier.
- libcib,libfencing,libtransition: Handle memory allocation errors without CRM_CHECK().
- lib: Correction of the deletion of the notice registration.
- libcrmcommon: Correct directory name in log message.
- libcrmcommon: Ensure crm_time_t structure is fully initialized by API calls.
- libcrmcommon: Log XML comments correctly.
- libcrmcommon: Properly handle XML comments when comparing v2 patchset diffs.
- libcrmcommon: Really ensure crm_time_t structure is fully initialized by API calls.
- libcrmcommon: Remove extraneous format specifier from log message.
- libcrmcommon: Report errors consistently when waiting for data on connection. (bsc#986644)
- libfencing: Report added node ID correctly.
- liblrmd: Avoid memory leak when closing or deleting lrmd connections.
- libpengine: Allow pe_order_same_node option for constraints.
- libpengine: Log message when stonith disabled, not enabled.
- libpengine: Only log startup-fencing warning once.
- libtransition: Potential memory leak if unpacking action fails.
- lrmd: Handle shutdown a little more cleanly. (bsc#981489)
- lrmd,libcluster: Ensure g_hash_table_foreach() is never passed a null table.
- lrmd,liblrmd: Add lrmd IPC operations for requesting and acknowledging shutdown. (bsc#981489)
- lrmd: Make proxied IPC providers/clients opaque. (bsc#981489)
- mcp: Improve comments for sysconfig options.
- pacemaker_remote: Set LSB Provides header to the service name.
- pacemaker_remote: Support graceful stops. (bsc#981489)
- PE: Correctly update the dependent actions of un-runnable clones.
- PE: Honor the shutdown transient attributes for remote nodes. (bsc#981489)
- pengine: Avoid memory leak when invalid constraint involves set.
- pengine: Avoid null dereference in new same-node ordering option.
- pengine: Avoid transition loop for start-then-stop + unfencing.
- pengine: Avoid use-after-free with location constraint + sets + templates.
- pengine: Better error handling when unpacking sets in location constraints.
- pengine: Consider resource failed if any of the configured monitor operations failed. (bsc#972187)
- pengine: Correction of the record judgment of the failed information.
- pengine: Do not fence a maintenance node if it shuts down cleanly. (bsc#1000743)
- pengine: Correctly set the environment variable 'OCF_RESKEY_CRM_meta_timeout' when 'start-delay' is configured. 
  (bsc#977258)
- pengine: Only set unfencing constraints once.
- pengine: Organize order of actions for master resources in anti-colocations. (bsc#977800)
- pengine: Organize order of actions for slave resources in anti-colocations. (bsc#977800)
- pengine: Properly order stop actions relative to stonith.
- pengine: Respect asymmetrical ordering when trying to move resources. (bsc#977675)
- pengine: Set OCF_RESKEY_CRM_meta_notify_active_* for multistate resources.
- pengine,tools: Display pending resource state by default when it's available. (bsc#986201)
- ping: Avoid temp files in fping_check. (bsc#987348)
- ping: Avoid temporary files for fping check. (bsc#987348)
- ping: Log sensible error when /tmp is full. (bsc#987348)
- ping resource: Use fping6 for IPv6 hosts. (bsc#976271)
- RA/SysInfo: Reset the node attribute '#health_disk' to 'green' when there's sufficient free disk. (bsc#975079)
- remote: Allow cluster and remote LRM API versions to diverge. (bsc#1009076)
- remote: Correctly calculate the remaining timeouts when receiving messages. (bsc#986644)
- resources: Use OCF version tagging correctly.
- services: Correctly clean up service actions for non-dbus case.
- spec: fence_pcmk only eligible for Pacemaker+CMAN.
- stonithd: Correction of the wrong connection process name.
- sysconfig: Minor tweaks (typo, wording).
- tools: Avoid memory leaks in crm_resource --restart.
- tools: Avoid memory leak when crm_mon unpacks constraints.
- tools: Correctly count starting resources when doing crm_resource --restart.
- tools: crm_resource -T option should not be hidden anymore.
- tools: crm_standby --version/--help should work without cluster.
- tools: Do not send command lines to syslog. (bsc#986676)
- tools: Do not assume all resources restart on same node with crm_resource --restart.
- tools: Don't require node to be known to crm_resource when deleting attribute.
- tools: Properly handle crm_resource --restart with a resource in a group.
- tools: Remember any existing target-role when doing crm_resource --restart.
- various: Issues discovered via valgrind and coverity.

Additionally, the following references have been added to the changelog:

bsc#970733, fate#318381, bsc#1002767, CVE-2016-7797, bsc#971129
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-15"/>
	<updated date="2016-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000743">SUSE bug 1000743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002767">SUSE bug 1002767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003565">SUSE bug 1003565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007433">SUSE bug 1007433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009076">SUSE bug 1009076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953192">SUSE bug 953192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970733">SUSE bug 970733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971129">SUSE bug 971129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972187">SUSE bug 972187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974108">SUSE bug 974108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975079">SUSE bug 975079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976271">SUSE bug 976271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976865">SUSE bug 976865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977258">SUSE bug 977258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977675">SUSE bug 977675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977800">SUSE bug 977800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981489">SUSE bug 981489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981731">SUSE bug 981731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986056">SUSE bug 986056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986201">SUSE bug 986201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986265">SUSE bug 986265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986644">SUSE bug 986644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986676">SUSE bug 986676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986931">SUSE bug 986931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987348">SUSE bug 987348</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7035/">CVE-2016-7035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7797/">CVE-2016-7797</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567619" comment="libpacemaker-devel-1.1.12-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567620" comment="libpacemaker3-1.1.12-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567621" comment="pacemaker-1.1.12-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567622" comment="pacemaker-cli-1.1.12-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567623" comment="pacemaker-remote-1.1.12-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38167" version="1" class="patch">
	<metadata>
		<title>Security update for resource-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
		</affected>
		<reference ref_id="1021689" ref_url="https://bugzilla.suse.com/1021689" source="BUGZILLA"/>
		<reference ref_id="1146687" ref_url="https://bugzilla.suse.com/1146687" source="BUGZILLA"/>
		<reference ref_id="1146690" ref_url="https://bugzilla.suse.com/1146690" source="BUGZILLA"/>
		<reference ref_id="1146784" ref_url="https://bugzilla.suse.com/1146784" source="BUGZILLA"/>
		<reference ref_id="1146785" ref_url="https://bugzilla.suse.com/1146785" source="BUGZILLA"/>
		<reference ref_id="1146787" ref_url="https://bugzilla.suse.com/1146787" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006740.html" source="SUSE-SU"/>
		<description>
This update for resource-agents fixes the following issues:

- Fixed multiple vulnerabilities related to unsafe tempfile usage.
  (bsc#1146690 bsc#1146784 bsc#1146785 bsc#1146787)
- Fixed issues where the ocfmon user was created with a default password (bsc#1021689, bsc#1146687).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-24"/>
	<updated date="2020-04-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021689">SUSE bug 1021689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146687">SUSE bug 1146687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146690">SUSE bug 1146690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146784">SUSE bug 1146784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146785">SUSE bug 1146785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146787">SUSE bug 1146787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-hae:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117403" comment="SUSE Linux Enterprise High Availability Extension 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567624" comment="ldirectord-3.9.5-50.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567625" comment="nagios-plugins-metadata-3.9.5-50.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567626" comment="resource-agents-3.9.5-50.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38168" version="1" class="patch">
	<metadata>
		<title>Security update for qemu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP2</platform>
		</affected>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

The qemu vt100 emulation is affected by a problem where specific vt100 
sequences could have been used by guest users to affect the host. 
(CVE-2012-3515 aka XSA-17).

Security Issue references:

    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-03"/>
	<updated date="2012-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117404" comment="SUSE Linux Enterprise Point of Sale 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563129" comment="qemu-0.10.1-0.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38169" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567627" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38170" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567628" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38171" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567629" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38172" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567630" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38173" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567631" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38174" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567632" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38175" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007873.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567633" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38176" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-14"/>
	<updated date="2016-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567634" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567635" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567636" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567637" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567638" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567639" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567640" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567641" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567642" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38177" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567643" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567644" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38178" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567645" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567646" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38179" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567647" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567648" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38180" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567649" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567650" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38181" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567651" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567652" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38182" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567653" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567654" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567655" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567656" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567657" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567658" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567659" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38183" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox and mozilla-nss fixes the following issues:

Security issues fixed:
- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)
  - CVE-2017-7758: Out-of-bounds read in Opus encoder
  - CVE-2017-7749: Use-after-free during docshell reloading
  - CVE-2017-7751: Use-after-free with content viewer listeners
  - CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
  - CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
  - CVE-2017-7752: Use-after-free with IME input
  - CVE-2017-7750: Use-after-free with track elements
  - CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service
  - CVE-2017-7778: Vulnerabilities in the Graphite 2 library
  - CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
  - CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files
  - CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
  - CVE-2017-7757: Use-after-free in IndexedDB
  - CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application
  - CVE-2017-7763: Mac fonts render some unicode characters as spaces
  - CVE-2017-7765: Mark of the Web bypass when saving executable files
  - CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)
  - CVE-2016-10196: Vulnerabilities in Libevent library
  - CVE-2017-5443: Out-of-bounds write during BinHex decoding
  - CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
  - CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
  - CVE-2017-5465: Out-of-bounds read in ConvolvePixel
  - CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
  - CVE-2017-5467: Memory corruption when drawing Skia content
  - CVE-2017-5460: Use-after-free in frame selection
  - CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
  - CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
  - CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
  - CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
  - CVE-2017-5447: Out-of-bounds read during glyph processing
  - CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
  - CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content
  - CVE-2017-5442: Use-after-free during style changes
  - CVE-2017-5469: Potential Buffer overflow in flex-generated code
  - CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
  - CVE-2017-5441: Use-after-free with selection during scroll events
  - CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
  - CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
  - CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
  - CVE-2017-5435: Use-after-free during transaction processing in the editor
  - CVE-2017-5434: Use-after-free during focus handling
  - CVE-2017-5433: Use-after-free in SMIL animation functions
  - CVE-2017-5432: Use-after-free in text input selection
  - CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
  - CVE-2017-5459: Buffer overflow in WebGL
  - CVE-2017-5462: DRBG flaw in NSS
  - CVE-2017-5455: Sandbox escape through internal feed reader APIs
  - CVE-2017-5454: Sandbox escape allowing file system read access through file picker
  - CVE-2017-5456: Sandbox escape allowing local file system access
  - CVE-2017-5451: Addressbar spoofing with onblur event

- General
  - CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842)

Bugfixes:
- workaround for Firefox hangs (bsc#1031485, bsc#1025108)
- Update to gcc-5-branch head.
  * Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460),
    (bsc#930496), (bsc#930392) and (bsc#955382).
- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)
- Fix libffi include install.  (bsc#935510)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567660" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567661" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567662" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567663" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567664" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567665" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567666" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567667" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567668" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38184" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<description>


Mozilla Firefox was updated to the ESR 52.3 release (bsc#1052829)

Following security issues were fixed:

* MFSA 2017-19/CVE-2017-7807: Domain hijacking through AppCache fallback
* MFSA 2017-19/CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts
* MFSA 2017-19/CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID
* MFSA 2017-19/CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections
* MFSA 2017-19/CVE-2017-7787: Same-origin policy bypass with iframes through page reloads
* MFSA 2017-19/CVE-2017-7786: Buffer overflow while painting non-displayable SVG
* MFSA 2017-19/CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM
* MFSA 2017-19/CVE-2017-7784: Use-after-free with image observers
* MFSA 2017-19/CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements
* MFSA 2017-19/CVE-2017-7798: XUL injection in the style editor in devtools
* MFSA 2017-19/CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher
* MFSA 2017-19/CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3
* MFSA 2017-19/CVE-2017-7800: Use-after-free in WebSockets during disconnection
* MFSA 2017-19/CVE-2017-7801: Use-after-free with marquee during window resizing
* MFSA 2017-19/CVE-2017-7802: Use-after-free resizing image elements
* MFSA 2017-19/CVE-2017-7803: CSP containing 'sandbox' improperly applied

This update also fixes:

-  fixed firefox hangs after a while in FUTEX_WAIT_PRIVATE if
   cgroups enabled and running on cpu &gt;=1 (bsc#1031485)
-  The Itanium ia64 build was fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567669" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567670" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567671" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38185" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567672" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567673" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38186" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567674" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567675" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38187" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567676" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567677" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38188" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 52.8 release fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567678" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567679" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38189" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567680" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567681" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38190" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567682" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567683" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38191" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567684" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38192" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657131" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38193" version="1" class="patch">
	<metadata>
		<title>Security update for POS_Image3, POS_Server3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1003374" ref_url="https://bugzilla.suse.com/1003374" source="BUGZILLA"/>
		<reference ref_id="1003376" ref_url="https://bugzilla.suse.com/1003376" source="BUGZILLA"/>
		<reference ref_id="1003383" ref_url="https://bugzilla.suse.com/1003383" source="BUGZILLA"/>
		<reference ref_id="840279" ref_url="https://bugzilla.suse.com/840279" source="BUGZILLA"/>
		<reference ref_id="883017" ref_url="https://bugzilla.suse.com/883017" source="BUGZILLA"/>
		<reference ref_id="887607" ref_url="https://bugzilla.suse.com/887607" source="BUGZILLA"/>
		<reference ref_id="889665" ref_url="https://bugzilla.suse.com/889665" source="BUGZILLA"/>
		<reference ref_id="890002" ref_url="https://bugzilla.suse.com/890002" source="BUGZILLA"/>
		<reference ref_id="927232" ref_url="https://bugzilla.suse.com/927232" source="BUGZILLA"/>
		<reference ref_id="944292" ref_url="https://bugzilla.suse.com/944292" source="BUGZILLA"/>
		<reference ref_id="946740" ref_url="https://bugzilla.suse.com/946740" source="BUGZILLA"/>
		<reference ref_id="979925" ref_url="https://bugzilla.suse.com/979925" source="BUGZILLA"/>
		<reference ref_id="985979" ref_url="https://bugzilla.suse.com/985979" source="BUGZILLA"/>
		<reference ref_id="989247" ref_url="https://bugzilla.suse.com/989247" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002351.html" source="SUSE-SU"/>
		<description>

This update provides POS_Image3 and POS_Server3 version 3.5.5, which bring many
fixes and enhancements:

- Fixed potential security issues (bsc#946740)
  * use three argument perl open function consistently
  * use array in perl system call everywhere
  * use preferably perl built-in functions instead of external shell commands
  * improved validation of uploaded files from terminals to BS
  * improved runcmd code used for calling external commands
- Auto-registration should not start before dhcpd is ready (bsc#1003383)
- Fixed handling of HTTP redirects in registerImages (bsc#1003376)
- Fixed handling x86_64 images (bsc#1003374)
- Do not limit number of entries for BS LDAP (bsc#985979)
- Increase max wait time to 10mins (bsc#989247)
- Infer service IP when only one BS NIC is specified in LDAP (bsc#927232)
- Fixed regression in directly referenced image in scWorkstation object (bsc#979925)
- Fixed handling deltas of compressed images in registerImages (bsc#887607)
- Fixed posleases to handle stop event correctly (bsc#883017)
- Fixed save_poslogs utility to dump LDAP content on BS (bsc#890002)
- Do not configure authoritative DNS outside netmask (bsc#889665)
- Add ipHostNumber field to services in posAdmin-GUI (bsc#944292)
- Fixed multival modification in posAdmin (bsc#840279)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-25"/>
	<updated date="2016-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003374">SUSE bug 1003374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003376">SUSE bug 1003376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003383">SUSE bug 1003383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840279">SUSE bug 840279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883017">SUSE bug 883017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887607">SUSE bug 887607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889665">SUSE bug 889665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890002">SUSE bug 890002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927232">SUSE bug 927232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944292">SUSE bug 944292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946740">SUSE bug 946740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979925">SUSE bug 979925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985979">SUSE bug 985979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989247">SUSE bug 989247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567685" comment="POS_Image-Minimal3-3.4.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567686" comment="POS_Image-Netboot-hooks-3.4.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567687" comment="POS_Image-Tools-3.4.0-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567688" comment="POS_Image3-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567689" comment="POS_Migration-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567690" comment="POS_Server-Admin3-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567691" comment="POS_Server-AdminGUI-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567692" comment="POS_Server-AdminTools3-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567693" comment="POS_Server-BranchTools3-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567694" comment="POS_Server-Modules3-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567695" comment="POS_Server3-3.5.5-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567696" comment="admind-1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567697" comment="admind-client-1.9-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567698" comment="posbios-1.0-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38194" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567699" comment="SDL-1.2.13-106.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38195" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679742" comment="SDL-1.2.13-106.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38196" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567700" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38197" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010061.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664249" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38198" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567701" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567702" comment="apache2-devel-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567703" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567704" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567705" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567706" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567707" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38199" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567708" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567709" comment="apache2-devel-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567710" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567711" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567712" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567713" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567714" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38200" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567715" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567716" comment="apache2-devel-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567717" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567718" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567719" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567720" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567721" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38201" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567722" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567723" comment="apache2-devel-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567724" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567725" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567726" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567727" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567728" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38202" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633937" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633938" comment="apache2-devel-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633939" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633940" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633941" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633942" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633943" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38203" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673613" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673614" comment="apache2-devel-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673615" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673616" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673617" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673618" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673619" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38204" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567729" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38205" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14266-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-202014266-1.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567730" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38206" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009093.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616450" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38207" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009287.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627830" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627831" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38208" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567731" comment="atftp-0.7.0-135.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38209" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567732" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567733" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567734" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567735" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567736" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38210" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567737" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567738" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567739" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567740" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567741" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38211" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567742" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567743" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567744" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567745" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567746" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38212" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567747" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567748" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567749" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567750" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567751" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38213" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service
(daemon crash) via a long request that uses the lightweight resolver protocol.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567752" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567753" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567754" comment="bind-devel-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567755" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567756" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567757" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38214" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1034162" ref_url="https://bugzilla.suse.com/1034162" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00018.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567758" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567759" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567760" comment="bind-devel-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567761" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567762" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567763" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38215" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567764" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567765" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567766" comment="bind-devel-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567767" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567768" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567769" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38216" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00006.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567770" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567771" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567772" comment="bind-devel-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567773" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567774" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567775" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38217" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567776" comment="bind-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567777" comment="bind-chrootenv-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567778" comment="bind-devel-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567779" comment="bind-doc-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567780" comment="bind-libs-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567781" comment="bind-utils-9.9.6P1-0.51.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38218" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1033843" ref_url="https://bugzilla.suse.com/1033843" source="BUGZILLA"/>
		<reference ref_id="1092283" ref_url="https://bugzilla.suse.com/1092283" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172220" ref_url="https://bugzilla.suse.com/1172220" source="BUGZILLA"/>
		<reference ref_id="1172680" ref_url="https://bugzilla.suse.com/1172680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- Removed rndc.key generation from bind.spec file (bsc#1092283, bsc#1033843)
  bind should create the key on first boot or if it went missing.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033843">SUSE bug 1033843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092283">SUSE bug 1092283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172220">SUSE bug 1172220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172680">SUSE bug 1172680</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567782" comment="bind-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567783" comment="bind-chrootenv-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567784" comment="bind-devel-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567785" comment="bind-doc-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567786" comment="bind-libs-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567787" comment="bind-utils-9.9.6P1-0.51.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38219" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008341.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567788" comment="bind-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567789" comment="bind-chrootenv-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567790" comment="bind-devel-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567791" comment="bind-doc-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567792" comment="bind-libs-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567793" comment="bind-utils-9.9.6P1-0.51.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38220" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567794" comment="bind-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567795" comment="bind-chrootenv-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567796" comment="bind-devel-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567797" comment="bind-doc-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567798" comment="bind-libs-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567799" comment="bind-utils-9.9.6P1-0.51.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38221" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567800" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38222" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567801" comment="bzip2-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567802" comment="bzip2-doc-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567803" comment="libbz2-1-1.0.5-34.256.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38223" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567804" comment="bzip2-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567805" comment="bzip2-doc-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567806" comment="libbz2-1-1.0.5-34.256.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38224" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010849.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681247" comment="cifs-utils-5.1-0.14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38225" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567807" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38226" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567808" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38227" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567809" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38228" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567810" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38229" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567811" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38230" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567812" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38231" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567813" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38232" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567814" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38233" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567815" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38234" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567816" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38235" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657132" comment="clamav-0.103.4-0.20.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38236" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010086.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664012" comment="clamav-0.103.5-0.20.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38237" version="1" class="patch">
	<metadata>
		<title>Security update for compat-wireless, compat-wireless-debuginfo, compat-wireless-debugsource, compat-wireless-kmp-default, compat-wireless-kmp-pae, compat-wireless-kmp-trace, compat-wireless-kmp-xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="851021" ref_url="https://bugzilla.suse.com/851021" source="BUGZILLA"/>
		<reference ref_id="851426" ref_url="https://bugzilla.suse.com/851426" source="BUGZILLA"/>
		<reference ref_id="865475" ref_url="https://bugzilla.suse.com/865475" source="BUGZILLA"/>
		<reference ref_id="871148" ref_url="https://bugzilla.suse.com/871148" source="BUGZILLA"/>
		<reference ref_id="883209" ref_url="https://bugzilla.suse.com/883209" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672/" source="CVE"/>
		<description>

This update for the compat-wireless kernel modules provides many fixes and 
enhancements:

    * Fix potential crash problem in ath9k. (CVE-2014-2672, bnc#871148)
    * Fix improper updates of MAC addresses in ath9k_htc. (bnc#851426,
      CVE-2013-4579)
    * Fix stability issues in iwlwifi. (bnc#865475)
    * Improve support for Intel 7625 cards in iwlwifi. (bnc#51021)

Installation notes:

New driver modules may conflict with old modules, which are automatically 
loaded from the initrd file after reboot. To apply this maintenance update 
correctly, the following steps need to be executed on a SLEPOS system:

    * Rebuild image
    * Create specific scDistributionContainer with newly built initrd and
      kernel
    * Put the updated system image in it as a scPosImage object

Alternatively, you can use a kernel parameter to enforce using the kernel 
from the system image:

    * Rebuild image
    * Set the kernel parameter FORCE_KEXEC, by adding the scPxeFileTemplate
      object under the relevant scPosImage object, with the
      scKernelParameters attribute containing 'FORCE_KEXEC=yes'.

Security Issue references:

    * CVE-2014-2672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672&gt;
    * CVE-2013-4579
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-18"/>
	<updated date="2014-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/851021">SUSE bug 851021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865475">SUSE bug 865475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883209">SUSE bug 883209</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566375" comment="compat-wireless-kmp-default-3.13_3.0.101_0.31-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566376" comment="compat-wireless-kmp-pae-3.13_3.0.101_0.31-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38238" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009282.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630644" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630645" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38239" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009331.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631546" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631547" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38240" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567817" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567818" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567819" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38241" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006729.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567820" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567821" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567822" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38242" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567823" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567824" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567825" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38243" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567826" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567827" comment="libcurl4-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38244" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567828" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567829" comment="libcurl4-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38245" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567830" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567831" comment="libcurl-devel-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567832" comment="libcurl4-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38246" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567833" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567834" comment="libcurl-devel-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567835" comment="libcurl4-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38247" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567836" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567837" comment="libcurl-devel-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567838" comment="libcurl4-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38248" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567839" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567840" comment="libcurl-devel-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567841" comment="libcurl4-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38249" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008085.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567842" comment="cyrus-sasl-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567843" comment="cyrus-sasl-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567844" comment="cyrus-sasl-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567845" comment="cyrus-sasl-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567846" comment="cyrus-sasl-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567847" comment="cyrus-sasl-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567848" comment="cyrus-sasl-saslauthd-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567849" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38250" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669451" comment="cyrus-sasl-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669452" comment="cyrus-sasl-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669453" comment="cyrus-sasl-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669454" comment="cyrus-sasl-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669455" comment="cyrus-sasl-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669456" comment="cyrus-sasl-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669457" comment="cyrus-sasl-saslauthd-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669458" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38251" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567850" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567851" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38252" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567852" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567853" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567854" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567855" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38253" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567856" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567857" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567858" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567859" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38254" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008905.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567860" comment="dhcp-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567861" comment="dhcp-client-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567862" comment="dhcp-relay-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567863" comment="dhcp-server-4.2.4.P2-0.28.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38255" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567864" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38256" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008890.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567865" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38257" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009112.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624087" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38258" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009248.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627832" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38259" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]

This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567866" comment="dnsmasq-2.78-0.16.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38260" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issues fixed:

- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686: Fixed multiple Cache Poisoning attacks (bsc#1177077).
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687: Fixed multiple potential Heap-based overflows when DNSSEC is enabled (bsc#1177077).

Non-security issue fixed:

- Retry query to other servers on receipt of SERVFAIL rcode (bsc#1176076).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567867" comment="dnsmasq-2.78-0.16.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38261" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).

Non-security fixes:

- Removed cache size limit (bsc#1138743).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679568" comment="dnsmasq-2.78-0.16.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38262" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00075.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567868" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567869" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567870" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567871" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567872" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38263" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567873" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567874" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567875" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38264" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664118" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664119" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38265" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666454" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666455" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38266" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669848" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669849" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38267" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010614.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671287" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671288" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38268" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567876" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567877" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567878" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567879" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567880" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567881" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38269" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="938159" ref_url="https://bugzilla.suse.com/938159" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="999596" ref_url="https://bugzilla.suse.com/999596" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
		<description>

  
This update for gcc43 fixes the following issues:

Security issue fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

New features:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection to mitigate the Stack Clash attack.  [bnc#1039513]

Non security bugs fixed:

- Fixed build of 32bit libgcov.a with LFS support.  [bsc#1044016]
- Fixed issue with libstdc++ functional when an exception is thrown during construction.  [bsc#999596]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed ICE compiling AFS modules for the s390x kernel.  [bsc#938159]
- Backport large file support from GCC 4.6.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938159">SUSE bug 938159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999596">SUSE bug 999596</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567882" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567883" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567884" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567885" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567886" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567887" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38270" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567888" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567889" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567890" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567891" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567892" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567893" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38271" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006091.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

- CVE-2019-1010180: Fixed a buffer overflow (bsc#1142772).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567894" comment="gdb-7.5.1-0.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38272" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567895" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567896" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567897" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567898" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567899" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567900" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567901" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38273" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00052.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567902" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567903" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567904" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567905" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567906" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567907" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567908" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38274" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567909" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567910" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567911" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567912" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567913" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567914" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567915" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38275" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005853.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567916" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567917" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567918" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567919" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567920" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567921" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567922" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38276" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567923" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567924" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567925" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567926" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567927" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567928" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567929" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567930" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38277" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00018.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567931" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567932" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567933" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567934" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567935" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567936" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567937" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567938" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38278" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00038.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567939" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567940" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567941" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567942" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567943" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567944" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567945" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567946" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38279" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-28"/>
	<updated date="2018-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567947" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567948" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567949" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567950" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567951" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567952" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567953" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567954" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38280" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1077763" ref_url="https://bugzilla.suse.com/1077763" source="BUGZILLA"/>
		<reference ref_id="1079625" ref_url="https://bugzilla.suse.com/1079625" source="BUGZILLA"/>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161).

Bug fixes:

- bsc#1086690: Fix crash in resolver on memory allocation failure.
- bsc#1077763: Fix allocation in in6ailist_add.
- bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077763">SUSE bug 1077763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079625">SUSE bug 1079625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567955" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567956" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567957" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567958" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567959" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567960" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567961" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567962" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38281" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1058774" ref_url="https://bugzilla.suse.com/1058774" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583)
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580)
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234).

This non-security issue was fixed:

- Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058774">SUSE bug 1058774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567963" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567964" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567965" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567966" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567967" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567968" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567969" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567970" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38282" version="1" class="patch">
	<metadata>
		<title>Recommended update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1110170" ref_url="https://bugzilla.suse.com/1110170" source="BUGZILLA"/>
		<reference ref_id="1110174" ref_url="https://bugzilla.suse.com/1110174" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325).

Non-security issue fixed:

- Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618).
- Remove improper assert in dlclose (bsc#1110174, BZ #11941).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110170">SUSE bug 1110170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110174">SUSE bug 1110174</bugzilla>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567971" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567972" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567973" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567974" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567975" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567976" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567977" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567978" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38283" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005564.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2019-9169: Fixed heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-20"/>
	<updated date="2019-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567979" comment="glibc-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567980" comment="glibc-devel-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567981" comment="glibc-html-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567982" comment="glibc-i18ndata-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567983" comment="glibc-info-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567984" comment="glibc-locale-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567985" comment="glibc-profile-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567986" comment="nscd-2.11.3-17.110.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38284" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-04"/>
	<updated date="2021-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634722" comment="glibc-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634723" comment="glibc-devel-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634724" comment="glibc-html-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634725" comment="glibc-i18ndata-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634726" comment="glibc-info-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634727" comment="glibc-locale-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634728" comment="glibc-profile-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634729" comment="nscd-2.11.3-17.110.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38285" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed in getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673392" comment="glibc-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673393" comment="glibc-devel-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673394" comment="glibc-html-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673395" comment="glibc-i18ndata-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673396" comment="glibc-info-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673397" comment="glibc-locale-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673398" comment="glibc-profile-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673399" comment="nscd-2.11.3-17.110.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38286" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567987" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567988" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38287" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567989" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567990" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567991" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567992" comment="libgstapp-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567993" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38288" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009022.html" source="SUSE-SU"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567994" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38289" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14044-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914044-1.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38290" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567997" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38291" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00018.html" source="SUSE-SU"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567998" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568000" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568001" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568002" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568003" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38292" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568004" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568006" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568007" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568008" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568009" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38293" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:


  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568010" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568011" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568012" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568013" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568014" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568015" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38294" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<description>
This update for java-1_6_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 6.0.16.50 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2017-10355 CVE-2017-10357
    CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350
    CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-19"/>
	<updated date="2017-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568016" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568017" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568018" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568019" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568020" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568021" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38295" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<description>

IBM Java 7 was updated to 7.1-9.50, fixing bugs and security issues (bsc#992537).

Security issues fixed:
  CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-10"/>
	<updated date="2016-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568022" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568023" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568024" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568025" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568026" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38296" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

- Version update to 7.0-9.60 (bsc#1009280, bsc#992537) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568027" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568028" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568029" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568030" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568031" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38297" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568032" comment="java-1_7_0-ibm-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568033" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568034" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568035" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568036" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38298" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

Version update to 7.0-10.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568037" comment="java-1_7_0-ibm-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568038" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568039" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568040" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568041" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38299" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Security update to version 7.0.10.15 (bsc#1070162):
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2016-10165 CVE-2017-10355
    CVE-2017-10357 CVE-2017-10348 CVE-2017-10349 CVE-2017-10347
    CVE-2017-10350 CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568042" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568043" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568044" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568045" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568046" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38300" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<description>

  
This update for java-1_7_0-ibm provides the following fixes:

The version was updated to 7.0.10.20 [bsc#1082810]:

* Following security issues were fixed:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

    - IJ04281 Class Libraries: Startup time increase after applying
      	      apar IV96905
    - IJ03822 Class Libraries: Update timezone information to tzdata2017c
    - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
      	      trace, log was not enabled by default
    - IJ03607 JIT Compiler: Result String contains a redundant dot when
      	      converted from BigDecimal with 0 on all platforms
    - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
    - IJ04282 Security: Change in location and default of jurisdiction
      	      policy files
    - IJ03853 Security: IBMCAC provider does not support SHA224
    - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
      	      specification attribute
    - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
    - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
      	      stash, JKS Chain issue and JVM argument parse issue with iKeyman
    - IJ02284 JIT Compiler: Division by zero in JIT compiler

    - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568047" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568048" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568049" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568050" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568051" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38301" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

IBM Java was updated to 7.1.4.25 (bsc#1093311, bsc#1085449)

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-29"/>
	<updated date="2018-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568052" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568053" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568054" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568055" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568056" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38302" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568057" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568058" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568059" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568060" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568061" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38303" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<description>


java-1_7_0-ibm is updated to Java 7.0 Service Refresh 10 Fix Pack 35 (bsc#1116574):

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS

* Java Virtual Machine

  - IJ10931 CVE-2018-3169

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING

* Security
  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568062" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568063" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568064" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568065" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568066" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38304" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm to version 7.0.10.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568067" comment="java-1_7_0-ibm-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568068" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568069" comment="java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568070" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568071" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38305" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:
	  
Update to Java 7.0 Service Refresh 10 Fix Pack 50 (bsc#1147021).

Security issues fixed:

- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1147021).
- CVE-2019-4473: Fixed insecure RPATH in multiple binaries on AIX (bsc#1147021).
- CVE-2019-7317: Fixed use-after-free in libpng, affecting client-libs/java.awt (bsc#1147021).
- CVE-2019-11771: Fixed insecure RPATH in OpenJ9 on AIX (bsc#1147021).
- CVE-2019-11775: Fixed failure to privatize a value pulled out of the loop by versioning (bsc#1147021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-04"/>
	<updated date="2019-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568072" comment="java-1_7_0-ibm-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568073" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568074" comment="java-1_7_0-ibm-devel-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568075" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568076" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.50-65.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38306" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to 7.0 Service Refresh 10 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958 CVE-2019-2962
    CVE-2019-2964 CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2999 CVE-2019-2973
    CVE-2019-2981    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568077" comment="java-1_7_0-ibm-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568078" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568079" comment="java-1_7_0-ibm-devel-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568080" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568081" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.55-65.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38307" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:
Java was updated to 7.0 Service Refresh 10 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568082" comment="java-1_7_0-ibm-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568083" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568084" comment="java-1_7_0-ibm-devel-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568085" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568086" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.60-65.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38308" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568087" comment="java-1_7_0-ibm-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568088" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568089" comment="java-1_7_0-ibm-devel-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568090" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568091" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.65-65.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38309" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE

- The pack200 and unpack200 alternatives should be slaves of java [bsc#1171352]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568092" comment="java-1_7_0-ibm-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568093" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568094" comment="java-1_7_0-ibm-devel-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568095" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568096" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.70-65.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38310" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568097" comment="java-1_7_0-ibm-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568098" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568099" comment="java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568100" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568101" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38311" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568102" comment="java-1_7_0-ibm-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568103" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568104" comment="java-1_7_0-ibm-devel-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568105" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568106" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.80-65.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38312" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Update Java 7.0 to Service Refresh 11 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-23"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674098" comment="java-1_7_0-ibm-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674099" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674100" comment="java-1_7_0-ibm-devel-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674101" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674102" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.5-65.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38313" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662517" comment="java-1_7_0-ibm-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662518" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662519" comment="java-1_7_0-ibm-devel-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662520" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662521" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.0-65.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38314" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="919351" ref_url="https://bugzilla.suse.com/919351" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="962404" ref_url="https://bugzilla.suse.com/962404" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="966460" ref_url="https://bugzilla.suse.com/966460" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="974428" ref_url="https://bugzilla.suse.com/974428" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="987709" ref_url="https://bugzilla.suse.com/987709" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3955" ref_url="https://www.suse.com/security/cve/CVE-2016-3955/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)

The following non-security bugs were fixed:
- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
- Update PCI VPD size patch to upstream: 
  * PCI: Determine actual VPD size on first access (bsc#971729). 
  * PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
- hid-elo: kill not flush the work.
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- nfs: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- nfs: reduce access cache shrinker locking (bnc#866130).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
- usbhid: more mice with ALWAYS_POLL (bsc#919351).
- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
- veth: do not modify ip_summed (bsc#969149).
- virtio_scsi: Implement eh_timed_out callback.
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919351">SUSE bug 919351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962404">SUSE bug 962404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966460">SUSE bug 966460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974428">SUSE bug 974428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-3955/">CVE-2016-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568107" comment="kernel-default-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568108" comment="kernel-default-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568109" comment="kernel-default-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568110" comment="kernel-ec2-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568111" comment="kernel-ec2-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568112" comment="kernel-ec2-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568113" comment="kernel-pae-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568114" comment="kernel-pae-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568115" comment="kernel-pae-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568116" comment="kernel-source-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568117" comment="kernel-syms-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568118" comment="kernel-trace-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568119" comment="kernel-trace-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568120" comment="kernel-trace-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568121" comment="kernel-xen-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568122" comment="kernel-xen-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568123" comment="kernel-xen-devel-3.0.101-0.47.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38315" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP 3 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568124" comment="kernel-default-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568125" comment="kernel-default-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568126" comment="kernel-default-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568127" comment="kernel-ec2-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568128" comment="kernel-ec2-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568129" comment="kernel-ec2-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568130" comment="kernel-pae-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568131" comment="kernel-pae-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568132" comment="kernel-pae-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568133" comment="kernel-source-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568134" comment="kernel-syms-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568135" comment="kernel-trace-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568136" comment="kernel-trace-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568137" comment="kernel-trace-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568138" comment="kernel-xen-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568139" comment="kernel-xen-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568140" comment="kernel-xen-devel-3.0.101-0.47.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38316" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00005.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following security bug:

CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver (drivers/tty/n_hdlc.c)
could have been exploited to gain a local privilege escalation (bnc#1027565)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-03"/>
	<updated date="2017-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568141" comment="kernel-default-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568142" comment="kernel-default-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568143" comment="kernel-default-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568144" comment="kernel-ec2-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568145" comment="kernel-ec2-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568146" comment="kernel-ec2-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568147" comment="kernel-pae-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568148" comment="kernel-pae-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568149" comment="kernel-pae-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568150" comment="kernel-source-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568151" comment="kernel-syms-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568152" comment="kernel-trace-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568153" comment="kernel-trace-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568154" comment="kernel-trace-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568155" comment="kernel-xen-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568156" comment="kernel-xen-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568157" comment="kernel-xen-devel-3.0.101-0.47.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38317" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00012.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.

The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using 
more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page
  to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a 
hardening measure against this kind of userland attack.(bsc#1039348)

- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain 
privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero 
(bnc#979021).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568158" comment="kernel-default-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568159" comment="kernel-default-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568160" comment="kernel-default-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568161" comment="kernel-ec2-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568162" comment="kernel-ec2-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568163" comment="kernel-ec2-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568164" comment="kernel-pae-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568165" comment="kernel-pae-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568166" comment="kernel-pae-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568167" comment="kernel-source-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568168" comment="kernel-syms-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568169" comment="kernel-trace-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568170" comment="kernel-trace-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568171" comment="kernel-trace-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568172" comment="kernel-xen-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568173" comment="kernel-xen-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568174" comment="kernel-xen-devel-3.0.101-0.47.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38318" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00037.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340, bsc#1045406]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568175" comment="kernel-default-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568176" comment="kernel-default-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568177" comment="kernel-default-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568178" comment="kernel-ec2-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568179" comment="kernel-ec2-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568180" comment="kernel-ec2-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568181" comment="kernel-pae-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568182" comment="kernel-pae-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568183" comment="kernel-pae-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568184" comment="kernel-source-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568185" comment="kernel-syms-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568186" comment="kernel-trace-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568187" comment="kernel-trace-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568188" comment="kernel-trace-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568189" comment="kernel-xen-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568190" comment="kernel-xen-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568191" comment="kernel-xen-devel-3.0.101-0.47.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38319" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00017.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues:

- Stack corruption could have lead to local privilege escalation
  (bsc#1059525, CVE-2017-1000253).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-13"/>
	<updated date="2017-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568192" comment="kernel-default-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568193" comment="kernel-default-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568194" comment="kernel-default-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568195" comment="kernel-ec2-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568196" comment="kernel-ec2-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568197" comment="kernel-ec2-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568198" comment="kernel-pae-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568199" comment="kernel-pae-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568200" comment="kernel-pae-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568201" comment="kernel-source-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568202" comment="kernel-syms-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568203" comment="kernel-trace-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568204" comment="kernel-trace-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568205" comment="kernel-trace-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568206" comment="kernel-xen-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568207" comment="kernel-xen-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568208" comment="kernel-xen-devel-3.0.101-0.47.106.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38320" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912).
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119).

The following non-security bugs were fixed:

- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: x86: Free vmx_msr_bitmap_longmode while kvm_init failed (bsc#1104367).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568209" comment="kernel-default-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568210" comment="kernel-default-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568211" comment="kernel-default-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568212" comment="kernel-ec2-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568213" comment="kernel-ec2-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568214" comment="kernel-ec2-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568215" comment="kernel-pae-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568216" comment="kernel-pae-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568217" comment="kernel-pae-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568218" comment="kernel-source-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568219" comment="kernel-syms-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568220" comment="kernel-trace-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568221" comment="kernel-trace-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568222" comment="kernel-trace-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568223" comment="kernel-xen-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568224" comment="kernel-xen-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568225" comment="kernel-xen-devel-3.0.101-0.47.106.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38321" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1069708" ref_url="https://bugzilla.suse.com/1069708" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1074033" ref_url="https://bugzilla.suse.com/1074033" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please contact your CPU / hardware vendor for potential microcode
  or BIOS updates needed for this fix.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This feature is disabled on unaffected architectures.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bnc#1057389).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer was fixed. (bnc#1072876).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel didn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702 1069708).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695 1074033).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- asm alternatives: remove incorrect alignment notes.
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- ptrace: Add a new thread access check (bsc#1068032).
- Revert 'mac80211: accept key reinstall without changing anything' This reverts commit 1def0d4e1446974356bacd9f4be06eee32b66473.
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi: mpt2sas: fix cleanup on controller resource mapping failure (bsc#999245).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- temporary fix (bsc#1068032).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568226" comment="kernel-default-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568227" comment="kernel-default-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568228" comment="kernel-default-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568229" comment="kernel-ec2-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568230" comment="kernel-ec2-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568231" comment="kernel-ec2-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568232" comment="kernel-pae-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568233" comment="kernel-pae-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568234" comment="kernel-pae-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568235" comment="kernel-source-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568236" comment="kernel-syms-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568237" comment="kernel-trace-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568238" comment="kernel-trace-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568239" comment="kernel-trace-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568240" comment="kernel-xen-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568241" comment="kernel-xen-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568242" comment="kernel-xen-devel-3.0.101-0.47.106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38322" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).

The following non-security bugs were fixed:

- cdc-acm: apply quirk for card reader (bsc#1060279).
- Enable CPU vulnerabilities reporting via sysfs
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- Move kABI fixup for retpolines to proper place.
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568243" comment="kernel-default-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568244" comment="kernel-default-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568245" comment="kernel-default-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568246" comment="kernel-ec2-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568247" comment="kernel-ec2-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568248" comment="kernel-ec2-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568249" comment="kernel-pae-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568250" comment="kernel-pae-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568251" comment="kernel-pae-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568252" comment="kernel-source-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568253" comment="kernel-syms-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568254" comment="kernel-trace-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568255" comment="kernel-trace-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568256" comment="kernel-trace-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568257" comment="kernel-xen-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568258" comment="kernel-xen-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568259" comment="kernel-xen-devel-3.0.101-0.47.106.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38323" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed
  local users to cause a denial of service (use-after-free) or possibly
  have unspecified other impact via crafted system calls (bnc#1091755).
- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.
- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions
  merged from the upstream kernel.

The following non-security bugs were fixed:

- Update config files. Set CONFIG_RETPOLINE=y for i386.
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568260" comment="kernel-default-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568261" comment="kernel-default-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568262" comment="kernel-default-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568263" comment="kernel-ec2-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568264" comment="kernel-ec2-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568265" comment="kernel-ec2-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568266" comment="kernel-pae-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568267" comment="kernel-pae-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568268" comment="kernel-pae-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568269" comment="kernel-source-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568270" comment="kernel-syms-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568271" comment="kernel-trace-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568272" comment="kernel-trace-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568273" comment="kernel-trace-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568274" comment="kernel-xen-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568275" comment="kernel-xen-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568276" comment="kernel-xen-devel-3.0.101-0.47.106.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38324" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568277" comment="kernel-default-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568278" comment="kernel-default-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568279" comment="kernel-default-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568280" comment="kernel-ec2-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568281" comment="kernel-ec2-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568282" comment="kernel-ec2-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568283" comment="kernel-pae-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568284" comment="kernel-pae-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568285" comment="kernel-pae-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568286" comment="kernel-source-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568287" comment="kernel-syms-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568288" comment="kernel-trace-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568289" comment="kernel-trace-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568290" comment="kernel-trace-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568291" comment="kernel-xen-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568292" comment="kernel-xen-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568293" comment="kernel-xen-devel-3.0.101-0.47.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38325" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1094186" ref_url="https://bugzilla.suse.com/1094186" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1104070" ref_url="https://bugzilla.suse.com/1104070" source="BUGZILLA"/>
		<reference ref_id="1104366" ref_url="https://bugzilla.suse.com/1104366" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1107189" ref_url="https://bugzilla.suse.com/1107189" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109200" ref_url="https://bugzilla.suse.com/1109200" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1116412" ref_url="https://bugzilla.suse.com/1116412" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117515" ref_url="https://bugzilla.suse.com/1117515" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="905299" ref_url="https://bugzilla.suse.com/905299" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1108498).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: Fixed a denial of service, which was caused by flooding the diagnostic port 0x80 an exception leading to a kernel panic (bnc#1071021).

The following non-security bugs were fixed:

- ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018, bsc#1104366).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- Drivers: scsi: storvsc: Change the limits to reflect the values on the host (bug#1107189).
- drivers: scsi: storvsc: Correctly handle TEST_UNIT_READY failure (bug#1107189).
- Drivers: scsi: storvsc: Filter commands based on the storage protocol version (bug#1107189).
- Drivers: scsi: storvsc: Fix a bug in handling VMBUS protocol version (bug#1107189).
- Drivers: scsi: storvsc: Implement a eh_timed_out handler (bug#1107189).
- Drivers: scsi: storvsc: Set cmd_per_lun to reflect value supported by the Host (bug#1107189).
- drivers: scsi: storvsc: Set srb_flags in all cases (bug#1107189).
- EHCI: improved logic for isochronous scheduling (bsc#1117515).
- ipv4: remove the unnecessary variable in udp_mcast_next (bsc#1104070).
- KEYS: prevent creating a different user's keyrings (bnc#1094186).
- KVM: x86: Fix the duplicate failure path handling in vmx_init (bsc#1104367).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#1116412).
- MM/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#1116412).
- net/ipv6/udp: Fix ipv6 multicast socket filter regression (bsc#1104070).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#1116412).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#1116412).
- NFS: Do not write enable new pages while an invalidation is proceeding (bsc#1116412).
- NFS: Fix a regression in the read() syscall (bsc#1116412).
- NFS: Fix races in nfs_revalidate_mapping (bsc#1116412).
- NFS: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#1116412).
- NFS: Fix writeback performance issue on cache invalidation (bsc#1116412).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- reiserfs: fix race in readdir (bsc#1039803).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: storvsc: Always send on the selected outgoing channel (bug#1107189).
- scsi: storvsc: Do not assume that the scatterlist is not chained (bug#1107189).
- scsi: storvsc: Fix a bug in copy_from_bounce_buffer() (bug#1107189).
- scsi: storvsc: Increase the ring buffer size (bug#1107189).
- scsi: storvsc: Size the queue depth based on the ringbuffer size (bug#1107189).
- storvsc: fix a bug in storvsc limits (bug#1107189).
- storvsc: force discovery of LUNs that may have been removed (bug#1107189).
- storvsc: get rid of overly verbose warning messages (bug#1107189).
- storvsc: in responce to a scan event, scan the host (bug#1107189).
- storvsc: Set the SRB flags correctly when no data transfer is needed (bug#1107189).
- udp: ipv4: Add udp early demux (bsc#1104070).
- udp: restore UDPlite many-cast delivery (bsc#1104070).
- udp: Simplify __udp*_lib_mcast_deliver (bsc#1104070).
- udp: Use hash2 for long hash1 chains in __udp*_lib_mcast_deliver (bsc#1104070).
- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
- USB: EHCI: add symbolic constants for QHs (bsc#1117515).
- USB: EHCI: always scan each interrupt QH (bsc#1117515).
- USB: EHCI: do not lose events during a scan (bsc#1117515).
- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
- USB: EHCI: do not refcount QHs (bsc#1117515).
- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).
- USB: EHCI: fix up locking (bsc#1117515).
- USB: EHCI: initialize data before resetting hardware (bsc#1117515).
- USB: EHCI: introduce high-res timer (bsc#1117515).
- USB: EHCI: remove PS3 status polling (bsc#1117515).
- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
- USB: EHCI: rename 'reclaim' (bsc#1117515).
- USB: EHCI: resolve some unlikely races (bsc#1117515).
- USB: EHCI: return void instead of 0 (bsc#1117515).
- USB: EHCI: simplify isochronous scanning (bsc#1117515).
- USB: EHCI: unlink multiple async QHs together (bsc#1117515).
- USB: EHCI: use hrtimer for async schedule (bsc#1117515).
- USB: EHCI: use hrtimer for controller death (bsc#1117515).
- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
- XFS: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- XFS: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- XFS: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-29"/>
	<updated date="2019-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094186">SUSE bug 1094186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104070">SUSE bug 1104070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104366">SUSE bug 1104366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107189">SUSE bug 1107189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109200">SUSE bug 1109200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116412">SUSE bug 1116412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117515">SUSE bug 1117515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905299">SUSE bug 905299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568294" comment="kernel-default-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568295" comment="kernel-default-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568296" comment="kernel-default-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568297" comment="kernel-ec2-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568298" comment="kernel-ec2-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568299" comment="kernel-ec2-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568300" comment="kernel-pae-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568301" comment="kernel-pae-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568302" comment="kernel-pae-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568303" comment="kernel-source-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568304" comment="kernel-syms-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568305" comment="kernel-trace-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568306" comment="kernel-trace-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568307" comment="kernel-trace-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568308" comment="kernel-xen-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568309" comment="kernel-xen-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568310" comment="kernel-xen-devel-3.0.101-0.47.106.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38326" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

The following non-security bugs were fixed:

- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- xen/x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600). 
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568311" comment="kernel-default-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568312" comment="kernel-default-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568313" comment="kernel-default-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568314" comment="kernel-ec2-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568315" comment="kernel-ec2-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568316" comment="kernel-ec2-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568317" comment="kernel-pae-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568318" comment="kernel-pae-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568319" comment="kernel-pae-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568320" comment="kernel-source-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568321" comment="kernel-syms-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568322" comment="kernel-trace-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568323" comment="kernel-trace-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568324" comment="kernel-trace-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568325" comment="kernel-xen-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568326" comment="kernel-xen-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568327" comment="kernel-xen-devel-3.0.101-0.47.106.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38327" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-24"/>
	<updated date="2016-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568328" comment="kernel-default-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568329" comment="kernel-default-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568330" comment="kernel-default-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568331" comment="kernel-ec2-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568332" comment="kernel-ec2-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568333" comment="kernel-ec2-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568334" comment="kernel-pae-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568335" comment="kernel-pae-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568336" comment="kernel-pae-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568337" comment="kernel-source-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568338" comment="kernel-syms-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568339" comment="kernel-trace-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568340" comment="kernel-trace-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568341" comment="kernel-trace-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568342" comment="kernel-xen-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568343" comment="kernel-xen-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568344" comment="kernel-xen-devel-3.0.101-0.47.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38328" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025013" ref_url="https://bugzilla.suse.com/1025013" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1027179" ref_url="https://bugzilla.suse.com/1027179" source="BUGZILLA"/>
		<reference ref_id="1027406" ref_url="https://bugzilla.suse.com/1027406" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1030575" ref_url="https://bugzilla.suse.com/1030575" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031481" ref_url="https://bugzilla.suse.com/1031481" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1031660" ref_url="https://bugzilla.suse.com/1031660" source="BUGZILLA"/>
		<reference ref_id="1033287" ref_url="https://bugzilla.suse.com/1033287" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1034838" ref_url="https://bugzilla.suse.com/1034838" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1037182" ref_url="https://bugzilla.suse.com/1037182" source="BUGZILLA"/>
		<reference ref_id="1037183" ref_url="https://bugzilla.suse.com/1037183" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038564" ref_url="https://bugzilla.suse.com/1038564" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038883" ref_url="https://bugzilla.suse.com/1038883" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039349" ref_url="https://bugzilla.suse.com/1039349" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1042364" ref_url="https://bugzilla.suse.com/1042364" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042892" ref_url="https://bugzilla.suse.com/1042892" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050677" ref_url="https://bugzilla.suse.com/1050677" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053760" ref_url="https://bugzilla.suse.com/1053760" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="870618" ref_url="https://bugzilla.suse.com/870618" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bsc#1030593).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bsc#1029850).
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bsc#1038879).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 1050677 ).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336)
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability. This requires a malicious PCI Card. (bnc#1037994).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038544).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1039883).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1040069).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).
- CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary  could have overflowed the parport_nr array in the following code (bnc#1039456).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).

The following non-security bugs were fixed:

- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- btrfs: cleanup code of btrfs_balance_delayed_items() (bsc#1034838).
- btrfs: do not run delayed nodes again after all nodes flush (bsc#1034838).
- btrfs: remove btrfs_end_transaction_dmeta() (bsc#1034838).
- btrfs: remove residual code in delayed inode async helper (bsc#1034838).
- btrfs: use flags instead of the bool variants in delayed node (bsc#1034838).
- cifs: cifs_get_root shouldn't use path with tree name, alternate fix (bsc#963655, bsc#979681, bsc#1027406).
- dentry name snapshots (bsc#1049483).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562) (bsc#948562).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919, bnc#1053760).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- keys: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- nfs: Avoid getting confused by confused server (bsc#1045416).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Make nfs_readdir revalidate less often (bsc#1048232).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi: virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- sunrpc: Clean up the slot table allocation (bsc#1013862).
- sunrpc: Initalise the struct xprt upon allocation (bsc#1013862).
- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- usb: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Use make --output-sync feature when available (bsc#1012422). 
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027406">SUSE bug 1027406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033287">SUSE bug 1033287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034838">SUSE bug 1034838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053760">SUSE bug 1053760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568345" comment="kernel-default-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568346" comment="kernel-default-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568347" comment="kernel-default-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568348" comment="kernel-ec2-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568349" comment="kernel-ec2-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568350" comment="kernel-ec2-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568351" comment="kernel-pae-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568352" comment="kernel-pae-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568353" comment="kernel-pae-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568354" comment="kernel-source-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568355" comment="kernel-syms-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568356" comment="kernel-trace-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568357" comment="kernel-trace-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568358" comment="kernel-trace-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568359" comment="kernel-xen-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568360" comment="kernel-xen-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568361" comment="kernel-xen-devel-3.0.101-0.47.106.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38329" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108227" ref_url="https://bugzilla.suse.com/1108227" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="905299" ref_url="https://bugzilla.suse.com/905299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: An issue was discovered in yurex_read in drivers/usb/misc/yurex.c where local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).

The following non-security bugs were fixed:

- net: fix neighbours after MAC change (bnc#905299).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
- x86/fpu: fix signal handling with eager FPU switching (ia32) (bsc#1108227).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108227">SUSE bug 1108227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905299">SUSE bug 905299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568362" comment="kernel-default-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568363" comment="kernel-default-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568364" comment="kernel-default-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568365" comment="kernel-ec2-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568366" comment="kernel-ec2-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568367" comment="kernel-ec2-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568368" comment="kernel-pae-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568369" comment="kernel-pae-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568370" comment="kernel-pae-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568371" comment="kernel-source-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568372" comment="kernel-syms-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568373" comment="kernel-trace-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568374" comment="kernel-trace-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568375" comment="kernel-trace-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568376" comment="kernel-xen-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568377" comment="kernel-xen-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568378" comment="kernel-xen-devel-3.0.101-0.47.106.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38330" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).
- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.
- KABI: x86/kaiser: properly align trampoline stack.
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- kvm/x86: fix icebp instruction handling (bsc#1087088).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568379" comment="kernel-default-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568380" comment="kernel-default-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568381" comment="kernel-default-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568382" comment="kernel-ec2-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568383" comment="kernel-ec2-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568384" comment="kernel-ec2-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568385" comment="kernel-pae-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568386" comment="kernel-pae-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568387" comment="kernel-pae-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568388" comment="kernel-source-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568389" comment="kernel-syms-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568390" comment="kernel-trace-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568391" comment="kernel-trace-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568392" comment="kernel-trace-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568393" comment="kernel-xen-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568394" comment="kernel-xen-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568395" comment="kernel-xen-devel-3.0.101-0.47.106.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38331" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015048" ref_url="https://bugzilla.suse.com/1015048" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031051" ref_url="https://bugzilla.suse.com/1031051" source="BUGZILLA"/>
		<reference ref_id="1034044" ref_url="https://bugzilla.suse.com/1034044" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1038396" ref_url="https://bugzilla.suse.com/1038396" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="1045035" ref_url="https://bugzilla.suse.com/1045035" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1049785" ref_url="https://bugzilla.suse.com/1049785" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674)
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902)
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-6505: The ohci_service_ed_list function allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866)
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159)
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801)
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296)
* Fix privilege escalation in TCG mode (bsc#1030624)

These non-security issues were fixed:

- bsc#1045035: Fixed regression introduced by previous virtfs security fixes
- bsc#1038396: Fixed 12 tempest tests
- bsc#1034044: Prevent KVM guests stuck when waiting for sg_io() completion
- bsc#1031051: Prevent I/O errors when using pvmove with disk device=lun
- bsc#1049785: Make virsh dump output readable by crash
- bsc#1015048: Fixed virtio interface failure 
- bsc#1016779: Fixed graphical update errors introduced by previous security fix
- Fixed various inaccuracies in cirrus vga device emulation
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015048">SUSE bug 1015048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031051">SUSE bug 1031051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034044">SUSE bug 1034044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038396">SUSE bug 1038396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045035">SUSE bug 1045035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049785">SUSE bug 1049785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568396" comment="kvm-1.4.2-53.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38332" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00022.html" source="SUSE-SU"/>
		<description>


This update for kvm fixes the following issues:

A security flaw mitigation has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

Also a security fix has been applied:

- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568397" comment="kvm-1.4.2-53.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38333" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<description>

  
This update for kvm fixes the following issues:

This update has the next round of Spectre v2 related patches,
which now integrates with corresponding changes in libvirt. A
January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution. We remove that initial patch and now
rely on patches from upstream. This update defines spec_ctrl and
ibpb cpu feature flags as well as new cpu models which are clones
of existing models with either -IBRS or -IBPB added to the end of
the model name. These new vcpu models explicitly include the new
feature(s), whereas the feature flags can be added to the cpu
parameter as with other features. In short, for continued Spectre
v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu
models is used. Although migration from older versions is
supported, the new cpu features won't be properly exposed to the
guest until it is restarted with the cpu features explicitly
added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)

For additional information on Spectre v2 as it relates to QEMU,
see:
	https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

(CVE-2017-5715 bsc#1068032)

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

Additional security fixes:

- CVE-2018-5683: An out-of-bounds read in vga_draw_text routine was fixed which could lead to crashes or information leakage. (bsc#1076114)
- CVE-2018-7550: multiboot OOB access while loading kernel image was fixed that could lead to crashes (bsc#1083291)
- CVE-2017-18030: An out-of-bounds access in cirrus_invalidate_region routine could lead to crashes or information leakage (bsc#1076179)

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568398" comment="kvm-1.4.2-53.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38334" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568399" comment="kvm-1.4.2-53.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38335" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-04"/>
	<updated date="2018-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568400" comment="kvm-1.4.2-53.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38336" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1112185" ref_url="https://bugzilla.suse.com/1112185" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
- CVE-2018-18438: Fixed integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value (bnc#1112185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568401" comment="kvm-1.4.2-53.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38337" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568402" comment="kvm-1.4.2-53.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38338" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix use-after-free in slirp (CVE-2019-15890 bsc#1149811)
- Fix for similar problems as for the original fix prompting this issue (CVE-2019-6778 bsc#1123156)
- Fix potential OOB accesses in slirp (CVE-2020-8608 bsc#1163018 CVE-2020-7039 bsc#1161066)
- Fix use after free in slirp (CVE-2020-1983 bsc#1170940)
- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068 bsc#1146873)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-23"/>
	<updated date="2021-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568403" comment="kvm-1.4.2-53.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38339" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1031692" ref_url="https://bugzilla.suse.com/1031692" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1186473" ref_url="https://bugzilla.suse.com/1186473" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)
- CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)
- CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)
- CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)
- CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)
- CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031692">SUSE bug 1031692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626872" comment="kvm-1.4.2-53.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38340" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010438.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670890" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38341" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009278.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630422" comment="libcares2-1.7.4-7.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38342" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1082821" ref_url="https://bugzilla.suse.com/1082821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007472.html" source="SUSE-SU"/>
		<description>
This update for libcdio and libcdio-mini fixes the following issues:

Security issue fixed: 

- CVE-2017-18199: Fixed a NULL Pointer Dereference in realloc_symlink which could allow remote attackers to cause Denial of Service (bsc#1082821).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568404" comment="libcdio7-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568405" comment="libcdio_cdda0-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568406" comment="libcdio_paranoia0-0.80-8.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38343" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009454.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631917" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38344" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009358.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629507" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38345" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568407" comment="libexif-0.6.17-2.14.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38346" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009053.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568408" comment="libgcrypt11-1.5.0-0.26.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38347" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626759" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38348" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009970.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662522" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38349" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed:   

- Fixed an issue where libssh2 stops parsing known_hosts (bsc#1091236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568409" comment="libssh2-1-1.2.9-4.2.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38350" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005376.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568410" comment="libssh2-1-1.2.9-4.2.12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38351" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005609.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568411" comment="libssh2-1-1.2.9-4.2.12.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38352" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568412" comment="libssh2-1-1.2.9-4.2.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38353" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html" source="SUSE-SU"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568413" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38354" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00080.html" source="SUSE-SU"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568414" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568415" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38355" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1025340" ref_url="https://bugzilla.suse.com/1025340" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="1087887" ref_url="https://bugzilla.suse.com/1087887" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="936233" ref_url="https://bugzilla.suse.com/936233" source="BUGZILLA"/>
		<reference ref_id="960742" ref_url="https://bugzilla.suse.com/960742" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Spectre fixes for libvirt (bsc#1079869, bsc#1088147, bsc#1087887).
- CVE-2018-1064: Avoid denial of service reading from QEMU guest agent (bsc#1083625).
- CVE-2018-5748: Avoid denial of service reading from QEMU monitor (bsc#1076500).

Bug fixes:

- bsc#1025340: Use xend for nodeGetFreeMemory API.
- bsc#960742: Allow read access to script directories in libvirtd AppArmor profile.
- bsc#936233: Introduce qemuDomainDefCheckABIStability.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025340">SUSE bug 1025340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936233">SUSE bug 936233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960742">SUSE bug 960742</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568416" comment="libvirt-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568417" comment="libvirt-client-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568418" comment="libvirt-doc-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568419" comment="libvirt-lock-sanlock-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568420" comment="libvirt-python-1.0.5.9-21.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38356" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568421" comment="libvirt-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568422" comment="libvirt-client-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568423" comment="libvirt-doc-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568424" comment="libvirt-lock-sanlock-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568425" comment="libvirt-python-1.0.5.9-21.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38357" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005613.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568426" comment="libvirt-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568427" comment="libvirt-client-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568428" comment="libvirt-doc-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568429" comment="libvirt-lock-sanlock-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568430" comment="libvirt-python-1.0.5.9-21.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38358" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568431" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568432" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568433" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38359" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568434" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568435" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568436" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38360" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:14179-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914179-1.html" source="SUSE-SU"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568437" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568438" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568439" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38361" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568440" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568441" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568442" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38362" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010372.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670891" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670892" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670893" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38363" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003253" ref_url="https://bugzilla.suse.com/1003253" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008850" ref_url="https://bugzilla.suse.com/1008850" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010713" ref_url="https://bugzilla.suse.com/1010713" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012183" ref_url="https://bugzilla.suse.com/1012183" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012852" ref_url="https://bugzilla.suse.com/1012852" source="BUGZILLA"/>
		<reference ref_id="1012895" ref_url="https://bugzilla.suse.com/1012895" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019079" ref_url="https://bugzilla.suse.com/1019079" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="935436" ref_url="https://bugzilla.suse.com/935436" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="961923" ref_url="https://bugzilla.suse.com/961923" source="BUGZILLA"/>
		<reference ref_id="966826" ref_url="https://bugzilla.suse.com/966826" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="992569" ref_url="https://bugzilla.suse.com/992569" source="BUGZILLA"/>
		<reference ref_id="992906" ref_url="https://bugzilla.suse.com/992906" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="999943" ref_url="https://bugzilla.suse.com/999943" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374).
- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).

The following non-security bugs were fixed:

- Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: add flock_owner to open context (bnc#998689).
- NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).
- __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- include/linux/math64.h: add div64_ul() (bsc#996329).
- kabi-fix for flock_owner addition (bsc#998689).
- kabi: get back scsi_device.current_cmnd (bsc#935436).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- qlcnic: Schedule napi directly in netpoll (bsc#966826).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/config.sh: Set a fitting release string (bsc#997059)
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: remove current_cmnd field from struct scsi_device (bsc#935436). 
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xfs: remove the deprecated nodelaylog option (bsc#992906).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012895">SUSE bug 1012895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935436">SUSE bug 935436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961923">SUSE bug 961923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966826">SUSE bug 966826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992906">SUSE bug 992906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999943">SUSE bug 999943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568443" comment="kernel-default-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568444" comment="kernel-default-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568445" comment="kernel-default-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568446" comment="kernel-ec2-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568447" comment="kernel-ec2-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568448" comment="kernel-ec2-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568449" comment="kernel-pae-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568450" comment="kernel-pae-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568451" comment="kernel-pae-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568452" comment="kernel-source-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568453" comment="kernel-syms-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568454" comment="kernel-trace-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568455" comment="kernel-trace-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568456" comment="kernel-trace-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568457" comment="kernel-xen-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568458" comment="kernel-xen-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568459" comment="kernel-xen-devel-3.0.101-0.47.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38364" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006321.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38365" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009915.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38366" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010085.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38367" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568461" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38368" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005519.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568462" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38369" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006168.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568463" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38370" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006780.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568464" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38371" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007138.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568465" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38372" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026 bsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation (MFSA 2016-92  bsc#1012964)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)
    
The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568466" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568467" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568468" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568469" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568470" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568471" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38373" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00033.html" source="SUSE-SU"/>
		<description>


Update to Intel microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

Among other updates it contains:

- IVT C0          (06-3e-04:ed) 428-&gt;42a
- SKL-U/Y D0      (06-4e-03:c0) ba-&gt;c2
- BDW-U/Y E/F     (06-3d-04:c0) 25-&gt;28
- HSW-ULT Cx/Dx   (06-45-01:72) 20-&gt;21
- Crystalwell Cx  (06-46-01:32) 17-&gt;18
- BDW-H E/G       (06-47-01:22) 17-&gt;1b
- HSX-EX E0       (06-3f-04:80) 0f-&gt;10
- SKL-H/S R0      (06-5e-03:36) ba-&gt;c2
- HSW Cx/Dx       (06-3c-03:32) 22-&gt;23
- HSX C0          (06-3f-02:6f) 3a-&gt;3b
- BDX-DE V0/V1    (06-56-02:10) 0f-&gt;14
- BDX-DE V2       (06-56-03:10) 700000d-&gt;7000011
- KBL-U/Y H0      (06-8e-09:c0) 62-&gt;80
- KBL Y0 / CFL D0 (06-8e-0a:c0) 70-&gt;80
- KBL-H/S B0      (06-9e-09:2a) 5e-&gt;80
- CFL U0          (06-9e-0a:22) 70-&gt;80
- CFL B0          (06-9e-0b:02) 72-&gt;80
- SKX H0          (06-55-04:b7) 2000035-&gt;200003c
- GLK B0          (06-7a-01:01) 1e-&gt;22
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568472" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38374" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00043.html" source="SUSE-SU"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568473" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38375" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<description>

  
This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568474" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38376" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the 
mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568475" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38377" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
- CFL-H        R0       6-9e-d/22 000000b0-&gt;000000b8 Core Gen9 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568476" comment="microcode_ctl-1.17-102.83.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38378" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1141977" ref_url="https://bugzilla.suse.com/1141977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded what missing in last update:
BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568477" comment="microcode_ctl-1.17-102.83.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38379" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568478" comment="microcode_ctl-1.17-102.83.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38380" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568479" comment="microcode_ctl-1.17-102.83.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38381" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568480" comment="microcode_ctl-1.17-102.83.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38382" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issue:

- Updated Intel CPU Microcode to 20201027 prerelease (bsc#1170446)

- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

  # New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568481" comment="microcode_ctl-1.17-102.83.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38383" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated Intel CPU Microcode to 20201110 official release.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile

  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568482" comment="microcode_ctl-1.17-102.83.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38384" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20210525 release:

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (bsc#1179833)
- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (bsc#1179836)
- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837)
- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (bsc#1179839)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568483" comment="microcode_ctl-1.17-102.83.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38385" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659158" comment="libfreebl3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659159" comment="libsoftokn3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659160" comment="mozilla-nss-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659161" comment="mozilla-nss-certs-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659162" comment="mozilla-nss-tools-3.68.1-47.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38386" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010660.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678376" comment="libfreebl3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678377" comment="libsoftokn3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678378" comment="mozilla-nss-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678379" comment="mozilla-nss-certs-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678380" comment="mozilla-nss-tools-3.68.3-47.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38387" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568484" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38388" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568485" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38389" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007894.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568486" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38390" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="967374" ref_url="https://bugzilla.suse.com/967374" source="BUGZILLA"/>
		<reference ref_id="989913" ref_url="https://bugzilla.suse.com/989913" source="BUGZILLA"/>
		<reference ref_id="989919" ref_url="https://bugzilla.suse.com/989919" source="BUGZILLA"/>
		<reference ref_id="989922" ref_url="https://bugzilla.suse.com/989922" source="BUGZILLA"/>
		<reference ref_id="989926" ref_url="https://bugzilla.suse.com/989926" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<description>

This mysql update to verson 5.5.52 fixes the following issues: 

Security issues fixed:
- CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913).
- CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919).
- CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922).
- CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926).
- CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and , under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)


More details can be found on:
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html

Bugs fixed:
- bsc#967374: properly restart mysql multi instances during upgrade
- bnc#937258: multi script to restart after crash
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-20"/>
	<updated date="2016-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967374">SUSE bug 967374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568487" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568488" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568489" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568490" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568491" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38391" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.54 fixes the following issues:

- CVE-2017-3318: Unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component (bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

Release Notes: 
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568492" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568493" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568494" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568495" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568496" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38392" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1064116" ref_url="https://bugzilla.suse.com/1064116" source="BUGZILLA"/>
		<reference ref_id="1064117" ref_url="https://bugzilla.suse.com/1064117" source="BUGZILLA"/>
		<reference ref_id="1064119" ref_url="https://bugzilla.suse.com/1064119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<description>


This update for mysql to version 5.5.58 fixes the following issues:

Fixed security issues:

- CVE-2017-10268: issue inside subcomponent Server Replication [bsc#1064101] 
- CVE-2017-10378: issue inside subcomponent Server Optimizer [bsc#1064115] 
- CVE-2017-10379: issue inside subcomponent Client programs [bsc#1064116] 
- CVE-2017-10384: issue inside subcomponent Server DDL [bsc#1064117] 

For a full list of changes check:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568497" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568498" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568499" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568500" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568501" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38393" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112369" ref_url="https://bugzilla.suse.com/1112369" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3133" ref_url="https://www.suse.com/security/cve/CVE-2018-3133/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<description>

  
MySQL server was updated to version 5.5.62, fixing bugs and security issues.

Changes:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html

Following security issues were fixed:

- CVE-2016-9843: The crc32_big function in zlib might have allowed context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. (bsc#1013882)
  Please note that SUSE uses the system zlib, not the embedded copy.

- CVE-2018-3133: Authenticated low privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112369)
- CVE-2018-3174: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112368)
- CVE-2018-3282: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112432)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3133/">CVE-2018-3133</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568502" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568503" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568504" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568505" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568506" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38394" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568507" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568508" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38395" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568509" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568510" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38396" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568511" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568512" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38397" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005280.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:
	  
Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568513" comment="ntp-4.2.8p13-48.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568514" comment="ntp-doc-4.2.8p13-48.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38398" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568515" comment="compat-libldap-2_3-0-2.3.37-2.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568516" comment="libldap-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568517" comment="openldap2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568518" comment="openldap2-back-meta-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568519" comment="openldap2-client-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38399" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568520" comment="compat-libldap-2_3-0-2.3.37-2.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568521" comment="libldap-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568522" comment="openldap2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568523" comment="openldap2-back-meta-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568524" comment="openldap2-client-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38400" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568525" comment="compat-libldap-2_3-0-2.3.37-2.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568526" comment="libldap-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568527" comment="openldap2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568528" comment="openldap2-back-meta-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568529" comment="openldap2-client-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38401" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568530" comment="compat-libldap-2_3-0-2.3.37-2.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568531" comment="libldap-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568532" comment="openldap2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568533" comment="openldap2-back-meta-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568534" comment="openldap2-client-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38402" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009681.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653632" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653633" comment="opensc-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38403" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568535" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568536" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38404" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="959096" ref_url="https://bugzilla.suse.com/959096" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="962794" ref_url="https://bugzilla.suse.com/962794" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<description>

This update for OpenSSH fixes the following issues:

- Prevent user enumeration through the timing of password processing.
  (bsc#989363, CVE-2016-6210)
- Allow lowering the DH groups parameter limit in server as well as when GSSAPI
  key exchange is used. (bsc#948902)
- Sanitize input for xauth(1). (bsc#970632, CVE-2016-3115)
- Prevent X11 SECURITY circumvention when forwarding X11 connections.
  (bsc#962313, CVE-2016-1908)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back
  to the RFC 4419 specified minimum through an option. (bsc#932483, bsc#948902)
- Ignore PAM environment when using login. (bsc#975865, CVE-2015-8325)
- Limit the accepted password length (prevents a possible denial of service).
  (bsc#992533, CVE-2016-6515)
- Relax version requires for the openssh-askpass sub-package. (bsc#962794)
- Avoid complaining about unset DISPLAY variable. (bsc#981654)
- Initialize message id to prevent connection breakups in some cases. (bsc#959096)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959096">SUSE bug 959096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962794">SUSE bug 962794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568537" comment="openssh-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568538" comment="openssh-askpass-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568539" comment="openssh-askpass-gnome-6.2p2-0.33.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38405" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

Security issues fixed:
- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
- CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

Non security issues fixed:
- Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568540" comment="openssh-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568541" comment="openssh-askpass-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568542" comment="openssh-askpass-gnome-6.2p2-0.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38406" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1105180" ref_url="https://bugzilla.suse.com/1105180" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="1106726" ref_url="https://bugzilla.suse.com/1106726" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2017-15906: The process_open function in sftp-server.c in OpenSSH did not properly prevent write operations in readonly mode, which allowed attackers to create zero-length files. (bsc#1065000, bsc#1106726)
- CVE-2016-10708: sshd allowed remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.  (bsc#1076957)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)
- CVE-2016-10012: Removed pre-auth compression support from the server to prevent possible cryptographic attacks.  (bsc#1016370)

Bugs fixed:

- Fixed failing 'AuthorizedKeysCommand' within a 'Match User' block in sshd_config (bsc#1105180)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105180">SUSE bug 1105180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106726">SUSE bug 1106726</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568543" comment="openssh-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568544" comment="openssh-askpass-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568545" comment="openssh-askpass-gnome-6.2p2-0.41.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38407" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-11"/>
	<updated date="2019-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568546" comment="openssh-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568547" comment="openssh-askpass-gnome-6.6p1-41.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38408" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568548" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568549" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568550" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568551" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568552" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38409" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568553" comment="libopenssl-devel-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568554" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568555" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568556" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568557" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38410" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568558" comment="libopenssl-devel-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568559" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568560" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568561" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568562" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38411" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568563" comment="libopenssl-devel-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568564" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568565" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568566" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568567" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38412" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568568" comment="libopenssl-devel-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568569" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568570" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568571" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568572" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38413" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568573" comment="libopenssl-devel-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568574" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568575" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568576" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568577" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38414" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568578" comment="libopenssl-devel-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568579" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568580" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568581" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568582" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38415" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006542.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568583" comment="libopenssl-devel-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568584" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568585" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568586" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568587" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38416" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007429.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568588" comment="libopenssl-devel-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568589" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568590" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568591" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568592" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38417" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568593" comment="libopenssl-devel-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568594" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568595" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568596" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568597" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38418" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631735" comment="libopenssl-devel-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631736" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631737" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631738" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631739" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38419" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632456" comment="libopenssl-devel-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632457" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632458" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632459" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632460" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38420" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673050" comment="libopenssl-devel-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673051" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673052" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673053" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673054" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38421" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00028.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568598" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568599" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38422" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<description>


This update for openvpn fixes the following security issues:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
- CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
- CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
- CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
- Some other hardening fixes have also been applied (bsc#1038713)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568600" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568601" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38423" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568602" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38424" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568603" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568604" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568605" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568606" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568607" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38425" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568608" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38426" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568609" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38427" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00050.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568610" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38428" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3690: Fixed a privilege escalation through untrusted symlinks (bsc#1150734). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568611" comment="permissions-2013.1.7-0.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38429" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00006.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568612" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568613" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568614" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568615" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568616" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568617" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568618" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568619" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568620" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568621" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568622" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568623" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568624" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568625" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568626" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568627" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568628" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568629" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568630" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568631" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568632" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568633" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568634" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568635" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568636" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568637" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568638" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568639" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568640" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568641" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568642" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568643" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568644" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568645" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568646" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568647" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568648" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568649" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568650" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568651" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568652" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568653" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568654" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568655" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568656" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38430" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1019550" ref_url="https://bugzilla.suse.com/1019550" source="BUGZILLA"/>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022255" ref_url="https://bugzilla.suse.com/1022255" source="BUGZILLA"/>
		<reference ref_id="1022257" ref_url="https://bugzilla.suse.com/1022257" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10159" ref_url="https://www.suse.com/security/cve/CVE-2016-10159/" source="CVE"/>
		<reference ref_id="CVE-2016-10160" ref_url="https://www.suse.com/security/cve/CVE-2016-10160/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-7478" ref_url="https://www.suse.com/security/cve/CVE-2016-7478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite
  loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10159/">CVE-2016-10159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10160/">CVE-2016-10160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7478/">CVE-2016-7478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568657" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568658" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568659" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568660" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568661" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568662" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568663" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568664" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568665" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568666" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568667" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568668" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568669" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568670" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568671" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568672" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568673" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568674" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568675" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568676" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568677" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568678" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568679" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568680" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568681" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568682" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568683" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568684" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568685" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568686" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568687" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568688" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568689" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568690" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568691" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568692" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568693" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568694" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568695" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568696" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568697" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568698" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568699" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568700" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568701" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38431" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1076220" ref_url="https://bugzilla.suse.com/1076220" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="986391" ref_url="https://bugzilla.suse.com/986391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2016-5771" ref_url="https://www.suse.com/security/cve/CVE-2016-5771/" source="CVE"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes several issues.

These security issues were fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data
  could be controlled if the input can be controlled (e.g., during file
  uploads).  (bsc#1080234)
- CVE-2018-5712: Prevent reflected XSS on the PHAR 404 error page via the
  URI of a request for a .phar file that allowed for information disclosure
  (bsc#1076220)
- CVE-2018-5711: Prevent integer signedness error that could have lead
  to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
- CVE-2016-5773: php_zip.c in the zip extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data containing a ZipArchive object.  (bsc#986247)
- CVE-2016-5771: spl_array.c in the SPL extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data.  (bsc#986391)
- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an
  HTTPresponse in the php_stream_url_wrap_http_ex.  (bsc#1083639)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5771/">CVE-2016-5771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568702" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568703" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568704" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568705" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568706" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568707" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568708" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568709" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568710" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568711" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568712" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568713" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568714" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568715" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568716" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568717" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568718" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568719" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568720" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568721" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568722" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568723" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568724" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568725" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568726" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568727" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568728" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568729" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568730" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568731" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568732" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568733" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568734" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568735" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568736" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568737" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568738" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568739" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568740" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568741" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568742" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568743" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568744" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568745" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568746" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38432" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091362" ref_url="https://bugzilla.suse.com/1091362" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="1091367" ref_url="https://bugzilla.suse.com/1091367" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10545" ref_url="https://www.suse.com/security/cve/CVE-2018-10545/" source="CVE"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2018-10545: Fix access controls in FPM child processes (bsc#1091367).
- CVE-2018-10547: Fix Reflected XSS on the PHAR 403 and 404 error pages (bsc#1091362).
- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10545/">CVE-2018-10545</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568747" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568748" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568749" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568750" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568751" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568752" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568753" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568754" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568755" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568756" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568757" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568758" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568759" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568760" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568761" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568762" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568763" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568764" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568765" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568766" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568767" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568768" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568769" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568770" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568771" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568772" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568773" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568774" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568775" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568776" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568777" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568778" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568779" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568780" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568781" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568782" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568783" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568784" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568785" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568786" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568787" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568788" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568789" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568790" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568791" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38433" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126713" ref_url="https://bugzilla.suse.com/1126713" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1127122" ref_url="https://bugzilla.suse.com/1127122" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128886" ref_url="https://bugzilla.suse.com/1128886" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which could allow an attacker to read 
  allocated and unallocated memory when parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR reading functions which could allow an 
  attacker to read allocated and unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568792" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568793" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568794" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568795" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568796" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568797" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568798" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568799" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568800" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568801" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568802" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568803" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568804" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568805" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568806" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568807" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568808" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568809" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568810" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568811" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568812" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568813" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568814" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568815" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568816" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568817" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568818" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568819" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568820" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568821" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568822" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568823" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568824" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568825" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568826" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568827" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568828" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568829" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568830" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568831" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568832" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568833" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568834" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568835" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568836" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38434" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568837" comment="apache2-mod_php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568838" comment="php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568839" comment="php53-bcmath-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568840" comment="php53-bz2-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568841" comment="php53-calendar-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568842" comment="php53-ctype-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568843" comment="php53-curl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568844" comment="php53-dba-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568845" comment="php53-dom-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568846" comment="php53-exif-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568847" comment="php53-fastcgi-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568848" comment="php53-fileinfo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568849" comment="php53-ftp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568850" comment="php53-gd-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568851" comment="php53-gettext-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568852" comment="php53-gmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568853" comment="php53-iconv-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568854" comment="php53-intl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568855" comment="php53-json-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568856" comment="php53-ldap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568857" comment="php53-mbstring-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568858" comment="php53-mcrypt-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568859" comment="php53-mysql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568860" comment="php53-odbc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568861" comment="php53-openssl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568862" comment="php53-pcntl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568863" comment="php53-pdo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568864" comment="php53-pear-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568865" comment="php53-pgsql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568866" comment="php53-pspell-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568867" comment="php53-shmop-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568868" comment="php53-snmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568869" comment="php53-soap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568870" comment="php53-suhosin-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568871" comment="php53-sysvmsg-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568872" comment="php53-sysvsem-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568873" comment="php53-sysvshm-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568874" comment="php53-tokenizer-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568875" comment="php53-wddx-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568876" comment="php53-xmlreader-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568877" comment="php53-xmlrpc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568878" comment="php53-xmlwriter-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568879" comment="php53-xsl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568880" comment="php53-zip-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568881" comment="php53-zlib-5.3.17-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38435" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568882" comment="apache2-mod_php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568883" comment="php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568884" comment="php53-bcmath-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568885" comment="php53-bz2-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568886" comment="php53-calendar-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568887" comment="php53-ctype-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568888" comment="php53-curl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568889" comment="php53-dba-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568890" comment="php53-dom-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568891" comment="php53-exif-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568892" comment="php53-fastcgi-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568893" comment="php53-fileinfo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568894" comment="php53-ftp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568895" comment="php53-gd-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568896" comment="php53-gettext-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568897" comment="php53-gmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568898" comment="php53-iconv-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568899" comment="php53-intl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568900" comment="php53-json-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568901" comment="php53-ldap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568902" comment="php53-mbstring-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568903" comment="php53-mcrypt-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568904" comment="php53-mysql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568905" comment="php53-odbc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568906" comment="php53-openssl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568907" comment="php53-pcntl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568908" comment="php53-pdo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568909" comment="php53-pear-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568910" comment="php53-pgsql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568911" comment="php53-pspell-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568912" comment="php53-shmop-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568913" comment="php53-snmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568914" comment="php53-soap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568915" comment="php53-suhosin-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568916" comment="php53-sysvmsg-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568917" comment="php53-sysvsem-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568918" comment="php53-sysvshm-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568919" comment="php53-tokenizer-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568920" comment="php53-wddx-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568921" comment="php53-xmlreader-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568922" comment="php53-xmlrpc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568923" comment="php53-xmlwriter-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568924" comment="php53-xsl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568925" comment="php53-zip-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568926" comment="php53-zlib-5.3.17-112.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38436" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007557.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568927" comment="apache2-mod_php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568928" comment="php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568929" comment="php53-bcmath-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568930" comment="php53-bz2-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568931" comment="php53-calendar-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568932" comment="php53-ctype-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568933" comment="php53-curl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568934" comment="php53-dba-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568935" comment="php53-dom-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568936" comment="php53-exif-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568937" comment="php53-fastcgi-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568938" comment="php53-fileinfo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568939" comment="php53-ftp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568940" comment="php53-gd-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568941" comment="php53-gettext-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568942" comment="php53-gmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568943" comment="php53-iconv-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568944" comment="php53-intl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568945" comment="php53-json-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568946" comment="php53-ldap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568947" comment="php53-mbstring-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568948" comment="php53-mcrypt-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568949" comment="php53-mysql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568950" comment="php53-odbc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568951" comment="php53-openssl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568952" comment="php53-pcntl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568953" comment="php53-pdo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568954" comment="php53-pear-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568955" comment="php53-pgsql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568956" comment="php53-pspell-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568957" comment="php53-shmop-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568958" comment="php53-snmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568959" comment="php53-soap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568960" comment="php53-suhosin-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568961" comment="php53-sysvmsg-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568962" comment="php53-sysvsem-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568963" comment="php53-sysvshm-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568964" comment="php53-tokenizer-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568965" comment="php53-wddx-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568966" comment="php53-xmlreader-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568967" comment="php53-xmlrpc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568968" comment="php53-xmlwriter-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568969" comment="php53-xsl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568970" comment="php53-zip-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568971" comment="php53-zlib-5.3.17-112.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38437" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008508.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009568972" comment="apache2-mod_php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568973" comment="php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568974" comment="php53-bcmath-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568975" comment="php53-bz2-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568976" comment="php53-calendar-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568977" comment="php53-ctype-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568978" comment="php53-curl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568979" comment="php53-dba-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568980" comment="php53-dom-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568981" comment="php53-exif-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568982" comment="php53-fastcgi-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568983" comment="php53-fileinfo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568984" comment="php53-ftp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568985" comment="php53-gd-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568986" comment="php53-gettext-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568987" comment="php53-gmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568988" comment="php53-iconv-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568989" comment="php53-intl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568990" comment="php53-json-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568991" comment="php53-ldap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568992" comment="php53-mbstring-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568993" comment="php53-mcrypt-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568994" comment="php53-mysql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568995" comment="php53-odbc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568996" comment="php53-openssl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568997" comment="php53-pcntl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568998" comment="php53-pdo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568999" comment="php53-pear-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569000" comment="php53-pgsql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569001" comment="php53-pspell-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569002" comment="php53-shmop-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569003" comment="php53-snmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569004" comment="php53-soap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569005" comment="php53-suhosin-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569006" comment="php53-sysvmsg-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569007" comment="php53-sysvsem-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569008" comment="php53-sysvshm-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569009" comment="php53-tokenizer-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569010" comment="php53-wddx-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569011" comment="php53-xmlreader-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569012" comment="php53-xmlrpc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569013" comment="php53-xmlwriter-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569014" comment="php53-xsl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569015" comment="php53-zip-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569016" comment="php53-zlib-5.3.17-112.99.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38438" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569017" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569018" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569019" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569020" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569021" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569022" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38439" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569023" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38440" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569024" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569025" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569026" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569027" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569028" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569029" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569030" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569031" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569032" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38441" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569033" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569034" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569035" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569036" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569037" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569040" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569041" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569042" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569043" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38442" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569044" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569045" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569046" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569047" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569048" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569051" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569052" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569053" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569054" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38443" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569055" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569056" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569057" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569058" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569059" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569062" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569063" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569064" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569065" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38444" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569066" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569067" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569068" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569069" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569070" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569073" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569074" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569075" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569076" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38445" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569077" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569078" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569079" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569080" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569081" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569084" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569085" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569086" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569087" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38446" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005188.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issues:
	  
Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569088" comment="python-numpy-1.3.0-1.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38447" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569089" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38448" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569090" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569091" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569092" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569093" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569094" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569095" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569096" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569097" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569098" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569100" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569101" comment="samba-winbind-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38449" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1036283" ref_url="https://bugzilla.suse.com/1036283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00017.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
  For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression
  in the fix has been addressed (bsc#1036283, bso#12721).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-08"/>
	<updated date="2017-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569102" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569103" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569104" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569105" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569106" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569107" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569108" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569109" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569110" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569112" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569113" comment="samba-winbind-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38450" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00064.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569114" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569115" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569116" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569117" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569118" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569119" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569120" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569121" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569122" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569124" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569125" comment="samba-winbind-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38451" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed: 

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)

This non-security issue was fixed: 

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569126" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569127" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569128" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569129" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569130" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569131" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569132" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569133" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569134" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569136" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569137" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38452" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1016531" ref_url="https://bugzilla.suse.com/1016531" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);


- s3/libads: fix seal/signed ldap connections so they are reused;
  (bsc#1016531).		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016531">SUSE bug 1016531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569138" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569139" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569140" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569141" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569142" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569143" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569144" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569145" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569146" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569148" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569149" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38453" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1079449" ref_url="https://bugzilla.suse.com/1079449" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
  
The following other bugs were fixed:

- s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079449">SUSE bug 1079449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569150" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569151" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569152" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569153" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569154" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569155" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569156" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569157" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569158" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569160" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569161" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38454" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1101499" ref_url="https://bugzilla.suse.com/1101499" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005435.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issue fixed:

- Make init scripts create log directories before running daemons (bsc#1101499)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101499">SUSE bug 1101499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569162" comment="ldapsmb-1.34b-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569163" comment="libldb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569164" comment="libsmbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569165" comment="libtalloc2-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569166" comment="libtdb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569167" comment="libtevent0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569168" comment="libwbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569169" comment="samba-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569170" comment="samba-client-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569171" comment="samba-doc-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569172" comment="samba-krb-printing-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569173" comment="samba-winbind-3.6.3-94.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38455" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569174" comment="ldapsmb-1.34b-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569175" comment="libldb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569176" comment="libsmbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569177" comment="libtalloc2-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569178" comment="libtdb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569179" comment="libtevent0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569180" comment="libwbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569181" comment="samba-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569182" comment="samba-client-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569183" comment="samba-doc-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569184" comment="samba-krb-printing-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569185" comment="samba-winbind-3.6.3-94.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38456" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007175.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569186" comment="ldapsmb-1.34b-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569187" comment="libldb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569188" comment="libsmbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569189" comment="libtalloc2-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569190" comment="libtdb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569191" comment="libtevent0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569192" comment="libwbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569193" comment="samba-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569194" comment="samba-client-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569195" comment="samba-doc-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569196" comment="samba-krb-printing-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569197" comment="samba-winbind-3.6.3-94.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38457" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569198" comment="ldapsmb-1.34b-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569199" comment="libldb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569200" comment="libsmbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569201" comment="libtalloc2-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569202" comment="libtdb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569203" comment="libtevent0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569204" comment="libwbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569205" comment="samba-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569206" comment="samba-client-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569207" comment="samba-doc-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569208" comment="samba-krb-printing-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569209" comment="samba-winbind-3.6.3-94.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38458" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569210" comment="ldapsmb-1.34b-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569211" comment="libldb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569212" comment="libsmbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569213" comment="libtalloc2-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569214" comment="libtdb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569215" comment="libtevent0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569216" comment="libwbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569217" comment="samba-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569218" comment="samba-client-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569219" comment="samba-doc-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569220" comment="samba-krb-printing-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569221" comment="samba-winbind-3.6.3-94.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38459" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569222" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569223" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38460" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005562.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569224" comment="libsqlite3-0-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569225" comment="sqlite3-3.7.6.3-1.4.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38461" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006166.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:
	  
- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569226" comment="libsqlite3-0-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569227" comment="sqlite3-3.7.6.3-1.4.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38462" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2019-20218: Fixed a stack unwinding flaw in the selectExpander after a parsing error. (bsc#1160439)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626549" comment="libsqlite3-0-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626550" comment="sqlite3-3.7.6.3-1.4.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38463" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670260" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38464" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569228" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38465" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569229" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38466" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671848" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38467" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652838" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652839" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38468" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664945" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664946" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38469" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569230" comment="sudo-1.7.6p2-0.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38470" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19636: Local root exploit via inclusion of attacker controlled shell script (bsc#1117751)
- CVE-2018-19640: Users can kill arbitrary processes (bsc#1118463)
- CVE-2018-19638: User can overwrite arbitrary log files in support tar (bsc#1118460)
- CVE-2018-19639: Code execution if run with -v (bsc#1118462)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38471" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006818.html" source="SUSE-SU"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569232" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38472" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006107.html" source="SUSE-SU"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569233" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38473" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569234" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38474" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010249.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668228" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38475" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569235" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569236" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38476" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666456" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666457" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38477" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006203.html" source="SUSE-SU"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569237" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38478" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38479" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006646.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38480" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38481" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38482" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651175" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38483" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653705" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38484" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00000.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569270" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38485" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1040414" ref_url="https://bugzilla.suse.com/1040414" source="BUGZILLA"/>
		<reference ref_id="903440" ref_url="https://bugzilla.suse.com/903440" source="BUGZILLA"/>
		<reference ref_id="903738" ref_url="https://bugzilla.suse.com/903738" source="BUGZILLA"/>
		<reference ref_id="923777" ref_url="https://bugzilla.suse.com/923777" source="BUGZILLA"/>
		<reference ref_id="923904" ref_url="https://bugzilla.suse.com/923904" source="BUGZILLA"/>
		<reference ref_id="924994" ref_url="https://bugzilla.suse.com/924994" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="930236" ref_url="https://bugzilla.suse.com/930236" source="BUGZILLA"/>
		<reference ref_id="931607" ref_url="https://bugzilla.suse.com/931607" source="BUGZILLA"/>
		<reference ref_id="949754" ref_url="https://bugzilla.suse.com/949754" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008640.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2015-5218: Prevent colcrt buffer overflow. (bsc#949754)

These non-security issues were fixed:

- Mount crashes when trying to mount `shmfs` while `SELinux` is active. (bsc#1040414)
- Fix `lsblk -f` on `CCISS` and other devices with nodes in `/dev` subdirectory. (bsc#924994)
- Fix `script(1)` hang caused by mis-interpreted EOF on big-endian platforms. (bsc#930236)
- Do not segfault when TERM is not defined or wrong. (bsc#903440)
- Update and fix mount XFS documentation. (bsc#925705)
- Fix recognition of `/dev/dm-N` partitions names. (bsc#931607)
- Follow SUSE Linux Enterprise 11 device mapper partition names configuration. (bsc#931607)
- Fix recognition of device mapper partitions. (bsc#923904)
- Fix `fsck -C {fd}` parsing. (bsc#923777, bsc#903738)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040414">SUSE bug 1040414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903440">SUSE bug 903440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903738">SUSE bug 903738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923777">SUSE bug 923777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923904">SUSE bug 923904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924994">SUSE bug 924994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930236">SUSE bug 930236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931607">SUSE bug 931607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949754">SUSE bug 949754</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569271" comment="libblkid1-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569272" comment="libuuid1-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569273" comment="util-linux-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569274" comment="util-linux-lang-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569275" comment="uuid-runtime-2.19.1-6.62.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38486" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569276" comment="gvim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569277" comment="vim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569278" comment="vim-base-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569279" comment="vim-data-7.2-8.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38487" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006887.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569280" comment="gvim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569281" comment="vim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569282" comment="vim-base-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569283" comment="vim-data-7.2-8.21.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38488" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008521.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569284" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38489" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569285" comment="wget-1.11.4-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38490" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569286" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38491" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="973631" ref_url="https://bugzilla.suse.com/973631" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="976470" ref_url="https://bugzilla.suse.com/976470" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: Unbounded memory allocation allowed a guest administrator to cause a denial of service of the host (bsc#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)

These non-security issues were fixed:
- bsc#985503: vif-route broken 
- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) 
- bsc#961600: Poor performance when Xen HVM domU configured with max memory &gt; current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#976470: Xend fails to start 
- bsc#973631: AWS EC2 kdump issue
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973631">SUSE bug 973631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976470">SUSE bug 976470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569287" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569288" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569289" comment="xen-libs-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569290" comment="xen-tools-domU-4.2.5_21-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38492" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)

This non-security issue was fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569291" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569292" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569293" comment="xen-libs-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569294" comment="xen-tools-domU-4.2.5_21-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38493" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340).
- CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a 'supposedly-ignored' operand size prefix (bsc#1012651).
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298)

This non-security issue was fixed:

- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569295" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569296" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569297" comment="xen-libs-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569298" comment="xen-tools-domU-4.2.5_21-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38494" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569299" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569300" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569301" comment="xen-libs-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569302" comment="xen-tools-domU-4.2.5_21-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38495" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several security issues:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569303" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569304" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569305" comment="xen-libs-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569306" comment="xen-tools-domU-4.2.5_21-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38496" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569307" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.102-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569308" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.102-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569309" comment="xen-libs-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569310" comment="xen-tools-domU-4.2.5_21-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38497" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569311" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569312" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569313" comment="xen-libs-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569314" comment="xen-tools-domU-4.2.5_21-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38498" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569315" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569316" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569317" comment="xen-libs-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569318" comment="xen-tools-domU-4.2.5_21-45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38499" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-20"/>
	<updated date="2017-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569319" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569320" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569321" comment="xen-libs-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569322" comment="xen-tools-domU-4.2.5_21-45.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38500" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569323" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.8-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569324" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.8-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569325" comment="xen-libs-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569326" comment="xen-tools-domU-4.2.5_21-45.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38501" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an
  integer overflow flaw allowing a privileged user to crash the Qemu process on
  the host resulting in DoS (bsc#1024307)
- Unprivileged domains could have issued well-timed writes to xenstore which
  conflict with transactions to stall progress of the control domain or driver
  domain, possibly leading to DoS (bsc#1030144, XSA-206).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569327" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569328" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569329" comment="xen-libs-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569330" comment="xen-tools-domU-4.2.5_21-45.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38502" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-10"/>
	<updated date="2018-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569331" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569332" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569333" comment="xen-libs-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569334" comment="xen-tools-domU-4.2.5_21-45.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38503" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097206" ref_url="https://bugzilla.suse.com/1097206" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

These security issue were fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- CVE-2018-12617: An integer overflow that could cause a segmentation
  fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was
  fixed (bsc#1098744)
- CVE-2018-3665: System software utilizing Lazy FP state restore technique
  on systems using Intel Core-based microprocessors may potentially allow
  a local process to infer data from another process through a speculative
  execution side channel. (bsc#1095242)
- CVE-2018-3639: Systems with microprocessors utilizing speculative
  execution and speculative execution of memory reads before the addresses
  of all prior memory writes are known may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)
- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5753: Systems with microprocessors utilizing speculative
  execution and branch prediction may allow unauthorized disclosure of
  information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5754: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis of the data cache. (bsc#1074562)
- CVE-2018-12891: Certain PV MMU operations may take a long time to
  process. For that reason Xen explicitly checks for the need to preempt
  the current vCPU at certain points. A few rarely taken code paths did
  bypass such checks. By suitably enforcing the conditions through its own
  page table contents, a malicious guest may cause such bypasses to be used
  for an unbounded number of iterations. A malicious or buggy PV guest may
  cause a Denial of Service (DoS) affecting the entire host. Specifically,
  it may prevent use of a physical CPU for an indeterminate period of
  time. (bsc#1097521)
- CVE-2018-12893:  One of the fixes in XSA-260 added some safety checks
  to help prevent Xen livelocking with debug exceptions. Unfortunately,
  due to an oversight, at least one of these safety checks can be
  triggered by a guest. A malicious PV guest can crash Xen, leading to
  a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86
  HVM and PVH guests cannot exploit the vulnerability. An attacker
  needs to be able to control hardware debugging facilities to exploit
  the vulnerability, but such permissions are typically available to
  unprivileged users. (bsc#1097522)
- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer
  overflow via incoming fragmented datagrams. (bsc#1096224)
- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest
  OS users to cause a denial of service (unexpectedly high interrupt
  number, array overrun, and hypervisor crash) or possibly gain hypervisor
  privileges by setting up an HPET timer to deliver interrupts in IO-APIC
  mode, aka vHPET interrupt injection. (bsc#1090822)
- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)

Following bugs were fixed:

- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)
- bsc#1079730 - in xen-kmp, unplug emulated devices after migration
  This is required since xen-4.10 and/or qemu-2.10 because the state
  of unplug is not propagated from one dom0 to another. Without
  this unplug qemu's block-backend will be unable to open qcow2
  disks on the receiving dom0
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097206">SUSE bug 1097206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569335" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569336" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569337" comment="xen-libs-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569338" comment="xen-tools-domU-4.2.5_21-45.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38504" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1110924" ref_url="https://bugzilla.suse.com/1110924" source="BUGZILLA"/>
		<reference ref_id="1111007" ref_url="https://bugzilla.suse.com/1111007" source="BUGZILLA"/>
		<reference ref_id="1111011" ref_url="https://bugzilla.suse.com/1111011" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1112188" ref_url="https://bugzilla.suse.com/1112188" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-18849: Fixed an out of bounds memory access issue was found in the 
  LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin (bsc#1114423).
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18438: Fixed an integer overflow in ccid_card_vscard_read function which could allow memory corruption (bsc#1112188).
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
  pcnet component (bsc#1111011)
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
  leading to a denial of service (DoS). (bsc#1111014)
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2018-17958: Fixed an integer overflow  which could lead to buffer overflow (bsc#1111007).
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
  the ne2000 component (bsc#1110924).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569339" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569340" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569341" comment="xen-libs-4.2.5_21-45.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569342" comment="xen-tools-domU-4.2.5_21-45.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38505" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1047675" ref_url="https://bugzilla.suse.com/1047675" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1135905" ref_url="https://bugzilla.suse.com/1135905" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1145652" ref_url="https://bugzilla.suse.com/1145652" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
- CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652).
- CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which
  could have led to denial of service (bsc#1135905).
- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- CVE-2017-10806: Fixed a stack buffer overflow in debug logging (bsc#1047675).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569343" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569344" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569345" comment="xen-libs-4.2.5_21-45.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569346" comment="xen-tools-domU-4.2.5_21-45.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38506" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues
- bsc#1161181 - CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host
- bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation
- bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change operations
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569347" comment="xen-kmp-default-4.2.5_22_3.0.101_0.47.106.59-45.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569348" comment="xen-kmp-pae-4.2.5_22_3.0.101_0.47.106.59-45.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569349" comment="xen-libs-4.2.5_22-45.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569350" comment="xen-tools-domU-4.2.5_22-45.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38507" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010256.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38508" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569351" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38509" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569352" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38510" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569353" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38511" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569354" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38512" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569355" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569356" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569357" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38513" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1078383" ref_url="https://bugzilla.suse.com/1078383" source="BUGZILLA"/>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fix:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

Non security issues fixed:

- Do not write past the allocated buffer. (bsc#1078383)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078383">SUSE bug 1078383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569358" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569359" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569360" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38514" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569361" comment="xorg-x11-Xvnc-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569362" comment="xorg-x11-server-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569363" comment="xorg-x11-server-extra-7.4-27.122.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38515" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569364" comment="xorg-x11-Xvnc-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569365" comment="xorg-x11-server-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569366" comment="xorg-x11-server-extra-7.4-27.122.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38516" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569367" comment="xorg-x11-Xvnc-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569368" comment="xorg-x11-server-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569369" comment="xorg-x11-server-extra-7.4-27.122.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38517" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569370" comment="xorg-x11-Xvnc-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569371" comment="xorg-x11-server-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569372" comment="xorg-x11-server-extra-7.4-27.122.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38518" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659906" comment="xorg-x11-Xvnc-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659907" comment="xorg-x11-server-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659908" comment="xorg-x11-server-extra-7.4-27.122.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38519" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009924.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660944" comment="xorg-x11-Xvnc-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660945" comment="xorg-x11-server-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660946" comment="xorg-x11-server-extra-7.4-27.122.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38520" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009009.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569373" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38521" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679340" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679341" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679342" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38522" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677178" comment="zlib-1.2.7-0.17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38523" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Point of Sale 11 SP3</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-pos:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117405" comment="SUSE Linux Enterprise Point of Sale 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671289" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38524" version="1" class="patch">
	<metadata>
		<title>Security update for Real Time Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP1</platform>
		</affected>
		<reference ref_id="676204" ref_url="https://bugzilla.suse.com/676204" source="BUGZILLA"/>
		<reference ref_id="717994" ref_url="https://bugzilla.suse.com/717994" source="BUGZILLA"/>
		<reference ref_id="726600" ref_url="https://bugzilla.suse.com/726600" source="BUGZILLA"/>
		<reference ref_id="730118" ref_url="https://bugzilla.suse.com/730118" source="BUGZILLA"/>
		<reference ref_id="731673" ref_url="https://bugzilla.suse.com/731673" source="BUGZILLA"/>
		<reference ref_id="740745" ref_url="https://bugzilla.suse.com/740745" source="BUGZILLA"/>
		<reference ref_id="745832" ref_url="https://bugzilla.suse.com/745832" source="BUGZILLA"/>
		<reference ref_id="749118" ref_url="https://bugzilla.suse.com/749118" source="BUGZILLA"/>
		<reference ref_id="749569" ref_url="https://bugzilla.suse.com/749569" source="BUGZILLA"/>
		<reference ref_id="750079" ref_url="https://bugzilla.suse.com/750079" source="BUGZILLA"/>
		<reference ref_id="758058" ref_url="https://bugzilla.suse.com/758058" source="BUGZILLA"/>
		<reference ref_id="758260" ref_url="https://bugzilla.suse.com/758260" source="BUGZILLA"/>
		<reference ref_id="758532" ref_url="https://bugzilla.suse.com/758532" source="BUGZILLA"/>
		<reference ref_id="760902" ref_url="https://bugzilla.suse.com/760902" source="BUGZILLA"/>
		<reference ref_id="763194" ref_url="https://bugzilla.suse.com/763194" source="BUGZILLA"/>
		<reference ref_id="764150" ref_url="https://bugzilla.suse.com/764150" source="BUGZILLA"/>
		<reference ref_id="769896" ref_url="https://bugzilla.suse.com/769896" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4020" ref_url="https://www.suse.com/security/cve/CVE-2009-4020/" source="CVE"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-4077" ref_url="https://www.suse.com/security/cve/CVE-2011-4077/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4132" ref_url="https://www.suse.com/security/cve/CVE-2011-4132/" source="CVE"/>
		<reference ref_id="CVE-2011-4330" ref_url="https://www.suse.com/security/cve/CVE-2011-4330/" source="CVE"/>
		<reference ref_id="CVE-2012-0044" ref_url="https://www.suse.com/security/cve/CVE-2012-0044/" source="CVE"/>
		<reference ref_id="CVE-2012-0810" ref_url="https://www.suse.com/security/cve/CVE-2012-0810/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-2123" ref_url="https://www.suse.com/security/cve/CVE-2012-2123/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="CVE-2012-2383" ref_url="https://www.suse.com/security/cve/CVE-2012-2383/" source="CVE"/>
		<reference ref_id="CVE-2012-2384" ref_url="https://www.suse.com/security/cve/CVE-2012-2384/" source="CVE"/>
		<reference ref_id="CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390/" source="CVE"/>
		<reference ref_id="CVE-2012-3375" ref_url="https://www.suse.com/security/cve/CVE-2012-3375/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 SP1 Realtime kernel has been updated to 
fix various bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3375: Fixed a denial of service condition in the epoll loop
      detection.
    * 

      CVE-2012-2390: Memory leaks in the hugetlbfs map reservation code
      have been fixed that could be used by local attackers to exhaust
      machine memory.

    * 

      CVE-2012-2133: A fix use after free bug in 'quota' handling of
      hugepages has been fixed that could cause a local denial of service.

    * 

      CVE-2012-2384: A integer overflow in i915_gem_do_execbuffer() has
      been fixed that might be used by local attackers to crash the kernel
      or potentially execute code.

    * 

      CVE-2012-2383: A integer overflow in i915_gem_execbuffer2() has been
      fixed that might be used by local attackers to crash the kernel or
      potentially execute code.

    * 

      CVE-2012-2123: The filesystem cabability handling was not fully
      correct, allowing local users to bypass fscaps related restrictions
      to disable e.g. address space randomization.

    * 

      CVE-2009-4020: Fixed a potential buffer overflow in hfsplus that
      could have been used to crash the kernel by supplying a bad hfsplus
      image for mounting.

    * 

      CVE-2011-4330: Mounting a corrupted hfs filesystem could have lead to
      a buffer overflow.

    * 

      CVE-2012-1097: The regset common infrastructure assumed that regsets
      would always have .get and .set methods, but necessarily .active
      methods. Unfortunately people have since written regsets without .set
      method, so NULL pointer dereference attacks were possible.

    * 

      CVE-2011-1083: Limit the path length users can build using epoll() to
      avoid local attackers consuming lots of kernel CPU time.

    * 

      CVE-2012-1090: Fixed a dentry refcount leak when opening a FIFO on
      lookup in cifs that could have been used to crash the kernel.

    * 

      CVE-2012-0810: A stack reusage bug has been fixed which could be used
      by local attackers to crash the kernel in some circumstances. As this
      only affects x86 32bit, it does not affect x86_64 at all.

    * 

      CVE-2012-0044: A integer overflow in drm_mode_dirtyfb_ioctl() has
      been fixed that might be used by local attackers to crash the kernel
      or execute code.

    * 

      CVE-2011-4077: A possible memory corruption in xfs_readlink has been
      fixed that could be used by local users able to mount xfs images to
      crash the kernel.

    * 

      CVE-2011-4132: Fixed a oops in jbd/jbd2 that could have been caused
      by mounting a malicious prepared filesystem.

    * 

      CVE-2011-4086: Fixed a oops in jbd/jbd2 that could have been caused
      by specific filesystem access patterns.

Also the following non security bugs have been fixed:

    * sched: Fix proc_sched_set_task() (bnc#717994).
    * vlan/core: Fix memory leak/corruption on VLAN GRO_DROP (bnc#758058).

Security Issue references:

    * CVE-2009-4020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020&gt;
    * CVE-2011-1083
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083&gt;
    * CVE-2011-4077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4077&gt;
    * CVE-2011-4086
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086&gt;
    * CVE-2011-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132&gt;
    * CVE-2011-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4330&gt;
    * CVE-2012-0044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0044&gt;
    * CVE-2012-0810
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0810&gt;
    * CVE-2012-1090
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1090&gt;
    * CVE-2012-1097
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1097&gt;
    * CVE-2012-2123
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2123&gt;
    * CVE-2012-2383
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2383&gt;
    * CVE-2012-2384
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2384&gt;
    * CVE-2012-2390
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390&gt;
    * CVE-2012-3375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3375&gt;
    * CVE-2012-2133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-14"/>
	<updated date="2012-08-14"/>
	<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717994">SUSE bug 717994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726600">SUSE bug 726600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730118">SUSE bug 730118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731673">SUSE bug 731673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740745">SUSE bug 740745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749118">SUSE bug 749118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749569">SUSE bug 749569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750079">SUSE bug 750079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758058">SUSE bug 758058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758260">SUSE bug 758260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760902">SUSE bug 760902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763194">SUSE bug 763194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764150">SUSE bug 764150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769896">SUSE bug 769896</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4020/">CVE-2009-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4077/">CVE-2011-4077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4132/">CVE-2011-4132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4330/">CVE-2011-4330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0044/">CVE-2012-0044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0810/">CVE-2012-0810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2123/">CVE-2012-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2383/">CVE-2012-2383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2384/">CVE-2012-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3375/">CVE-2012-3375</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:suse-linux-enterprise-rt:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664708" comment="SUSE Linux Enterprise Real Time Extension 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569374" comment="brocade-bna-kmp-rt-2.1.0.0_2.6.33.20_rt31_0.5-0.2.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569375" comment="cluster-network-kmp-rt-1.4_2.6.33.20_rt31_0.5-2.5.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569376" comment="cluster-network-kmp-rt_trace-1.4_2.6.33.20_rt31_0.5-2.5.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569377" comment="drbd-kmp-rt-8.3.11_2.6.33.20_rt31_0.5-0.3.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569378" comment="drbd-kmp-rt_trace-8.3.11_2.6.33.20_rt31_0.5-0.3.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569379" comment="iscsitarget-kmp-rt-1.4.19_2.6.33.20_rt31_0.5-0.9.11.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569380" comment="kernel-rt-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569381" comment="kernel-rt-base-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569382" comment="kernel-rt-devel-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569383" comment="kernel-rt_trace-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569384" comment="kernel-rt_trace-base-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569385" comment="kernel-rt_trace-devel-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569386" comment="kernel-source-rt-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569387" comment="kernel-syms-rt-2.6.33.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569388" comment="ocfs2-kmp-rt-1.6_2.6.33.20_rt31_0.5-0.4.2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569389" comment="ocfs2-kmp-rt_trace-1.6_2.6.33.20_rt31_0.5-0.4.2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569390" comment="ofed-kmp-rt-1.5.2_2.6.33.20_rt31_0.5-0.9.13.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38525" version="1" class="patch">
	<metadata>
		<title>Security update for OFED</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP1</platform>
		</affected>
		<reference ref_id="693243" ref_url="https://bugzilla.suse.com/693243" source="BUGZILLA"/>
		<reference ref_id="703752" ref_url="https://bugzilla.suse.com/703752" source="BUGZILLA"/>
		<reference ref_id="704914" ref_url="https://bugzilla.suse.com/704914" source="BUGZILLA"/>
		<reference ref_id="706175" ref_url="https://bugzilla.suse.com/706175" source="BUGZILLA"/>
		<reference ref_id="722030" ref_url="https://bugzilla.suse.com/722030" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1023" ref_url="https://www.suse.com/security/cve/CVE-2011-1023/" source="CVE"/>
		<description>

This update fixes the following reports for OFED:

    * 704914: Fixed NFS client over TCP hangs due to packet loss.
    * 693243: Fixed issue with building lustre against ofed-devel.
    * 706175: Fix crash on accessing /proc/net/sdpstats
    * 722030: Cannot load ib_ipath
    * 703752: Prevent BUG_ON triggering on congestion

Security Issue reference:

    * CVE-2011-1023
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1023&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-03"/>
	<updated date="2011-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/693243">SUSE bug 693243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703752">SUSE bug 703752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704914">SUSE bug 704914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706175">SUSE bug 706175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722030">SUSE bug 722030</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1023/">CVE-2011-1023</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:suse-linux-enterprise-rt:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664708" comment="SUSE Linux Enterprise Real Time Extension 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569391" comment="ofed-kmp-rt-1.5.2_2.6.33.18_rt31_0.3-0.9.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38526" version="1" class="patch">
	<metadata>
		<title>Security update for Real Time Linux Kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP2</platform>
		</affected>
		<reference ref_id="708296" ref_url="https://bugzilla.suse.com/708296" source="BUGZILLA"/>
		<reference ref_id="769644" ref_url="https://bugzilla.suse.com/769644" source="BUGZILLA"/>
		<reference ref_id="787843" ref_url="https://bugzilla.suse.com/787843" source="BUGZILLA"/>
		<reference ref_id="789359" ref_url="https://bugzilla.suse.com/789359" source="BUGZILLA"/>
		<reference ref_id="806988" ref_url="https://bugzilla.suse.com/806988" source="BUGZILLA"/>
		<reference ref_id="810323" ref_url="https://bugzilla.suse.com/810323" source="BUGZILLA"/>
		<reference ref_id="813245" ref_url="https://bugzilla.suse.com/813245" source="BUGZILLA"/>
		<reference ref_id="818545" ref_url="https://bugzilla.suse.com/818545" source="BUGZILLA"/>
		<reference ref_id="819979" ref_url="https://bugzilla.suse.com/819979" source="BUGZILLA"/>
		<reference ref_id="820102" ref_url="https://bugzilla.suse.com/820102" source="BUGZILLA"/>
		<reference ref_id="820338" ref_url="https://bugzilla.suse.com/820338" source="BUGZILLA"/>
		<reference ref_id="821980" ref_url="https://bugzilla.suse.com/821980" source="BUGZILLA"/>
		<reference ref_id="823618" ref_url="https://bugzilla.suse.com/823618" source="BUGZILLA"/>
		<reference ref_id="825696" ref_url="https://bugzilla.suse.com/825696" source="BUGZILLA"/>
		<reference ref_id="825896" ref_url="https://bugzilla.suse.com/825896" source="BUGZILLA"/>
		<reference ref_id="826602" ref_url="https://bugzilla.suse.com/826602" source="BUGZILLA"/>
		<reference ref_id="826756" ref_url="https://bugzilla.suse.com/826756" source="BUGZILLA"/>
		<reference ref_id="827767" ref_url="https://bugzilla.suse.com/827767" source="BUGZILLA"/>
		<reference ref_id="828236" ref_url="https://bugzilla.suse.com/828236" source="BUGZILLA"/>
		<reference ref_id="831168" ref_url="https://bugzilla.suse.com/831168" source="BUGZILLA"/>
		<reference ref_id="834473" ref_url="https://bugzilla.suse.com/834473" source="BUGZILLA"/>
		<reference ref_id="834708" ref_url="https://bugzilla.suse.com/834708" source="BUGZILLA"/>
		<reference ref_id="834808" ref_url="https://bugzilla.suse.com/834808" source="BUGZILLA"/>
		<reference ref_id="835074" ref_url="https://bugzilla.suse.com/835074" source="BUGZILLA"/>
		<reference ref_id="835186" ref_url="https://bugzilla.suse.com/835186" source="BUGZILLA"/>
		<reference ref_id="836718" ref_url="https://bugzilla.suse.com/836718" source="BUGZILLA"/>
		<reference ref_id="837739" ref_url="https://bugzilla.suse.com/837739" source="BUGZILLA"/>
		<reference ref_id="838623" ref_url="https://bugzilla.suse.com/838623" source="BUGZILLA"/>
		<reference ref_id="839407" ref_url="https://bugzilla.suse.com/839407" source="BUGZILLA"/>
		<reference ref_id="840226" ref_url="https://bugzilla.suse.com/840226" source="BUGZILLA"/>
		<reference ref_id="841445" ref_url="https://bugzilla.suse.com/841445" source="BUGZILLA"/>
		<reference ref_id="842239" ref_url="https://bugzilla.suse.com/842239" source="BUGZILLA"/>
		<reference ref_id="843419" ref_url="https://bugzilla.suse.com/843419" source="BUGZILLA"/>
		<reference ref_id="843429" ref_url="https://bugzilla.suse.com/843429" source="BUGZILLA"/>
		<reference ref_id="843445" ref_url="https://bugzilla.suse.com/843445" source="BUGZILLA"/>
		<reference ref_id="843642" ref_url="https://bugzilla.suse.com/843642" source="BUGZILLA"/>
		<reference ref_id="843645" ref_url="https://bugzilla.suse.com/843645" source="BUGZILLA"/>
		<reference ref_id="845621" ref_url="https://bugzilla.suse.com/845621" source="BUGZILLA"/>
		<reference ref_id="845729" ref_url="https://bugzilla.suse.com/845729" source="BUGZILLA"/>
		<reference ref_id="846036" ref_url="https://bugzilla.suse.com/846036" source="BUGZILLA"/>
		<reference ref_id="846984" ref_url="https://bugzilla.suse.com/846984" source="BUGZILLA"/>
		<reference ref_id="847261" ref_url="https://bugzilla.suse.com/847261" source="BUGZILLA"/>
		<reference ref_id="848321" ref_url="https://bugzilla.suse.com/848321" source="BUGZILLA"/>
		<reference ref_id="848336" ref_url="https://bugzilla.suse.com/848336" source="BUGZILLA"/>
		<reference ref_id="848544" ref_url="https://bugzilla.suse.com/848544" source="BUGZILLA"/>
		<reference ref_id="849021" ref_url="https://bugzilla.suse.com/849021" source="BUGZILLA"/>
		<reference ref_id="849029" ref_url="https://bugzilla.suse.com/849029" source="BUGZILLA"/>
		<reference ref_id="849034" ref_url="https://bugzilla.suse.com/849034" source="BUGZILLA"/>
		<reference ref_id="849404" ref_url="https://bugzilla.suse.com/849404" source="BUGZILLA"/>
		<reference ref_id="849675" ref_url="https://bugzilla.suse.com/849675" source="BUGZILLA"/>
		<reference ref_id="849809" ref_url="https://bugzilla.suse.com/849809" source="BUGZILLA"/>
		<reference ref_id="849848" ref_url="https://bugzilla.suse.com/849848" source="BUGZILLA"/>
		<reference ref_id="849950" ref_url="https://bugzilla.suse.com/849950" source="BUGZILLA"/>
		<reference ref_id="850640" ref_url="https://bugzilla.suse.com/850640" source="BUGZILLA"/>
		<reference ref_id="851066" ref_url="https://bugzilla.suse.com/851066" source="BUGZILLA"/>
		<reference ref_id="851101" ref_url="https://bugzilla.suse.com/851101" source="BUGZILLA"/>
		<reference ref_id="851314" ref_url="https://bugzilla.suse.com/851314" source="BUGZILLA"/>
		<reference ref_id="852373" ref_url="https://bugzilla.suse.com/852373" source="BUGZILLA"/>
		<reference ref_id="852558" ref_url="https://bugzilla.suse.com/852558" source="BUGZILLA"/>
		<reference ref_id="852559" ref_url="https://bugzilla.suse.com/852559" source="BUGZILLA"/>
		<reference ref_id="853050" ref_url="https://bugzilla.suse.com/853050" source="BUGZILLA"/>
		<reference ref_id="853051" ref_url="https://bugzilla.suse.com/853051" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="854546" ref_url="https://bugzilla.suse.com/854546" source="BUGZILLA"/>
		<reference ref_id="854634" ref_url="https://bugzilla.suse.com/854634" source="BUGZILLA"/>
		<reference ref_id="854722" ref_url="https://bugzilla.suse.com/854722" source="BUGZILLA"/>
		<reference ref_id="855037" ref_url="https://bugzilla.suse.com/855037" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4345" ref_url="https://www.suse.com/security/cve/CVE-2013-4345/" source="CVE"/>
		<reference ref_id="CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483/" source="CVE"/>
		<reference ref_id="CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511/" source="CVE"/>
		<reference ref_id="CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514/" source="CVE"/>
		<reference ref_id="CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515/" source="CVE"/>
		<reference ref_id="CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587/" source="CVE"/>
		<reference ref_id="CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592/" source="CVE"/>
		<reference ref_id="CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378/" source="CVE"/>
		<reference ref_id="CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380/" source="CVE"/>
		<reference ref_id="CVE-2013-6383" ref_url="https://www.suse.com/security/cve/CVE-2013-6383/" source="CVE"/>
		<reference ref_id="CVE-2013-6463" ref_url="https://www.suse.com/security/cve/CVE-2013-6463/" source="CVE"/>
		<reference ref_id="CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 2 kernel for RealTime was updated 
to version 3.0.101 and also includes various other bug and security fixes.

The following feature has been added:

    * supported.conf: Mark net/netfilter/xt_set as supported. (bnc#851066,
      FATE#313309)

The following security issues have been fixed:

    * 

      CVE-2013-7027: The ieee80211_radiotap_iterator_init function in
      net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not
      check whether a frame contains any data outside of the header, which
      might allow attackers to cause a denial of service (buffer over-read)
      via a crafted header. (bnc#854634)

    * 

      CVE-2013-6378: The lbs_debugfs_write function in
      drivers/net/wireless/libertas/debugfs.c in the Linux kernel through
      3.12.1 allows local users to cause a denial of service (OOPS) by
      leveraging root privileges for a zero-length write operation.
      (bnc#852559)

    * 

      CVE-2013-6380: The aac_send_raw_srb function in
      drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1
      does not properly validate a certain size value, which allows local
      users to cause a denial of service (invalid pointer dereference) or
      possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB
      ioctl call that triggers a crafted SRB command. (bnc#852373)

    * 

      CVE-2013-4514: Multiple buffer overflows in
      drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12
      allow local users to cause a denial of service or possibly have
      unspecified other impact by leveraging the CAP_NET_ADMIN capability
      and providing a long station-name string, related to the (1)
      wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.
      (bnc#849029)

    * 

      CVE-2013-4515: The bcm_char_ioctl function in
      drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory via an
      IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call. (bnc#849034)

    * 

      CVE-2013-4592: Memory leak in the __kvm_set_memory_region function in
      virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users
      to cause a denial of service (memory consumption) by leveraging
      certain device access to trigger movement of memory slots.
      (bnc#851101)

    * 

      CVE-2013-4587: Array index error in the kvm_vm_ioctl_create_vcpu
      function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux
      kernel through 3.12.5 allows local users to gain privileges via a
      large id value. (bnc#853050)

    * 

      CVE-2013-6367: The apic_get_tmcct function in arch/x86/kvm/lapic.c in
      the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS
      users to cause a denial of service (divide-by-zero error and host OS
      crash) via crafted modifications of the TMICT value. (bnc#853051)

    * 

      CVE-2013-6368: The KVM subsystem in the Linux kernel through 3.12.5
      allows local users to gain privileges or cause a denial of service
      (system crash) via a VAPIC synchronization operation involving a
      page-end address. (bnc#853052)

    * 

      CVE-2013-4483: The ipc_rcu_putref function in ipc/util.c in the Linux
      kernel before 3.10 does not properly manage a reference count, which
      allows local users to cause a denial of service (memory consumption
      or system crash) via a crafted application. (bnc#848321)

    * 

      CVE-2013-4511: Multiple integer overflows in Alchemy LCD frame-buffer
      drivers in the Linux kernel before 3.12 allow local users to create a
      read-write memory mapping for the entirety of kernel memory, and
      consequently gain privileges, via crafted mmap operations, related to
      the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the
      (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.
      (bnc#849021)

    * 

      CVE-2013-6463: Linux kernel built with the networking
      support(CONFIG_NET) is vulnerable to an information leakage flaw in
      the socket layer. It could occur while doing recvmsg(2), recvfrom(2)
      socket calls. It occurs due to improperly initialised msg_name &amp;
      msg_namelen message header parameters. (bnc#854722)

    * 

      CVE-2013-6383: The aac_compat_ioctl function in
      drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does
      not require the CAP_SYS_RAWIO capability, which allows local users to
      bypass intended access restrictions via a crafted ioctl call.
      (bnc#852558)

    * 

      CVE-2013-4345: Off-by-one error in the get_prng_bytes function in
      crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it
      easier for context-dependent attackers to defeat cryptographic
      protection mechanisms via multiple requests for small amounts of
      data, leading to improper management of the state of the consumed
      data. (bnc#840226)

The following non-security issues have been fixed:

    * kabi: protect bind_conflict callback in struct
      inet_connection_sock_af_ops (bnc#823618).
    * printk: forcibly flush nmi ringbuffer if oops is in progress
      (bnc#849675).
    * blktrace: Send BLK_TN_PROCESS events to all running traces
      (bnc#838623).
    * x86/dumpstack: Fix printk_address for direct addresses (bnc#845621).
    * futex: fix handling of read-only-mapped hugepages (VM Functionality).
    * random: fix accounting race condition with lockless irq entropy_count
      update (bnc#789359).
    * Provide realtime priority kthread and workqueue boot options
      (bnc#836718).
    * sched: Fix several races in CFS_BANDWIDTH (bnc#848336).
    * sched: Fix cfs_bandwidth misuse of hrtimer_expires_remaining
      (bnc#848336).
    * sched: Fix hrtimer_cancel()/rq-&gt;lock deadlock (bnc#848336).
    * sched: Fix race on toggling cfs_bandwidth_used (bnc#848336).
    * sched: Fix buglet in return_cfs_rq_runtime().
    * sched: Guarantee new group-entities always have weight (bnc#848336).
    * sched: Use jump labels to reduce overhead when bandwidth control is
      inactive (bnc#848336).
    * watchdog: Get rid of MODULE_ALIAS_MISCDEV statements (bnc#827767).
    * tcp: bind() fix autoselection to share ports (bnc#823618).
    * tcp: bind() use stronger condition for bind_conflict (bnc#823618).
    * tcp: ipv6: bind() use stronger condition for bind_conflict
      (bnc#823618).
    * macvlan: disable LRO on lower device instead of macvlan (bnc#846984).
    * macvlan: introduce IFF_MACVLAN flag and helper function (bnc#846984).
    * macvlan: introduce macvlan_dev_real_dev() helper function
      (bnc#846984).
    * xen: netback: bump tx queue length (bnc#849404).
    * netxen: fix off by one bug in netxen_release_tx_buffer()
      (bnc#845729).
    * xfrm: invalidate dst on policy insertion/deletion (bnc#842239).
    * xfrm: prevent ipcomp scratch buffer race condition (bnc#842239).
    * crypto: Fix aes-xts parameter corruption (bnc#854546, LTC#100718).
    * crypto: gf128mul - fix call to memset() (obvious fix).
    * autofs4: autofs4_wait() vs. autofs4_catatonic_mode() race
      (bnc#851314).
    * autofs4: catatonic_mode vs. notify_daemon race (bnc#851314).
    * autofs4: close the races around autofs4_notify_daemon() (bnc#851314).
    * autofs4: deal with autofs4_write/autofs4_write races (bnc#851314).
    * autofs4 - dont clear DCACHE_NEED_AUTOMOUNT on rootless mount
      (bnc#851314).
    * autofs4 - fix deal with autofs4_write races (bnc#851314).
    * autofs4 - use simple_empty() for empty directory check (bnc#851314).
    * blkdev_max_block: make private to fs/buffer.c (bnc#820338).
    * Avoid softlockup in shrink_dcache_for_umount_subtree (bnc#834473).
    * dlm: set zero linger time on sctp socket (bnc#787843).
    * SUNRPC: Fix a data corruption issue when retransmitting RPC calls
      (bnc#855037)
    * nfs: Change NFSv4 to not recover locks after they are lost
      (bnc#828236).
    * nfs: Adapt readdirplus to application usage patterns (bnc#834708).
    * xfs: improve ioend error handling (bnc#846036).
    * xfs: reduce ioend latency (bnc#846036).
    * xfs: use per-filesystem I/O completion workqueues (bnc#846036).
    * xfs: Hide additional entries in struct xfs_mount (bnc#846036
      bnc#848544).
    * xfs: Account log unmount transaction correctly (bnc#849950).
    * vfs: avoid 'attempt to access beyond end of device' warnings
      (bnc#820338).
    * vfs: fix O_DIRECT read past end of block device (bnc#820338).
    * cifs: Improve performance of browsing directories with several files
      (bnc#810323).
    * cifs: Ensure cifs directories don't show up as files (bnc#826602).
    * sd: avoid deadlocks when running under multipath (bnc#818545).
    * sd: fix crash when UA received on DIF enabled device (bnc#841445).
    * sg: fix blk_get_queue usage (bnc#834808).
    * block: factor out vector mergeable decision to a helper function
      (bnc#769644).
    * block: modify __bio_add_page check to accept pages that don't start a
      new segment (bnc#769644).
    * scsi_dh: invoke callback if -&gt;activate is not present (bnc#708296).
    * scsi_dh: return individual errors in scsi_dh_activate() (bnc#708296).
    * scsi_dh_alua: Decode EMC Clariion extended inquiry (bnc#708296).
    * scsi_dh_alua: Decode HP EVA array identifier (bnc#708296).
    * scsi_dh_alua: Evaluate state for all port groups (bnc#708296).
    * scsi_dh_alua: Fix missing close brace in alua_check_sense
      (bnc#843642).
    * scsi_dh_alua: Make stpg synchronous (bnc#708296).
    * scsi_dh_alua: Pass buffer as function argument (bnc#708296).
    * scsi_dh_alua: Re-evaluate port group states after STPG (bnc#708296).
    * scsi_dh_alua: Recheck state on transitioning (bnc#708296).
    * scsi_dh_alua: Rework rtpg workqueue (bnc#708296).
    * scsi_dh_alua: Use separate alua_port_group structure (bnc#708296).
    * scsi_dh_alua: Allow get_alua_data() to return NULL (bnc#839407).
    * scsi_dh_alua: asynchronous RTPG (bnc#708296).
    * scsi_dh_alua: correctly terminate target port strings (bnc#708296).
    * scsi_dh_alua: defer I/O while workqueue item is pending (bnc#708296).
    * scsi_dh_alua: Do not attach to RAID or enclosure devices
      (bnc#819979).
    * scsi_dh_alua: Do not attach to well-known LUNs (bnc#821980).
    * scsi_dh_alua: fine-grained locking in alua_rtpg_work() (bnc#708296).
    * scsi_dh_alua: invalid state information for 'optimized' paths
      (bnc#843445).
    * scsi_dh_alua: move RTPG to workqueue (bnc#708296).
    * scsi_dh_alua: move 'expiry' into PG structure (bnc#708296).
    * scsi_dh_alua: move some sense code handling into generic code
      (bnc#813245).
    * scsi_dh_alua: multipath failover fails with error 15 (bnc#825696).
    * scsi_dh_alua: parse target device id (bnc#708296).
    * scsi_dh_alua: protect accesses to struct alua_port_group
      (bnc#708296).
    * scsi_dh_alua: put sense buffer on stack (bnc#708296).
    * scsi_dh_alua: reattaching device handler fails with 'Error 15'
      (bnc#843429).
    * scsi_dh_alua: remove locking when checking state (bnc#708296).
    * scsi_dh_alua: remove stale variable (bnc#708296).
    * scsi_dh_alua: retry RTPG on UNIT ATTENTION (bnc#708296).
    * scsi_dh_alua: retry command on 'mode parameter changed' sense code
      (bnc#843645).
    * scsi_dh_alua: simplify alua_check_sense() (bnc#843642).
    * scsi_dh_alua: simplify state update (bnc#708296).
    * scsi_dh_alua: use delayed_work (bnc#708296).
    * scsi_dh_alua: use flag for RTPG extended header (bnc#708296).
    * scsi_dh_alua: use local buffer for VPD inquiry (bnc#708296).
    * scsi_dh_alua: use spin_lock_irqsave for port group (bnc#708296).
    * lpfc: Do not free original IOCB whenever ABTS fails (bnc#806988).
    * lpfc: Fix kernel warning on spinlock usage (bnc#806988).
    * lpfc: Fixed system panic due to midlayer abort (bnc#806988).
    * qla2xxx: Add module parameter to override the default request queue
      size (bnc#826756).
    * qla2xxx: Module parameter 'ql2xasynclogin' (bnc#825896).
    * bna: do not register ndo_set_rx_mode callback (bnc#847261).
    * hv: handle more than just WS2008 in KVP negotiation (bnc#850640).
    * drm: don't add inferred modes for monitors that don't support them
      (bnc #849809).
    * pci/quirks: Modify reset method for Chelsio T4 (bnc#831168).
    * pci: fix truncation of resource size to 32 bits (bnc#843419).
    * pci: pciehp: Retrieve link speed after link is trained (bnc#820102).
    * pci: Separate pci_bus_read_dev_vendor_id from pci_scan_device
      (bnc#820102).
    * pci: pciehp: replace unconditional sleep with config space access
      check (bnc#820102).
    * pci: pciehp: make check_link_active more helpful (bnc#820102).
    * pci: pciehp: Add pcie_wait_link_not_active() (bnc#820102).
    * pci: pciehp: Add Disable/enable link functions (bnc#820102).
    * pci: pciehp: Disable/enable link during slot power off/on
      (bnc#820102).
    * mlx4: allocate just enough pages instead of always 4 pages
      (bnc#835186 bnc#835074).
    * mlx4: allow order-0 memory allocations in RX path (bnc#835186
      bnc#835074).
    * net/mlx4: use one page fragment per incoming frame (bnc#835186
      bnc#835074).
    * qeth: request length checking in snmp ioctl (bnc#849848, LTC#99511).
    * cio: add message for timeouts on internal I/O (bnc#837739,LTC#97047).
    * s390/cio: dont abort verification after missing irq
      (bnc#837739,LTC#97047).
    * s390/cio: skip broken paths (bnc#837739,LTC#97047).
    * s390/cio: export vpm via sysfs (bnc#837739,LTC#97047).
    * s390/cio: handle unknown pgroup state (bnc#837739,LTC#97047).

Security Issues:

    * CVE-2013-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345&gt;
    * CVE-2013-4483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483&gt;
    * CVE-2013-4511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511&gt;
    * CVE-2013-4514
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4514&gt;
    * CVE-2013-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4515&gt;
    * CVE-2013-4587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587&gt;
    * CVE-2013-4592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592&gt;
    * CVE-2013-6367
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367&gt;
    * CVE-2013-6368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368&gt;
    * CVE-2013-6378
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378&gt;
    * CVE-2013-6380
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6380&gt;
    * CVE-2013-6383
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383&gt;
    * CVE-2013-6463
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463&gt;
    * CVE-2013-7027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7027&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/708296">SUSE bug 708296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769644">SUSE bug 769644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787843">SUSE bug 787843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789359">SUSE bug 789359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806988">SUSE bug 806988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/810323">SUSE bug 810323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813245">SUSE bug 813245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818545">SUSE bug 818545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819979">SUSE bug 819979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820102">SUSE bug 820102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820338">SUSE bug 820338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821980">SUSE bug 821980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823618">SUSE bug 823618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825696">SUSE bug 825696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825896">SUSE bug 825896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826602">SUSE bug 826602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826756">SUSE bug 826756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827767">SUSE bug 827767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828236">SUSE bug 828236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831168">SUSE bug 831168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834473">SUSE bug 834473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834708">SUSE bug 834708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834808">SUSE bug 834808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835074">SUSE bug 835074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835186">SUSE bug 835186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836718">SUSE bug 836718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837739">SUSE bug 837739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838623">SUSE bug 838623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839407">SUSE bug 839407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841445">SUSE bug 841445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842239">SUSE bug 842239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843419">SUSE bug 843419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843429">SUSE bug 843429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843445">SUSE bug 843445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843642">SUSE bug 843642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843645">SUSE bug 843645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845621">SUSE bug 845621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845729">SUSE bug 845729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846036">SUSE bug 846036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846984">SUSE bug 846984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847261">SUSE bug 847261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848336">SUSE bug 848336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848544">SUSE bug 848544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849029">SUSE bug 849029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849034">SUSE bug 849034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849404">SUSE bug 849404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849675">SUSE bug 849675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849809">SUSE bug 849809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849848">SUSE bug 849848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849950">SUSE bug 849950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850640">SUSE bug 850640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851066">SUSE bug 851066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851101">SUSE bug 851101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851314">SUSE bug 851314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852373">SUSE bug 852373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854546">SUSE bug 854546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855037">SUSE bug 855037</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4345/">CVE-2013-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6383/">CVE-2013-6383</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6463/">CVE-2013-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664709" comment="SUSE Linux Enterprise Real Time Extension 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569392" comment="cluster-network-kmp-rt-1.4_3.0.101_rt130_0.7.9-2.18.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569393" comment="cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.7.9-2.18.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569394" comment="drbd-kmp-rt-8.4.2_3.0.101_rt130_0.7.9-0.6.6.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569395" comment="drbd-kmp-rt_trace-8.4.2_3.0.101_rt130_0.7.9-0.6.6.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569396" comment="iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.7.9-0.25.25.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569397" comment="iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.7.9-0.25.25.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569398" comment="kernel-rt-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569399" comment="kernel-rt-base-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569400" comment="kernel-rt-devel-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569401" comment="kernel-rt_trace-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569402" comment="kernel-rt_trace-base-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569403" comment="kernel-rt_trace-devel-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569404" comment="kernel-source-rt-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569405" comment="kernel-syms-rt-3.0.101.rt130-0.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569406" comment="lttng-modules-kmp-rt-2.0.4_3.0.101_rt130_0.7.9-0.9.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569407" comment="lttng-modules-kmp-rt_trace-2.0.4_3.0.101_rt130_0.7.9-0.9.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569408" comment="ocfs2-kmp-rt-1.6_3.0.101_rt130_0.7.9-0.11.78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569409" comment="ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.7.9-0.11.78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569410" comment="ofed-kmp-rt-1.5.2_3.0.101_rt130_0.7.9-0.28.28.50 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569411" comment="ofed-kmp-rt_trace-1.5.2_3.0.101_rt130_0.7.9-0.28.28.50 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38527" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871134" ref_url="https://bugzilla.suse.com/871134" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879304" ref_url="https://bugzilla.suse.com/879304" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891281" ref_url="https://bugzilla.suse.com/891281" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="891746" ref_url="https://bugzilla.suse.com/891746" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895608" ref_url="https://bugzilla.suse.com/895608" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was 
updated to fix various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux 
kernel through 3.14.5 does not ensure that calls have two different futex 
addresses, which allows local users to gain privileges via a crafted 
FUTEX_REQUEUE command that facilitates unsafe waiter modification. 
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs 
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec 
(bnc#891746). - Add option to automatically enforce module signatures when 
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). 
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported 
new patches of Lock down functions for UEFI secure boot Also updated 
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file 
system snapshot. - Btrfs: abort the transaction when we does not find our 
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - 
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile 
flags on seqlock retry. - Btrfs: does not check nodes for extent items. - 
Btrfs: fix a possible deadlock between scrub and transaction committing. - 
Btrfs: fix corruption after write/fsync failure + fsync + log recovery 
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated 
checksums (bnc#891619). - Btrfs: fix double free in 
find_lock_delalloc_range. - Btrfs: fix possible memory leak in 
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config 
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected 
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when 
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) 
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - 
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - 
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - 
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - 
drm/i915: create functions for the 'unclaimed register' checks 
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks 
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory 
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - 
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). 
- hibernate: Disable in a signed modules environment (bnc#884333). - 
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init 
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory 
barriers for send / receive (bnc#885382). - inet: add a redirect generation 
id in inetpeer (bnc#860593). - inetpeer: initialize -&gt;redirect_genid in 
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() 
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base 
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: 
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - 
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). 
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - 
kexec: Disable at runtime if the kernel enforces module loading 
restrictions (bnc#884333). - md/raid6: avoid data corruption during 
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of 
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized 
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE 
check in vma_has_reserves() - mm, hugetlb: change variable name 
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE 
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus 
pages - mm, hugetlb: do not use a page in page cache for cow optimization - 
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, 
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting 
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: 
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which 
check availability of free huge page - mm, hugetlb: protect reserved pages 
when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets 
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy 
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples 
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - 
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: 
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid 
escalating the SCSI error handler if the command is not found in firmware 
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost 
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware 
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue 
abort command for outstanding commands during cleanup when only firmware is 
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to 
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host 
can_queue value based on available resources (bnc#859840). - restore 
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy 
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the 
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: 
Enable integrated ASCII console per default (bnc#885262, LTC#112035). - 
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start 
(bnc#833820). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix 
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - 
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add 
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity 
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - 
x86/UV: Update UV support for external NMI signals (bnc#888847). - 
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number 
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port 
access when module security is enabled (bnc#884333). - x86: Restrict MSR 
access when module loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-25"/>
	<updated date="2014-09-25"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871134">SUSE bug 871134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879304">SUSE bug 879304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891281">SUSE bug 891281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891746">SUSE bug 891746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895608">SUSE bug 895608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664710" comment="SUSE Linux Enterprise Real Time Extension 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569412" comment="cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569413" comment="cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569414" comment="drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569415" comment="drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569416" comment="iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569417" comment="iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569418" comment="kernel-rt-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569419" comment="kernel-rt-base-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569420" comment="kernel-rt-devel-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569421" comment="kernel-rt_trace-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569422" comment="kernel-rt_trace-base-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569423" comment="kernel-rt_trace-devel-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569424" comment="kernel-source-rt-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569425" comment="kernel-syms-rt-3.0.101.rt130-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569426" comment="lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569427" comment="lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569428" comment="ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569429" comment="ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569430" comment="ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569431" comment="ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38528" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP3</platform>
		</affected>
		<reference ref_id="851068" ref_url="https://bugzilla.suse.com/851068" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="927786" ref_url="https://bugzilla.suse.com/927786" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930761" ref_url="https://bugzilla.suse.com/930761" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931538" ref_url="https://bugzilla.suse.com/931538" source="BUGZILLA"/>
		<reference ref_id="932348" ref_url="https://bugzilla.suse.com/932348" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934742" ref_url="https://bugzilla.suse.com/934742" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.

The following feature was added for RT:
- FATE#317131: The SocketCAN (Peak PCI) driver was added for CAN bus support.

Following security bugs were fixed:

- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel allowed local users to bypass intended
  size restrictions and trigger read operations on additional memory
  locations by changing the handle_bytes value of a file handle during
  the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
  to a crash which could occur while fetching inode information from a
  corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
  issues in handling UDF filesystems in the Linux kernel allowed the
  corruption of kernel memory and other issues. An attacker able to mount
  a corrupted/malicious UDF file system image could cause the kernel to
  crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
  PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
  kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
  to obtain sensitive information from uninitialized locations in host OS
  kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
  read and write functionality did not take into account the I/O vectors
  that were already processed when retrying after a failed atomic access
  operation, potentially resulting in memory corruption due to an I/O vector
  array overrun. A local, unprivileged user could use this flaw to crash
  the system or, potentially, escalate their privileges on the system.
  (bsc#933429).


Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler  (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-09"/>
	<updated date="2015-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851068">SUSE bug 851068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927786">SUSE bug 927786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930761">SUSE bug 930761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931538">SUSE bug 931538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932348">SUSE bug 932348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934742">SUSE bug 934742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664710" comment="SUSE Linux Enterprise Real Time Extension 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569432" comment="kernel-rt-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569433" comment="kernel-rt-base-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569434" comment="kernel-rt-devel-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569435" comment="kernel-rt_trace-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569436" comment="kernel-rt_trace-base-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569437" comment="kernel-rt_trace-devel-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569438" comment="kernel-source-rt-3.0.101.rt130-0.33.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569439" comment="kernel-syms-rt-3.0.101.rt130-0.33.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38529" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP3</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="926007" ref_url="https://bugzilla.suse.com/926007" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="937969" ref_url="https://bugzilla.suse.com/937969" source="BUGZILLA"/>
		<reference ref_id="937970" ref_url="https://bugzilla.suse.com/937970" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939207" ref_url="https://bugzilla.suse.com/939207" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
  users to cause a denial of service (host OS panic or hang) by triggering
  many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS
  users to cause a denial of service (host OS panic or hang) by triggering
  many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c
  (bnc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
  creating a connection, preventing possible DoS (bsc#952384, CVE-2015-7990).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
  the x86_64 platform mishandled IRET faults in processing NMIs that
  occurred during userspace execution, which might allow local users to
  gain privileges by triggering an NMI (bnc#937969 bnc#937970 bnc#938706
  bnc#939207).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
  in the Linux kernel allowed local users to cause a denial of service
  (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
  kernel did not validate attempted changes to the MTU value, which allowed
  context-dependent attackers to cause a denial of service (packet loss)
  via a value that is (1) smaller than the minimum compliant value or
  (2) larger than the MTU of an interface, as demonstrated by a Router
  Advertisement (RA) message that is not validated by a daemon, a different
  vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is
  limited to the NetworkManager product. (bnc#955354).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
  in the Linux kernel allowed local users to cause a denial of service
  (NULL pointer dereference and system crash) or possibly have unspecified
  other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c
  in the Linux kernel allowed local users to cause a denial of service
  (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers
  permanent file-descriptor allocation (bnc#942367).

The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s-&amp;gt;lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: Get rid if the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- Fixing wording in patch comment (bsc#923002)
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: drop first packet to dead server (bsc#946078).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch (bnc#920016).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- macvlan: Support bonding events bsc#948521
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).
- Modified -rt patches: 344 of 435, useless noise elided.
- Moved iscsi kabi patch to patches.kabi (bsc#923002)
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).
- Rename kabi patch appropriately (bsc#923002)
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- XHCI: use uninterruptible sleep for waiting for internal operations (bnc#939955).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926007">SUSE bug 926007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664710" comment="SUSE Linux Enterprise Real Time Extension 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569440" comment="kernel-rt-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569441" comment="kernel-rt-base-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569442" comment="kernel-rt-devel-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569443" comment="kernel-rt_trace-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569444" comment="kernel-rt_trace-base-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569445" comment="kernel-rt_trace-devel-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569446" comment="kernel-source-rt-3.0.101.rt130-0.33.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569447" comment="kernel-syms-rt-3.0.101.rt130-0.33.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38530" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003344" ref_url="https://bugzilla.suse.com/1003344" source="BUGZILLA"/>
		<reference ref_id="1003568" ref_url="https://bugzilla.suse.com/1003568" source="BUGZILLA"/>
		<reference ref_id="1003677" ref_url="https://bugzilla.suse.com/1003677" source="BUGZILLA"/>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1004520" ref_url="https://bugzilla.suse.com/1004520" source="BUGZILLA"/>
		<reference ref_id="1005857" ref_url="https://bugzilla.suse.com/1005857" source="BUGZILLA"/>
		<reference ref_id="1005877" ref_url="https://bugzilla.suse.com/1005877" source="BUGZILLA"/>
		<reference ref_id="1005896" ref_url="https://bugzilla.suse.com/1005896" source="BUGZILLA"/>
		<reference ref_id="1005903" ref_url="https://bugzilla.suse.com/1005903" source="BUGZILLA"/>
		<reference ref_id="1006917" ref_url="https://bugzilla.suse.com/1006917" source="BUGZILLA"/>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012411" ref_url="https://bugzilla.suse.com/1012411" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015561" ref_url="https://bugzilla.suse.com/1015561" source="BUGZILLA"/>
		<reference ref_id="1015752" ref_url="https://bugzilla.suse.com/1015752" source="BUGZILLA"/>
		<reference ref_id="1015760" ref_url="https://bugzilla.suse.com/1015760" source="BUGZILLA"/>
		<reference ref_id="1015796" ref_url="https://bugzilla.suse.com/1015796" source="BUGZILLA"/>
		<reference ref_id="1015803" ref_url="https://bugzilla.suse.com/1015803" source="BUGZILLA"/>
		<reference ref_id="1015817" ref_url="https://bugzilla.suse.com/1015817" source="BUGZILLA"/>
		<reference ref_id="1015828" ref_url="https://bugzilla.suse.com/1015828" source="BUGZILLA"/>
		<reference ref_id="1015844" ref_url="https://bugzilla.suse.com/1015844" source="BUGZILLA"/>
		<reference ref_id="1015848" ref_url="https://bugzilla.suse.com/1015848" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1015932" ref_url="https://bugzilla.suse.com/1015932" source="BUGZILLA"/>
		<reference ref_id="1016320" ref_url="https://bugzilla.suse.com/1016320" source="BUGZILLA"/>
		<reference ref_id="1016505" ref_url="https://bugzilla.suse.com/1016505" source="BUGZILLA"/>
		<reference ref_id="1016520" ref_url="https://bugzilla.suse.com/1016520" source="BUGZILLA"/>
		<reference ref_id="1016668" ref_url="https://bugzilla.suse.com/1016668" source="BUGZILLA"/>
		<reference ref_id="1016688" ref_url="https://bugzilla.suse.com/1016688" source="BUGZILLA"/>
		<reference ref_id="1016824" ref_url="https://bugzilla.suse.com/1016824" source="BUGZILLA"/>
		<reference ref_id="1016831" ref_url="https://bugzilla.suse.com/1016831" source="BUGZILLA"/>
		<reference ref_id="1017686" ref_url="https://bugzilla.suse.com/1017686" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019165" ref_url="https://bugzilla.suse.com/1019165" source="BUGZILLA"/>
		<reference ref_id="1019348" ref_url="https://bugzilla.suse.com/1019348" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="748806" ref_url="https://bugzilla.suse.com/748806" source="BUGZILLA"/>
		<reference ref_id="763198" ref_url="https://bugzilla.suse.com/763198" source="BUGZILLA"/>
		<reference ref_id="771065" ref_url="https://bugzilla.suse.com/771065" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795297" ref_url="https://bugzilla.suse.com/795297" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="800999" ref_url="https://bugzilla.suse.com/800999" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="865783" ref_url="https://bugzilla.suse.com/865783" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="901809" ref_url="https://bugzilla.suse.com/901809" source="BUGZILLA"/>
		<reference ref_id="907611" ref_url="https://bugzilla.suse.com/907611" source="BUGZILLA"/>
		<reference ref_id="908458" ref_url="https://bugzilla.suse.com/908458" source="BUGZILLA"/>
		<reference ref_id="908684" ref_url="https://bugzilla.suse.com/908684" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="909491" ref_url="https://bugzilla.suse.com/909491" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="913387" ref_url="https://bugzilla.suse.com/913387" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="924708" ref_url="https://bugzilla.suse.com/924708" source="BUGZILLA"/>
		<reference ref_id="925065" ref_url="https://bugzilla.suse.com/925065" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="953233" ref_url="https://bugzilla.suse.com/953233" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="961589" ref_url="https://bugzilla.suse.com/961589" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973203" ref_url="https://bugzilla.suse.com/973203" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="987333" ref_url="https://bugzilla.suse.com/987333" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989680" ref_url="https://bugzilla.suse.com/989680" source="BUGZILLA"/>
		<reference ref_id="989764" ref_url="https://bugzilla.suse.com/989764" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="990245" ref_url="https://bugzilla.suse.com/990245" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999101" ref_url="https://bugzilla.suse.com/999101" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<description>

The SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during
  a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the
  existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of
  an incomplete fix for CVE-2016-7097 (bnc#1021258).
- CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
  where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or
  cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and 
  drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and
  cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet,
  especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
  between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause
  a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local
  malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
  because it first requires compromising a privileged process and current compiler optimizations restrict access to the
  vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of 
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux
  kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed
  local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN
  capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2)
  SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly
  initialize Code Segment (CS) in certain error cases, which allowed local users
  to obtain sensitive information from kernel stack memory via a crafted
  application (bnc#1013038).
- CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE  (bsc#1013604)
- CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533)
- CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around  np-&gt;opt (bsc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c
  in the Linux kernel allowed local users to cause a denial of service (memory
  consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in
  drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or
  cause a denial of service (memory corruption and system crash) by detaching a
  device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the
  Linux kernel lacks chunk-length checking for the first chunk, which allowed
  remote attackers to cause a denial of service (out-of-bounds slab access) or
  possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
  - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in
  block/genhd.c in the Linux kernel allowed local users to gain privileges by
  leveraging the execution of a certain stop operation even if the corresponding
  start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
  block/ioprio.c in the Linux kernel allowed local users to gain privileges or
  cause a denial of service (use-after-free) via a crafted ioprio_get system call
  (bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to
  gain privileges or cause a denial of service (system crash) via a VAPIC
  synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c
  in the Linux kernel allowed local users to obtain sensitive information from
  kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Revert 'proc: prevent accessing /proc/&lt;PID&gt;/environ until it's ready (bsc#1010467)'
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux
  kernel allowed local users to cause a denial of service (OOPS) by attempting to
  trigger use of in-kernel hash algorithms for a socket that has received zero
  bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in
  certain unusual hardware configurations, allowed remote attackers to execute
  arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function  (bsc#1004517).
- CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind  callback (bsc#1003925).
- CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077).

The following non-security bugs were fixed:

- blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk
- blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags

- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036).
- IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036).
- IB/mlx4: Fix memory leak if QP creation failed (bsc#786036).
- IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036).
- IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036).
- IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#908684).
- cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655)
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cpumask_set_cpu_local_first =&gt; cpumask_local_spread, lament (bug#919382).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 &amp; 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks()
- dm thin: fix race condition when destroying thin pool workqueue
- dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- hv: vmbus: handle various crash scenarios (bnc#986337).
- hv: vmbus: remove code duplication in message handling (bnc#986337).
- hv: vss: run only on supported host versions (bnc#986337).
- i40e: fix an uninitialized variable bug (bsc#909484).
- ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297).
- igb: Fix oops caused by missing queue pairing (bsc#909491).
- igb: Fix oops on changing number of rings (bsc#909491).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491).
- igb: Unpair the queues when changing the number of queues (bsc#909491).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi-fix for flock_owner addition (bsc#998689).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- libata: introduce ata_host-&gt;n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- md/raid10: Fix memory leak when raid10 reshape completes
- md/raid10: always set reshape_safe when initializing reshape_position
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netfront: do not truncate grant references.
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- oom: print nodemask in the oom report (bnc#1003866).
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS &amp; cscope (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils &lt; 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC'
  obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350).
- qlcnic: fix a timeout loop (bsc#909350)
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/package-descriptions: add -bigmem description
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618).
- softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend
  cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than
  the priority specified by the user.
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458).
- tg3: Fix temperature reporting (bnc#790588).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors
- x86/gart: Check for GART support before accessing GART registers
- xenbus: do not invoke -&gt;is_ready() for most device states (bsc#987333).
- zcrypt: Fix hang condition on crypto card config-off (bsc#1016320).
- zcrypt: Fix invalid domain response handling (bsc#1016320).
- zfcp: Fix erratic device offline during EH (bsc#993832).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677).
- zfcp: fix ELS/GS request&amp;response length for hardware data router (bnc#1003677).
- zfcp: fix payload trace length for SAN request&amp;response (bnc#1003677).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677).
- zfcp: trace on request for open and close of WKA port (bnc#1003677).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-25"/>
	<updated date="2017-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003344">SUSE bug 1003344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003568">SUSE bug 1003568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003677">SUSE bug 1003677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004520">SUSE bug 1004520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005857">SUSE bug 1005857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005877">SUSE bug 1005877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005896">SUSE bug 1005896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005903">SUSE bug 1005903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006917">SUSE bug 1006917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012411">SUSE bug 1012411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015561">SUSE bug 1015561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015752">SUSE bug 1015752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015760">SUSE bug 1015760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015796">SUSE bug 1015796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015803">SUSE bug 1015803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015817">SUSE bug 1015817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015828">SUSE bug 1015828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015844">SUSE bug 1015844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015848">SUSE bug 1015848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015932">SUSE bug 1015932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016320">SUSE bug 1016320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016505">SUSE bug 1016505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016520">SUSE bug 1016520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016668">SUSE bug 1016668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016688">SUSE bug 1016688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016824">SUSE bug 1016824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016831">SUSE bug 1016831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017686">SUSE bug 1017686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019165">SUSE bug 1019165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019348">SUSE bug 1019348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748806">SUSE bug 748806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763198">SUSE bug 763198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771065">SUSE bug 771065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795297">SUSE bug 795297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800999">SUSE bug 800999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865783">SUSE bug 865783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901809">SUSE bug 901809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907611">SUSE bug 907611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908458">SUSE bug 908458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908684">SUSE bug 908684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909491">SUSE bug 909491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913387">SUSE bug 913387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924708">SUSE bug 924708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925065">SUSE bug 925065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953233">SUSE bug 953233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961589">SUSE bug 961589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973203">SUSE bug 973203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987333">SUSE bug 987333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989680">SUSE bug 989680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989764">SUSE bug 989764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990245">SUSE bug 990245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999101">SUSE bug 999101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569448" comment="kernel-rt-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569449" comment="kernel-rt-base-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569450" comment="kernel-rt-devel-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569451" comment="kernel-rt_trace-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569452" comment="kernel-rt_trace-base-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569453" comment="kernel-rt_trace-devel-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569454" comment="kernel-source-rt-3.0.101.rt130-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569455" comment="kernel-syms-rt-3.0.101.rt130-68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38531" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1000365" ref_url="https://bugzilla.suse.com/1000365" source="BUGZILLA"/>
		<reference ref_id="1000380" ref_url="https://bugzilla.suse.com/1000380" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1029140" ref_url="https://bugzilla.suse.com/1029140" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030814" ref_url="https://bugzilla.suse.com/1030814" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035721" ref_url="https://bugzilla.suse.com/1035721" source="BUGZILLA"/>
		<reference ref_id="1035777" ref_url="https://bugzilla.suse.com/1035777" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1036056" ref_url="https://bugzilla.suse.com/1036056" source="BUGZILLA"/>
		<reference ref_id="1036288" ref_url="https://bugzilla.suse.com/1036288" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037191" ref_url="https://bugzilla.suse.com/1037191" source="BUGZILLA"/>
		<reference ref_id="1037193" ref_url="https://bugzilla.suse.com/1037193" source="BUGZILLA"/>
		<reference ref_id="1037227" ref_url="https://bugzilla.suse.com/1037227" source="BUGZILLA"/>
		<reference ref_id="1037232" ref_url="https://bugzilla.suse.com/1037232" source="BUGZILLA"/>
		<reference ref_id="1037233" ref_url="https://bugzilla.suse.com/1037233" source="BUGZILLA"/>
		<reference ref_id="1037356" ref_url="https://bugzilla.suse.com/1037356" source="BUGZILLA"/>
		<reference ref_id="1037358" ref_url="https://bugzilla.suse.com/1037358" source="BUGZILLA"/>
		<reference ref_id="1037359" ref_url="https://bugzilla.suse.com/1037359" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039258" ref_url="https://bugzilla.suse.com/1039258" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041762" ref_url="https://bugzilla.suse.com/1041762" source="BUGZILLA"/>
		<reference ref_id="1041975" ref_url="https://bugzilla.suse.com/1041975" source="BUGZILLA"/>
		<reference ref_id="1042045" ref_url="https://bugzilla.suse.com/1042045" source="BUGZILLA"/>
		<reference ref_id="1042615" ref_url="https://bugzilla.suse.com/1042615" source="BUGZILLA"/>
		<reference ref_id="1042633" ref_url="https://bugzilla.suse.com/1042633" source="BUGZILLA"/>
		<reference ref_id="1042687" ref_url="https://bugzilla.suse.com/1042687" source="BUGZILLA"/>
		<reference ref_id="1042832" ref_url="https://bugzilla.suse.com/1042832" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044216" ref_url="https://bugzilla.suse.com/1044216" source="BUGZILLA"/>
		<reference ref_id="1044230" ref_url="https://bugzilla.suse.com/1044230" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044882" ref_url="https://bugzilla.suse.com/1044882" source="BUGZILLA"/>
		<reference ref_id="1044913" ref_url="https://bugzilla.suse.com/1044913" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045356" ref_url="https://bugzilla.suse.com/1045356" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1045525" ref_url="https://bugzilla.suse.com/1045525" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1045547" ref_url="https://bugzilla.suse.com/1045547" source="BUGZILLA"/>
		<reference ref_id="1045615" ref_url="https://bugzilla.suse.com/1045615" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1046192" ref_url="https://bugzilla.suse.com/1046192" source="BUGZILLA"/>
		<reference ref_id="1046715" ref_url="https://bugzilla.suse.com/1046715" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047053" ref_url="https://bugzilla.suse.com/1047053" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049688" ref_url="https://bugzilla.suse.com/1049688" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050154" ref_url="https://bugzilla.suse.com/1050154" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051515" ref_url="https://bugzilla.suse.com/1051515" source="BUGZILLA"/>
		<reference ref_id="1051770" ref_url="https://bugzilla.suse.com/1051770" source="BUGZILLA"/>
		<reference ref_id="1055680" ref_url="https://bugzilla.suse.com/1055680" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="792863" ref_url="https://bugzilla.suse.com/792863" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="938352" ref_url="https://bugzilla.suse.com/938352" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-10277" ref_url="https://www.suse.com/security/cve/CVE-2016-10277/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2016-10277: Potential privilege escalation due to a missing bounds check in the lp driver. A kernel command-line adversary can overflow the parport_nr array to execute code (bsc#1039456).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7533: Bug in inotify code allowing privilege escalation (bsc#1049483).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bsc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-1000365: The Linux Kernel imposed a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354)
- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bnc#1032340)
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-1000380: sound/core/timer.c was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents could have bene disclosed when a read and an ioctl happen at the same time (bnc#1044125)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431)
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used by local console attackers to bypass certain secure boot settings. (bnc#1039456)
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885)
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069)
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883)
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879)
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850)

The following non-security bugs were fixed:

- 8250: use callbacks to access UART_DLL/UART_DLM.
- ALSA: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- ALSA: hda - using uninitialized data (bsc#1045538).
- ALSA: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- ALSA: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- ALSA: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- ALSA: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- Add CVE tag to references
- CIFS: backport prepath matching fix (bsc#799133).
- Drop CONFIG_PPC_CELL from bigmem (bsc#1049128).
- EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr().
- Fix scripts/bigmem-generate-ifdef-guard to work on all branches
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- IB/mlx4: Demote mcg message from warning to debug (bsc#919382).
- IB/mlx4: Fix ib device initialization error flow (bsc#919382).
- IB/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- IB/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- IB/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- IB/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- Input: cm109 - validate number of endpoints before using them (bsc#1037193).
- Input: hanwang - validate number of endpoints before using them (bsc#1037232).
- Input: yealink - validate number of endpoints before using them (bsc#1037227).
- KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- NFS: Avoid getting confused by confused server (bsc#1045416).
- NFS: Fix another OPEN_DOWNGRADE bug (git-next).
- NFS: Fix size of NFSACL SETACL operations (git-fixes).
- NFS: Make nfs_readdir revalidate less often (bsc#1048232).
- NFS: tidy up nfs_show_mountd_netid (git-fixes).
- NFSD: Do not use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- NFSv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- NFSv4: Fix another bug in the close/open_downgrade code (git-fixes).
- NFSv4: Fix problems with close in the presence of a delegation (git-fixes).
- NFSv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- SUNRPC: Fix a memory leak in the backchannel code (git-fixes).
- Staging: vt6655-6: potential NULL dereference in hostap_disable_hostapd() (bsc#1045479).
- USB: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- USB: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- USB: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- USB: iowarrior: fix NULL-deref in write (bsc#1037359).
- USB: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- USB: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- USB: serial: ark3116: fix register-accessor error handling (git-fixes).
- USB: serial: ch341: fix open error handling (bsc#1037441).
- USB: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- USB: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- USB: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- USB: serial: io_ti: fix information leak in completion handler (git-fixes).
- USB: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- USB: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- USB: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- USB: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- USB: usbip: fix nonconforming hub descriptor (bsc#1047487).
- USB: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- USB: usbtmc: Change magic number to constant (bsc#1036288).
- USB: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- USB: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- USB: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- USB: usbtmc: add missing endpoint sanity check (bsc#1036288).
- USB: usbtmc: fix DMA on stack (bsc#1036288).
- USB: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- USB: usbtmc: fix probe error path (bsc#1036288).
- USB: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- USB: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- Use make --output-sync feature when available (bsc#1012422).
- Xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- blacklist b50a6c584bb4 powerpc/perf: Clear MMCR2 when enabling PMU (bsc#1035721). 
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: Blacklist 847fa1a6d3d0 ('ftrace/x86_32: Set ftrace_stub to weak to prevent gcc from using short jumps to it') The released kernels are not build with a gas new enough to optimize the jmps so that this patch would be required. (bsc#1051478)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- cifs: do not compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975). backporting upstream commit 2f2591a34db6c9361faa316c91a6e320cb4e6aee
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- dentry name snapshots (bsc#1049483).
- devres: fix a for loop bounds check (git-fixes).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216)
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport-&gt;dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fuse: add missing FR_FORCE (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- initial cr0 bits (bnc#1036056, LTC#153612).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jsm: add support for additional Neo cards (bsc#1045615).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush -&gt;event_work before stopping array (git-fixes).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- powerpc/ibmebus: Fix device reference leaks in sysfs interface (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/ibmebus: Fix further device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (bsc#1032471).
- powerpc/mm/slice: Update the function prototype (bsc#1032471).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (bsc#1032471).
- powerpc/pci/rpadlpar: Fix device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Drop support for pre-POWER4 cpus (bsc#1032471).
- powerpc: Remove STAB code (bsc#1032471).
- random32: fix off-by-one in seeding requirement (git-fixes).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev-&gt;stime underflow (bnc#938352).
- sched: Do not account bogus utime (bnc#938352).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of -&gt;host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- sfc: do not device_attach if a reset is pending (bsc#909618).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression greater than 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000365">SUSE bug 1000365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000380">SUSE bug 1000380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029140">SUSE bug 1029140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030814">SUSE bug 1030814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035721">SUSE bug 1035721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035777">SUSE bug 1035777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036056">SUSE bug 1036056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036288">SUSE bug 1036288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037191">SUSE bug 1037191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037193">SUSE bug 1037193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037227">SUSE bug 1037227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037232">SUSE bug 1037232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037233">SUSE bug 1037233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037356">SUSE bug 1037356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037358">SUSE bug 1037358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037359">SUSE bug 1037359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039258">SUSE bug 1039258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041762">SUSE bug 1041762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041975">SUSE bug 1041975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042045">SUSE bug 1042045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042615">SUSE bug 1042615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042633">SUSE bug 1042633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042687">SUSE bug 1042687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042832">SUSE bug 1042832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044216">SUSE bug 1044216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044230">SUSE bug 1044230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044882">SUSE bug 1044882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044913">SUSE bug 1044913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045356">SUSE bug 1045356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045525">SUSE bug 1045525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045547">SUSE bug 1045547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045615">SUSE bug 1045615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046192">SUSE bug 1046192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046715">SUSE bug 1046715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047053">SUSE bug 1047053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049688">SUSE bug 1049688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050154">SUSE bug 1050154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051515">SUSE bug 1051515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051770">SUSE bug 1051770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055680">SUSE bug 1055680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792863">SUSE bug 792863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938352">SUSE bug 938352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-10277/">CVE-2016-10277</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569456" comment="cluster-network-kmp-rt-1.4_3.0.101_rt130_68-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569457" comment="cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_68-2.32.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569458" comment="drbd-kmp-rt-8.4.4_3.0.101_rt130_68-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569459" comment="drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_68-0.27.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569460" comment="gfs2-kmp-rt-2_3.0.101_rt130_68-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569461" comment="gfs2-kmp-rt_trace-2_3.0.101_rt130_68-0.24.2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569462" comment="ocfs2-kmp-rt-1.6_3.0.101_rt130_68-0.28.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569463" comment="ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_68-0.28.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38532" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1032084" ref_url="https://bugzilla.suse.com/1032084" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065999" ref_url="https://bugzilla.suse.com/1065999" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1067912" ref_url="https://bugzilla.suse.com/1067912" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1081358" ref_url="https://bugzilla.suse.com/1081358" source="BUGZILLA"/>
		<reference ref_id="1082091" ref_url="https://bugzilla.suse.com/1082091" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083275" ref_url="https://bugzilla.suse.com/1083275" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085113" ref_url="https://bugzilla.suse.com/1085113" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1085513" ref_url="https://bugzilla.suse.com/1085513" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089665" ref_url="https://bugzilla.suse.com/1089665" source="BUGZILLA"/>
		<reference ref_id="1089668" ref_url="https://bugzilla.suse.com/1089668" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="951638" ref_url="https://bugzilla.suse.com/951638" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-10124: The kill_something_info function in kernel/signal.c might
  have allowed local users to cause a denial of service via an INT_MIN argument
  (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed
  local users to cause a denial of service by triggering an attempted use of the
  -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in
  drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of
  service (memory consumption) via many read accesses to files in the
  /sys/class/sas_phy directory, as demonstrated by the
  /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-7566: Buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl
  write operation to /dev/snd/seq by a local user potentially allowing for code
  execution (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in
  the ALSA subsystem allowed attackers to gain privileges via unspecified vectors
  (bnc#1088260 1088268).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel
  function could have beenexploited by malicious NCPFS servers to crash the
  kernel or execute code (bnc#1086162).
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the video
  driver (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow
  local users to cause a denial of service (BUG) by leveraging a race condition
  with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
  kernel memory addresses. Successful exploitation requires that a USB device is
  attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local
  users to cause a denial of service (infinite loop) by triggering use of
  MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in
  drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of
  service (improper error handling and system crash) or possibly have unspecified
  other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c allowed attackers
  to cause a denial of service (integer overflow) or possibly have unspecified
  other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function
  (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service
  (NULL pointer dereference) via a specially crafted USB over IP packet
  (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed
  physically proximate attackers to obtain sensitive information from kernel
  memory or cause a denial of service (out-of-bounds read) by connecting a
  device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c
  attempted to support a FRAGLIST feature without proper memory allocation, which
  allowed guest OS users to cause a denial of service (buffer overflow and memory
  corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in
  block/bio.c did unbalanced refcounting when a SCSI I/O vector had small
  consecutive buffers belonging to the same page. The bio_add_pc_page function
  merged them into one, but the page reference was never dropped. This caused a
  memory leak and possible system lockup (exploitable against the host OS by a
  guest OS user, if a SCSI disk is passed through to a virtual machine) due to an
  out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c)
  allowed attackers to cause a denial of service (out-of-bounds read) via a
  specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function
  (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed
  attackers to cause a denial of service (arbitrary memory allocation) via a
  specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.
- KABI: x86/kaiser: properly align trampoline stack.
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).
- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)
- Subject: af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).
- blacklist.conf: blacklisted 7edaeb6841df ('kernel/watchdog: Prevent false positives with turbo modes') (bnc#1063516)
- blacklist.conf: blacklisted 9fbc1f635fd0bd28cb32550211bf095753ac637a (bnc#1089665)
- blacklist.conf: blacklisted ba4877b9ca51f80b5d30f304a46762f0509e1635 (bnc#1089668)
- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).
- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).
- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- media: cpia2: Fix a couple off by one bugs (bsc#1050431).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).
- posix-timers: Protect posix clock array access against speculation (bnc#1081358).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bnc#1032084).
- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084).
- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084).
- powerpc/fadump: use 'fadump_reserve_mem=' when specified (bnc#1032084).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).
- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).
- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xen/x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032084">SUSE bug 1032084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065999">SUSE bug 1065999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081358">SUSE bug 1081358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082091">SUSE bug 1082091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083275">SUSE bug 1083275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085113">SUSE bug 1085113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085513">SUSE bug 1085513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089665">SUSE bug 1089665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089668">SUSE bug 1089668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569464" comment="kernel-rt-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569465" comment="kernel-rt-base-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569466" comment="kernel-rt-devel-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569467" comment="kernel-rt_trace-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569468" comment="kernel-rt_trace-base-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569469" comment="kernel-rt_trace-devel-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569470" comment="kernel-source-rt-3.0.101.rt130-69.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569471" comment="kernel-syms-rt-3.0.101.rt130-69.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38533" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="912738" ref_url="https://bugzilla.suse.com/912738" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="933782" ref_url="https://bugzilla.suse.com/933782" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951815" ref_url="https://bugzilla.suse.com/951815" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955837" ref_url="https://bugzilla.suse.com/955837" source="BUGZILLA"/>
		<reference ref_id="955925" ref_url="https://bugzilla.suse.com/955925" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959649" ref_url="https://bugzilla.suse.com/959649" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963561" ref_url="https://bugzilla.suse.com/963561" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964818" ref_url="https://bugzilla.suse.com/964818" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966137" ref_url="https://bugzilla.suse.com/966137" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="969571" ref_url="https://bugzilla.suse.com/969571" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320200)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of service
  or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
  Linux kernel did not verify an address length, which allowed local users
  to obtain sensitive information from kernel memory and bypass the KASLR
  protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in
  the umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in
  ALSA that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
  CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
  handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
  bsc#968012, bsc#968013).

The following non-security bugs were fixed:
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- alsa: hda - Add one more node in the EAPD supporting candidate list (bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658 fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#961658 fate#320200).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ec2: Update kabi files and start tracking ec2
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. (bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry (bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too (bsc#951815).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also address bsc#966094).
- rt: v3.0-rt relevant @stable-rt patches from v3.2-rt rt111 update
- s390/cio: collect format 1 channel-path description data (bnc#958000, LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000, LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000, LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658 fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support (bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed (XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent (bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658 fate#320200).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658 fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658 fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request (bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of indirect segments (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658 fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path (bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658 fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658 fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend (bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658 fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658 fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen: consolidate and simplify struct xenbus_driver instantiation (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658 fate#320200).
- xen: Update Xen config files (enable upstream block frontend).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Skip dirty pages in -&gt;releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-19"/>
	<updated date="2016-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912738">SUSE bug 912738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933782">SUSE bug 933782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951815">SUSE bug 951815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955925">SUSE bug 955925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959649">SUSE bug 959649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963561">SUSE bug 963561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964818">SUSE bug 964818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966137">SUSE bug 966137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969571">SUSE bug 969571</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569472" comment="kernel-rt-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569473" comment="kernel-rt-base-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569474" comment="kernel-rt-devel-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569475" comment="kernel-rt_trace-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569476" comment="kernel-rt_trace-base-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569477" comment="kernel-rt_trace-devel-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569478" comment="kernel-source-rt-3.0.101.rt130-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569479" comment="kernel-syms-rt-3.0.101.rt130-51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38534" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1059174" ref_url="https://bugzilla.suse.com/1059174" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069508" ref_url="https://bugzilla.suse.com/1069508" source="BUGZILLA"/>
		<reference ref_id="1070623" ref_url="https://bugzilla.suse.com/1070623" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074880" ref_url="https://bugzilla.suse.com/1074880" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076437" ref_url="https://bugzilla.suse.com/1076437" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077191" ref_url="https://bugzilla.suse.com/1077191" source="BUGZILLA"/>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077487" ref_url="https://bugzilla.suse.com/1077487" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078875" ref_url="https://bugzilla.suse.com/1078875" source="BUGZILLA"/>
		<reference ref_id="1079917" ref_url="https://bugzilla.suse.com/1079917" source="BUGZILLA"/>
		<reference ref_id="1080133" ref_url="https://bugzilla.suse.com/1080133" source="BUGZILLA"/>
		<reference ref_id="1080359" ref_url="https://bugzilla.suse.com/1080359" source="BUGZILLA"/>
		<reference ref_id="1080363" ref_url="https://bugzilla.suse.com/1080363" source="BUGZILLA"/>
		<reference ref_id="1080372" ref_url="https://bugzilla.suse.com/1080372" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080685" ref_url="https://bugzilla.suse.com/1080685" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building
  the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
  did not validate a value that is used during DMA page allocation, leading
  to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
  function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
  net/rds/rdma.c mishandled cases where page pinning fails or an invalid
  address is supplied, leading to an rds_atomic_free_op NULL pointer
  dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in
  net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
  to cause a denial of service (use-after-free and memory corruption)
  or possibly have unspecified other impact by leveraging the presence of
  xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's
  assigned to guests to send ethernet flow control pause frames via the
  PF. (bnc#1077355).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
  attackers to obtain potentially sensitive information from kernel
  memory, aka a write_mmio stack-based out-of-bounds read, related to
  arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream
  kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
  existed in the sound system, this can lead to a deadlock and denial of
  service condition (bnc#1076017).

The following non-security bugs were fixed:

- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache  (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,  bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags &amp; wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,  bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca  (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the  sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059174">SUSE bug 1059174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069508">SUSE bug 1069508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070623">SUSE bug 1070623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074880">SUSE bug 1074880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076437">SUSE bug 1076437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077191">SUSE bug 1077191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077487">SUSE bug 1077487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078875">SUSE bug 1078875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079917">SUSE bug 1079917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080133">SUSE bug 1080133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080359">SUSE bug 1080359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080363">SUSE bug 1080363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080372">SUSE bug 1080372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080685">SUSE bug 1080685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569480" comment="cluster-network-kmp-rt-1.4_3.0.101_rt130_69.14-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569481" comment="cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.14-2.32.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569482" comment="drbd-kmp-rt-8.4.4_3.0.101_rt130_69.14-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569483" comment="drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.14-0.27.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569484" comment="gfs2-kmp-rt-2_3.0.101_rt130_69.14-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569485" comment="gfs2-kmp-rt_trace-2_3.0.101_rt130_69.14-0.24.4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569486" comment="ocfs2-kmp-rt-1.6_3.0.101_rt130_69.14-0.28.5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569487" comment="ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.14-0.28.5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38535" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031572" ref_url="https://bugzilla.suse.com/1031572" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1086695" ref_url="https://bugzilla.suse.com/1086695" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1114440" ref_url="https://bugzilla.suse.com/1114440" source="BUGZILLA"/>
		<reference ref_id="1114672" ref_url="https://bugzilla.suse.com/1114672" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1115827" ref_url="https://bugzilla.suse.com/1115827" source="BUGZILLA"/>
		<reference ref_id="1115828" ref_url="https://bugzilla.suse.com/1115828" source="BUGZILLA"/>
		<reference ref_id="1115829" ref_url="https://bugzilla.suse.com/1115829" source="BUGZILLA"/>
		<reference ref_id="1115830" ref_url="https://bugzilla.suse.com/1115830" source="BUGZILLA"/>
		<reference ref_id="1115831" ref_url="https://bugzilla.suse.com/1115831" source="BUGZILLA"/>
		<reference ref_id="1115832" ref_url="https://bugzilla.suse.com/1115832" source="BUGZILLA"/>
		<reference ref_id="1115833" ref_url="https://bugzilla.suse.com/1115833" source="BUGZILLA"/>
		<reference ref_id="1115834" ref_url="https://bugzilla.suse.com/1115834" source="BUGZILLA"/>
		<reference ref_id="1115835" ref_url="https://bugzilla.suse.com/1115835" source="BUGZILLA"/>
		<reference ref_id="1115836" ref_url="https://bugzilla.suse.com/1115836" source="BUGZILLA"/>
		<reference ref_id="1115837" ref_url="https://bugzilla.suse.com/1115837" source="BUGZILLA"/>
		<reference ref_id="1115838" ref_url="https://bugzilla.suse.com/1115838" source="BUGZILLA"/>
		<reference ref_id="1115839" ref_url="https://bugzilla.suse.com/1115839" source="BUGZILLA"/>
		<reference ref_id="1115840" ref_url="https://bugzilla.suse.com/1115840" source="BUGZILLA"/>
		<reference ref_id="1115841" ref_url="https://bugzilla.suse.com/1115841" source="BUGZILLA"/>
		<reference ref_id="1115842" ref_url="https://bugzilla.suse.com/1115842" source="BUGZILLA"/>
		<reference ref_id="1115843" ref_url="https://bugzilla.suse.com/1115843" source="BUGZILLA"/>
		<reference ref_id="1115844" ref_url="https://bugzilla.suse.com/1115844" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117796" ref_url="https://bugzilla.suse.com/1117796" source="BUGZILLA"/>
		<reference ref_id="1117802" ref_url="https://bugzilla.suse.com/1117802" source="BUGZILLA"/>
		<reference ref_id="1117805" ref_url="https://bugzilla.suse.com/1117805" source="BUGZILLA"/>
		<reference ref_id="1117806" ref_url="https://bugzilla.suse.com/1117806" source="BUGZILLA"/>
		<reference ref_id="1117943" ref_url="https://bugzilla.suse.com/1117943" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118760" ref_url="https://bugzilla.suse.com/1118760" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120056" ref_url="https://bugzilla.suse.com/1120056" source="BUGZILLA"/>
		<reference ref_id="1120077" ref_url="https://bugzilla.suse.com/1120077" source="BUGZILLA"/>
		<reference ref_id="1120086" ref_url="https://bugzilla.suse.com/1120086" source="BUGZILLA"/>
		<reference ref_id="1120093" ref_url="https://bugzilla.suse.com/1120093" source="BUGZILLA"/>
		<reference ref_id="1120094" ref_url="https://bugzilla.suse.com/1120094" source="BUGZILLA"/>
		<reference ref_id="1120105" ref_url="https://bugzilla.suse.com/1120105" source="BUGZILLA"/>
		<reference ref_id="1120107" ref_url="https://bugzilla.suse.com/1120107" source="BUGZILLA"/>
		<reference ref_id="1120109" ref_url="https://bugzilla.suse.com/1120109" source="BUGZILLA"/>
		<reference ref_id="1120217" ref_url="https://bugzilla.suse.com/1120217" source="BUGZILLA"/>
		<reference ref_id="1120223" ref_url="https://bugzilla.suse.com/1120223" source="BUGZILLA"/>
		<reference ref_id="1120226" ref_url="https://bugzilla.suse.com/1120226" source="BUGZILLA"/>
		<reference ref_id="1120336" ref_url="https://bugzilla.suse.com/1120336" source="BUGZILLA"/>
		<reference ref_id="1120347" ref_url="https://bugzilla.suse.com/1120347" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1121997" ref_url="https://bugzilla.suse.com/1121997" source="BUGZILLA"/>
		<reference ref_id="1122874" ref_url="https://bugzilla.suse.com/1122874" source="BUGZILLA"/>
		<reference ref_id="1123505" ref_url="https://bugzilla.suse.com/1123505" source="BUGZILLA"/>
		<reference ref_id="1123702" ref_url="https://bugzilla.suse.com/1123702" source="BUGZILLA"/>
		<reference ref_id="1123706" ref_url="https://bugzilla.suse.com/1123706" source="BUGZILLA"/>
		<reference ref_id="1124010" ref_url="https://bugzilla.suse.com/1124010" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125931" ref_url="https://bugzilla.suse.com/1125931" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="969471" ref_url="https://bugzilla.suse.com/969471" source="BUGZILLA"/>
		<reference ref_id="969473" ref_url="https://bugzilla.suse.com/969473" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741/" source="CVE"/>
		<reference ref_id="CVE-2017-18360" ref_url="https://www.suse.com/security/cve/CVE-2017-18360/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-18360: In change_port_settings in drivers/usb/serial/io_ti.c local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates (bnc#1123706).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2019-7222: A information leak in exception handling in KVM could be used to expose host memory to guests. (bnc#1124735).

The following non-security bugs were fixed:

- aacraid: Fix memory leak in aac_fib_map_free (bsc#1115827).
- arcmsr: upper 32 of dma address lost (bsc#1115828).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (bsc#1121997).
- block/swim: Fix array bounds check (Git-fix).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- dasd: fix deadlock in dasd_times_out (bnc#1117943, LTC#174111).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106886)
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106886)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106886)
- Fix kabi break cased by NFS: Cache state owners after files are closed (bsc#1031572).
- fork: record start_time late (bsc#1121872).
- fscache: Fix dead object requeue (bsc#1107371).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (git-fixes).
- fs-cache: Move fscache_report_unexpected_submission() to make it more available (bsc#1107371).
- fs-cache: When submitting an op, cancel it if the target object is dying (bsc#1107371).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (git-fixes).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: Fix oops at process_init_reply() (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: umount should wait for all requests (git-fixes).
- igb: do not unmap NULL hw_addr (bsc#969471 bsc#969473 ) (bsc#1123702).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382) (bsc#1123702).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- kvm: x86: Fix the duplicated failure path handling in vmx_init (bsc#1104367).
- lib: add 'on'/'off' support to strtobool (bsc#1125931).
- megaraid_sas: Fix probing cards without io port (bsc#1115829).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114440, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114440, LTC#172679).
- nfs: Cache state owners after files are closed (bsc#1031572).
- nfs: Do not drop CB requests with invalid principals (git-fixes).
- nfsv4.1: Fix a kfree() of uninitialised pointers in decode_cb_sequence_args (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- nfsv4: Keep dropped state owners on the LRU list for a while (bsc#1031572).
- nlm: Ensure callback code also checks that the files match (git-fixes).
- ocfs2: fix three small problems in the patch (bsc#1086695)
- omap2fb: Fix stack memory disclosure (bsc#1106886)
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- powerpc/fadump: handle crash memory ranges array index overflow (git-fixes).
- powerpc/fadump: Return error when fadump registration fails (git-fixes).
- powerpc/fadump: Unregister fadump on kexec down path (git-fixes).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- Revert 'NFS: Make close(2) asynchronous when closing NFS O_DIRECT files' (git-fixes).
- ring-buffer: Always reset iterator to reader page (bsc#1120107).
- ring-buffer: Fix first commit on sub-buffer having non-zero delta (bsc#1120077).
- ring-buffer: Fix infinite spin in reading buffer (bsc#1120107).
- ring-buffer: Have ring_buffer_iter_empty() return true when empty (bsc#1120107).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- ring-buffer: Up rb_iter_peek() loop count to 3 (bsc#1120105).
- rpm/modprobe-xen.conf: Add --ignore-install.
- s390: always save and restore all registers on context switch (git-fixes).
- s390/dasd: fix using offset into zero size array error (git-fixes).
- s390/decompressor: fix initrd corruption caused by bss clear (git-fixes).
- s390/qdio: do not release memory in qdio_setup_irq() (git-fixes).
- s390/qdio: reset old sbal_state flags (bnc#1114440, LTC#171525).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114440, LTC#172682).
- s390/qeth: fix length check in SNMP processing (bnc#1117943, LTC#173657).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114440, LTC#172682).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/qeth: remove outdated portname debug msg (bnc#1117943, LTC#172960).
- s390/qeth: sanitize strings in debug messages (bnc#1117943, LTC#172960).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: aacraid: Fix typo in blink status (bsc#1115830).
- scsi: aacraid: Reorder Adapter status check (bsc#1115830).
- scsi: aic94xx: fix an error code in aic94xx_init() (bsc#1115831).
- scsi: bfa: integer overflow in debugfs (bsc#1115832).
- scsi: esp_scsi: Track residual for PIO transfers (bsc#1115833).
- scsi: fas216: fix sense buffer initialization (bsc#1115834).
- scsi: libfc: Revert ' libfc: use offload EM instance again instead jumping to next EM' (bsc#1115835).
- scsi: libsas: fix ata xfer length (bsc#1115836).
- scsi: libsas: fix error when getting phy events (bsc#1115837).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1115838).
- scsi: megaraid_sas: Fix data integrity failure for JBOD (passthrough) devices (bsc#1115839).
- scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression (bsc#1115839).
- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1115840).
- scsi: qla2xxx: shutdown chip if reset fail (bsc#1115841).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1115842).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bsc#1115843).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (git-fixes).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1123505, LTC#174581).
- sg: fix dxferp in from_to case (bsc#1115844).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- svc: Avoid garbage replies when pc_func() returns rpc_drop_reply (git-fixes).
- svcrpc: do not leak contexts on PROC_DESTROY (git-fixes).
- tracepoints: Do not trace when cpu is offline (bsc#1120109).
- tracing: Add #undef to fix compile error (bsc#1120226).
- tracing: Allow events to have NULL strings (bsc#1120056).
- tracing: Do not add event files for modules that fail tracepoints (bsc#1120086).
- tracing: Fix check for cpu online when event is disabled (bsc#1120109).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing/kprobes: Allow to create probe with a module name starting with a digit (bsc#1120336).
- tracing: Move mutex to protect against resetting of seq data (bsc#1120217).
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1120347).
- usb: keyspan: fix overrun-error reporting (bsc#1114672).
- usb: keyspan: fix tty line-status reporting (bsc#1114672).
- usb: option: fix Cinterion AHxx enumeration (bsc#1114672).
- usb: serial: ark3116: fix open error handling (bsc#1114672).
- usb: serial: ch341: fix control-message error handling (bsc#1114672).
- usb: serial: ch341: fix initial modem-control state (bsc#1114672).
- usb: serial: ch341: fix modem-status handling (bsc#1114672).
- usb: serial: ch341: fix open and resume after B0 (bsc#1114672).
- usb: serial: ch341: fix resume after reset (bsc#1114672).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1114672).
- usb: serial: cyberjack: fix NULL-deref at open (bsc#1114672).
- usb: serial: fix tty-device error handling at probe (bsc#1114672).
- usb: serial: ftdi_sio: fix modem-status error handling (bsc#1114672).
- usb: serial: io_ti: fix another NULL-deref at open (bsc#1114672).
- usb: serial: io_ti: fix NULL-deref at open (bsc#1114672).
- usb: serial: keyspan_pda: verify endpoints at probe (bsc#1114672).
- usb: serial: kl5kusb105: abort on open exception path (bsc#1114672).
- usb: serial: kl5kusb105: fix open error path (bsc#1114672).
- usb: serial: kobil_sct: fix NULL-deref in write (bsc#1114672).
- usb: serial: mct_u232: fix modem-status error handling (bsc#1114672).
- usb: serial: omninet: fix NULL-derefs at open and disconnect.
- usb: serial: pl2303: fix NULL-deref at open (bsc#1114672).
- usb: serial: ti_usb_3410_5052: fix NULL-deref at open (bsc#1114672).
- vmcore: Remove 'weak' from function declarations (git-fixes).
- x86, kvm: Remove incorrect redundant assembly constraint (bnc#931850).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081, bnc#1104684).
- xen: kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen: x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen/x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/process: Re-export start_thread() (bsc#1110006).
- xen/x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen/x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- xen/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen/x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix the logspace waiting algorithm (bsc#1122874).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031572">SUSE bug 1031572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086695">SUSE bug 1086695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114440">SUSE bug 1114440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114672">SUSE bug 1114672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115827">SUSE bug 1115827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115828">SUSE bug 1115828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115829">SUSE bug 1115829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115830">SUSE bug 1115830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115831">SUSE bug 1115831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115832">SUSE bug 1115832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115833">SUSE bug 1115833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115834">SUSE bug 1115834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115835">SUSE bug 1115835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115836">SUSE bug 1115836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115837">SUSE bug 1115837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115838">SUSE bug 1115838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115839">SUSE bug 1115839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115840">SUSE bug 1115840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115841">SUSE bug 1115841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115842">SUSE bug 1115842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115843">SUSE bug 1115843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115844">SUSE bug 1115844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117796">SUSE bug 1117796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117802">SUSE bug 1117802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117805">SUSE bug 1117805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117806">SUSE bug 1117806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117943">SUSE bug 1117943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118760">SUSE bug 1118760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120056">SUSE bug 1120056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120077">SUSE bug 1120077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120086">SUSE bug 1120086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120093">SUSE bug 1120093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120094">SUSE bug 1120094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120105">SUSE bug 1120105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120107">SUSE bug 1120107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120109">SUSE bug 1120109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120217">SUSE bug 1120217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120223">SUSE bug 1120223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120226">SUSE bug 1120226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120336">SUSE bug 1120336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120347">SUSE bug 1120347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121997">SUSE bug 1121997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122874">SUSE bug 1122874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123505">SUSE bug 1123505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123702">SUSE bug 1123702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125931">SUSE bug 1125931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969471">SUSE bug 969471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969473">SUSE bug 969473</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18360/">CVE-2017-18360</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569488" comment="ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569489" comment="ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38536" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="898592" ref_url="https://bugzilla.suse.com/898592" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="946122" ref_url="https://bugzilla.suse.com/946122" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="959381" ref_url="https://bugzilla.suse.com/959381" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="963998" ref_url="https://bugzilla.suse.com/963998" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="965860" ref_url="https://bugzilla.suse.com/965860" source="BUGZILLA"/>
		<reference ref_id="965923" ref_url="https://bugzilla.suse.com/965923" source="BUGZILLA"/>
		<reference ref_id="967863" ref_url="https://bugzilla.suse.com/967863" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968566" ref_url="https://bugzilla.suse.com/968566" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="968687" ref_url="https://bugzilla.suse.com/968687" source="BUGZILLA"/>
		<reference ref_id="969356" ref_url="https://bugzilla.suse.com/969356" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971433" ref_url="https://bugzilla.suse.com/971433" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="972363" ref_url="https://bugzilla.suse.com/972363" source="BUGZILLA"/>
		<reference ref_id="973237" ref_url="https://bugzilla.suse.com/973237" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973556" ref_url="https://bugzilla.suse.com/973556" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1339" ref_url="https://www.suse.com/security/cve/CVE-2015-1339/" source="CVE"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2015-1339: Memory leak in the cuse_channel_release function in
  fs/fuse/cuse.c in the Linux kernel allowed local users to cause a denial
  of service (memory consumption) or possibly have unspecified other impact
  by opening /dev/cuse many times (bnc#969356).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c
  in the Linux kernel allowed physically proximate attackers to cause
  a denial of service (NULL pointer dereference and system crash) or
  possibly have unspecified other impact by inserting a USB device that
  lacks a bulk-out endpoint (bnc#961512).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an
  x86 system and using Linux 3.1.x through 4.3.x as the driver domain,
  allowed local guest administrators to hit BUG conditions and cause
  a denial of service (NULL pointer dereference and host OS crash) by
  leveraging a system with access to a passed-through MSI or MSI-X capable
  physical PCI device and a crafted sequence of XEN_PCI_OP_* operations,
  aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an
  x86 system and using Linux 3.1.x through 4.3.x as the driver domain,
  allowed local guest administrators to generate a continuous stream
  of WARN messages and cause a denial of service (disk consumption)
  by leveraging a system with access to a passed-through MSI or MSI-X
  capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka
  'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in
  the Linux kernel did not properly maintain a hub-interface data structure,
  which allowed physically proximate attackers to cause a denial of service
  (invalid memory access and system crash) or possibly have unspecified
  other impact by unplugging a USB hub device (bnc#968010).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390
  platforms mishandles the case of four page-table levels, which allowed
  local users to cause a denial of service (system crash) or possibly
  have unspecified other impact via a crafted application, related to
  arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h
  (bnc#970504).
- CVE-2016-2184: The create_fixed_stream_quirk function in
  sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed
  physically proximate attackers to cause a denial of service (NULL pointer
  dereference or double free, and system crash) via a crafted endpoints
  value in a USB device descriptor (bnc#971125).
- CVE-2016-2185: The ati_remote2_probe function in
  drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically
  proximate attackers to cause a denial of service (NULL pointer dereference
  and system crash) via a crafted endpoints value in a USB device descriptor
  (bnc#971124).
- CVE-2016-2186: The powermate_probe function in
  drivers/input/misc/powermate.c in the Linux kernel allowed physically
  proximate attackers to cause a denial of service (NULL pointer dereference
  and system crash) via a crafted endpoints value in a USB device descriptor
  (bnc#970958).
- CVE-2016-2188: The iowarrior_probe function in
  drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically
  proximate attackers to cause a denial of service (NULL pointer dereference
  and system crash) via a crafted endpoints value in a USB device descriptor
  (bnc#970956).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c
  in the Linux kernel allowed physically proximate attackers to cause a
  denial of service (NULL pointer dereference and system crash) or possibly
  have unspecified other impact by inserting a USB device that lacks a
  (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount
  of unread data in pipes, which allowed local users to cause a denial of
  service (memory consumption) by creating many pipes with non-default sizes
  (bnc#970948).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel
  allowed physically proximate attackers to cause a denial of service
  (NULL pointer dereference and system crash) via a USB device without
  both an interrupt-in and an interrupt-out endpoint descriptor, related
  to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c
  in the Linux kernel allowed physically proximate attackers to cause a
  denial of service (NULL pointer dereference and system crash) via a USB
  device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3139: The wacom_probe function in
  drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically
  proximate attackers to cause a denial of service (NULL pointer dereference
  and system crash) via a crafted endpoints value in a USB device descriptor
  (bnc#970909).
- CVE-2016-3140: The digi_port_init function in
  drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed
  physically proximate attackers to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted endpoints value in a USB
  device descriptor (bnc#970892).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles
  destruction of device objects, which allowed guest OS users to cause a
  denial of service (host OS networking outage) by arranging for a large
  number of IP addresses (bnc#971360).

The following non-security bugs were fixed:
- acpi / pci: Account for ARI in _PRT lookups (bsc#968566).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018).
- alsa: rawmidi: Fix race at copying &amp; updating the position (bsc#968018).
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix double port list deletion (bsc#968018).
- alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).
- alsa: seq: Fix race at closing in virmidi driver (bsc#968018).
- alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018).
- alsa: timer: Call notifier in the same spinlock (bsc#973378).
- alsa: timer: Code cleanup (bsc#968018).
- alsa: timer: Fix leftover link at closing (bsc#968018).
- alsa: timer: Fix link corruption due to double start or stop (bsc#968018).
- alsa: timer: Fix race between stop and interrupt (bsc#968018).
- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
- alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- alsa: timer: Sync timer deletion at closing the system timer (bsc#973378).
- alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- hpsa: fix issues with multilun devices (bsc#959381).
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- kabi: Import kabi files from kernel 3.0.101-71
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kabi: Restore kabi after lock-owner change (bnc#968141).
- llist: Add llist_next() (fate#316876).
- make vfree() safe to call from interrupt contexts (fate#316876).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433).
- net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433).
- net/core: __hw_addr_sync_one / _multiple broken (bsc#971433).
- net/core: __hw_addr_unsync_one 'from' address not marked synced (bsc#971433).
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfsd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237).
- nfsd: do not fail unchecked creates of non-special files (bsc#973237).
- nfs: use smaller allocations for 'struct idmap' (bsc#965923).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- pci: Move pci_ari_enabled() to global header (bsc#968566).
- pci: Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729).
- rdma/ucma: Fix AB-BA deadlock (bsc#963998).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- scsi: mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- usb: usbip: fix potential out-of-bounds write (bnc#975945).
- vmxnet3: set carrier state properly on probe (bsc#972363).
- vmxnet3: set netdev parant device before calling netdev_info (bsc#972363).
- xfrm: do not segment UFO packets (bsc#946122).
- xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-30"/>
	<updated date="2016-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/898592">SUSE bug 898592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946122">SUSE bug 946122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959381">SUSE bug 959381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963998">SUSE bug 963998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965860">SUSE bug 965860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965923">SUSE bug 965923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967863">SUSE bug 967863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968566">SUSE bug 968566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968687">SUSE bug 968687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969356">SUSE bug 969356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971433">SUSE bug 971433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972363">SUSE bug 972363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973237">SUSE bug 973237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973556">SUSE bug 973556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1339/">CVE-2015-1339</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569490" comment="kernel-rt-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569491" comment="kernel-rt-base-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569492" comment="kernel-rt-devel-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569493" comment="kernel-rt_trace-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569494" comment="kernel-rt_trace-base-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569495" comment="kernel-rt_trace-devel-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569496" comment="kernel-source-rt-3.0.101.rt130-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569497" comment="kernel-syms-rt-3.0.101.rt130-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38537" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1005651" ref_url="https://bugzilla.suse.com/1005651" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008850" ref_url="https://bugzilla.suse.com/1008850" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013800" ref_url="https://bugzilla.suse.com/1013800" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1016489" ref_url="https://bugzilla.suse.com/1016489" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1018074" ref_url="https://bugzilla.suse.com/1018074" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1021913" ref_url="https://bugzilla.suse.com/1021913" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023014" ref_url="https://bugzilla.suse.com/1023014" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1023163" ref_url="https://bugzilla.suse.com/1023163" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024788" ref_url="https://bugzilla.suse.com/1024788" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1025702" ref_url="https://bugzilla.suse.com/1025702" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026260" ref_url="https://bugzilla.suse.com/1026260" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1028372" ref_url="https://bugzilla.suse.com/1028372" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029140" ref_url="https://bugzilla.suse.com/1029140" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029770" ref_url="https://bugzilla.suse.com/1029770" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030814" ref_url="https://bugzilla.suse.com/1030814" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1033287" ref_url="https://bugzilla.suse.com/1033287" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1033771" ref_url="https://bugzilla.suse.com/1033771" source="BUGZILLA"/>
		<reference ref_id="1033794" ref_url="https://bugzilla.suse.com/1033794" source="BUGZILLA"/>
		<reference ref_id="1033804" ref_url="https://bugzilla.suse.com/1033804" source="BUGZILLA"/>
		<reference ref_id="1033816" ref_url="https://bugzilla.suse.com/1033816" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035777" ref_url="https://bugzilla.suse.com/1035777" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1036056" ref_url="https://bugzilla.suse.com/1036056" source="BUGZILLA"/>
		<reference ref_id="1036288" ref_url="https://bugzilla.suse.com/1036288" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037182" ref_url="https://bugzilla.suse.com/1037182" source="BUGZILLA"/>
		<reference ref_id="1037183" ref_url="https://bugzilla.suse.com/1037183" source="BUGZILLA"/>
		<reference ref_id="1037191" ref_url="https://bugzilla.suse.com/1037191" source="BUGZILLA"/>
		<reference ref_id="1037193" ref_url="https://bugzilla.suse.com/1037193" source="BUGZILLA"/>
		<reference ref_id="1037227" ref_url="https://bugzilla.suse.com/1037227" source="BUGZILLA"/>
		<reference ref_id="1037232" ref_url="https://bugzilla.suse.com/1037232" source="BUGZILLA"/>
		<reference ref_id="1037233" ref_url="https://bugzilla.suse.com/1037233" source="BUGZILLA"/>
		<reference ref_id="1037356" ref_url="https://bugzilla.suse.com/1037356" source="BUGZILLA"/>
		<reference ref_id="1037358" ref_url="https://bugzilla.suse.com/1037358" source="BUGZILLA"/>
		<reference ref_id="1037359" ref_url="https://bugzilla.suse.com/1037359" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039258" ref_url="https://bugzilla.suse.com/1039258" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041762" ref_url="https://bugzilla.suse.com/1041762" source="BUGZILLA"/>
		<reference ref_id="1041975" ref_url="https://bugzilla.suse.com/1041975" source="BUGZILLA"/>
		<reference ref_id="1042045" ref_url="https://bugzilla.suse.com/1042045" source="BUGZILLA"/>
		<reference ref_id="1042200" ref_url="https://bugzilla.suse.com/1042200" source="BUGZILLA"/>
		<reference ref_id="1042615" ref_url="https://bugzilla.suse.com/1042615" source="BUGZILLA"/>
		<reference ref_id="1042633" ref_url="https://bugzilla.suse.com/1042633" source="BUGZILLA"/>
		<reference ref_id="1042687" ref_url="https://bugzilla.suse.com/1042687" source="BUGZILLA"/>
		<reference ref_id="1042832" ref_url="https://bugzilla.suse.com/1042832" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044216" ref_url="https://bugzilla.suse.com/1044216" source="BUGZILLA"/>
		<reference ref_id="1044230" ref_url="https://bugzilla.suse.com/1044230" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044882" ref_url="https://bugzilla.suse.com/1044882" source="BUGZILLA"/>
		<reference ref_id="1044913" ref_url="https://bugzilla.suse.com/1044913" source="BUGZILLA"/>
		<reference ref_id="1044985" ref_url="https://bugzilla.suse.com/1044985" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045356" ref_url="https://bugzilla.suse.com/1045356" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045525" ref_url="https://bugzilla.suse.com/1045525" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1045547" ref_url="https://bugzilla.suse.com/1045547" source="BUGZILLA"/>
		<reference ref_id="1045615" ref_url="https://bugzilla.suse.com/1045615" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1046122" ref_url="https://bugzilla.suse.com/1046122" source="BUGZILLA"/>
		<reference ref_id="1046192" ref_url="https://bugzilla.suse.com/1046192" source="BUGZILLA"/>
		<reference ref_id="1046715" ref_url="https://bugzilla.suse.com/1046715" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047053" ref_url="https://bugzilla.suse.com/1047053" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049688" ref_url="https://bugzilla.suse.com/1049688" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050154" ref_url="https://bugzilla.suse.com/1050154" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051515" ref_url="https://bugzilla.suse.com/1051515" source="BUGZILLA"/>
		<reference ref_id="1051770" ref_url="https://bugzilla.suse.com/1051770" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="792863" ref_url="https://bugzilla.suse.com/792863" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="870618" ref_url="https://bugzilla.suse.com/870618" source="BUGZILLA"/>
		<reference ref_id="909486" ref_url="https://bugzilla.suse.com/909486" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="911105" ref_url="https://bugzilla.suse.com/911105" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="938352" ref_url="https://bugzilla.suse.com/938352" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="991651" ref_url="https://bugzilla.suse.com/991651" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bsc#1032340).
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bnc#979021).
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374 bsc#1008850).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used to bypass certain secure boot settings. (bnc#1039456).
- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be 'jumped' over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010) (bnc#1039348).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bsc#1049603).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565 bsc#1028372).
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024 bsc#1033287).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly manages lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850).
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52 (bnc#1030573).
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls (bnc#1031579).
- CVE-2017-7482: Fixed a potential overflow in the net/rxprc where a padded len isn't checked in ticket decode (bsc#1046107).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bsc#1049483).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182 bsc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1037183 bsc#1038981).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).

The following non-security bugs were fixed:

- 8250: use callbacks to access UART_DLL/UART_DLM.
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- alsa: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- alsa: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- alsa: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- alsa: hda - using uninitialized data (bsc#1045538).
- alsa: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- alsa: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: blacklisted 1fe89e1b6d27 (bnc#1046122)
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Don't clear SGID when inheriting ACLs (bsc#1030552).
- cifs: backport prepath matching fix (bsc#799133).
- cifs: don't compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975).
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- clocksource: Remove 'weak' from clocksource_default_clock() declaration (bnc#1013018).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (fate#314588,bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- devres: fix a for loop bounds check (git-fixes).
- dlm: backport 'fix lvb invalidation conditions' (bsc#1005651).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216, fate#323551)
- drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)
- edac, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr() (fate#313937).
- enic: set skb-&gt;hash type properly (bsc#911105 FATE#317501).
- ext2: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: fix mballoc breakage with 64k block size (bsc#1013018).
- ext4: fix stack memory corruption with 64k block size (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- ext4: reject inodes with negative size (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport-&gt;dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fuse: add missing FR_FORCE (bsc#1013018).
- fuse: initialize fc-&gt;release before calling it (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- i40e: avoid null pointer dereference (bsc#909486 FATE#317393).
- i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- ib/mlx4: Demote mcg message from warning to debug (bsc#919382).
- ib/mlx4: Fix ib device initialization error flow (bsc#919382).
- ib/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- ib/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- ib/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- ib/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- initial cr0 bits (bnc#1036056, LTC#153612).
- input: cm109 - validate number of endpoints before using them (bsc#1037193).
- input: hanwang - validate number of endpoints before using them (bsc#1037232).
- input: yealink - validate number of endpoints before using them (bsc#1037227).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- jsm: add support for additional Neo cards (bsc#1045615).
- kabi fix (bsc#1008893).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508).
- kabi:severeties: Add splice_write_to_file PASS This function is part of an xfs-specific fix which never went upstream and is not expected to have 3rdparty users other than xfs itself.
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- keys: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- kvm: kvm_io_bus_unregister_dev() should never fail.
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- lockd: use init_utsname for id encoding (bsc#1033804).
- lockd: use rpc client's cl_nodename for id encoding (bsc#1033804).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush -&gt;event_work before stopping array (git-fixes).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md/linear: shutup lockdep warnning (bsc#1018446).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- mm: do not collapse stack gap into THP (bnc#1039348)
- mm: enlarge stack guard gap (bnc#1039348).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).
- mm, mmap: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348, bnc#1045340, bnc#1045406).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- Move nr_cpus_allowed into a hole in struct_sched_entity instead of the one below task_struct.policy. RT fills the hole 29baa7478ba4 used, which will screw up kABI for RT instead of curing the space needed problem in sched_rt_entity caused by adding ff77e4685359. This leaves nr_cpus_alowed in an odd spot, but safely allows the RT entity specific data added by ff77e4685359 to reside where it belongs.. nr_cpus_allowed just moves from one odd spot to another.
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815 FATE#313898).
- nfs: Avoid getting confused by confused server (bsc#1045416).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- nfsd: Don't use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Fix another OPEN_DOWNGRADE bug (git-next).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfs: Fix size of NFSACL SETACL operations (git-fixes).
- nfs: Make nfs_readdir revalidate less often (bsc#1048232).
- nfs: tidy up nfs_show_mountd_netid (git-fixes).
- nfsv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- nfsv4: Fix another bug in the close/open_downgrade code (git-fixes).
- nfsv4: fix getacl head length estimation (git-fixes).
- nfsv4: Fix problems with close in the presence of a delegation (git-fixes).
- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).
- ocfs2: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).
- ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- ocfs2: null deref on allocation error (bsc#1013018).
- pci: Allow access to VPD attributes with size 0 (bsc#1018074).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: use pci_physfn() (bsc#999245).
- pci: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- posix-timers: Fix stack info leak in timer_create() (bnc#1013018).
- powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163).
- powerpc: Drop support for pre-POWER4 cpus (fate#322495, bsc#1032471).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138,fate#319026).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (fate#322495, bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (fate#322495, bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (fate#322495, bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (fate#322495, bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (fate#322495, bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (fate#322495, bsc#1032471).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (fate#322495, bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (fate#322495, bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (fate#322495, bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (fate#322495, bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (fate#322495, bsc#1032471).
- powerpc/mm/slice: Update the function prototype (fate#322495, bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (fate#322495, bsc#1032471).
- powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Remove STAB code (fate#322495, bsc#1032471).
- powerpc/vdso64: Use double word compare on pointers (bsc#1016489).
- raid1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1026260).
- random32: fix off-by-one in seeding requirement (git-fixes).
- rcu: Call out dangers of expedited RCU primitives (bsc#1008893).
- rcu: Direct algorithmic SRCU implementation (bsc#1008893).
- rcu: Flip -&gt;completed only once per SRCU grace period (bsc#1008893).
- rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893).
- rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893).
- rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893).
- reiserfs: Don't clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: don't preallocate blocks for extended attributes (bsc#990682).
- Remove patches causing regression (bsc#1043234)
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'kabi:severeties: Add splice_write_to_file PASS' This reverts commit 05ecf7ab16b2ea555fadd1ce17d8177394de88f2.
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- Revert 'xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).' I was baing my assumption of SLE11-SP4 needing this patch on an old kernel build (3.0.101-63). Re-testing with the latest one 3.0.101-94 shows that the issue is not present. Furthermore this one was causing some crashes. This reverts commit 16ceeac70f7286b6232861c3170ed32e39dcc68c.
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/kmsg: add missing kmsg descriptions (bnc#1025702, LTC#151573).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702, LTC#152144).
- s390/zcrypt: Introduce CEX6 toleration (FATE#321782, LTC#147505).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev-&gt;stime underflow (bnc#938352).
- sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched: Do not account bogus utime (bnc#938352).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of -&gt;host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- scsi: virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702, LTC#151317).
- scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702, LTC#151319).
- scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702, LTC#151365).
- scsi: zfcp: fix use-after-'free' in FC ingress path after TMF (bnc#1025702, LTC#151312).
- sfc: do not device_attach if a reset is pending (bsc#909618 FATE#317521).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- sunrpc: Clean up the slot table allocation (bsc#1013862).
- sunrpc: Fix a memory leak in the backchannel code (git-fixes).
- sunrpc: Initalise the struct xprt upon allocation (bsc#1013862).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- Update metadata for serial fixes (bsc#1013070)
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- usb: cdc-acm: fix broken runtime suspend (bsc#1033771).
- usb: cdc-acm: fix open and suspend race (bsc#1033771).
- usb: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).
- usb: cdc-acm: fix runtime PM for control messages (bsc#1033771).
- usb: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).
- usb: cdc-acm: fix shutdown and suspend race (bsc#1033771).
- usb: cdc-acm: fix write and resume race (bsc#1033771).
- usb: cdc-acm: fix write and suspend race (bsc#1033771).
- usb: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- usb: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- usb: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- usb: hub: Fix crash after failure to read BOS descriptor (FATE#317453).
- usb: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- usb: iowarrior: fix NULL-deref in write (bsc#1037359).
- usb: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- usb: serial: ark3116: fix register-accessor error handling (git-fixes).
- usb: serial: ch341: fix open error handling (bsc#1037441).
- usb: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- usb: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- usb: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- usb: serial: io_ti: fix information leak in completion handler (git-fixes).
- usb: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).
- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- usb: serial: mos7720: fix NULL-deref at open (bsc#1033816).
- usb: serial: mos7720: fix parallel probe (bsc#1033816).
- usb: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).
- usb: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).
- usb: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- usb: serial: mos7840: fix NULL-deref at open (bsc#1034026).
- usb: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- usb: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- usb: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usb: usbip: fix nonconforming hub descriptor (bsc#1047487).
- usb: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- usb: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- usb: usbtmc: add missing endpoint sanity check (bsc#1036288).
- usb: usbtmc: Change magic number to constant (bsc#1036288).
- usb: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- usb: usbtmc: fix DMA on stack (bsc#1036288).
- usb: usbtmc: fix probe error path (bsc#1036288).
- usb: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- usb: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- usb: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- usb: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).
- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available. SLE11 has make 3.81 so it is required to include make 4 in the kernel OBS projects to take advantege of this.
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression &gt;= 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: kill xfs_itruncate_start (bsc#1024788).
- xfs: Make xfs_icdinode-&gt;di_dmstate atomic_t (bsc#1024788).
- xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788).
- xfs: remove the i_size field in struct xfs_inode (bsc#1024788).
- xfs: remove xfs_itruncate_data (bsc#1024788).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: split xfs_itruncate_finish (bsc#1024788).
- xfs: split xfs_setattr (bsc#1024788).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005651">SUSE bug 1005651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013800">SUSE bug 1013800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016489">SUSE bug 1016489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018074">SUSE bug 1018074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021913">SUSE bug 1021913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023014">SUSE bug 1023014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023163">SUSE bug 1023163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024788">SUSE bug 1024788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025702">SUSE bug 1025702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026260">SUSE bug 1026260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029140">SUSE bug 1029140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029770">SUSE bug 1029770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030814">SUSE bug 1030814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033287">SUSE bug 1033287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033771">SUSE bug 1033771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033794">SUSE bug 1033794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033804">SUSE bug 1033804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033816">SUSE bug 1033816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035777">SUSE bug 1035777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036056">SUSE bug 1036056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036288">SUSE bug 1036288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037191">SUSE bug 1037191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037193">SUSE bug 1037193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037227">SUSE bug 1037227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037232">SUSE bug 1037232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037233">SUSE bug 1037233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037356">SUSE bug 1037356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037358">SUSE bug 1037358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037359">SUSE bug 1037359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039258">SUSE bug 1039258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041762">SUSE bug 1041762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041975">SUSE bug 1041975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042045">SUSE bug 1042045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042200">SUSE bug 1042200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042615">SUSE bug 1042615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042633">SUSE bug 1042633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042687">SUSE bug 1042687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042832">SUSE bug 1042832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044216">SUSE bug 1044216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044230">SUSE bug 1044230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044882">SUSE bug 1044882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044913">SUSE bug 1044913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044985">SUSE bug 1044985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045356">SUSE bug 1045356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045525">SUSE bug 1045525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045547">SUSE bug 1045547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045615">SUSE bug 1045615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046122">SUSE bug 1046122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046192">SUSE bug 1046192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046715">SUSE bug 1046715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047053">SUSE bug 1047053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049688">SUSE bug 1049688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050154">SUSE bug 1050154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051515">SUSE bug 1051515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051770">SUSE bug 1051770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792863">SUSE bug 792863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909486">SUSE bug 909486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911105">SUSE bug 911105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938352">SUSE bug 938352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569498" comment="kernel-rt-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569499" comment="kernel-rt-base-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569500" comment="kernel-rt-devel-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569501" comment="kernel-rt_trace-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569502" comment="kernel-rt_trace-base-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569503" comment="kernel-rt_trace-devel-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569504" comment="kernel-source-rt-3.0.101.rt130-69.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569505" comment="kernel-syms-rt-3.0.101.rt130-69.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38538" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source-rt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="891116" ref_url="https://bugzilla.suse.com/891116" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917968" ref_url="https://bugzilla.suse.com/917968" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="923431" ref_url="https://bugzilla.suse.com/923431" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="929076" ref_url="https://bugzilla.suse.com/929076" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935055" ref_url="https://bugzilla.suse.com/935055" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936095" ref_url="https://bugzilla.suse.com/936095" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936921" ref_url="https://bugzilla.suse.com/936921" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942404" ref_url="https://bugzilla.suse.com/942404" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943477" ref_url="https://bugzilla.suse.com/943477" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5697" ref_url="https://www.suse.com/security/cve/CVE-2015-5697/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to version
3.0.101.rt130-45.1 to receive various security and bugfixes.

Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
  VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
  system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 do not properly consider yielding a
  processor, which allowed remote attackers to cause a denial of service
  (system hang) via incorrect checksums within a UDP packet flood
  (bnc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
  values, which allowed remote attackers to cause a denial of service
  (EPOLLET epoll application read outage) via an incorrect checksum in a
  UDP packet, a different vulnerability than CVE-2015-5364 (bnc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
  bypass intended size restrictions and trigger read operations on
  additional memory locations by changing the handle_bytes value of a
  file handle during the execution of this function (bnc#915517).
* CVE-2015-4700: The bpf_int_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
  local users to cause a denial of service (system crash) by creating a
  packet filter and then loading crafted BPF instructions that trigger
  late convergence by the JIT compiler (bnc#935705).
* CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the
  Linux kernel before 4.1.6 does not initialize a certain bitmap data
  structure, which allows local users to obtain sensitive information
  from kernel memory via a GET_BITMAP_FILE ioctl call. (bnc#939994)

The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption
  (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption
  (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption
  (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption
  (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO
  (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in
  encoders (v2) (bsc#942938).
- DRM/i915: Get rid if the 'hotplug_supported_mask' in struct
  drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- CIFS: Fix missing crypto allocation (bnc#937402).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level
  (bsc#923002).
- SCSI: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- SCSI: kabi: allow iscsi disocvery session support (bsc#923002).
- SCSI: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- SCSI: fix scsi_error_handler vs. scsi_host_dev_release race
  (bnc#942204).
- SCSI: scsi_error: add missing case statements in
  scsi_decide_disposition() (bsc#920733).
- SCSI: scsi_transport_iscsi: Exporting new attrs for iscsi session and
  connection in sysfs (bsc#923002).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and
  nfs4_async_handle_error (bsc#939910).
- New patches: patches.fixes/hrtimer-Prevent-timer-interrupt-DoS.patch
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown()
  (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices
  (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (bnc#884333,
  bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- Set hostbyte status in scsi_check_sense() (bsc#920733).
- USB: xhci: Reset a halted endpoint immediately when we encounter a
  stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set
  (bnc#933721).
- apparmor: fix file_permission if profile is updated (bsc#917968).
- drm/cirrus: do not attempt to acquire a reservation while in an
  interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4)
  (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events
  (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2)
  (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt
  (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3)
  (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch
  platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities
  (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access
  (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually
  (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set
  (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD
  event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is
  false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler()
  (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets
  (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable
  (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting
  (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup
  (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock
  (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq
  (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler
  (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler
  (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/
  (bsc#942938).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm-&amp;gt;def_flags setting in
  load_elf_binary() (bnc#891116).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&amp;gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES
  (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned
  (bsc#927355).
- kabi: patches.fixes/mm-make-page-pfmemalloc-check-more-robust.patch
  (bnc#920016).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change
  (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477,
  LTC#129509).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs
  (bsc#923002).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM
  Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for
  zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM
  Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM
  Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address()
  (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM
  Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance,
  bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM
  Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs
  (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference
  (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support
  (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat
  (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to
  guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp()
  (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966,
  LTC#128595).
- sg_start_req(): make sure that there's not too many elements in iovec
  (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by
  st_open (bsc#936875).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub
  port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb
  (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver
  (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs
  (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info
  (bnc#942605).
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256
  (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as
  COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state
  (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921,
  LTC#126491).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925,
  LTC#126491).		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891116">SUSE bug 891116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917968">SUSE bug 917968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923431">SUSE bug 923431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929076">SUSE bug 929076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935055">SUSE bug 935055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936095">SUSE bug 936095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936921">SUSE bug 936921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942404">SUSE bug 942404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943477">SUSE bug 943477</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5697/">CVE-2015-5697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569506" comment="kernel-rt-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569507" comment="kernel-rt-base-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569508" comment="kernel-rt-devel-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569509" comment="kernel-rt_trace-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569510" comment="kernel-rt_trace-base-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569511" comment="kernel-rt_trace-devel-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569512" comment="kernel-source-rt-3.0.101.rt130-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569513" comment="kernel-syms-rt-3.0.101.rt130-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38539" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="921081" ref_url="https://bugzilla.suse.com/921081" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="930835" ref_url="https://bugzilla.suse.com/930835" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937969" ref_url="https://bugzilla.suse.com/937969" source="BUGZILLA"/>
		<reference ref_id="937970" ref_url="https://bugzilla.suse.com/937970" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939207" ref_url="https://bugzilla.suse.com/939207" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944677" ref_url="https://bugzilla.suse.com/944677" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946214" ref_url="https://bugzilla.suse.com/946214" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="950298" ref_url="https://bugzilla.suse.com/950298" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953799" ref_url="https://bugzilla.suse.com/953799" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="954950" ref_url="https://bugzilla.suse.com/954950" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7509: Mounting a prepared ext2 filesystem as ext4 could lead
  to a local denial of service (crash) (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
  the Linux kernel did not ensure that certain slot numbers are valid,
  which allowed local users to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
  (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS
  users to cause a denial of service (host OS panic or hang) by triggering
  many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS
  users to cause a denial of service (host OS panic or hang) by triggering
  many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c
  (bnc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before
  creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on
  the x86_64 platform mishandled IRET faults in processing NMIs that
  occurred during userspace execution, which might allow local users to
  gain privileges by triggering an NMI (bnc#937969 937970 938706 939207).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c
  in the Linux kernel allowed local users to cause a denial of service
  (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
  kernel did not validate attempted changes to the MTU value, which allowed
  context-dependent attackers to cause a denial of service (packet loss)
  via a value that is (1) smaller than the minimum compliant value or
  (2) larger than the MTU of an interface, as demonstrated by a Router
  Advertisement (RA) message that is not validated by a daemon, a different
  vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is
  limited to the NetworkManager product. (bnc#955354).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c
  in the Linux kernel allowed local users to cause a denial of service
  (NULL pointer dereference and system crash) or possibly have unspecified
  other impact by using a socket that was not properly bound (bnc#945825).

The following non-security bugs were fixed:
- af_xhci: avoid path quiesce of severed path in shutdown() (bnc#946214, LTC#131684).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- dm-snap: avoid deadock on s-&amp;gt;lock when a read is split (bsc#939826).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- drivers: hv: do not do hypercalls when hypercall_page is NULL.
- drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- drivers: hv: vmbus: add special crash handler (bnc#930770).
- drivers: hv: vmbus: add special kexec handler.
- drivers: hv: vmbus: Get rid of some unused definitions.
- drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- drivers: hv: vmbus: kill tasklets on module unload.
- drivers: hv: vmbus: prefer 'die' notification chain to 'panic'.
- drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- drivers: hv: vmbus: unregister panic notifier on module unload.
- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality).
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- Import SP4-RT GA kabi files
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: drop first packet to dead server (bsc#946078).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214, LTC#130124).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214, LTC#132100).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950, VM Functionality).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality).
- mm: remove GFP_THISNODE (bsc#954950, VM Functionality).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS (fate#304949)).
- Modified -rt patches: 343 of 434, noise elided.
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pci: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- pci: delay configuration of SRIOV capability (bnc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bnc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214, LTC#132707).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214, LTC#132706).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/pci: handle events for unused functions (bnc#946214, LTC#130628).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214, LTC#130628).
- s390/pci: improve state check when processing hotplug events (bnc#946214, LTC#130628).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- sg: fix read() error reporting (bsc#926774).
- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
- Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference.
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921081">SUSE bug 921081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930835">SUSE bug 930835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944677">SUSE bug 944677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946214">SUSE bug 946214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950298">SUSE bug 950298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953799">SUSE bug 953799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954950">SUSE bug 954950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569514" comment="kernel-rt-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569515" comment="kernel-rt-base-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569516" comment="kernel-rt-devel-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569517" comment="kernel-rt_trace-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569518" comment="kernel-rt_trace-base-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569519" comment="kernel-rt_trace-devel-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569520" comment="kernel-source-rt-3.0.101.rt130-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569521" comment="kernel-syms-rt-3.0.101.rt130-48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38540" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1036286" ref_url="https://bugzilla.suse.com/1036286" source="BUGZILLA"/>
		<reference ref_id="1044228" ref_url="https://bugzilla.suse.com/1044228" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1053317" ref_url="https://bugzilla.suse.com/1053317" source="BUGZILLA"/>
		<reference ref_id="1056230" ref_url="https://bugzilla.suse.com/1056230" source="BUGZILLA"/>
		<reference ref_id="1056504" ref_url="https://bugzilla.suse.com/1056504" source="BUGZILLA"/>
		<reference ref_id="1057796" ref_url="https://bugzilla.suse.com/1057796" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1060665" ref_url="https://bugzilla.suse.com/1060665" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061180" ref_url="https://bugzilla.suse.com/1061180" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062842" ref_url="https://bugzilla.suse.com/1062842" source="BUGZILLA"/>
		<reference ref_id="1063301" ref_url="https://bugzilla.suse.com/1063301" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-1000253: Setuid root PIE binaries could still be exploited to gain local root access due missing overlapping memory checking in the ELF loader in the Linux Kernel. (bnc#1059525).

The following non-security bugs were fixed:

- blacklist.conf: blacklist bfedb589252c ('mm: Add a user_ns owner to mm_struct and fix ptrace permission checks') (bnc#1044228)
- bnx2x: prevent crash when accessing PTP with interface down (bsc#1060665).
- drm/mgag200: Fixes for G200eH3. (bnc#1062842)
- fs/binfmt_elf.c:load_elf_binary(): return -EINVAL on zero-length mappings (bnc#1059525).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#909484 FATE#317397).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- lustre: Fix 'getcwd: Close race with d_move called by lustre' for -rt Convert added spin_lock/unlock() of -&gt;d_lock to seqlock variants.
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061180).
- netback: coalesce (guest) RX SKBs as needed (bsc#1056504).
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- powerpc: Fix the corrupt r3 error during MCE handling (bnc#1056230).
- powerpc: Make sure IPI handlers see data written by IPI senders (bnc#1056230).
- powerpc/xics: Harden xics hypervisor backend (bnc#1056230).
- s390/cpcmd,vmcp: avoid GFP_DMA allocations (bnc#1060245, LTC#159112).
- s390/qdio: avoid reschedule of outbound tasklet once killed (bnc#1063301, LTC#159885).
- s390/topology: alternative topology for topology-less machines (bnc#1060245, LTC#159177).
- s390/topology: enable / disable topology dynamically (bnc#1060245, LTC#159177).
- scsi: qla2xxx: Get mutex lock before checking optrom_state (bsc#1053317).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1060245, LTC#158494).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1060245, LTC#158494).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1060245, LTC#158493).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1060245, LTC#158494).
- Update config files. (bsc#1057796) The CONFIG_MODULE_SIG_UEFI should be enabled on x86_64/xen architecture because xen can work with shim on x86_64. Enabling the following kernel config to load certificate from db/mok: +CONFIG_MODULE_SIG_BLACKLIST=y +CONFIG_MODULE_SIG_UEFI=y
- virtio_scsi: do not call virtqueue_add_sgs(... GFP_NOIO) holding spinlock (bsc#1036286).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036286">SUSE bug 1036286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044228">SUSE bug 1044228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053317">SUSE bug 1053317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056230">SUSE bug 1056230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056504">SUSE bug 1056504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057796">SUSE bug 1057796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060665">SUSE bug 1060665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061180">SUSE bug 1061180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062842">SUSE bug 1062842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063301">SUSE bug 1063301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569522" comment="kernel-rt-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569523" comment="kernel-rt-base-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569524" comment="kernel-rt-devel-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569525" comment="kernel-rt_trace-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569526" comment="kernel-rt_trace-base-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569527" comment="kernel-rt_trace-devel-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569528" comment="kernel-source-rt-3.0.101.rt130-69.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569529" comment="kernel-syms-rt-3.0.101.rt130-69.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38541" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1024612" ref_url="https://bugzilla.suse.com/1024612" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045205" ref_url="https://bugzilla.suse.com/1045205" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051133" ref_url="https://bugzilla.suse.com/1051133" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1064803" ref_url="https://bugzilla.suse.com/1064803" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1066973" ref_url="https://bugzilla.suse.com/1066973" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1067816" ref_url="https://bugzilla.suse.com/1067816" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072457" ref_url="https://bugzilla.suse.com/1072457" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1074709" ref_url="https://bugzilla.suse.com/1074709" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 realtime kernel was updated to receive
various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.

- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  This is done with help of Linux Kernel fixes on the Intel/AMD x86_64
  architectures.
  On x86_64, this requires also updates of the CPU microcode packages,
  delivered in seperate updates.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.


The following security bugs were fixed:

- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer was fixed. (bnc#1072876).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- Add upstream RT preemption points to block/blk-iopoll.c and net/core/dev.c
- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1048185).
- alsa: core: Fix unexpected error at replacing user TLV (bsc#1045538).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1045538).
- alsa: timer: Add missing mutex lock for compat ioctls (bsc#1045538).
- asm alternatives: remove incorrect alignment notes.
- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).
- autofs: do not fail mount for transient error (bsc#1065180).
- autofs: fix careless error in recent commit (bsc#1065180).
- blacklist.conf: Add PCI ASPM fix to blacklist (bsc#1045538)
- blacklist.conf: Blacklisted commit 2b1be689f3aadcfe0 ('printk/console: Always disable boot consoles that use init memory before it is freed')
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- dm bufio: fix integer overflow when limiting maximum cache size (git-fixes).
- ecryptfs: fix dereference of NULL user_key_payload (bsc#1013018).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1013018).
- fnic: Use the local variable instead of I/O flag to acquire io_req_lock in fnic_queuecommand() to avoid deadloack (bsc#1067816).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1013018).
- fs-cache: fix dereference of NULL user_key_payload (git-fixes).
- fs: prevent speculative execution (bnc#1068032). [jkosina@suse.cz: hack around kABI; this should be done in separate  patch in patches.kabi eventually]
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1045538).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- lpfc: check for valid scsi cmnd in lpfc_scsi_cmd_iocb_cmpl() (bsc#1051133).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1050431).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- nfs: Fix ugly referral attributes (git-fixes).
- nfs: improve shinking of access cache (bsc#1012917).
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Correct instruction code for xxlor instruction (bsc#1064861, git-fixes).
- powerpc: Fix emulation of mfocrf in emulate_step() (bsc#1064861, git-fixes).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1064861, git-fixes).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888, git-fixes f2ab6219969f).
- powerpc-rfi-flush.patch: disable due to boot failure
- powerpc: Secure memory rfi flush (bsc#1068032).
- pti: unbreak EFI (bsc#1074709).
- ptrace: Add a new thread access check (bsc#1068032).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1072457, LTC#148203).
- Revert 'mac80211: accept key reinstall without changing anything'
- s390: add ppa to system call and program check path (bsc#1068032).
- s390/disassembler: correct disassembly lines alignment (bnc#1066973, LTC#161577).
- s390/disassembler: increase show_code buffer size (bnc#1066973, LTC#161577).
- s390: fix transactional execution control register handling (bnc#1072457, LTC#162116).
- s390: introduce CPU alternatives.
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier.
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- s390/spinlock: add ppa to system call path.
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1066973, LTC#160081).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- temporary fix (bsc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- usb: host: fix incorrect updating of offset (bsc#1047487).
- usb-serial: check for NULL private data in pl2303_suse_disconnect (bsc#1064803).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- uvcvideo: prevent speculative execution (bnc#1068032).
- video: udlfb: Fix read EDID timeout (bsc#1045538).
- watchdog: hpwdt: add support for iLO5 (bsc#1024612).
- watchdog/hpwdt: Check source of NMI (bsc#1024612).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
- zd1211rw: fix NULL-deref at probe (bsc#1045479).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024612">SUSE bug 1024612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045205">SUSE bug 1045205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051133">SUSE bug 1051133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064803">SUSE bug 1064803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066973">SUSE bug 1066973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067816">SUSE bug 1067816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072457">SUSE bug 1072457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074709">SUSE bug 1074709</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569530" comment="kernel-rt-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569531" comment="kernel-rt-base-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569532" comment="kernel-rt-devel-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569533" comment="kernel-rt_trace-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569534" comment="kernel-rt_trace-base-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569535" comment="kernel-rt_trace-devel-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569536" comment="kernel-source-rt-3.0.101.rt130-69.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569537" comment="kernel-syms-rt-3.0.101.rt130-69.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38542" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1059174" ref_url="https://bugzilla.suse.com/1059174" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069508" ref_url="https://bugzilla.suse.com/1069508" source="BUGZILLA"/>
		<reference ref_id="1070623" ref_url="https://bugzilla.suse.com/1070623" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074880" ref_url="https://bugzilla.suse.com/1074880" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076437" ref_url="https://bugzilla.suse.com/1076437" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077191" ref_url="https://bugzilla.suse.com/1077191" source="BUGZILLA"/>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077487" ref_url="https://bugzilla.suse.com/1077487" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078875" ref_url="https://bugzilla.suse.com/1078875" source="BUGZILLA"/>
		<reference ref_id="1079917" ref_url="https://bugzilla.suse.com/1079917" source="BUGZILLA"/>
		<reference ref_id="1080133" ref_url="https://bugzilla.suse.com/1080133" source="BUGZILLA"/>
		<reference ref_id="1080359" ref_url="https://bugzilla.suse.com/1080359" source="BUGZILLA"/>
		<reference ref_id="1080363" ref_url="https://bugzilla.suse.com/1080363" source="BUGZILLA"/>
		<reference ref_id="1080372" ref_url="https://bugzilla.suse.com/1080372" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080685" ref_url="https://bugzilla.suse.com/1080685" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver, i40e/i40evf driver and the DPDK, additionally multiple vendor NIC firmware is affected (bnc#1077355).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).

The following non-security bugs were fixed:

- Add proper NX hadnling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kabi/severities ignore Cell-specific symbols
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache  (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,  bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags &amp; wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,  bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca  (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the  sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- Update config files: enable CPU vulnerabilities reporting via sysfs
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059174">SUSE bug 1059174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069508">SUSE bug 1069508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070623">SUSE bug 1070623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074880">SUSE bug 1074880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076437">SUSE bug 1076437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077191">SUSE bug 1077191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077487">SUSE bug 1077487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078875">SUSE bug 1078875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079917">SUSE bug 1079917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080133">SUSE bug 1080133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080359">SUSE bug 1080359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080363">SUSE bug 1080363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080372">SUSE bug 1080372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080685">SUSE bug 1080685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569538" comment="kernel-rt-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569539" comment="kernel-rt-base-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569540" comment="kernel-rt-devel-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569541" comment="kernel-rt_trace-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569542" comment="kernel-rt_trace-base-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569543" comment="kernel-rt_trace-devel-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569544" comment="kernel-source-rt-3.0.101.rt130-69.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569545" comment="kernel-syms-rt-3.0.101.rt130-69.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38543" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1015828" ref_url="https://bugzilla.suse.com/1015828" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1093183" ref_url="https://bugzilla.suse.com/1093183" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097125" ref_url="https://bugzilla.suse.com/1097125" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1097562" ref_url="https://bugzilla.suse.com/1097562" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1099709" ref_url="https://bugzilla.suse.com/1099709" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1102087" ref_url="https://bugzilla.suse.com/1102087" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="1103909" ref_url="https://bugzilla.suse.com/1103909" source="BUGZILLA"/>
		<reference ref_id="1104365" ref_url="https://bugzilla.suse.com/1104365" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability was fixed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device lead to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: Linux kernel was vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS could be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- usb: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- usb: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- usb: kobil_sct: fix non-atomic allocation in write path (bsc#1015828).
- usb: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- usb: serial: io_edgeport: fix NULL-deref at open (bsc#1015828).
- usb: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).
- usb: visor: Match I330 phone more precisely (bsc#1047487).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable prot_none native mitigation (bnc#1104684)
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm: re-enable error handling (bsc#1103884)
- efivarfs: maintain the efivarfs interfaces when sysfs be created and removed (bsc#1097125).
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Handle Broadwell family processors (bsc#1093183).
- s390/qeth: fix IPA command submission race (bnc#1099709, LTC#169004).
- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1102087, LTC#168038).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1102087, LTC#168765).
- series.conf: Remove trailing whitespaces
- slab: introduce kmalloc_array() (bsc#909361).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).
- x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015828">SUSE bug 1015828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093183">SUSE bug 1093183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097125">SUSE bug 1097125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097562">SUSE bug 1097562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099709">SUSE bug 1099709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102087">SUSE bug 1102087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103909">SUSE bug 1103909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104365">SUSE bug 1104365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569546" comment="kernel-rt-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569547" comment="kernel-rt-base-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569548" comment="kernel-rt-devel-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569549" comment="kernel-rt_trace-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569550" comment="kernel-rt_trace-base-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569551" comment="kernel-rt_trace-devel-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569552" comment="kernel-source-rt-3.0.101.rt130-69.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569553" comment="kernel-syms-rt-3.0.101.rt130-69.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38544" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="732582" ref_url="https://bugzilla.suse.com/732582" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="843236" ref_url="https://bugzilla.suse.com/843236" source="BUGZILLA"/>
		<reference ref_id="909994" ref_url="https://bugzilla.suse.com/909994" source="BUGZILLA"/>
		<reference ref_id="911687" ref_url="https://bugzilla.suse.com/911687" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="934760" ref_url="https://bugzilla.suse.com/934760" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="976867" ref_url="https://bugzilla.suse.com/976867" source="BUGZILLA"/>
		<reference ref_id="977687" ref_url="https://bugzilla.suse.com/977687" source="BUGZILLA"/>
		<reference ref_id="979514" ref_url="https://bugzilla.suse.com/979514" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="982218" ref_url="https://bugzilla.suse.com/982218" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="983619" ref_url="https://bugzilla.suse.com/983619" source="BUGZILLA"/>
		<reference ref_id="984102" ref_url="https://bugzilla.suse.com/984102" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="984992" ref_url="https://bugzilla.suse.com/984992" source="BUGZILLA"/>
		<reference ref_id="985206" ref_url="https://bugzilla.suse.com/985206" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="987565" ref_url="https://bugzilla.suse.com/987565" source="BUGZILLA"/>
		<reference ref_id="988440" ref_url="https://bugzilla.suse.com/988440" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="989779" ref_url="https://bugzilla.suse.com/989779" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="991923" ref_url="https://bugzilla.suse.com/991923" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="993127" ref_url="https://bugzilla.suse.com/993127" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994436" ref_url="https://bugzilla.suse.com/994436" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="994926" ref_url="https://bugzilla.suse.com/994926" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996664" ref_url="https://bugzilla.suse.com/996664" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998399" ref_url="https://bugzilla.suse.com/998399" source="BUGZILLA"/>
		<reference ref_id="999584" ref_url="https://bugzilla.suse.com/999584" source="BUGZILLA"/>
		<reference ref_id="999600" ref_url="https://bugzilla.suse.com/999600" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

This feature was added:

- Support for the 2017 Intel Purley platform. 

The following security bugs were fixed:

- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)

The following non-security bugs were fixed:

- ahci: Order SATA device IDs for codename Lewisburg.
- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.
- ALSA: hda - Add Intel Lewisburg device IDs Audio.
- avoid dentry crash triggered by NFS (bsc#984194).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- fs/select: introduce SIZE_MAX (bsc#1000189).
- i2c: i801: add Intel Lewisburg device IDs.
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -&gt; 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- md: lockless I/O submission for RAID1 (bsc#982783).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Don't disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Don't write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- random32: add prandom_u32_max (bsc#989152).
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- s390/dasd: fix hanging device after clear subchannel (bnc#994436).
- sata: Adding Intel Lewisburg device IDs for SATA.
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs.  schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: don't deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732582">SUSE bug 732582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843236">SUSE bug 843236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909994">SUSE bug 909994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911687">SUSE bug 911687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934760">SUSE bug 934760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976867">SUSE bug 976867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977687">SUSE bug 977687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979514">SUSE bug 979514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982218">SUSE bug 982218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983619">SUSE bug 983619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984102">SUSE bug 984102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984992">SUSE bug 984992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985206">SUSE bug 985206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987565">SUSE bug 987565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988440">SUSE bug 988440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989779">SUSE bug 989779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991923">SUSE bug 991923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993127">SUSE bug 993127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994436">SUSE bug 994436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994926">SUSE bug 994926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996664">SUSE bug 996664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998399">SUSE bug 998399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999584">SUSE bug 999584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999600">SUSE bug 999600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569554" comment="kernel-rt-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569555" comment="kernel-rt-base-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569556" comment="kernel-rt-devel-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569557" comment="kernel-rt_trace-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569558" comment="kernel-rt_trace-base-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569559" comment="kernel-rt_trace-devel-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569560" comment="kernel-source-rt-3.0.101.rt130-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569561" comment="kernel-syms-rt-3.0.101.rt130-65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38545" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052351" ref_url="https://bugzilla.suse.com/1052351" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068054" ref_url="https://bugzilla.suse.com/1068054" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1080837" ref_url="https://bugzilla.suse.com/1080837" source="BUGZILLA"/>
		<reference ref_id="1083347" ref_url="https://bugzilla.suse.com/1083347" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1088343" ref_url="https://bugzilla.suse.com/1088343" source="BUGZILLA"/>
		<reference ref_id="1088997" ref_url="https://bugzilla.suse.com/1088997" source="BUGZILLA"/>
		<reference ref_id="1088998" ref_url="https://bugzilla.suse.com/1088998" source="BUGZILLA"/>
		<reference ref_id="1088999" ref_url="https://bugzilla.suse.com/1088999" source="BUGZILLA"/>
		<reference ref_id="1089000" ref_url="https://bugzilla.suse.com/1089000" source="BUGZILLA"/>
		<reference ref_id="1089001" ref_url="https://bugzilla.suse.com/1089001" source="BUGZILLA"/>
		<reference ref_id="1089002" ref_url="https://bugzilla.suse.com/1089002" source="BUGZILLA"/>
		<reference ref_id="1089003" ref_url="https://bugzilla.suse.com/1089003" source="BUGZILLA"/>
		<reference ref_id="1089004" ref_url="https://bugzilla.suse.com/1089004" source="BUGZILLA"/>
		<reference ref_id="1089005" ref_url="https://bugzilla.suse.com/1089005" source="BUGZILLA"/>
		<reference ref_id="1089006" ref_url="https://bugzilla.suse.com/1089006" source="BUGZILLA"/>
		<reference ref_id="1089007" ref_url="https://bugzilla.suse.com/1089007" source="BUGZILLA"/>
		<reference ref_id="1089008" ref_url="https://bugzilla.suse.com/1089008" source="BUGZILLA"/>
		<reference ref_id="1089010" ref_url="https://bugzilla.suse.com/1089010" source="BUGZILLA"/>
		<reference ref_id="1089011" ref_url="https://bugzilla.suse.com/1089011" source="BUGZILLA"/>
		<reference ref_id="1089012" ref_url="https://bugzilla.suse.com/1089012" source="BUGZILLA"/>
		<reference ref_id="1089013" ref_url="https://bugzilla.suse.com/1089013" source="BUGZILLA"/>
		<reference ref_id="1089016" ref_url="https://bugzilla.suse.com/1089016" source="BUGZILLA"/>
		<reference ref_id="1089192" ref_url="https://bugzilla.suse.com/1089192" source="BUGZILLA"/>
		<reference ref_id="1089199" ref_url="https://bugzilla.suse.com/1089199" source="BUGZILLA"/>
		<reference ref_id="1089200" ref_url="https://bugzilla.suse.com/1089200" source="BUGZILLA"/>
		<reference ref_id="1089201" ref_url="https://bugzilla.suse.com/1089201" source="BUGZILLA"/>
		<reference ref_id="1089202" ref_url="https://bugzilla.suse.com/1089202" source="BUGZILLA"/>
		<reference ref_id="1089203" ref_url="https://bugzilla.suse.com/1089203" source="BUGZILLA"/>
		<reference ref_id="1089204" ref_url="https://bugzilla.suse.com/1089204" source="BUGZILLA"/>
		<reference ref_id="1089205" ref_url="https://bugzilla.suse.com/1089205" source="BUGZILLA"/>
		<reference ref_id="1089206" ref_url="https://bugzilla.suse.com/1089206" source="BUGZILLA"/>
		<reference ref_id="1089207" ref_url="https://bugzilla.suse.com/1089207" source="BUGZILLA"/>
		<reference ref_id="1089208" ref_url="https://bugzilla.suse.com/1089208" source="BUGZILLA"/>
		<reference ref_id="1089209" ref_url="https://bugzilla.suse.com/1089209" source="BUGZILLA"/>
		<reference ref_id="1089210" ref_url="https://bugzilla.suse.com/1089210" source="BUGZILLA"/>
		<reference ref_id="1089211" ref_url="https://bugzilla.suse.com/1089211" source="BUGZILLA"/>
		<reference ref_id="1089212" ref_url="https://bugzilla.suse.com/1089212" source="BUGZILLA"/>
		<reference ref_id="1089213" ref_url="https://bugzilla.suse.com/1089213" source="BUGZILLA"/>
		<reference ref_id="1089214" ref_url="https://bugzilla.suse.com/1089214" source="BUGZILLA"/>
		<reference ref_id="1089215" ref_url="https://bugzilla.suse.com/1089215" source="BUGZILLA"/>
		<reference ref_id="1089216" ref_url="https://bugzilla.suse.com/1089216" source="BUGZILLA"/>
		<reference ref_id="1089217" ref_url="https://bugzilla.suse.com/1089217" source="BUGZILLA"/>
		<reference ref_id="1089218" ref_url="https://bugzilla.suse.com/1089218" source="BUGZILLA"/>
		<reference ref_id="1089219" ref_url="https://bugzilla.suse.com/1089219" source="BUGZILLA"/>
		<reference ref_id="1089220" ref_url="https://bugzilla.suse.com/1089220" source="BUGZILLA"/>
		<reference ref_id="1089221" ref_url="https://bugzilla.suse.com/1089221" source="BUGZILLA"/>
		<reference ref_id="1089222" ref_url="https://bugzilla.suse.com/1089222" source="BUGZILLA"/>
		<reference ref_id="1089223" ref_url="https://bugzilla.suse.com/1089223" source="BUGZILLA"/>
		<reference ref_id="1089224" ref_url="https://bugzilla.suse.com/1089224" source="BUGZILLA"/>
		<reference ref_id="1089225" ref_url="https://bugzilla.suse.com/1089225" source="BUGZILLA"/>
		<reference ref_id="1089226" ref_url="https://bugzilla.suse.com/1089226" source="BUGZILLA"/>
		<reference ref_id="1089227" ref_url="https://bugzilla.suse.com/1089227" source="BUGZILLA"/>
		<reference ref_id="1089228" ref_url="https://bugzilla.suse.com/1089228" source="BUGZILLA"/>
		<reference ref_id="1089229" ref_url="https://bugzilla.suse.com/1089229" source="BUGZILLA"/>
		<reference ref_id="1089230" ref_url="https://bugzilla.suse.com/1089230" source="BUGZILLA"/>
		<reference ref_id="1089231" ref_url="https://bugzilla.suse.com/1089231" source="BUGZILLA"/>
		<reference ref_id="1089232" ref_url="https://bugzilla.suse.com/1089232" source="BUGZILLA"/>
		<reference ref_id="1089233" ref_url="https://bugzilla.suse.com/1089233" source="BUGZILLA"/>
		<reference ref_id="1089234" ref_url="https://bugzilla.suse.com/1089234" source="BUGZILLA"/>
		<reference ref_id="1089235" ref_url="https://bugzilla.suse.com/1089235" source="BUGZILLA"/>
		<reference ref_id="1089236" ref_url="https://bugzilla.suse.com/1089236" source="BUGZILLA"/>
		<reference ref_id="1089237" ref_url="https://bugzilla.suse.com/1089237" source="BUGZILLA"/>
		<reference ref_id="1089238" ref_url="https://bugzilla.suse.com/1089238" source="BUGZILLA"/>
		<reference ref_id="1089239" ref_url="https://bugzilla.suse.com/1089239" source="BUGZILLA"/>
		<reference ref_id="1089240" ref_url="https://bugzilla.suse.com/1089240" source="BUGZILLA"/>
		<reference ref_id="1089241" ref_url="https://bugzilla.suse.com/1089241" source="BUGZILLA"/>
		<reference ref_id="1089386" ref_url="https://bugzilla.suse.com/1089386" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090607" ref_url="https://bugzilla.suse.com/1090607" source="BUGZILLA"/>
		<reference ref_id="1090630" ref_url="https://bugzilla.suse.com/1090630" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1091659" ref_url="https://bugzilla.suse.com/1091659" source="BUGZILLA"/>
		<reference ref_id="1091671" ref_url="https://bugzilla.suse.com/1091671" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1091815" ref_url="https://bugzilla.suse.com/1091815" source="BUGZILLA"/>
		<reference ref_id="1092372" ref_url="https://bugzilla.suse.com/1092372" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1093194" ref_url="https://bugzilla.suse.com/1093194" source="BUGZILLA"/>
		<reference ref_id="1093195" ref_url="https://bugzilla.suse.com/1093195" source="BUGZILLA"/>
		<reference ref_id="1093196" ref_url="https://bugzilla.suse.com/1093196" source="BUGZILLA"/>
		<reference ref_id="1093197" ref_url="https://bugzilla.suse.com/1093197" source="BUGZILLA"/>
		<reference ref_id="1093198" ref_url="https://bugzilla.suse.com/1093198" source="BUGZILLA"/>
		<reference ref_id="1093600" ref_url="https://bugzilla.suse.com/1093600" source="BUGZILLA"/>
		<reference ref_id="1093710" ref_url="https://bugzilla.suse.com/1093710" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094421" ref_url="https://bugzilla.suse.com/1094421" source="BUGZILLA"/>
		<reference ref_id="1094422" ref_url="https://bugzilla.suse.com/1094422" source="BUGZILLA"/>
		<reference ref_id="1094423" ref_url="https://bugzilla.suse.com/1094423" source="BUGZILLA"/>
		<reference ref_id="1094424" ref_url="https://bugzilla.suse.com/1094424" source="BUGZILLA"/>
		<reference ref_id="1094425" ref_url="https://bugzilla.suse.com/1094425" source="BUGZILLA"/>
		<reference ref_id="1094436" ref_url="https://bugzilla.suse.com/1094436" source="BUGZILLA"/>
		<reference ref_id="1094437" ref_url="https://bugzilla.suse.com/1094437" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096746" ref_url="https://bugzilla.suse.com/1096746" source="BUGZILLA"/>
		<reference ref_id="1097443" ref_url="https://bugzilla.suse.com/1097443" source="BUGZILLA"/>
		<reference ref_id="1097445" ref_url="https://bugzilla.suse.com/1097445" source="BUGZILLA"/>
		<reference ref_id="1097948" ref_url="https://bugzilla.suse.com/1097948" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This new feature was added:

- Btrfs: Remove empty block groups in the background

The following security bugs were fixed:

- : Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)
- : Systems with microprocessors utilizing speculative execution
  and speculative execution of memory reads the addresses of all prior memory
  writes are known may have allowed unauthorized disclosure of information to an
  attacker with local user access via a side-channel analysis, aka Speculative
  Store Bypass (SSB), Variant 4 (bsc#1087082)
- : Prevent vulnerability in modify_user_hw_breakpoint() that
  could have caused a crash and possibly memory corruption (bsc#1089895)
- : The do_get_mempolicy function allowed local users to cause a
  denial of service (use-after-free) or possibly have unspecified other impact
  via crafted system calls (bnc#1091755).

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Avoid quadratic search when freeing delegations (bsc#1084760).
- Btrfs: Avoid trucating page or punching hole in a already existed hole (bsc#1088998).
- Btrfs: Avoid truncate tailing page if fallocate range does not exceed inode size (bsc#1094424).
- Btrfs: Fix lost-data-profile caused by auto removing bg
- Btrfs: Fix misuse of chunk mutex
- Btrfs: Fix out-of-space bug (bsc#1089231).
- Btrfs: Set relative data on clear btrfs_block_group_cache-&gt;pinned
- Btrfs: Use ref_cnt for set_block_group_ro() (bsc#1089239).
- Btrfs: add alloc_fs_devices and switch to it (bsc#1089205).
- Btrfs: add btrfs_alloc_device and switch to it (bsc#1089204).
- Btrfs: add missing discards when unpinning extents with -o discard
- Btrfs: add missing inode update when punching hole (bsc#1089006).
- Btrfs: add support for asserts (bsc#1089207).
- Btrfs: avoid syncing log in the fast fsync path when not necessary (bsc#1089010).
- Btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries
- Btrfs: check pending chunks when shrinking fs to avoid corruption (bsc#1089235).
- Btrfs: cleanup backref search commit root flag stuff (bsc#1089200).
- Btrfs: do not leak transaction in btrfs_sync_file() (bsc#1089210).
- Btrfs: do not mix the ordered extents of all files together during logging the inodes (bsc#1089214).
- Btrfs: do not remove extents and xattrs when logging new names (bsc#1089005).
- Btrfs: eliminate races in worker stopping code (bsc#1089211).
- Btrfs: ensure deletion from pinned_chunks list is protected
- Btrfs: fix -ENOSPC on block group removal
- Btrfs: fix -ENOSPC when finishing block group creation
- Btrfs: fix NULL pointer crash when running balance and scrub concurrently (bsc#1089220).
- Btrfs: fix chunk allocation regression leading to transaction abort (bsc#1089236).
- Btrfs: fix crash caused by block group removal
- Btrfs: fix data loss in the fast fsync path (bsc#1089007).
- Btrfs: fix deadlock caused by fsync when logging directory entries (bsc#1093194).
- Btrfs: fix directory inconsistency after fsync log replay (bsc#1089001).
- Btrfs: fix directory recovery from fsync log (bsc#1088999).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#1093195).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#1093196).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#1089241).
- Btrfs: fix find_free_dev_extent() malfunction in case device tree has hole (bsc#1089232).
- Btrfs: fix fitrim discarding device area reserved for boot loader's use
- Btrfs: fix freeing used extent after removing empty block group
- Btrfs: fix freeing used extents after removing empty block group
- Btrfs: fix fs mapping extent map leak (bsc#1089229).
- Btrfs: fix fsync data loss after a ranged fsync (bsc#1089221).
- Btrfs: fix fsync data loss after adding hard link to inode (bsc#1089004).
- Btrfs: fix fsync data loss after append write (bsc#1089238).
- Btrfs: fix fsync log replay for inodes with a mix of regular refs and extrefs (bsc#1089003).
- Btrfs: fix fsync race leading to invalid data after log replay (bsc#1089000).
- Btrfs: fix fsync when extend references are added to an inode (bsc#1089002).
- Btrfs: fix fsync xattr loss in the fast fsync path (bsc#1094423).
- Btrfs: fix invalid extent maps due to hole punching (bsc#1094425).
- Btrfs: fix kernel oops while reading compressed data (bsc#1089192).
- Btrfs: fix log replay failure after linking special file and fsync (bsc#1089016).
- Btrfs: fix memory leak after block remove + trimming
- Btrfs: fix metadata inconsistencies after directory fsync (bsc#1093197).
- Btrfs: fix race between balance and unused block group deletion (bsc#1089237).
- Btrfs: fix race between fs trimming and block group remove/allocation
- Btrfs: fix race between scrub and block group deletion
- Btrfs: fix race between transaction commit and empty block group removal 
- Btrfs: fix race conditions in BTRFS_IOC_FS_INFO ioctl (bsc#1089206).
- Btrfs: fix racy system chunk allocation when setting block group ro (bsc#1089233).
- Btrfs: fix regression in raid level conversion (bsc#1089234).
- Btrfs: fix skipped error handle when log sync failed (bsc#1089217).
- Btrfs: fix stale dir entries after removing a link and fsync (bsc#1089011).
- Btrfs: fix the number of transaction units needed to remove a block group
- Btrfs: fix the skipped transaction commit during the file sync (bsc#1089216).
- Btrfs: fix uninitialized variable warning in __extent_writepage Fixes fs/btrfs/extent_io.c:2861: warning: 'ret' may be used uninitialized in this function
- Btrfs: fix unprotected alloc list insertion during the finishing procedure of replace (bsc#1089215).
- Btrfs: fix unprotected assignment of the target device (bsc#1089222).
- Btrfs: fix unprotected deletion from pending_chunks list
- Btrfs: fix unprotected device list access when getting the fs information (bsc#1089228).
- Btrfs: fix unprotected device's variants on 32bits machine (bsc#1089227).
- Btrfs: fix unprotected device-&gt;bytes_used update (bsc#1089225).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#1089240).
- Btrfs: fix up read_tree_block to return proper error (bsc#1080837).
- Btrfs: fix wrong device bytes_used in the super block (bsc#1089224).
- Btrfs: fix wrong disk size when writing super blocks (bsc#1089223).
- Btrfs: fix xattr loss after power failure (bsc#1094436).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#1089013).
- Btrfs: initialize the seq counter in struct btrfs_device (bsc#1094437).
- Btrfs: iterate over unused chunk space in FITRIM
- Btrfs: make btrfs_issue_discard return bytes discarded
- Btrfs: make btrfs_search_forward return with nodes unlocked (bsc#1094422).
- Btrfs: make sure to copy everything if we rename (bsc#1088997).
- Btrfs: make the chunk allocator completely tree lockless (bsc#1089202).
- Btrfs: move btrfs_truncate_page to btrfs_cont_expand instead of btrfs_truncate (bsc#1089201).
- Btrfs: nuke write_super from comments (bsc#1089199).
- Btrfs: only drop modified extents if we logged the whole inode (bsc#1089213).
- Btrfs: only update disk_i_size as we remove extents (bsc#1089209).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#1089012).
- Btrfs: remove deleted xattrs on fsync log replay (bsc#1089008).
- Btrfs: remove empty block groups automatically
- Btrfs: remove non-sense btrfs_error_discard_extent() function (bsc#1089230).
- Btrfs: remove parameter blocksize from read_tree_block (bsc#1080837).
- Btrfs: remove transaction from send (bsc#1089218).
- Btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock
- Btrfs: remove unused max_key arg from btrfs_search_forward (bsc#1094421).
- Btrfs: return an error from btrfs_wait_ordered_range (bsc#1089212).
- Btrfs: set inode's logged_trans/last_log_commit after ranged fsync (bsc#1093198).
- Btrfs: skip superblocks during discard
- Btrfs: stop refusing the relocation of chunk 0 (bsc#1089208).
- Btrfs: update free_chunk_space during allocting a new chunk (bsc#1089226).
- Btrfs: use global reserve when deleting unused block group after ENOSPC
- Btrfs: use nodesize everywhere, kill leafsize (bsc#1080837).
- Btrfs: wait ordered range before doing direct io (bsc#1089203).
- Fix for bsc#1092497
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).
- IB/mlx4: Convert slave port before building address-handle (bug#919382).
- KABI protect struct _lowcore (bsc#1089386).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- NFS: add nostatflush mount option (bsc#1065726).
- NFS: allow flush-on-stat to be disabled (bsc#1065726).
- Refresh patches.arch/14.1-x86-retpoline-fill-rsb-on-context-switch-for-affected-cpus.patch. Fix bnc#1097948.
- Revert 'NFS: allow flush-on-stat to be disabled (bsc#1065726).' 
- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).
- USB: hub: fix SS hub-descriptor handling (bsc#1092372).
- Update config files, add Spectre mitigation for s390x (bnc#1089386, ).
- Update s390 config files (bsc#1089386).
- Xen counterparts of eager FPU implementation.
- balloon: do not BUG() when balloon is empty (bsc#1083347).
- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).
- config.sh: set BUGZILLA_PRODUCT for SLE11-SP4
- constraints: ppc64 does not build with 2.5G memory
- fanotify: fix logic of events on child (bsc#1013018).
- fs: btrfs: volumes.c: Fix for possible null pointer dereference (bsc#1089219).
- ipc/msg: Fix faulty parsing of msgctl args (bsc#1093600,bsc#1072689).
- kABI: work around BPF SSBD removal (bsc#1087082).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096746, ).
- kvm/powerpc: Add new ioctl to retreive server MMU infos (bsc#1094244).
- kvm/x86: fix icebp instruction handling (bsc#1087088).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).
- module: Fix locking in symbol_put_addr() (bsc#1097445).
- netfront: make req_prod check properly deal with index wraps (bsc#1046610).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1013018).
- powerpc, KVM: Split HVMODE_206 cpu feature bit into separate HV and architecture bits (bsc#1087082).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bsc#1094244).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump and flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: convert rtas_log_buf to linear allocation (bsc#1094244).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Fix /proc/cpuinfo revision for POWER9 DD2 (bsc#1093710).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815). 
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1091659, ).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096746, ).
- s390/dasd: fix IO error for newly defined devices (bnc#1091659, ).
- s390/dasd: fix failing path verification (bnc#1096746, ).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1091659, ).
- s390/qeth: on channel error, reject further cmd requests (bnc#1088343, ).
- s390: add automatic detection of the spectre defense (bnc#1089386, ).
- s390: add optimized array_index_mask_nospec (bnc#1089386, ).
- s390: add sysfs attributes for spectre (bnc#1089386, ).
- s390: correct module section names for expoline code revert (bsc#1089386).
- s390: correct nospec auto detection init order (bnc#1089386, ).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1089386, ).
- s390: fix retpoline build on 31bit (bsc#1089386).
- s390: improve cpu alternative handling for gmb and nobp (bnc#1089386, ).
- s390: introduce execute-trampolines for branches (bnc#1089386, ).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1089386, ).
- s390: report spectre mitigation via syslog (bnc#1089386, ).
- s390: run user space and KVM guests with modified branch prediction (bnc#1089386, ).
- s390: scrub registers on kernel entry and KVM exit (bnc#1089386, ).
- series.conf: fix the header It was corrupted back in 2015.
- trace: module: Maintain a valid user count (bsc#1097443).
- tracing: Create seq_buf layer in trace_seq (bsc#1091815).
- x86, mce: Fix mce_start_timer semantics (bsc#1090607).
- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)
- x86/kaiser: symbol kaiser_set_shadow_pgd() exported with non GPL
- x86: Fix /proc/mtrr with base/size more than 44bits (bsc#1052351).
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: fix buffer use after free on IO error (bsc#1052943).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#989401).
- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052351">SUSE bug 1052351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068054">SUSE bug 1068054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080837">SUSE bug 1080837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083347">SUSE bug 1083347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088343">SUSE bug 1088343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088997">SUSE bug 1088997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088998">SUSE bug 1088998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088999">SUSE bug 1088999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089000">SUSE bug 1089000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089001">SUSE bug 1089001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089002">SUSE bug 1089002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089003">SUSE bug 1089003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089004">SUSE bug 1089004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089005">SUSE bug 1089005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089006">SUSE bug 1089006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089007">SUSE bug 1089007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089008">SUSE bug 1089008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089010">SUSE bug 1089010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089011">SUSE bug 1089011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089012">SUSE bug 1089012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089013">SUSE bug 1089013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089016">SUSE bug 1089016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089192">SUSE bug 1089192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089199">SUSE bug 1089199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089200">SUSE bug 1089200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089201">SUSE bug 1089201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089202">SUSE bug 1089202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089203">SUSE bug 1089203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089204">SUSE bug 1089204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089205">SUSE bug 1089205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089206">SUSE bug 1089206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089207">SUSE bug 1089207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089208">SUSE bug 1089208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089209">SUSE bug 1089209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089210">SUSE bug 1089210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089211">SUSE bug 1089211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089212">SUSE bug 1089212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089213">SUSE bug 1089213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089214">SUSE bug 1089214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089215">SUSE bug 1089215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089216">SUSE bug 1089216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089217">SUSE bug 1089217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089218">SUSE bug 1089218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089219">SUSE bug 1089219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089220">SUSE bug 1089220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089221">SUSE bug 1089221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089222">SUSE bug 1089222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089223">SUSE bug 1089223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089224">SUSE bug 1089224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089225">SUSE bug 1089225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089226">SUSE bug 1089226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089227">SUSE bug 1089227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089228">SUSE bug 1089228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089229">SUSE bug 1089229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089230">SUSE bug 1089230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089231">SUSE bug 1089231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089232">SUSE bug 1089232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089233">SUSE bug 1089233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089234">SUSE bug 1089234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089235">SUSE bug 1089235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089236">SUSE bug 1089236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089237">SUSE bug 1089237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089238">SUSE bug 1089238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089239">SUSE bug 1089239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089240">SUSE bug 1089240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089241">SUSE bug 1089241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089386">SUSE bug 1089386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090607">SUSE bug 1090607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090630">SUSE bug 1090630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091659">SUSE bug 1091659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091671">SUSE bug 1091671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092372">SUSE bug 1092372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093194">SUSE bug 1093194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093195">SUSE bug 1093195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093196">SUSE bug 1093196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093197">SUSE bug 1093197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093198">SUSE bug 1093198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093600">SUSE bug 1093600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093710">SUSE bug 1093710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094421">SUSE bug 1094421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094422">SUSE bug 1094422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094423">SUSE bug 1094423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094424">SUSE bug 1094424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094425">SUSE bug 1094425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094436">SUSE bug 1094436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094437">SUSE bug 1094437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096746">SUSE bug 1096746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097443">SUSE bug 1097443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097445">SUSE bug 1097445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097948">SUSE bug 1097948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569562" comment="kernel-rt-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569563" comment="kernel-rt-base-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569564" comment="kernel-rt-devel-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569565" comment="kernel-rt_trace-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569566" comment="kernel-rt_trace-base-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569567" comment="kernel-rt_trace-devel-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569568" comment="kernel-source-rt-3.0.101.rt130-69.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569569" comment="kernel-syms-rt-3.0.101.rt130-69.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38546" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094876" ref_url="https://bugzilla.suse.com/1094876" source="BUGZILLA"/>
		<reference ref_id="1098408" ref_url="https://bugzilla.suse.com/1098408" source="BUGZILLA"/>
		<reference ref_id="1099177" ref_url="https://bugzilla.suse.com/1099177" source="BUGZILLA"/>
		<reference ref_id="1099598" ref_url="https://bugzilla.suse.com/1099598" source="BUGZILLA"/>
		<reference ref_id="1099709" ref_url="https://bugzilla.suse.com/1099709" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="780242" ref_url="https://bugzilla.suse.com/780242" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795301" ref_url="https://bugzilla.suse.com/795301" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="909495" ref_url="https://bugzilla.suse.com/909495" source="BUGZILLA"/>
		<reference ref_id="923242" ref_url="https://bugzilla.suse.com/923242" source="BUGZILLA"/>
		<reference ref_id="925105" ref_url="https://bugzilla.suse.com/925105" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2177-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2014-3688: The SCTP implementation allowed remote attackers to cause a
  denial of service (memory consumption) by triggering a large number of chunks
  in an association's output queue (bsc#902351)

The following non-security bugs were fixed:

- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1045538).
- ALSA: seq: Do not allow resizing pool in use (bsc#1045538).
- Delete patches.fixes/0001-ipc-shm-Fix-shmat-mmap-nil-page-protection.patch (bsc# 1090078)
- IB/mlx4: fix sprintf format warning (bnc#786036).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#786036).
- USB: uss720: fix NULL-deref at probe (bnc#1047487).
- bna: integer overflow bug in debugfs (bnc#780242).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bug#923242).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bug#909495).
- fix a leak in /proc/schedstats (bsc#1094876).
- ixgbe: Initialize 64-bit stats seqcounts (bnc#795301).
- mm: fix the NULL mapping case in __isolate_lru_page() (git-fixes).
- module/retpoline: Warn about missing retpoline in module (bnc#1099177).
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bnc#786036).
- net/mlx4_en: Change default QoS settings (bnc#786036).
- net/mlx4_en: Use __force to fix a sparse warning in TX datapath (bug#925105).
- netxen: fix incorrect loop counter decrement (bnc#784815).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- s390/qdio: do not merge ERROR output buffers (bnc#1099709).
- s390/qeth: do not dump control cmd twice (bnc#1099709).
- s390/qeth: fix SETIP command handling (bnc#1099709).
- s390/qeth: free netdevice when removing a card (bnc#1099709).
- s390/qeth: lock read device while queueing next buffer (bnc#1099709).
- s390/qeth: when thread completes, wake up all waiters (bnc#1099709).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- tg3: do not clear stats while tg3_close (bnc#790588).
- video/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bnc#1099966).
- vmxnet3: use correct flag to indicate LRO feature (bsc#936423).
- x86-32/kaiser: Add CPL check for CR3 switch before iret (bsc#1098408).
- x86-non-upstream-eager-fpu 32bit fix (bnc#1087086 bnc#1100091 bnc#1099598).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1099177).
- xen/x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec() (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-02"/>
	<updated date="2018-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094876">SUSE bug 1094876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098408">SUSE bug 1098408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099177">SUSE bug 1099177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099598">SUSE bug 1099598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099709">SUSE bug 1099709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780242">SUSE bug 780242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795301">SUSE bug 795301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909495">SUSE bug 909495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923242">SUSE bug 923242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925105">SUSE bug 925105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569570" comment="kernel-rt-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569571" comment="kernel-rt-base-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569572" comment="kernel-rt-devel-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569573" comment="kernel-rt_trace-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569574" comment="kernel-rt_trace-base-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569575" comment="kernel-rt_trace-devel-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569576" comment="kernel-source-rt-3.0.101.rt130-69.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569577" comment="kernel-syms-rt-3.0.101.rt130-69.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38547" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux RT Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1081680" ref_url="https://bugzilla.suse.com/1081680" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1103145" ref_url="https://bugzilla.suse.com/1103145" source="BUGZILLA"/>
		<reference ref_id="1105799" ref_url="https://bugzilla.suse.com/1105799" source="BUGZILLA"/>
		<reference ref_id="1106139" ref_url="https://bugzilla.suse.com/1106139" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107849" ref_url="https://bugzilla.suse.com/1107849" source="BUGZILLA"/>
		<reference ref_id="1108314" ref_url="https://bugzilla.suse.com/1108314" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114460" ref_url="https://bugzilla.suse.com/1114460" source="BUGZILLA"/>
		<reference ref_id="923775" ref_url="https://bugzilla.suse.com/923775" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 RT kernel was updated to 3.0.101-rt130-69.39 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).

The following non-security bugs were fixed:

- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).
- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KVM: Disable irq while unregistering user notifier (bsc#1106240).
- KVM: SVM: obey guest PAT (bsc#1106240).
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).
- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).
- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).
- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).
- KVM: x86: zero base3 of unusable segments (bsc#1106240).
- NFS - do not hang if xdr decoded username is bad (bsc#1105799).
- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).
- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).
- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).
- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).
- add kernel parameter to disable failfast on block devices  (bsc#1081680).
- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).
- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).
- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).
- dm: fix incomplete request_queue initialization (bsc#1047027).
- dm: only initialize the request_queue once (bsc#1047027).
- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).
- locks: fix unlock when fcntl_setlk races with a close (git-fixes).
- media: Fix invalid free in the fix for mceusb (bsc#1050431).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).
- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).
- media: mceusb: fix NULL-deref at probe (bsc#1050431).
- media: mceusb: fix memory leaks in error path.
- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).
- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).
- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).
- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).
- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).
- powerpc/book3s: handle machine check in Linux host (bsc#1094244).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).
- powerpc: Rework runlatch code (bsc#1094244).
- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).
- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).
- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).
- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).
- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).
- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).
- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).
- scsi: libfc: Do not login if the port is already started (bsc#1106139).
- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1110247).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081680">SUSE bug 1081680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103145">SUSE bug 1103145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105799">SUSE bug 1105799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106139">SUSE bug 1106139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107849">SUSE bug 1107849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108314">SUSE bug 1108314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114460">SUSE bug 1114460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923775">SUSE bug 923775</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569578" comment="kernel-rt-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569579" comment="kernel-rt-base-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569580" comment="kernel-rt-devel-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569581" comment="kernel-rt_trace-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569582" comment="kernel-rt_trace-base-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569583" comment="kernel-rt_trace-devel-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569584" comment="kernel-source-rt-3.0.101.rt130-69.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569585" comment="kernel-syms-rt-3.0.101.rt130-69.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38548" version="1" class="patch">
	<metadata>
		<title>Security update for kernel modules packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="926856" ref_url="https://bugzilla.suse.com/926856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<description>


The following kernel modules were rebuild with 'retpoline' enablement
to allow full mitigation of the Spectre Variant 2 (CVE-2017-5715, bsc#1068032)

OFED was adjusted to add an entry to control the loading/unloading of cxgb4 to
/etc/sysconf/infiniband (bsc#926856).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926856">SUSE bug 926856</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569586" comment="iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.24-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569587" comment="iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.24-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569588" comment="ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.24-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569589" comment="ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.24-22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38549" version="1" class="patch">
	<metadata>
		<title>Security update for various KMPs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1095824" ref_url="https://bugzilla.suse.com/1095824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<description>

This update rebuilds missing kernel modules (KMP) to use 'retpolines'
mitigations for Spectre Variant 2 (CVE-2017-5715).

Rebuilt KMP packages:

- cluster-network
- drbd
- gfs2
- iscsitarget
- ocfs2
- ofed
- oracleasm

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095824">SUSE bug 1095824</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569590" comment="cluster-network-kmp-rt-1.4_3.0.101_rt130_69.42-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569591" comment="cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_69.42-2.32.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569592" comment="drbd-kmp-rt-8.4.4_3.0.101_rt130_69.42-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569593" comment="drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_69.42-0.27.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569594" comment="gfs2-kmp-rt-2_3.0.101_rt130_69.42-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569595" comment="gfs2-kmp-rt_trace-2_3.0.101_rt130_69.42-0.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569596" comment="iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_69.42-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569597" comment="iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_69.42-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569598" comment="ocfs2-kmp-rt-1.6_3.0.101_rt130_69.42-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569599" comment="ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_69.42-0.28.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569600" comment="ofed-kmp-rt-1.5.4.1_3.0.101_rt130_69.42-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569601" comment="ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_69.42-22.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38550" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="676471" ref_url="https://bugzilla.suse.com/676471" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="909589" ref_url="https://bugzilla.suse.com/909589" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954847" ref_url="https://bugzilla.suse.com/954847" source="BUGZILLA"/>
		<reference ref_id="956491" ref_url="https://bugzilla.suse.com/956491" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="961518" ref_url="https://bugzilla.suse.com/961518" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="966245" ref_url="https://bugzilla.suse.com/966245" source="BUGZILLA"/>
		<reference ref_id="967914" ref_url="https://bugzilla.suse.com/967914" source="BUGZILLA"/>
		<reference ref_id="968500" ref_url="https://bugzilla.suse.com/968500" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="969391" ref_url="https://bugzilla.suse.com/969391" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="971030" ref_url="https://bugzilla.suse.com/971030" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="971947" ref_url="https://bugzilla.suse.com/971947" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="974787" ref_url="https://bugzilla.suse.com/974787" source="BUGZILLA"/>
		<reference ref_id="975358" ref_url="https://bugzilla.suse.com/975358" source="BUGZILLA"/>
		<reference ref_id="976739" ref_url="https://bugzilla.suse.com/976739" source="BUGZILLA"/>
		<reference ref_id="976868" ref_url="https://bugzilla.suse.com/976868" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979347" ref_url="https://bugzilla.suse.com/979347" source="BUGZILLA"/>
		<reference ref_id="979419" ref_url="https://bugzilla.suse.com/979419" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="979915" ref_url="https://bugzilla.suse.com/979915" source="BUGZILLA"/>
		<reference ref_id="980246" ref_url="https://bugzilla.suse.com/980246" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981231" ref_url="https://bugzilla.suse.com/981231" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="982532" ref_url="https://bugzilla.suse.com/982532" source="BUGZILLA"/>
		<reference ref_id="982544" ref_url="https://bugzilla.suse.com/982544" source="BUGZILLA"/>
		<reference ref_id="982691" ref_url="https://bugzilla.suse.com/982691" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983721" ref_url="https://bugzilla.suse.com/983721" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="988498" ref_url="https://bugzilla.suse.com/988498" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3707" ref_url="https://www.suse.com/security/cve/CVE-2016-3707/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).

The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- ALSA: oxygen: add Xonar DGX support (bsc#982691).
- Assign correct -&gt;can_queue value in hv_storvsc (bnc#969391)
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFS: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- NVMe: Unify controller probe and resume (bsc#979347).
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- bridge: superfluous skb-&gt;nfct check in br_nf_dev_queue_xmit (bsc#982544).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- hid-elo: kill not flush the work (bnc#982532).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/pci_dma: fix DMA table corruption with &gt; 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-08"/>
	<updated date="2016-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/676471">SUSE bug 676471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909589">SUSE bug 909589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954847">SUSE bug 954847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956491">SUSE bug 956491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961518">SUSE bug 961518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966245">SUSE bug 966245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967914">SUSE bug 967914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968500">SUSE bug 968500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969391">SUSE bug 969391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971030">SUSE bug 971030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971947">SUSE bug 971947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974787">SUSE bug 974787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975358">SUSE bug 975358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976739">SUSE bug 976739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976868">SUSE bug 976868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979347">SUSE bug 979347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979419">SUSE bug 979419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979915">SUSE bug 979915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980246">SUSE bug 980246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981231">SUSE bug 981231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982532">SUSE bug 982532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982544">SUSE bug 982544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982691">SUSE bug 982691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983721">SUSE bug 983721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988498">SUSE bug 988498</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3707/">CVE-2016-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569602" comment="kernel-rt-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569603" comment="kernel-rt-base-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569604" comment="kernel-rt-devel-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569605" comment="kernel-rt_trace-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569606" comment="kernel-rt_trace-base-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569607" comment="kernel-rt_trace-devel-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569608" comment="kernel-source-rt-3.0.101.rt130-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569609" comment="kernel-syms-rt-3.0.101.rt130-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38551" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092772" ref_url="https://bugzilla.suse.com/1092772" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1093666" ref_url="https://bugzilla.suse.com/1093666" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100705" ref_url="https://bugzilla.suse.com/1100705" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1104481" ref_url="https://bugzilla.suse.com/1104481" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1104901" ref_url="https://bugzilla.suse.com/1104901" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105723" ref_url="https://bugzilla.suse.com/1105723" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106199" ref_url="https://bugzilla.suse.com/1106199" source="BUGZILLA"/>
		<reference ref_id="1106202" ref_url="https://bugzilla.suse.com/1106202" source="BUGZILLA"/>
		<reference ref_id="1106206" ref_url="https://bugzilla.suse.com/1106206" source="BUGZILLA"/>
		<reference ref_id="1106209" ref_url="https://bugzilla.suse.com/1106209" source="BUGZILLA"/>
		<reference ref_id="1106212" ref_url="https://bugzilla.suse.com/1106212" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106609" ref_url="https://bugzilla.suse.com/1106609" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1106930" ref_url="https://bugzilla.suse.com/1106930" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107064" ref_url="https://bugzilla.suse.com/1107064" source="BUGZILLA"/>
		<reference ref_id="1107071" ref_url="https://bugzilla.suse.com/1107071" source="BUGZILLA"/>
		<reference ref_id="1107650" ref_url="https://bugzilla.suse.com/1107650" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107949" ref_url="https://bugzilla.suse.com/1107949" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912)
- CVE-2018-14617: Prevent NULL pointer dereference and panic in
  hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
  hfs+ filesystem that has malformed catalog data, and is mounted read-only
  without a metadata directory (bsc#1102870)
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
  yurex_read allowed local attackers to use user access read/writes to crash the
  kernel or potentially escalate privileges (bsc#1106095)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent
  attackers for conducting Spectre-v2 attacks against paravirtual guests
  (bsc#1105348)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119)

The following non-security bugs were fixed:

- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).
- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).
- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).
- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).
- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).
- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).
- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).
- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).
- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).
- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).
- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).
- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).
- ASoC: blackfin: Fix missing break (bsc#1045538).
- Enforce module signatures if the kernel is locked down (bsc#1093666).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- PCI: Fix TI816X class code quirk (bsc#1050431).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- TPM: Zero buffer whole after copying to userspace (bsc#1050381).
- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).
- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).
- applicom: dereferencing NULL on error path (git-fixes).
- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).
- base: make module_create_drivers_dir race-free (git-fixes).
- block: fix an error code in add_partition() (bsc#1106209).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).
- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).
- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).
- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).
- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).
- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).
- iommu/vt-d: Do not over-free page table directories (bsc#1106105).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).
- ipv6: correctly add local routes when lo goes up (bsc#1100705).
- ipv6: introduce ip6_rt_put() (bsc#1100705).
- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info-&gt;hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- nbd: ratelimit error msgs after socket close (bsc#1106206).
- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).
- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- qlge: Fix netdev features configuration (bsc#1098822).
- resource: fix integer overflow at reallocation (bsc#1045538).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).
- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).
- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).
- s390: detect etoken facility (bnc#1106930, LTC#171029).
- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).
- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- tpm: fix race condition in tpm_common_write() (bsc#1050381).
- tracing/blktrace: Fix to allow setting same value (bsc#1106212).
- tty: vt, fix bogus division in csi_J (git-fixes).
- tty: vt, return error when con_startup fails (git-fixes).
- uml: fix hostfs mknod() (bsc#1106202).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).
- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092772">SUSE bug 1092772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093666">SUSE bug 1093666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100705">SUSE bug 1100705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104481">SUSE bug 1104481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104901">SUSE bug 1104901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105723">SUSE bug 1105723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106199">SUSE bug 1106199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106202">SUSE bug 1106202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106206">SUSE bug 1106206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106209">SUSE bug 1106209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106212">SUSE bug 1106212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106609">SUSE bug 1106609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106930">SUSE bug 1106930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107064">SUSE bug 1107064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107071">SUSE bug 1107071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107650">SUSE bug 1107650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107949">SUSE bug 1107949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569610" comment="kernel-rt-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569611" comment="kernel-rt-base-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569612" comment="kernel-rt-devel-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569613" comment="kernel-rt_trace-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569614" comment="kernel-rt_trace-base-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569615" comment="kernel-rt_trace-devel-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569616" comment="kernel-source-rt-3.0.101.rt130-69.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569617" comment="kernel-syms-rt-3.0.101.rt130-69.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38552" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time Extension 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1024450" ref_url="https://bugzilla.suse.com/1024450" source="BUGZILLA"/>
		<reference ref_id="1031358" ref_url="https://bugzilla.suse.com/1031358" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1037667" ref_url="https://bugzilla.suse.com/1037667" source="BUGZILLA"/>
		<reference ref_id="1037669" ref_url="https://bugzilla.suse.com/1037669" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1040609" ref_url="https://bugzilla.suse.com/1040609" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051932" ref_url="https://bugzilla.suse.com/1051932" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052370" ref_url="https://bugzilla.suse.com/1052370" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053933" ref_url="https://bugzilla.suse.com/1053933" source="BUGZILLA"/>
		<reference ref_id="1054070" ref_url="https://bugzilla.suse.com/1054070" source="BUGZILLA"/>
		<reference ref_id="1054076" ref_url="https://bugzilla.suse.com/1054076" source="BUGZILLA"/>
		<reference ref_id="1054093" ref_url="https://bugzilla.suse.com/1054093" source="BUGZILLA"/>
		<reference ref_id="1054247" ref_url="https://bugzilla.suse.com/1054247" source="BUGZILLA"/>
		<reference ref_id="1054706" ref_url="https://bugzilla.suse.com/1054706" source="BUGZILLA"/>
		<reference ref_id="1055680" ref_url="https://bugzilla.suse.com/1055680" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="984530" ref_url="https://bugzilla.suse.com/984530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000251: The native Bluetooth stack was vulnerable to a stack
  overflow vulnerability in the processing of L2CAP configuration responses
  resulting in remote code execution in kernel space (bnc#1057389).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h did not
  verify that a filesystem has a realtime device, which allowed local users to
  cause a denial of service (NULL pointer dereference and OOPS) via vectors
  related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-14140: The move_pages system call in mm/migrate.c did not check the
  effective uid of the target process, enabling a local attacker to learn the
  memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl
  function in drivers/scsi/qla2xxx/qla_attr.c allowed local users to cause a
  denial of service (memory corruption and system crash) by leveraging root
  access (bnc#1056588).
- CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to gain
  privileges or cause a denial of service (list corruption or use-after-free) via
  simultaneous file-descriptor operations that leverage improper might_cancel
  queueing (bnc#1053152).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c a user-controlled buffer was
  copied into a local buffer of constant size using strcpy without a length check
  which can cause a buffer overflow (bnc#1053148).
- CVE-2017-8831: The saa7164_bus_get function allowed local users to cause a
  denial of service (out-of-bounds array access) or possibly have unspecified
  other impact by changing a certain sequence-number value, aka a 'double fetch'
  vulnerability (bnc#1037994).
- CVE-2017-1000112: Prevent race condition in net-packet code that could have
  been exploited by unprivileged users to gain root access.(bnc#1052311).

The following non-security bugs were fixed:

- ALSA: Fix Lewisburg audio issue
- Drop commit 96234ae:kvm_io_bus_unregister_dev() should never fail (bsc#1055680)
- Fixup build warnings in drivers/scsi/scsi.c (bsc#1031358)
- NFS: Cache aggressively when file is open for writing (bsc#1053933).
- NFS: Do drop directory dentry when error clearly requires it (bsc#1051932).
- NFS: Do not flush caches for a getattr that races with writeback (bsc#1053933).
- NFS: Optimize fallocate by refreshing mapping when needed (bsc#1053933).
- NFS: invalidate file size when taking a lock (bsc#1053933).
- PCI: fix hotplug related issues (bnc#1054247).
- af_key: do not use GFP_KERNEL in atomic contexts (bsc#1054093).
- avoid deadlock in xenbus (bnc#1047523).
- blacklist 9754d45e9970 tpm: read burstcount from TPM_STS in one 32-bit transaction
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- cx231xx-audio: fix NULL-deref at probe (bsc#1050431).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- fuse: do not use iocb after it may have been freed (bsc#1054706).
- fuse: fix fuse_write_end() if zero bytes were copied (bsc#1054706).
- fuse: fsync() did not return IO errors (bsc#1054076).
- fuse: fuse_flush must check mapping-&gt;flags for errors (bsc#1054706).
- gspca: konica: add missing endpoint sanity check (bsc#1050431).
- kabi/severities: Ignore zpci symbol changes (bsc#1054247)
- lib/mpi: mpi_read_raw_data(): fix nbits calculation
- media: platform: davinci: return -EINVAL for VPFE_CMD_S_CCDC_RAW_PARAMS ioctl (bsc#1050431).
- net: Fix RCU splat in af_key (bsc#1054093).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609 bsc#1024450).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669 bsc#1037667).
- powerpc/fadump: provide a helpful error message (bsc#1037669 bsc#1037667).
- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530, bsc#1052370).
- powerpc/slb: Force a full SLB flush when we insert for a bad EA (bsc#1054070).
- reiserfs: fix race in readdir (bsc#1039803).
- s390/pci: do not cleanup in arch_setup_msi_irqs (bnc#1054247).
- s390/pci: fix handling of PEC 306 (bnc#1054247).
- s390/pci: improve error handling during fmb (de)registration (bnc#1054247).
- s390/pci: improve error handling during interrupt deregistration (bnc#1054247).
- s390/pci: improve pci hotplug (bnc#1054247).
- s390/pci: improve unreg_ioat error handling (bnc#1054247).
- s390/pci: introduce clp_get_state (bnc#1054247).
- s390/pci: provide more debug information (bnc#1054247).
- scsi: avoid system stall due to host_busy race (bsc#1031358).
- scsi: close race when updating blocked counters (bsc#1031358).
- ser_gigaset: return -ENOMEM on error instead of success (bsc#1037441).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- tpm: fix a kernel memory leak in tpm-sysfs.c (bsc#1050381).
- uwb: fix device quirk on big-endian hosts (bsc#1036629).
- xfs: fix inobt inode allocation search optimization (bsc#1013018).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024450">SUSE bug 1024450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031358">SUSE bug 1031358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037667">SUSE bug 1037667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037669">SUSE bug 1037669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040609">SUSE bug 1040609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051932">SUSE bug 1051932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052370">SUSE bug 1052370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053933">SUSE bug 1053933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054070">SUSE bug 1054070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054076">SUSE bug 1054076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054093">SUSE bug 1054093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054247">SUSE bug 1054247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054706">SUSE bug 1054706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055680">SUSE bug 1055680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984530">SUSE bug 984530</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-linux-enterprise-rt:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664711" comment="SUSE Linux Enterprise Real Time Extension 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569618" comment="kernel-rt-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569619" comment="kernel-rt-base-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569620" comment="kernel-rt-devel-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569621" comment="kernel-rt_trace-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569622" comment="kernel-rt_trace-base-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569623" comment="kernel-rt_trace-devel-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569624" comment="kernel-source-rt-3.0.101.rt130-69.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569625" comment="kernel-syms-rt-3.0.101.rt130-69.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38553" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP1</platform>
		</affected>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<description>

This compat-openssl097g rollup update contains various security fixes:

    * CVE-2012-2131,CVE-2012-2110: incorrect integer conversions in OpenSSL
      can result in memory corruption during buffer management operations.

Security Issue reference:

    * CVE-2012-2110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258808" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38554" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP1</platform>
		</affected>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="778943" ref_url="https://bugzilla.suse.com/778943" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<description>

IBM Java 1.4.2 has been updated to SR13-FP13 that fixes bugs and security 
issues.

Please see for more information:

http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Additionally one bug has been fixed:

    * fix bnc#771808: create symlink /usr/bin/javaws properly

Security Issue references:

    * CVE-2012-1717
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717&gt;
    * CVE-2012-1713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713&gt;
    * CVE-2012-1719
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719&gt;
    * CVE-2012-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-26"/>
	<updated date="2012-10-26"/>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778943">SUSE bug 778943</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258808" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569626" comment="java-1_4_2-ibm-sap-1.4.2_sr13.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569627" comment="java-1_4_2-ibm-sap-devel-1.4.2_sr13.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38555" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<description>

This compat-openssl097g rollup update contains various security fixes:

    * CVE-2012-2131,CVE-2012-2110: incorrect integer conversions in OpenSSL
      could have resulted in memory corruption during buffer management
      operations.

Security Issue reference:

    * CVE-2012-2110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38556" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569628" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38557" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="666744" ref_url="https://bugzilla.suse.com/666744" source="BUGZILLA"/>
		<reference ref_id="778943" ref_url="https://bugzilla.suse.com/778943" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<description>

IBM Java 1.4.2 has been updated to SR13-FP13 that fixes bugs and security 
issues.

Please see for more information:

http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Additionally one bug has been fixed:

    * fix bnc#771808: create symlink /usr/bin/javaws properly

Security Issue references:

    * CVE-2012-1717
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717&gt;
    * CVE-2012-1713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713&gt;
    * CVE-2012-1719
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719&gt;
    * CVE-2012-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-26"/>
	<updated date="2012-10-26"/>
	<bugzilla href="https://bugzilla.suse.com/666744">SUSE bug 666744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778943">SUSE bug 778943</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569626" comment="java-1_4_2-ibm-sap-1.4.2_sr13.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569627" comment="java-1_4_2-ibm-sap-devel-1.4.2_sr13.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38558" version="1" class="patch">
	<metadata>
		<title>Security update for sap_suse_cluster_connector</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="763793" ref_url="https://bugzilla.suse.com/763793" source="BUGZILLA"/>
		<reference ref_id="777453" ref_url="https://bugzilla.suse.com/777453" source="BUGZILLA"/>
		<reference ref_id="778273" ref_url="https://bugzilla.suse.com/778273" source="BUGZILLA"/>
		<reference ref_id="778293" ref_url="https://bugzilla.suse.com/778293" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0426" ref_url="https://www.suse.com/security/cve/CVE-2012-0426/" source="CVE"/>
		<description>

A tmp race condition was fixed in sap_suse_cluster_connector. CVE-2012-0426 
was assigned to this issue.

Additionally some minor non-security fixes are included.

Security Issue reference:

    * CVE-2012-0426
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0426&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-08"/>
	<updated date="2012-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/763793">SUSE bug 763793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777453">SUSE bug 777453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778273">SUSE bug 778273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778293">SUSE bug 778293</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0426/">CVE-2012-0426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569629" comment="sap_suse_cluster_connector-1.0.0-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38559" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<description>

OpenSSL was updated to fix several security issues:

    * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by
      rejecting connections with DH parameters shorter than 1024 bits.
      2048-bit DH parameters are now generated by default.
    * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
    * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
      was fixed.
    * Fixed a timing side channel in RSA decryption. (bsc#929678)

Additional changes:

    * In the default SSL cipher string EXPORT ciphers are now disabled.
      This will only get active if applications get rebuilt and actually
      use this string. (bsc#931698)

Security Issues:

    * CVE-2015-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789&gt;
    * CVE-2015-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790&gt;
    * CVE-2015-4000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-19"/>
	<updated date="2015-06-19"/>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569630" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38560" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569628" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38561" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#976943: Fix buffer overrun in ASN1_parse
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-04"/>
	<updated date="2016-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569631" comment="compat-openssl097g-0.9.7g-146.22.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569632" comment="compat-openssl097g-32bit-0.9.7g-146.22.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38562" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569633" comment="compat-openssl097g-0.9.7g-146.22.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569634" comment="compat-openssl097g-32bit-0.9.7g-146.22.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38563" version="1" class="patch">
	<metadata>
		<title>Security update for clamsap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935939" ref_url="https://bugzilla.suse.com/935939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2278" ref_url="https://www.suse.com/security/cve/CVE-2015-2278/" source="CVE"/>
		<reference ref_id="CVE-2015-2282" ref_url="https://www.suse.com/security/cve/CVE-2015-2282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001953.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues: 

CVE-2015-2278: The LZH decompression implementation allows context-dependent attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to look-ups of non-simple codes.

CVE-2015-2282: Stack-based buffer overflow in the LZC decompression implementation allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-17"/>
	<updated date="2016-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935939">SUSE bug 935939</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2278/">CVE-2015-2278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2282/">CVE-2015-2282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569635" comment="clamsap-0.98.9-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38564" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569636" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569637" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38565" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-02"/>
	<updated date="2016-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569638" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569639" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38566" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#976943: Fix buffer overrun in ASN1_parse
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-04"/>
	<updated date="2016-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569640" comment="compat-openssl097g-0.9.7g-146.22.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569641" comment="compat-openssl097g-32bit-0.9.7g-146.22.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38567" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569642" comment="compat-openssl097g-0.9.7g-146.22.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569643" comment="compat-openssl097g-32bit-0.9.7g-146.22.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38568" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- resume reading from /dev/urandom when interrupted by a signal
  (bsc#995075)
- fix crash in print_notice (bsc#998190)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569644" comment="compat-openssl097g-0.9.7g-146.22.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569645" comment="compat-openssl097g-32bit-0.9.7g-146.22.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38569" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl097g fixes the following issues:

These security issues were fixed:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as
  can be found in PKCS7) could eventually exceed the stack given malicious input
  with excessive recursion. This could have resulted in DoS (bsc#1087102)

This non-security issue was fixed:

- Fixed crash in DES_fcrypt (bsc#1065363)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569646" comment="compat-openssl097g-0.9.7g-146.22.51.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569647" comment="compat-openssl097g-32bit-0.9.7g-146.22.51.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38570" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" source="SUSE-SU"/>
		<description>
This update for compat-openssl097g fixes the following issues:

Security issue fixed:

- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).

Non-security issue fixed:

- Fixed timing vulnerability in DSA signature generation (bsc#1113742).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-06"/>
	<updated date="2018-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569648" comment="compat-openssl097g-0.9.7g-146.22.51.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569649" comment="compat-openssl097g-32bit-0.9.7g-146.22.51.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38571" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="932286" ref_url="https://bugzilla.suse.com/932286" source="BUGZILLA"/>
		<reference ref_id="981347" ref_url="https://bugzilla.suse.com/981347" source="BUGZILLA"/>
		<reference ref_id="990847" ref_url="https://bugzilla.suse.com/990847" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3200" ref_url="https://www.suse.com/security/cve/CVE-2015-3200/" source="CVE"/>
		<reference ref_id="CVE-2016-1000212" ref_url="https://www.suse.com/security/cve/CVE-2016-1000212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002711.html" source="SUSE-SU"/>
		<description>

This update for lighttpd fixes the following issues:

Security issues fixed:

- CVE-2016-1000212: Don't allow requests to set the HTTP_PROXY variable. As *CGI apps
  might pick it up and use it for outgoing requests. (bsc#990847)
- CVE-2015-3200: Log injection via malformed base64 string in Authentication header.
  (bsc#932286)

Bug fixes:

- Add su directive to logrotate file as the directory is owned by lighttpd. (bsc#981347)
- Fix out of bounds read in mod_scgi.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932286">SUSE bug 932286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981347">SUSE bug 981347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990847">SUSE bug 990847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3200/">CVE-2015-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000212/">CVE-2016-1000212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569650" comment="lighttpd-mod_cml-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569651" comment="lighttpd-mod_magnet-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569652" comment="lighttpd-mod_mysql_vhost-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569653" comment="lighttpd-mod_rrdtool-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569654" comment="lighttpd-mod_trigger_b4_dl-1.4.20-2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569655" comment="lighttpd-mod_webdav-1.4.20-2.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38572" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager client tools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="764532" ref_url="https://bugzilla.suse.com/764532" source="BUGZILLA"/>
		<reference ref_id="766148" ref_url="https://bugzilla.suse.com/766148" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2679" ref_url="https://www.suse.com/security/cve/CVE-2012-2679/" source="CVE"/>
		<description>

This update fixes the following issue:

    * support new function signature for image deployment.
    * fixed insecure permissions used for /var/log/rhncfg-actions file

Security Issue reference:

    * CVE-2012-2679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2679&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-08"/>
	<updated date="2012-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/764532">SUSE bug 764532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766148">SUSE bug 766148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2679/">CVE-2012-2679</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569656" comment="rhn-virtualization-common-5.4.15-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569657" comment="rhn-virtualization-host-5.4.15-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569658" comment="rhncfg-5.9.33-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569659" comment="rhncfg-actions-5.9.33-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569660" comment="rhncfg-client-5.9.33-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569661" comment="rhncfg-management-5.9.33-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38573" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="763610" ref_url="https://bugzilla.suse.com/763610" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2395" ref_url="https://www.suse.com/security/cve/CVE-2012-2395/" source="CVE"/>
		<description>

This update of cobbler fixes a remote code execution flaw which could have 
been exploited through cobbler's XMLRPC API (CVE-2012-2395).

Security Issue references:

    * CVE-2012-2395
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2395&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-04"/>
	<updated date="2012-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/763610">SUSE bug 763610</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2395/">CVE-2012-2395</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569662" comment="koan-2.0.10-0.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38574" version="1" class="patch">
	<metadata>
		<title>Security update for spacewalk</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="644072" ref_url="https://bugzilla.suse.com/644072" source="BUGZILLA"/>
		<reference ref_id="678130" ref_url="https://bugzilla.suse.com/678130" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0718" ref_url="https://www.suse.com/security/cve/CVE-2011-0718/" source="CVE"/>
		<description>

This update adds the following two fixes:

    * Do not create ssh key in rpm %post script (bnc#678130)
    * the bootstrap script should force the installation of ORG_CA_CERT rpm
    * Set a time delay even after unsuccessful logins, which previously
      allowed a remote attacker to guess account names. CVE-2011-0718 has
      been assigned to this issue.

How to apply this update:

   1. 

      Log in as root user to the SUSE Manager server.

   2. 

      Stop the Spacewalk service:
      spacewalk-service stop

   3. 

      Apply the patch using either zypper patch or YaST Online Update.

   4. 

      Start the Spacewalk service:
      spacewalk-service start

Security Issue reference:

    * CVE-2011-0718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0718&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-11"/>
	<updated date="2011-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/644072">SUSE bug 644072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678130">SUSE bug 678130</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0718/">CVE-2011-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569663" comment="rhnmd-5.3.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569664" comment="spacewalk-backend-libs-1.2.74-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569665" comment="spacewalk-certs-tools-1.2.2-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38575" version="1" class="patch">
	<metadata>
		<title>Security update for spacewalk</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="644072" ref_url="https://bugzilla.suse.com/644072" source="BUGZILLA"/>
		<reference ref_id="644080" ref_url="https://bugzilla.suse.com/644080" source="BUGZILLA"/>
		<reference ref_id="674315" ref_url="https://bugzilla.suse.com/674315" source="BUGZILLA"/>
		<reference ref_id="674344" ref_url="https://bugzilla.suse.com/674344" source="BUGZILLA"/>
		<reference ref_id="675021" ref_url="https://bugzilla.suse.com/675021" source="BUGZILLA"/>
		<reference ref_id="676677" ref_url="https://bugzilla.suse.com/676677" source="BUGZILLA"/>
		<reference ref_id="676699" ref_url="https://bugzilla.suse.com/676699" source="BUGZILLA"/>
		<reference ref_id="676718" ref_url="https://bugzilla.suse.com/676718" source="BUGZILLA"/>
		<reference ref_id="678126" ref_url="https://bugzilla.suse.com/678126" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0717" ref_url="https://www.suse.com/security/cve/CVE-2011-0717/" source="CVE"/>
		<reference ref_id="CVE-2011-0718" ref_url="https://www.suse.com/security/cve/CVE-2011-0718/" source="CVE"/>
		<description>

This update fixes the following bugs in the web user interface:

    * link the local documentation instead of the online versions
    * Leave out the proxy version check
    * fix navigation on the help page
    * shorten the action name before writing them to the database
    * Fix session handling. A SUSE Manager user able to pre-set the session
      cookie in a victim's browser to a valid value could use this flaw to
      hijack the victim's session after the next log in. (CVE-2011-0717)
    * Set a time delay even after unsuccessful logins, which previously
      allowed a remote attacker to guess account names (CVE-2011-0718).
    * Add missing dependencies

How to apply this update:

   1. 

      Log in as root user to the SUSE Manager server.

   2. 

      Stop the Spacewalk service:
      spacewalk-service stop

   3. 

      Apply the patch using either zypper patch or YaST Online Update.

   4. 

      Start the Spacewalk service:
      spacewalk-service start

Security Issue reference:

    * CVE-2011-0718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0718&gt;
    * CVE-2011-0717
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0717&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-22"/>
	<updated date="2011-03-22"/>
	<bugzilla href="https://bugzilla.suse.com/644072">SUSE bug 644072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644080">SUSE bug 644080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674315">SUSE bug 674315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674344">SUSE bug 674344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675021">SUSE bug 675021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676677">SUSE bug 676677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676699">SUSE bug 676699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676718">SUSE bug 676718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678126">SUSE bug 678126</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0717/">CVE-2011-0717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0718/">CVE-2011-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569666" comment="spacewalk-backend-libs-1.2.74-0.22.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38576" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1023233" ref_url="https://bugzilla.suse.com/1023233" source="BUGZILLA"/>
		<reference ref_id="1024406" ref_url="https://bugzilla.suse.com/1024406" source="BUGZILLA"/>
		<reference ref_id="1024714" ref_url="https://bugzilla.suse.com/1024714" source="BUGZILLA"/>
		<reference ref_id="1025312" ref_url="https://bugzilla.suse.com/1025312" source="BUGZILLA"/>
		<reference ref_id="1026633" ref_url="https://bugzilla.suse.com/1026633" source="BUGZILLA"/>
		<reference ref_id="1027426" ref_url="https://bugzilla.suse.com/1027426" source="BUGZILLA"/>
		<reference ref_id="1029755" ref_url="https://bugzilla.suse.com/1029755" source="BUGZILLA"/>
		<reference ref_id="1031667" ref_url="https://bugzilla.suse.com/1031667" source="BUGZILLA"/>
		<reference ref_id="1032256" ref_url="https://bugzilla.suse.com/1032256" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7470" ref_url="https://www.suse.com/security/cve/CVE-2017-7470/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002898.html" source="SUSE-SU"/>
		<description>

The following security issue in spacewalk-backend has been fixed:

- Non admin or disabled user cannot make changes to a system anymore using spacewalk-channel.
  (bsc#1026633, CVE-2017-7470)

Additionally, the following non-security issues have been fixed:

rhnlib:

- Support all TLS versions in rpclib. (bsc#1025312)

spacecmd:

- Improve output on error for listrepo. (bsc#1027426)
- Reword spacecmd removal message. (bsc#1024406)

spacewalk-backend:

- Do not fail with traceback when media.1 does not exist. (bsc#1032256)
- Create scap files directory beforehand. (bsc#1029755)
- Fix error if SPACEWALK_DEBUG_NO_REPORTS environment variable is not present.
- Don't skip 'rhnErrataPackage' cleanup during an errata update. (bsc#1023233)
- Add support for running spacewalk-debug without creating reports. (bsc#1024714)
- Set scap store directory mod to 775 and group owner to susemanager.
- incomplete_package_import: Do import rhnPackageFile as it breaks some package installations.
- Added traceback printing to the exception block.
- Change postgresql starting commands.

spacewalk-client-tools:

- Fix reboot message to use correct product name. (bsc#1031667)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023233">SUSE bug 1023233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024406">SUSE bug 1024406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024714">SUSE bug 1024714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025312">SUSE bug 1025312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026633">SUSE bug 1026633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027426">SUSE bug 1027426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029755">SUSE bug 1029755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031667">SUSE bug 1031667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032256">SUSE bug 1032256</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7470/">CVE-2017-7470</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569667" comment="rhnlib-2.5.84.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569668" comment="spacecmd-2.5.5.5-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569669" comment="spacewalk-backend-libs-2.5.24.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569670" comment="spacewalk-check-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569671" comment="spacewalk-client-setup-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569672" comment="spacewalk-client-tools-2.5.13.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38577" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1103696" ref_url="https://bugzilla.suse.com/1103696" source="BUGZILLA"/>
		<reference ref_id="1104034" ref_url="https://bugzilla.suse.com/1104034" source="BUGZILLA"/>
		<reference ref_id="1130040" ref_url="https://bugzilla.suse.com/1130040" source="BUGZILLA"/>
		<reference ref_id="1135881" ref_url="https://bugzilla.suse.com/1135881" source="BUGZILLA"/>
		<reference ref_id="1136029" ref_url="https://bugzilla.suse.com/1136029" source="BUGZILLA"/>
		<reference ref_id="1136480" ref_url="https://bugzilla.suse.com/1136480" source="BUGZILLA"/>
		<reference ref_id="1137715" ref_url="https://bugzilla.suse.com/1137715" source="BUGZILLA"/>
		<reference ref_id="1137940" ref_url="https://bugzilla.suse.com/1137940" source="BUGZILLA"/>
		<reference ref_id="1138313" ref_url="https://bugzilla.suse.com/1138313" source="BUGZILLA"/>
		<reference ref_id="1138358" ref_url="https://bugzilla.suse.com/1138358" source="BUGZILLA"/>
		<reference ref_id="1138494" ref_url="https://bugzilla.suse.com/1138494" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1139453" ref_url="https://bugzilla.suse.com/1139453" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143856" ref_url="https://bugzilla.suse.com/1143856" source="BUGZILLA"/>
		<reference ref_id="1144155" ref_url="https://bugzilla.suse.com/1144155" source="BUGZILLA"/>
		<reference ref_id="1144889" ref_url="https://bugzilla.suse.com/1144889" source="BUGZILLA"/>
		<reference ref_id="1148125" ref_url="https://bugzilla.suse.com/1148125" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1148311" ref_url="https://bugzilla.suse.com/1148311" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10136" ref_url="https://www.suse.com/security/cve/CVE-2019-10136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005884.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

mgr-cfg:

- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-daemon:

- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Fix obsolete for old osad packages, to allow installing mgr-osad
  even by using osad at yum/zyppper install (bsc#1139453)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-virtualization:

- Fix missing python 3 ugettext (bsc#1138494)
- Fix package dependencies to prevent file conflict (bsc#1143856)

rhnlib:

- Add SNI support for clients
- Fix initialize ssl connection (bsc#1144155)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)
    
python-gzipstream:

- SPEC cleanup
- add makefile and pylint configuration
- Add Uyuni URL to package
- Bump version to 4.0.0 (bsc#1104034)
- Fix copyright for the package specfile (bsc#1103696)

spacecmd:

- Bugfix: referenced variable before assignment.
- Bugfix: 'dict' object has no attribute 'iteritems' (bsc#1135881)
- Add unit tests for custominfo, snippet, scap, ssm, cryptokey and distribution
- Fix missing runtime dependencies that made spacecmd return old versions of
  packages in some cases, even if newer ones were available (bsc#1148311)


spacewalk-backend:

- Do not overwrite comps and module data with older versions
- Fix issue with 'dists' keyword in url hostname
- Import packages from all collections of a patch not just first one
- Ensure bytes type when using hashlib to avoid traceback
  on XMLRPC call to 'registration.register_osad' (bsc#1138822)
- Do not duplicate 'http://' protocol when using proxies with 'deb'
  repositories (bsc#1138313)
- Fix reposync when dealing with RedHat CDN (bsc#1138358)
- Fix for CVE-2019-10136. An attacker with a valid, but expired,
  authenticated set of headers could move some digits around,
  artificially extending the session validity without modifying
  the checksum. (bsc#1136480)
- Prevent FileNotFoundError: repomd.xml.key traceback (bsc#1137940)
- Add journalctl output to spacewalk-debug tarballs
- Prevent unnecessary triggering of channel-repodata tasks when GPG
  signing is disabled (bsc#1137715)
- Fix spacewalk-repo-sync for Ubuntu repositories in mirror case (bsc#1136029)
- Add support for ULN repositories on new Zypper based reposync.
- Don't skip Deb package tags on package import (bsc#1130040)
- For backend-libs subpackages, exclude files for the server
  (already part of spacewalk-backend) to avoid conflicts (bsc#1148125)
- prevent duplicate key violates on repo-sync with long changelog
  entries (bsc#1144889)

spacewalk-remote-utils:

- Add RHEL8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103696">SUSE bug 1103696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104034">SUSE bug 1104034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130040">SUSE bug 1130040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135881">SUSE bug 1135881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136029">SUSE bug 1136029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136480">SUSE bug 1136480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137715">SUSE bug 1137715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137940">SUSE bug 1137940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138313">SUSE bug 1138313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138358">SUSE bug 1138358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138494">SUSE bug 1138494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139453">SUSE bug 1139453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143856">SUSE bug 1143856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144155">SUSE bug 1144155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144889">SUSE bug 1144889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148125">SUSE bug 1148125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148311">SUSE bug 1148311</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10136/">CVE-2019-10136</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569673" comment="mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569674" comment="mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569675" comment="mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569676" comment="mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569677" comment="mgr-daemon-4.0.7-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569678" comment="mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569679" comment="mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569680" comment="python2-mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569681" comment="python2-mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569682" comment="python2-mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569683" comment="python2-mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569684" comment="python2-mgr-osa-common-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569685" comment="python2-mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569686" comment="python2-mgr-virtualization-common-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569687" comment="python2-mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569688" comment="python2-rhnlib-4.0.11-12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569689" comment="spacecmd-4.0.14-18.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569690" comment="spacewalk-backend-libs-4.0.25-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569691" comment="spacewalk-remote-utils-4.0.5-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38578" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1167907" ref_url="https://bugzilla.suse.com/1167907" source="BUGZILLA"/>
		<reference ref_id="1169664" ref_url="https://bugzilla.suse.com/1169664" source="BUGZILLA"/>
		<reference ref_id="1176978" ref_url="https://bugzilla.suse.com/1176978" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Fix parsing cobbler dictionary options with values containing '=', e.g. kernel params containing '=' (bsc#1176978)

mgr-daemon:

- Update translation strings

salt:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)

spacecmd:

- Python3 fixes for errata in spacecmd (bsc#1169664)
- Added support for i18n of user-facing strings
- Python3 fix for sorted usage (bsc#1167907)

spacewalk-client-tools:

- Remove RH references in Python/Ruby localization and use the product name instead

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1167907">SUSE bug 1167907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176978">SUSE bug 1176978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569692" comment="koan-2.2.2-0.68.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569693" comment="mgr-daemon-4.1.3-5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569694" comment="python2-spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569695" comment="python2-spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569696" comment="python2-spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569697" comment="salt-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569698" comment="salt-doc-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569699" comment="salt-minion-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569700" comment="spacecmd-4.1.8-18.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569701" comment="spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569702" comment="spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569703" comment="spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38579" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1173557" ref_url="https://bugzilla.suse.com/1173557" source="BUGZILLA"/>
		<reference ref_id="1177884" ref_url="https://bugzilla.suse.com/1177884" source="BUGZILLA"/>
		<reference ref_id="1177928" ref_url="https://bugzilla.suse.com/1177928" source="BUGZILLA"/>
		<reference ref_id="1180583" ref_url="https://bugzilla.suse.com/1180583" source="BUGZILLA"/>
		<reference ref_id="1180584" ref_url="https://bugzilla.suse.com/1180584" source="BUGZILLA"/>
		<reference ref_id="1180585" ref_url="https://bugzilla.suse.com/1180585" source="BUGZILLA"/>
		<reference ref_id="1185178" ref_url="https://bugzilla.suse.com/1185178" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009060.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-wrouesnel-postgres_exporter:

- Add support for aarch64

mgr-cfg:

- SPEC: Updated Python definitions for RHEL8 and quoted text comparisons.

mgr-custom-info:

- Update package version to 4.2.0

mgr-daemon:

- Update translation strings
- Update the translations from weblate
- Added quotes around %{_vendor} token for the if statements in spec file.
- Fix removal of mgr-deamon with selinux enabled (bsc#1177928)
- Updating translations from weblate

mgr-osad:

- Change the log file permissions as expected by logrotate (bsc#1177884)
- Change deprecated path /var/run into /run for systemd (bsc#1185178)
- Python fixes
- Removal of RHEL5

mgr-push:

- Defined __python for python2.
- Excluded RHEL8 for Python 2 build.

mgr-virtualization:

- Update package version to 4.2.0

rhnlib:

- Update package version to 4.2.0

salt:

- Prevent command injection in the snapper module (bsc#1185281) (CVE-2021-31607)

spacecmd:

- Rename system migration to system transfer
- Rename SP to product migration
- Update translation strings
- Add group_addconfigchannel and group_removeconfigchannel
- Add group_listconfigchannels and configchannel_listgroups
- Fix spacecmd compat with Python 3
- Deprecated 'Software Crashes' feature
- Document advanced package search on '--help' (bsc#1180583)
- Fixed advanced search on 'package_listinstalledsystems'
- Fixed duplicate results when using multiple search criteria (bsc#1180585)
- Fixed 'non-advanced' package search when using multiple package names (bsc#1180584)
- Update translations
- Fix: make spacecmd build on Debian
- Add Service Pack migration operations (bsc#1173557)

spacewalk-client-tools:

- Update the translations from weblate
- Drop the --noSSLServerURL option
- Updated RHEL Python requirements.
- Added quotes around %{_vendor}.

spacewalk-koan:

- Fix for spacewalk-koan test

spacewalk-oscap:

- Update package version to 4.2.0

spacewalk-remote-utils:

- Update package version to 4.2.0

supportutils-plugin-susemanager-client:

- Update package version to 4.2.0

suseRegisterInfo:

- Add support for Amazon Linux 2
- Add support for Alibaba Cloud Linux 2
- Adapted for RHEL build.

uyuni-base:
- Added Apache as prerequisite for RHEL and Fedora (due to required users).
- Removed RHEL specific folder rights from SPEC file.
- Added RHEL8 compatibility.

uyuni-common-libs:

- Cleaning up unused Python 2 build leftovers.
- Disabled debug package build.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173557">SUSE bug 1173557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177884">SUSE bug 1177884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177928">SUSE bug 1177928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180583">SUSE bug 1180583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180584">SUSE bug 1180584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180585">SUSE bug 1180585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185178">SUSE bug 1185178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569704" comment="golang-github-wrouesnel-postgres_exporter-0.4.7-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569705" comment="mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569706" comment="mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569707" comment="mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569708" comment="mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569709" comment="mgr-custom-info-4.2.1-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569710" comment="mgr-daemon-4.2.7-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569711" comment="mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569712" comment="mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569713" comment="mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569714" comment="python2-mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569715" comment="python2-mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569716" comment="python2-mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569717" comment="python2-mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569718" comment="python2-mgr-osa-common-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569719" comment="python2-mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569720" comment="python2-mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569721" comment="python2-mgr-virtualization-common-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569722" comment="python2-mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569723" comment="python2-rhnlib-4.2.3-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569724" comment="python2-spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569725" comment="python2-spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569726" comment="python2-spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569727" comment="python2-spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569728" comment="python2-spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569729" comment="python2-suseRegisterInfo-4.2.3-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569730" comment="python2-uyuni-common-libs-4.2.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569731" comment="salt-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569732" comment="salt-doc-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569733" comment="salt-minion-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569734" comment="spacecmd-4.2.8-18.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569735" comment="spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569736" comment="spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569737" comment="spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569738" comment="spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569739" comment="spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569740" comment="spacewalk-remote-utils-4.2.1-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569741" comment="supportutils-plugin-susemanager-client-4.2.2-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569742" comment="suseRegisterInfo-4.2.3-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38580" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1188977" ref_url="https://bugzilla.suse.com/1188977" source="BUGZILLA"/>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="1190512" ref_url="https://bugzilla.suse.com/1190512" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009670.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

salt:

- Exclude the full path of a download URL to prevent injection of
  malicious code (bsc#1190265) (CVE-2021-21996)

spacecmd:

- Version 4.2.13-1
  * Update translation strings
  * configchannel_updatefile handles directory properly (bsc#1190512)
  * Add schedule_archivecompleted to mass archive actions (bsc#1181223)
  * Remove whoami from the list of unauthenticated commands (bsc#1188977)

spacewalk-client-tools:

- Version 4.2.14-1
  * Update translation strings

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188977">SUSE bug 1188977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190512">SUSE bug 1190512</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651453" comment="python2-spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651454" comment="python2-spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651455" comment="python2-spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651456" comment="salt-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651457" comment="salt-doc-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651458" comment="salt-minion-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651459" comment="spacecmd-4.2.13-18.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651460" comment="spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651461" comment="spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651462" comment="spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38581" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1074594" ref_url="https://bugzilla.suse.com/1074594" source="BUGZILLA"/>
		<reference ref_id="1090205" ref_url="https://bugzilla.suse.com/1090205" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004198.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2017-1000469: Escape shell parameters provided by the user for the reposync action. (bsc#1074594)
- Fix for calling koan with virt_type kvm. (bsc#1090205)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090205">SUSE bug 1090205</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569743" comment="koan-2.2.2-0.68.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38582" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1104189" ref_url="https://bugzilla.suse.com/1104189" source="BUGZILLA"/>
		<reference ref_id="1104287" ref_url="https://bugzilla.suse.com/1104287" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004506.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

Security issue fixed:

- CVE-2018-10931: Forbid exposure of private methods in the API (bsc#1104287, bsc#1104189)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569744" comment="koan-2.2.2-0.68.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38583" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1193671" ref_url="https://bugzilla.suse.com/1193671" source="BUGZILLA"/>
		<reference ref_id="1195906" ref_url="https://bugzilla.suse.com/1195906" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45083" ref_url="https://www.suse.com/security/cve/CVE-2021-45083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010255.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).

The following non-security bugs were fixed:

- Move configuration files ownership to apache (bsc#1195906)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193671">SUSE bug 1193671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195906">SUSE bug 1195906</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-45083/">CVE-2021-45083</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668399" comment="koan-2.2.2-0.68.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38584" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562788" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38585" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00048.html" source="SUSE-SU"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569745" comment="python-pycrypto-2.6.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38586" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1051948" ref_url="https://bugzilla.suse.com/1051948" source="BUGZILLA"/>
		<reference ref_id="1052264" ref_url="https://bugzilla.suse.com/1052264" source="BUGZILLA"/>
		<reference ref_id="1053376" ref_url="https://bugzilla.suse.com/1053376" source="BUGZILLA"/>
		<reference ref_id="1053955" ref_url="https://bugzilla.suse.com/1053955" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003279.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issue has been fixed:

- CVE-2017-12791: Directory traversal vulnerability in minion id validation
  allowed remote minions with incorrect credentials to authenticate to a master
  via a crafted minion ID (bsc#1053955).

Additionally, the following non-security issues have been fixed:

- Added support for SUSE Manager scalability features. (bsc#1052264)
- Introduced the kubernetes module. (bsc#1051948)
- Notify systemd synchronously via NOTIFY_SOCKET. (bsc#1053376)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051948">SUSE bug 1051948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052264">SUSE bug 1052264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053376">SUSE bug 1053376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569746" comment="salt-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569747" comment="salt-doc-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569748" comment="salt-minion-2016.11.4-43.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38587" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1041993" ref_url="https://bugzilla.suse.com/1041993" source="BUGZILLA"/>
		<reference ref_id="1042749" ref_url="https://bugzilla.suse.com/1042749" source="BUGZILLA"/>
		<reference ref_id="1050003" ref_url="https://bugzilla.suse.com/1050003" source="BUGZILLA"/>
		<reference ref_id="1059291" ref_url="https://bugzilla.suse.com/1059291" source="BUGZILLA"/>
		<reference ref_id="1059758" ref_url="https://bugzilla.suse.com/1059758" source="BUGZILLA"/>
		<reference ref_id="1060230" ref_url="https://bugzilla.suse.com/1060230" source="BUGZILLA"/>
		<reference ref_id="1062462" ref_url="https://bugzilla.suse.com/1062462" source="BUGZILLA"/>
		<reference ref_id="1062464" ref_url="https://bugzilla.suse.com/1062464" source="BUGZILLA"/>
		<reference ref_id="985112" ref_url="https://bugzilla.suse.com/985112" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003543.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issues have been fixed:

- CVE-2017-14695: A directory traversal vulnerability in minion id validation allowed remote minions with incorrect
  credentials to authenticate to a master via a crafted minion ID. (bsc#1062462)
- CVE-2017-14696: It was possible to force a remote Denial of Service with a specially crafted authentication 
  request. (bsc#1062464)

Additionally, the following non-security issues have been fixed:

- Removed deprecation warning for beacon configuration using dictionaries. (bsc#1041993)
- Fixed beacons failure when pillar-based suppressing config-based. (bsc#1060230)
- Fixed minion resource exhaustion when many functions are being executed in parallel. (bsc#1059758)
- Remove 'TasksTask' attribute from salt-master.service in older versions of systemd. (bsc#985112)
- Fix for delete_deployment in Kubernetes module. (bsc#1059291)
- Catching error when PIDfile cannot be deleted. (bsc#1050003)
- Use $HOME to get the user home directory instead using '~' char. (bsc#1042749)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041993">SUSE bug 1041993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042749">SUSE bug 1042749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050003">SUSE bug 1050003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059291">SUSE bug 1059291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059758">SUSE bug 1059758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060230">SUSE bug 1060230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062464">SUSE bug 1062464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985112">SUSE bug 985112</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569749" comment="salt-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569750" comment="salt-doc-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569751" comment="salt-minion-2016.11.4-43.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38588" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1113698" ref_url="https://bugzilla.suse.com/1113698" source="BUGZILLA"/>
		<reference ref_id="1113699" ref_url="https://bugzilla.suse.com/1113699" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Salt was updated to version 2016.11.10 and contains the following fixes:

Security issues fixed:

- CVE-2018-15750: Fixed directory traversal vulnerability in salt-api (bsc#1113698).
- CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi) that allows to execute arbitrary commands (bsc#1113699).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569752" comment="salt-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569753" comment="salt-doc-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569754" comment="salt-minion-2016.11.10-43.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38589" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972</cve>
	<cve impact="important" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569755" comment="salt-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569756" comment="salt-doc-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569757" comment="salt-minion-2016.11.10-43.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38590" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1011800" ref_url="https://bugzilla.suse.com/1011800" source="BUGZILLA"/>
		<reference ref_id="1012999" ref_url="https://bugzilla.suse.com/1012999" source="BUGZILLA"/>
		<reference ref_id="1017078" ref_url="https://bugzilla.suse.com/1017078" source="BUGZILLA"/>
		<reference ref_id="1020831" ref_url="https://bugzilla.suse.com/1020831" source="BUGZILLA"/>
		<reference ref_id="1022562" ref_url="https://bugzilla.suse.com/1022562" source="BUGZILLA"/>
		<reference ref_id="1025896" ref_url="https://bugzilla.suse.com/1025896" source="BUGZILLA"/>
		<reference ref_id="1027240" ref_url="https://bugzilla.suse.com/1027240" source="BUGZILLA"/>
		<reference ref_id="1027722" ref_url="https://bugzilla.suse.com/1027722" source="BUGZILLA"/>
		<reference ref_id="1030009" ref_url="https://bugzilla.suse.com/1030009" source="BUGZILLA"/>
		<reference ref_id="1030073" ref_url="https://bugzilla.suse.com/1030073" source="BUGZILLA"/>
		<reference ref_id="1032931" ref_url="https://bugzilla.suse.com/1032931" source="BUGZILLA"/>
		<reference ref_id="1035912" ref_url="https://bugzilla.suse.com/1035912" source="BUGZILLA"/>
		<reference ref_id="1035914" ref_url="https://bugzilla.suse.com/1035914" source="BUGZILLA"/>
		<reference ref_id="1036125" ref_url="https://bugzilla.suse.com/1036125" source="BUGZILLA"/>
		<reference ref_id="1038855" ref_url="https://bugzilla.suse.com/1038855" source="BUGZILLA"/>
		<reference ref_id="1039370" ref_url="https://bugzilla.suse.com/1039370" source="BUGZILLA"/>
		<reference ref_id="1040584" ref_url="https://bugzilla.suse.com/1040584" source="BUGZILLA"/>
		<reference ref_id="1040886" ref_url="https://bugzilla.suse.com/1040886" source="BUGZILLA"/>
		<reference ref_id="1043111" ref_url="https://bugzilla.suse.com/1043111" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5200" ref_url="https://www.suse.com/security/cve/CVE-2017-5200/" source="CVE"/>
		<reference ref_id="CVE-2017-8109" ref_url="https://www.suse.com/security/cve/CVE-2017-8109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002947.html" source="SUSE-SU"/>
		<description>

This update for salt provides version 2016.11.4 and brings various fixes and improvements:

- Adding a salt-minion watchdog for RHEL6 and SLES11 systems (sysV) to restart salt-minion in case of crashes during upgrade.
- Fix format error. (bsc#1043111)
- Fix ownership for whole master cache directory. (bsc#1035914)
- Disable 3rd party runtime packages to be explicitly recommended. (bsc#1040886)    
- Fix insecure permissions in salt-ssh temporary files. (bsc#1035912, CVE-2017-8109)
- Disable custom rosters for Salt SSH via Salt API. (bsc#1011800, CVE-2017-5200)
- Orchestrate and batches don't return false failed information anymore.
- Speed-up cherrypy by removing sleep call.
- Fix os_family grains on SUSE. (bsc#1038855)
- Fix setting the language on SUSE systems. (bsc#1038855)
- Use SUSE specific salt-api.service. (bsc#1039370)
- Fix using hostname for minion ID as '127'.
- Fix core grains constants for timezone. (bsc#1032931)
- Minor fixes on new pkg.list_downloaded.
- Listing all type of advisory patches for Yum module.
- Prevents zero length error on Python 2.6.
- Fixes zypper test error after backporting.
- Raet protocol is no longer supported. (bsc#1020831)
- Fix moving SSH data to the new home. (bsc#1027722)
- Fix logrotating /var/log/salt/minion. (bsc#1030009)
- Fix result of master_tops extension is mutually overwritten. (bsc#1030073)
- Allows to set 'timeout' and 'gather_job_timeout' via kwargs.
- Allows to set custom timeouts for 'manage.up' and 'manage.status'.
- Use salt's ordereddict for comparison.
- Fix scripts for salt-proxy.
- Add openscap module.
- File.get_managed regression fix.
- Fix translate variable arguments if they contain hidden keywords. (bsc#1025896)
- Added unit test for dockerng.sls_build dryrun.
- Added dryrun to dockerng.sls_build.
- Update dockerng minimal version requirements.
- Fix format error in error parsing.
- Keep fix for migrating salt home directory. (bsc#1022562)
- Fix  salt pkg.latest raises exception if package is not available. (bsc#1012999)
- Timezone should always be in UTC. (bsc#1017078)
- Fix timezone handling for rpm installtime. (bsc#1017078)
- Increasing timeouts for running integrations tests.
- Add buildargs option to dockerng.build module.
- Fix error when missing ssh-option parameter.
- Re-add yum notify plugin.
- All kwargs to dockerng.create to provide all features to sls_build as well.
- Datetime should be returned always in UTC.
- Fix possible crash  while deserialising data on infinite recursion in scheduled state. (bsc#1036125)
- Documentation refresh to 2016.11.4
- For a detailed description, please refer to:
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.4.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.3.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.2.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.1.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011800">SUSE bug 1011800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012999">SUSE bug 1012999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017078">SUSE bug 1017078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020831">SUSE bug 1020831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022562">SUSE bug 1022562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025896">SUSE bug 1025896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027240">SUSE bug 1027240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027722">SUSE bug 1027722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030009">SUSE bug 1030009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030073">SUSE bug 1030073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032931">SUSE bug 1032931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035912">SUSE bug 1035912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035914">SUSE bug 1035914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036125">SUSE bug 1036125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038855">SUSE bug 1038855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039370">SUSE bug 1039370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040584">SUSE bug 1040584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040886">SUSE bug 1040886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043111">SUSE bug 1043111</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5200/">CVE-2017-5200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8109/">CVE-2017-8109</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569758" comment="salt-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569759" comment="salt-doc-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569760" comment="salt-minion-2016.11.4-42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38591" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1140255" ref_url="https://bugzilla.suse.com/1140255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

- CVE-2019-13132: An unauthenticated remote attacker could have exploited
  a stack overflow vulnerability on a server that is supposed to be protected
  by encryption and authentication to potentially gain a remote code execution.
  (bsc#1140255)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569761" comment="libzmq3-4.0.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38592" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1023233" ref_url="https://bugzilla.suse.com/1023233" source="BUGZILLA"/>
		<reference ref_id="1024406" ref_url="https://bugzilla.suse.com/1024406" source="BUGZILLA"/>
		<reference ref_id="1024714" ref_url="https://bugzilla.suse.com/1024714" source="BUGZILLA"/>
		<reference ref_id="1025312" ref_url="https://bugzilla.suse.com/1025312" source="BUGZILLA"/>
		<reference ref_id="1026633" ref_url="https://bugzilla.suse.com/1026633" source="BUGZILLA"/>
		<reference ref_id="1027426" ref_url="https://bugzilla.suse.com/1027426" source="BUGZILLA"/>
		<reference ref_id="1029755" ref_url="https://bugzilla.suse.com/1029755" source="BUGZILLA"/>
		<reference ref_id="1031667" ref_url="https://bugzilla.suse.com/1031667" source="BUGZILLA"/>
		<reference ref_id="1032256" ref_url="https://bugzilla.suse.com/1032256" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7470" ref_url="https://www.suse.com/security/cve/CVE-2017-7470/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002898.html" source="SUSE-SU"/>
		<description>

The following security issue in spacewalk-backend has been fixed:

- Non admin or disabled user cannot make changes to a system anymore using spacewalk-channel.
  (bsc#1026633, CVE-2017-7470)

Additionally, the following non-security issues have been fixed:

rhnlib:

- Support all TLS versions in rpclib. (bsc#1025312)

spacecmd:

- Improve output on error for listrepo. (bsc#1027426)
- Reword spacecmd removal message. (bsc#1024406)

spacewalk-backend:

- Do not fail with traceback when media.1 does not exist. (bsc#1032256)
- Create scap files directory beforehand. (bsc#1029755)
- Fix error if SPACEWALK_DEBUG_NO_REPORTS environment variable is not present.
- Don't skip 'rhnErrataPackage' cleanup during an errata update. (bsc#1023233)
- Add support for running spacewalk-debug without creating reports. (bsc#1024714)
- Set scap store directory mod to 775 and group owner to susemanager.
- incomplete_package_import: Do import rhnPackageFile as it breaks some package installations.
- Added traceback printing to the exception block.
- Change postgresql starting commands.

spacewalk-client-tools:

- Fix reboot message to use correct product name. (bsc#1031667)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023233">SUSE bug 1023233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024406">SUSE bug 1024406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024714">SUSE bug 1024714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025312">SUSE bug 1025312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026633">SUSE bug 1026633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027426">SUSE bug 1027426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029755">SUSE bug 1029755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031667">SUSE bug 1031667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032256">SUSE bug 1032256</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7470/">CVE-2017-7470</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569667" comment="rhnlib-2.5.84.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569668" comment="spacecmd-2.5.5.5-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569669" comment="spacewalk-backend-libs-2.5.24.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569670" comment="spacewalk-check-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569671" comment="spacewalk-client-setup-2.5.13.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569672" comment="spacewalk-client-tools-2.5.13.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38593" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1103696" ref_url="https://bugzilla.suse.com/1103696" source="BUGZILLA"/>
		<reference ref_id="1104034" ref_url="https://bugzilla.suse.com/1104034" source="BUGZILLA"/>
		<reference ref_id="1130040" ref_url="https://bugzilla.suse.com/1130040" source="BUGZILLA"/>
		<reference ref_id="1135881" ref_url="https://bugzilla.suse.com/1135881" source="BUGZILLA"/>
		<reference ref_id="1136029" ref_url="https://bugzilla.suse.com/1136029" source="BUGZILLA"/>
		<reference ref_id="1136480" ref_url="https://bugzilla.suse.com/1136480" source="BUGZILLA"/>
		<reference ref_id="1137715" ref_url="https://bugzilla.suse.com/1137715" source="BUGZILLA"/>
		<reference ref_id="1137940" ref_url="https://bugzilla.suse.com/1137940" source="BUGZILLA"/>
		<reference ref_id="1138313" ref_url="https://bugzilla.suse.com/1138313" source="BUGZILLA"/>
		<reference ref_id="1138358" ref_url="https://bugzilla.suse.com/1138358" source="BUGZILLA"/>
		<reference ref_id="1138494" ref_url="https://bugzilla.suse.com/1138494" source="BUGZILLA"/>
		<reference ref_id="1138822" ref_url="https://bugzilla.suse.com/1138822" source="BUGZILLA"/>
		<reference ref_id="1139453" ref_url="https://bugzilla.suse.com/1139453" source="BUGZILLA"/>
		<reference ref_id="1142038" ref_url="https://bugzilla.suse.com/1142038" source="BUGZILLA"/>
		<reference ref_id="1143856" ref_url="https://bugzilla.suse.com/1143856" source="BUGZILLA"/>
		<reference ref_id="1144155" ref_url="https://bugzilla.suse.com/1144155" source="BUGZILLA"/>
		<reference ref_id="1144889" ref_url="https://bugzilla.suse.com/1144889" source="BUGZILLA"/>
		<reference ref_id="1148125" ref_url="https://bugzilla.suse.com/1148125" source="BUGZILLA"/>
		<reference ref_id="1148177" ref_url="https://bugzilla.suse.com/1148177" source="BUGZILLA"/>
		<reference ref_id="1148311" ref_url="https://bugzilla.suse.com/1148311" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10136" ref_url="https://www.suse.com/security/cve/CVE-2019-10136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005884.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

mgr-cfg:

- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-daemon:

- Fix systemd timer configuration on SLE12 (bsc#1142038)

mgr-osad:

- Fix obsolete for old osad packages, to allow installing mgr-osad
  even by using osad at yum/zyppper install (bsc#1139453)
- Ensure bytes type when using hashlib to avoid traceback (bsc#1138822)

mgr-virtualization:

- Fix missing python 3 ugettext (bsc#1138494)
- Fix package dependencies to prevent file conflict (bsc#1143856)

rhnlib:

- Add SNI support for clients
- Fix initialize ssl connection (bsc#1144155)
- Fix bootstrapping SLE11SP4 trad client with SSL enabled (bsc#1148177)
    
python-gzipstream:

- SPEC cleanup
- add makefile and pylint configuration
- Add Uyuni URL to package
- Bump version to 4.0.0 (bsc#1104034)
- Fix copyright for the package specfile (bsc#1103696)

spacecmd:

- Bugfix: referenced variable before assignment.
- Bugfix: 'dict' object has no attribute 'iteritems' (bsc#1135881)
- Add unit tests for custominfo, snippet, scap, ssm, cryptokey and distribution
- Fix missing runtime dependencies that made spacecmd return old versions of
  packages in some cases, even if newer ones were available (bsc#1148311)


spacewalk-backend:

- Do not overwrite comps and module data with older versions
- Fix issue with 'dists' keyword in url hostname
- Import packages from all collections of a patch not just first one
- Ensure bytes type when using hashlib to avoid traceback
  on XMLRPC call to 'registration.register_osad' (bsc#1138822)
- Do not duplicate 'http://' protocol when using proxies with 'deb'
  repositories (bsc#1138313)
- Fix reposync when dealing with RedHat CDN (bsc#1138358)
- Fix for CVE-2019-10136. An attacker with a valid, but expired,
  authenticated set of headers could move some digits around,
  artificially extending the session validity without modifying
  the checksum. (bsc#1136480)
- Prevent FileNotFoundError: repomd.xml.key traceback (bsc#1137940)
- Add journalctl output to spacewalk-debug tarballs
- Prevent unnecessary triggering of channel-repodata tasks when GPG
  signing is disabled (bsc#1137715)
- Fix spacewalk-repo-sync for Ubuntu repositories in mirror case (bsc#1136029)
- Add support for ULN repositories on new Zypper based reposync.
- Don't skip Deb package tags on package import (bsc#1130040)
- For backend-libs subpackages, exclude files for the server
  (already part of spacewalk-backend) to avoid conflicts (bsc#1148125)
- prevent duplicate key violates on repo-sync with long changelog
  entries (bsc#1144889)

spacewalk-remote-utils:

- Add RHEL8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103696">SUSE bug 1103696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104034">SUSE bug 1104034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130040">SUSE bug 1130040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135881">SUSE bug 1135881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136029">SUSE bug 1136029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136480">SUSE bug 1136480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137715">SUSE bug 1137715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137940">SUSE bug 1137940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138313">SUSE bug 1138313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138358">SUSE bug 1138358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138494">SUSE bug 1138494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138822">SUSE bug 1138822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139453">SUSE bug 1139453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142038">SUSE bug 1142038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143856">SUSE bug 1143856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144155">SUSE bug 1144155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144889">SUSE bug 1144889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148125">SUSE bug 1148125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148177">SUSE bug 1148177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148311">SUSE bug 1148311</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10136/">CVE-2019-10136</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569673" comment="mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569674" comment="mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569675" comment="mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569676" comment="mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569677" comment="mgr-daemon-4.0.7-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569678" comment="mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569679" comment="mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569680" comment="python2-mgr-cfg-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569681" comment="python2-mgr-cfg-actions-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569682" comment="python2-mgr-cfg-client-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569683" comment="python2-mgr-cfg-management-4.0.9-5.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569684" comment="python2-mgr-osa-common-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569685" comment="python2-mgr-osad-4.0.9-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569686" comment="python2-mgr-virtualization-common-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569687" comment="python2-mgr-virtualization-host-4.0.8-5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569688" comment="python2-rhnlib-4.0.11-12.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569689" comment="spacecmd-4.0.14-18.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569690" comment="spacewalk-backend-libs-4.0.25-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569691" comment="spacewalk-remote-utils-4.0.5-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38594" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1167907" ref_url="https://bugzilla.suse.com/1167907" source="BUGZILLA"/>
		<reference ref_id="1169664" ref_url="https://bugzilla.suse.com/1169664" source="BUGZILLA"/>
		<reference ref_id="1176978" ref_url="https://bugzilla.suse.com/1176978" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

cobbler:

- Fix parsing cobbler dictionary options with values containing '=', e.g. kernel params containing '=' (bsc#1176978)

mgr-daemon:

- Update translation strings

salt:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)

spacecmd:

- Python3 fixes for errata in spacecmd (bsc#1169664)
- Added support for i18n of user-facing strings
- Python3 fix for sorted usage (bsc#1167907)

spacewalk-client-tools:

- Remove RH references in Python/Ruby localization and use the product name instead

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1167907">SUSE bug 1167907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176978">SUSE bug 1176978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569692" comment="koan-2.2.2-0.68.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569693" comment="mgr-daemon-4.1.3-5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569694" comment="python2-spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569695" comment="python2-spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569696" comment="python2-spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569697" comment="salt-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569698" comment="salt-doc-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569699" comment="salt-minion-2016.11.10-43.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569700" comment="spacecmd-4.1.8-18.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569701" comment="spacewalk-check-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569702" comment="spacewalk-client-setup-4.1.7-27.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569703" comment="spacewalk-client-tools-4.1.7-27.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38595" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1173557" ref_url="https://bugzilla.suse.com/1173557" source="BUGZILLA"/>
		<reference ref_id="1177884" ref_url="https://bugzilla.suse.com/1177884" source="BUGZILLA"/>
		<reference ref_id="1177928" ref_url="https://bugzilla.suse.com/1177928" source="BUGZILLA"/>
		<reference ref_id="1180583" ref_url="https://bugzilla.suse.com/1180583" source="BUGZILLA"/>
		<reference ref_id="1180584" ref_url="https://bugzilla.suse.com/1180584" source="BUGZILLA"/>
		<reference ref_id="1180585" ref_url="https://bugzilla.suse.com/1180585" source="BUGZILLA"/>
		<reference ref_id="1185178" ref_url="https://bugzilla.suse.com/1185178" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009060.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-wrouesnel-postgres_exporter:

- Add support for aarch64

mgr-cfg:

- SPEC: Updated Python definitions for RHEL8 and quoted text comparisons.

mgr-custom-info:

- Update package version to 4.2.0

mgr-daemon:

- Update translation strings
- Update the translations from weblate
- Added quotes around %{_vendor} token for the if statements in spec file.
- Fix removal of mgr-deamon with selinux enabled (bsc#1177928)
- Updating translations from weblate

mgr-osad:

- Change the log file permissions as expected by logrotate (bsc#1177884)
- Change deprecated path /var/run into /run for systemd (bsc#1185178)
- Python fixes
- Removal of RHEL5

mgr-push:

- Defined __python for python2.
- Excluded RHEL8 for Python 2 build.

mgr-virtualization:

- Update package version to 4.2.0

rhnlib:

- Update package version to 4.2.0

salt:

- Prevent command injection in the snapper module (bsc#1185281) (CVE-2021-31607)

spacecmd:

- Rename system migration to system transfer
- Rename SP to product migration
- Update translation strings
- Add group_addconfigchannel and group_removeconfigchannel
- Add group_listconfigchannels and configchannel_listgroups
- Fix spacecmd compat with Python 3
- Deprecated 'Software Crashes' feature
- Document advanced package search on '--help' (bsc#1180583)
- Fixed advanced search on 'package_listinstalledsystems'
- Fixed duplicate results when using multiple search criteria (bsc#1180585)
- Fixed 'non-advanced' package search when using multiple package names (bsc#1180584)
- Update translations
- Fix: make spacecmd build on Debian
- Add Service Pack migration operations (bsc#1173557)

spacewalk-client-tools:

- Update the translations from weblate
- Drop the --noSSLServerURL option
- Updated RHEL Python requirements.
- Added quotes around %{_vendor}.

spacewalk-koan:

- Fix for spacewalk-koan test

spacewalk-oscap:

- Update package version to 4.2.0

spacewalk-remote-utils:

- Update package version to 4.2.0

supportutils-plugin-susemanager-client:

- Update package version to 4.2.0

suseRegisterInfo:

- Add support for Amazon Linux 2
- Add support for Alibaba Cloud Linux 2
- Adapted for RHEL build.

uyuni-base:
- Added Apache as prerequisite for RHEL and Fedora (due to required users).
- Removed RHEL specific folder rights from SPEC file.
- Added RHEL8 compatibility.

uyuni-common-libs:

- Cleaning up unused Python 2 build leftovers.
- Disabled debug package build.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173557">SUSE bug 1173557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177884">SUSE bug 1177884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177928">SUSE bug 1177928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180583">SUSE bug 1180583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180584">SUSE bug 1180584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180585">SUSE bug 1180585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185178">SUSE bug 1185178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569704" comment="golang-github-wrouesnel-postgres_exporter-0.4.7-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569705" comment="mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569706" comment="mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569707" comment="mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569708" comment="mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569709" comment="mgr-custom-info-4.2.1-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569710" comment="mgr-daemon-4.2.7-5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569711" comment="mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569712" comment="mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569713" comment="mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569714" comment="python2-mgr-cfg-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569715" comment="python2-mgr-cfg-actions-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569716" comment="python2-mgr-cfg-client-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569717" comment="python2-mgr-cfg-management-4.2.2-5.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569718" comment="python2-mgr-osa-common-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569719" comment="python2-mgr-osad-4.2.5-5.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569720" comment="python2-mgr-push-4.2.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569721" comment="python2-mgr-virtualization-common-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569722" comment="python2-mgr-virtualization-host-4.2.1-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569723" comment="python2-rhnlib-4.2.3-12.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569724" comment="python2-spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569725" comment="python2-spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569726" comment="python2-spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569727" comment="python2-spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569728" comment="python2-spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569729" comment="python2-suseRegisterInfo-4.2.3-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569730" comment="python2-uyuni-common-libs-4.2.3-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569731" comment="salt-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569732" comment="salt-doc-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569733" comment="salt-minion-2016.11.10-43.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569734" comment="spacecmd-4.2.8-18.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569735" comment="spacewalk-check-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569736" comment="spacewalk-client-setup-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569737" comment="spacewalk-client-tools-4.2.10-27.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569738" comment="spacewalk-koan-4.2.3-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569739" comment="spacewalk-oscap-4.2.1-6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569740" comment="spacewalk-remote-utils-4.2.1-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569741" comment="supportutils-plugin-susemanager-client-4.2.2-9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569742" comment="suseRegisterInfo-4.2.3-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38596" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181223" ref_url="https://bugzilla.suse.com/1181223" source="BUGZILLA"/>
		<reference ref_id="1188977" ref_url="https://bugzilla.suse.com/1188977" source="BUGZILLA"/>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="1190512" ref_url="https://bugzilla.suse.com/1190512" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009670.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

salt:

- Exclude the full path of a download URL to prevent injection of
  malicious code (bsc#1190265) (CVE-2021-21996)

spacecmd:

- Version 4.2.13-1
  * Update translation strings
  * configchannel_updatefile handles directory properly (bsc#1190512)
  * Add schedule_archivecompleted to mass archive actions (bsc#1181223)
  * Remove whoami from the list of unauthenticated commands (bsc#1188977)

spacewalk-client-tools:

- Version 4.2.14-1
  * Update translation strings

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181223">SUSE bug 1181223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188977">SUSE bug 1188977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190512">SUSE bug 1190512</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651453" comment="python2-spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651454" comment="python2-spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651455" comment="python2-spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651456" comment="salt-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651457" comment="salt-doc-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651458" comment="salt-minion-2016.11.10-43.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651459" comment="spacecmd-4.2.13-18.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651460" comment="spacewalk-check-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651461" comment="spacewalk-client-setup-4.2.14-27.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651462" comment="spacewalk-client-tools-4.2.14-27.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38597" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1074594" ref_url="https://bugzilla.suse.com/1074594" source="BUGZILLA"/>
		<reference ref_id="1090205" ref_url="https://bugzilla.suse.com/1090205" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000469" ref_url="https://www.suse.com/security/cve/CVE-2017-1000469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004198.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2017-1000469: Escape shell parameters provided by the user for the reposync action. (bsc#1074594)
- Fix for calling koan with virt_type kvm. (bsc#1090205)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074594">SUSE bug 1074594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090205">SUSE bug 1090205</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000469/">CVE-2017-1000469</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569743" comment="koan-2.2.2-0.68.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38598" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1104189" ref_url="https://bugzilla.suse.com/1104189" source="BUGZILLA"/>
		<reference ref_id="1104287" ref_url="https://bugzilla.suse.com/1104287" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10931" ref_url="https://www.suse.com/security/cve/CVE-2018-10931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004506.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

Security issue fixed:

- CVE-2018-10931: Forbid exposure of private methods in the API (bsc#1104287, bsc#1104189)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104189">SUSE bug 1104189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104287">SUSE bug 1104287</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10931/">CVE-2018-10931</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569744" comment="koan-2.2.2-0.68.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38599" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1193671" ref_url="https://bugzilla.suse.com/1193671" source="BUGZILLA"/>
		<reference ref_id="1195906" ref_url="https://bugzilla.suse.com/1195906" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45083" ref_url="https://www.suse.com/security/cve/CVE-2021-45083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010255.html" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

- CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671).

The following non-security bugs were fixed:

- Move configuration files ownership to apache (bsc#1195906)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193671">SUSE bug 1193671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195906">SUSE bug 1195906</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-45083/">CVE-2021-45083</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668399" comment="koan-2.2.2-0.68.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38600" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562788" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38601" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00048.html" source="SUSE-SU"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569745" comment="python-pycrypto-2.6.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38602" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1051948" ref_url="https://bugzilla.suse.com/1051948" source="BUGZILLA"/>
		<reference ref_id="1052264" ref_url="https://bugzilla.suse.com/1052264" source="BUGZILLA"/>
		<reference ref_id="1053376" ref_url="https://bugzilla.suse.com/1053376" source="BUGZILLA"/>
		<reference ref_id="1053955" ref_url="https://bugzilla.suse.com/1053955" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003279.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issue has been fixed:

- CVE-2017-12791: Directory traversal vulnerability in minion id validation
  allowed remote minions with incorrect credentials to authenticate to a master
  via a crafted minion ID (bsc#1053955).

Additionally, the following non-security issues have been fixed:

- Added support for SUSE Manager scalability features. (bsc#1052264)
- Introduced the kubernetes module. (bsc#1051948)
- Notify systemd synchronously via NOTIFY_SOCKET. (bsc#1053376)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051948">SUSE bug 1051948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052264">SUSE bug 1052264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053376">SUSE bug 1053376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569746" comment="salt-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569747" comment="salt-doc-2016.11.4-43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569748" comment="salt-minion-2016.11.4-43.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38603" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1041993" ref_url="https://bugzilla.suse.com/1041993" source="BUGZILLA"/>
		<reference ref_id="1042749" ref_url="https://bugzilla.suse.com/1042749" source="BUGZILLA"/>
		<reference ref_id="1050003" ref_url="https://bugzilla.suse.com/1050003" source="BUGZILLA"/>
		<reference ref_id="1059291" ref_url="https://bugzilla.suse.com/1059291" source="BUGZILLA"/>
		<reference ref_id="1059758" ref_url="https://bugzilla.suse.com/1059758" source="BUGZILLA"/>
		<reference ref_id="1060230" ref_url="https://bugzilla.suse.com/1060230" source="BUGZILLA"/>
		<reference ref_id="1062462" ref_url="https://bugzilla.suse.com/1062462" source="BUGZILLA"/>
		<reference ref_id="1062464" ref_url="https://bugzilla.suse.com/1062464" source="BUGZILLA"/>
		<reference ref_id="985112" ref_url="https://bugzilla.suse.com/985112" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003543.html" source="SUSE-SU"/>
		<description>
This update for salt fixes one security issue and bugs.

The following security issues have been fixed:

- CVE-2017-14695: A directory traversal vulnerability in minion id validation allowed remote minions with incorrect
  credentials to authenticate to a master via a crafted minion ID. (bsc#1062462)
- CVE-2017-14696: It was possible to force a remote Denial of Service with a specially crafted authentication 
  request. (bsc#1062464)

Additionally, the following non-security issues have been fixed:

- Removed deprecation warning for beacon configuration using dictionaries. (bsc#1041993)
- Fixed beacons failure when pillar-based suppressing config-based. (bsc#1060230)
- Fixed minion resource exhaustion when many functions are being executed in parallel. (bsc#1059758)
- Remove 'TasksTask' attribute from salt-master.service in older versions of systemd. (bsc#985112)
- Fix for delete_deployment in Kubernetes module. (bsc#1059291)
- Catching error when PIDfile cannot be deleted. (bsc#1050003)
- Use $HOME to get the user home directory instead using '~' char. (bsc#1042749)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041993">SUSE bug 1041993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042749">SUSE bug 1042749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050003">SUSE bug 1050003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059291">SUSE bug 1059291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059758">SUSE bug 1059758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060230">SUSE bug 1060230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062464">SUSE bug 1062464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985112">SUSE bug 985112</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569749" comment="salt-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569750" comment="salt-doc-2016.11.4-43.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569751" comment="salt-minion-2016.11.4-43.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38604" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1113698" ref_url="https://bugzilla.suse.com/1113698" source="BUGZILLA"/>
		<reference ref_id="1113699" ref_url="https://bugzilla.suse.com/1113699" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Salt was updated to version 2016.11.10 and contains the following fixes:

Security issues fixed:

- CVE-2018-15750: Fixed directory traversal vulnerability in salt-api (bsc#1113698).
- CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi) that allows to execute arbitrary commands (bsc#1113699).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569752" comment="salt-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569753" comment="salt-doc-2016.11.10-43.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569754" comment="salt-minion-2016.11.10-43.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38605" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972</cve>
	<cve impact="important" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569755" comment="salt-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569756" comment="salt-doc-2016.11.10-43.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569757" comment="salt-minion-2016.11.10-43.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38606" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1011800" ref_url="https://bugzilla.suse.com/1011800" source="BUGZILLA"/>
		<reference ref_id="1012999" ref_url="https://bugzilla.suse.com/1012999" source="BUGZILLA"/>
		<reference ref_id="1017078" ref_url="https://bugzilla.suse.com/1017078" source="BUGZILLA"/>
		<reference ref_id="1020831" ref_url="https://bugzilla.suse.com/1020831" source="BUGZILLA"/>
		<reference ref_id="1022562" ref_url="https://bugzilla.suse.com/1022562" source="BUGZILLA"/>
		<reference ref_id="1025896" ref_url="https://bugzilla.suse.com/1025896" source="BUGZILLA"/>
		<reference ref_id="1027240" ref_url="https://bugzilla.suse.com/1027240" source="BUGZILLA"/>
		<reference ref_id="1027722" ref_url="https://bugzilla.suse.com/1027722" source="BUGZILLA"/>
		<reference ref_id="1030009" ref_url="https://bugzilla.suse.com/1030009" source="BUGZILLA"/>
		<reference ref_id="1030073" ref_url="https://bugzilla.suse.com/1030073" source="BUGZILLA"/>
		<reference ref_id="1032931" ref_url="https://bugzilla.suse.com/1032931" source="BUGZILLA"/>
		<reference ref_id="1035912" ref_url="https://bugzilla.suse.com/1035912" source="BUGZILLA"/>
		<reference ref_id="1035914" ref_url="https://bugzilla.suse.com/1035914" source="BUGZILLA"/>
		<reference ref_id="1036125" ref_url="https://bugzilla.suse.com/1036125" source="BUGZILLA"/>
		<reference ref_id="1038855" ref_url="https://bugzilla.suse.com/1038855" source="BUGZILLA"/>
		<reference ref_id="1039370" ref_url="https://bugzilla.suse.com/1039370" source="BUGZILLA"/>
		<reference ref_id="1040584" ref_url="https://bugzilla.suse.com/1040584" source="BUGZILLA"/>
		<reference ref_id="1040886" ref_url="https://bugzilla.suse.com/1040886" source="BUGZILLA"/>
		<reference ref_id="1043111" ref_url="https://bugzilla.suse.com/1043111" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5200" ref_url="https://www.suse.com/security/cve/CVE-2017-5200/" source="CVE"/>
		<reference ref_id="CVE-2017-8109" ref_url="https://www.suse.com/security/cve/CVE-2017-8109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002947.html" source="SUSE-SU"/>
		<description>

This update for salt provides version 2016.11.4 and brings various fixes and improvements:

- Adding a salt-minion watchdog for RHEL6 and SLES11 systems (sysV) to restart salt-minion in case of crashes during upgrade.
- Fix format error. (bsc#1043111)
- Fix ownership for whole master cache directory. (bsc#1035914)
- Disable 3rd party runtime packages to be explicitly recommended. (bsc#1040886)    
- Fix insecure permissions in salt-ssh temporary files. (bsc#1035912, CVE-2017-8109)
- Disable custom rosters for Salt SSH via Salt API. (bsc#1011800, CVE-2017-5200)
- Orchestrate and batches don't return false failed information anymore.
- Speed-up cherrypy by removing sleep call.
- Fix os_family grains on SUSE. (bsc#1038855)
- Fix setting the language on SUSE systems. (bsc#1038855)
- Use SUSE specific salt-api.service. (bsc#1039370)
- Fix using hostname for minion ID as '127'.
- Fix core grains constants for timezone. (bsc#1032931)
- Minor fixes on new pkg.list_downloaded.
- Listing all type of advisory patches for Yum module.
- Prevents zero length error on Python 2.6.
- Fixes zypper test error after backporting.
- Raet protocol is no longer supported. (bsc#1020831)
- Fix moving SSH data to the new home. (bsc#1027722)
- Fix logrotating /var/log/salt/minion. (bsc#1030009)
- Fix result of master_tops extension is mutually overwritten. (bsc#1030073)
- Allows to set 'timeout' and 'gather_job_timeout' via kwargs.
- Allows to set custom timeouts for 'manage.up' and 'manage.status'.
- Use salt's ordereddict for comparison.
- Fix scripts for salt-proxy.
- Add openscap module.
- File.get_managed regression fix.
- Fix translate variable arguments if they contain hidden keywords. (bsc#1025896)
- Added unit test for dockerng.sls_build dryrun.
- Added dryrun to dockerng.sls_build.
- Update dockerng minimal version requirements.
- Fix format error in error parsing.
- Keep fix for migrating salt home directory. (bsc#1022562)
- Fix  salt pkg.latest raises exception if package is not available. (bsc#1012999)
- Timezone should always be in UTC. (bsc#1017078)
- Fix timezone handling for rpm installtime. (bsc#1017078)
- Increasing timeouts for running integrations tests.
- Add buildargs option to dockerng.build module.
- Fix error when missing ssh-option parameter.
- Re-add yum notify plugin.
- All kwargs to dockerng.create to provide all features to sls_build as well.
- Datetime should be returned always in UTC.
- Fix possible crash  while deserialising data on infinite recursion in scheduled state. (bsc#1036125)
- Documentation refresh to 2016.11.4
- For a detailed description, please refer to:
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.4.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.3.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.2.html
  + https://docs.saltstack.com/en/develop/topics/releases/2016.11.1.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011800">SUSE bug 1011800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012999">SUSE bug 1012999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017078">SUSE bug 1017078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020831">SUSE bug 1020831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022562">SUSE bug 1022562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025896">SUSE bug 1025896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027240">SUSE bug 1027240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027722">SUSE bug 1027722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030009">SUSE bug 1030009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030073">SUSE bug 1030073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032931">SUSE bug 1032931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035912">SUSE bug 1035912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035914">SUSE bug 1035914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036125">SUSE bug 1036125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038855">SUSE bug 1038855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039370">SUSE bug 1039370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040584">SUSE bug 1040584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040886">SUSE bug 1040886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043111">SUSE bug 1043111</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5200/">CVE-2017-5200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8109/">CVE-2017-8109</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569758" comment="salt-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569759" comment="salt-doc-2016.11.4-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569760" comment="salt-minion-2016.11.4-42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38607" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS</platform>
		</affected>
		<reference ref_id="1140255" ref_url="https://bugzilla.suse.com/1140255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

- CVE-2019-13132: An unauthenticated remote attacker could have exploited
  a stack overflow vulnerability on a server that is supposed to be protected
  by encryption and authentication to potentially gain a remote code execution.
  (bsc#1140255)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132</cve>
	<affected_cpe_list>
		<cpe>cpe:/a:suse:sle-clienttools:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569761" comment="libzmq3-4.0.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38608" version="1" class="patch">
	<metadata>
		<title>Security update for hawk</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="765097" ref_url="https://bugzilla.suse.com/765097" source="BUGZILLA"/>
		<reference ref_id="766791" ref_url="https://bugzilla.suse.com/766791" source="BUGZILLA"/>
		<reference ref_id="775649" ref_url="https://bugzilla.suse.com/775649" source="BUGZILLA"/>
		<reference ref_id="775653" ref_url="https://bugzilla.suse.com/775653" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3464" ref_url="https://www.suse.com/security/cve/CVE-2012-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3465" ref_url="https://www.suse.com/security/cve/CVE-2012-3465/" source="CVE"/>
		<description>

hawk has been rebuilt to include updated ruby gems that contain fixes for 
security issues.

rubygem-activesupport-2_3 has been updated to fix the following security 
issue:

    * This update also the HTML escaping code in Ruby on Rails.
      CVE-2012-3464 has been assigned to this issue.

rubygem-actionpack-2_3 has been updated to fix the following security 
issues:

    * CVE-2012-3465: Malformed HTML is not correctly handled when
      validating with the strip_tags helper which could result in
      Cross-site Scripting issues.
    * CVE-2012-2694, CVE-2012-2660: Unsafe query generation was possible
      using NULL queries.

The included GEM archive package was also adjusted to contain the security 
fixes available in the unpacked ruby tree.

Security Issue references:

    * CVE-2012-3464
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3464&gt;
    * CVE-2012-3465
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3465&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/765097">SUSE bug 765097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766791">SUSE bug 766791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775649">SUSE bug 775649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775653">SUSE bug 775653</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3464/">CVE-2012-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3465/">CVE-2012-3465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-hae:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117412" comment="SUSE Linux Enterprise High Availability Extension 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569762" comment="hawk-0.5.2-0.38.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569763" comment="hawk-templates-0.5.2-0.38.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38609" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="858831" ref_url="https://bugzilla.suse.com/858831" source="BUGZILLA"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 2 kernel was updated to fix a 
regression introduced by the previous update:

    * scsi_dh_alua: Incorrect reference counting in the SCSI ALUA
      initialization code lead to system crashes on boot (bnc#858831).

As the update introducing the regression was marked security, this is also 
marked security even though this bug is not security relevant.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-05"/>
	<updated date="2014-02-05"/>
	<bugzilla href="https://bugzilla.suse.com/858831">SUSE bug 858831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-hae:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117412" comment="SUSE Linux Enterprise High Availability Extension 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569764" comment="cluster-network-kmp-default-1.4_3.0.101_0.7.17-2.18.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569765" comment="cluster-network-kmp-pae-1.4_3.0.101_0.7.17-2.18.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569766" comment="cluster-network-kmp-ppc64-1.4_3.0.101_0.7.17-2.18.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569767" comment="cluster-network-kmp-trace-1.4_3.0.101_0.7.17-2.18.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569768" comment="cluster-network-kmp-xen-1.4_3.0.101_0.7.17-2.18.81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569769" comment="gfs2-kmp-default-2_3.0.101_0.7.17-0.7.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569770" comment="gfs2-kmp-pae-2_3.0.101_0.7.17-0.7.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569771" comment="gfs2-kmp-ppc64-2_3.0.101_0.7.17-0.7.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569772" comment="gfs2-kmp-trace-2_3.0.101_0.7.17-0.7.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569773" comment="gfs2-kmp-xen-2_3.0.101_0.7.17-0.7.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569774" comment="ocfs2-kmp-default-1.6_3.0.101_0.7.17-0.11.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569775" comment="ocfs2-kmp-pae-1.6_3.0.101_0.7.17-0.11.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569776" comment="ocfs2-kmp-ppc64-1.6_3.0.101_0.7.17-0.11.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569777" comment="ocfs2-kmp-trace-1.6_3.0.101_0.7.17-0.11.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569778" comment="ocfs2-kmp-xen-1.6_3.0.101_0.7.17-0.11.80 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38610" version="1" class="patch">
	<metadata>
		<title>Security update for lighttpd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability Extension 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="801071" ref_url="https://bugzilla.suse.com/801071" source="BUGZILLA"/>
		<reference ref_id="850468" ref_url="https://bugzilla.suse.com/850468" source="BUGZILLA"/>
		<reference ref_id="850469" ref_url="https://bugzilla.suse.com/850469" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4560" ref_url="https://www.suse.com/security/cve/CVE-2013-4560/" source="CVE"/>
		<description>

lighthttpd received fixes for the following security issues:

    * 

      CVE-2013-4559: lighttpd did not check the return value of the (1)
      setuid, (2) setgid, or (3) setgroups functions, which might have
      caused lighttpd to run as root if it is restarted and allowed remote
      attackers to gain privileges, as demonstrated by multiple calls to
      the clone function that cause setuid to fail when the user process
      limit is reached.

    * 

      CVE-2013-4560: Use-after-free vulnerability in lighttpd allowed
      remote attackers to cause a denial of service (segmentation fault and
      crash) via unspecified vectors that trigger FAMMonitorDirectory
      failures.

    * 

      CVE-2011-1473: Added support for disabling client side initiated
      renegotiation to avoid potential computational denial of service
      (unbalanced computation efforts server vs client).

Security Issues:

    * CVE-2013-4559
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4559&gt;
    * CVE-2013-4560
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4560&gt;
    * CVE-2011-1473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1473&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/801071">SUSE bug 801071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850468">SUSE bug 850468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850469">SUSE bug 850469</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4560/">CVE-2013-4560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-hae:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117412" comment="SUSE Linux Enterprise High Availability Extension 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563105" comment="lighttpd-1.4.20-2.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38611" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507728" ref_url="https://bugzilla.suse.com/507728" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1882" ref_url="https://www.suse.com/security/cve/CVE-2009-1882/" source="CVE"/>
		<description>
This update of ImageMagick fixes an integer overflow in the
XMakeImage() function that allowed remote attackers to
cause a denial-of-service and possibly the execution of
arbitrary code via a crafted TIFF file. (CVE-2009-1882)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-04"/>
	<updated date="2009-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/507728">SUSE bug 507728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1882/">CVE-2009-1882</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569779" comment="libMagickCore1-6.4.3.6-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569780" comment="libMagickCore1-32bit-6.4.3.6-7.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569779" comment="libMagickCore1-6.4.3.6-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569780" comment="libMagickCore1-32bit-6.4.3.6-7.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38612" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="500909" ref_url="https://bugzilla.suse.com/500909" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<description>
Firefox version upgrade to 3.0.10 to fix a crash in
nsTextFrame::ClearTextRun() (CVE-2009-1313).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-07"/>
	<updated date="2009-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/500909">SUSE bug 500909</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569781" comment="MozillaFirefox-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569782" comment="MozillaFirefox-branding-SLED-3.5-1.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569783" comment="MozillaFirefox-translations-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569784" comment="gconf2-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569785" comment="gconf2-32bit-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569786" comment="gconf2-x86-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569787" comment="libfreebl3-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569788" comment="libfreebl3-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569789" comment="libfreebl3-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569790" comment="libidl-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569791" comment="libidl-32bit-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569792" comment="libidl-x86-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569793" comment="mozilla-nspr-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569794" comment="mozilla-nspr-32bit-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569795" comment="mozilla-nspr-x86-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569796" comment="mozilla-nss-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569797" comment="mozilla-nss-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569798" comment="mozilla-nss-tools-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569799" comment="mozilla-nss-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569800" comment="mozilla-xulrunner190-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569801" comment="mozilla-xulrunner190-32bit-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569802" comment="mozilla-xulrunner190-gnomevfs-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569803" comment="mozilla-xulrunner190-translations-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569804" comment="mozilla-xulrunner190-x86-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569810" comment="mozilla-xulrunner192-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569811" comment="mozilla-xulrunner192-32bit-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569812" comment="mozilla-xulrunner192-gnome-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569813" comment="mozilla-xulrunner192-translations-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569814" comment="mozilla-xulrunner192-x86-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569815" comment="orbit2-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569816" comment="orbit2-32bit-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569817" comment="orbit2-x86-2.14.16-2.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569781" comment="MozillaFirefox-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569782" comment="MozillaFirefox-branding-SLED-3.5-1.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569783" comment="MozillaFirefox-translations-3.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569784" comment="gconf2-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569785" comment="gconf2-32bit-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569786" comment="gconf2-x86-2.24.0-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569787" comment="libfreebl3-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569788" comment="libfreebl3-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569789" comment="libfreebl3-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569790" comment="libidl-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569791" comment="libidl-32bit-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569792" comment="libidl-x86-0.8.11-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569793" comment="mozilla-nspr-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569794" comment="mozilla-nspr-32bit-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569795" comment="mozilla-nspr-x86-4.8-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569796" comment="mozilla-nss-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569797" comment="mozilla-nss-32bit-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569798" comment="mozilla-nss-tools-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569799" comment="mozilla-nss-x86-3.12.3.1-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569800" comment="mozilla-xulrunner190-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569801" comment="mozilla-xulrunner190-32bit-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569802" comment="mozilla-xulrunner190-gnomevfs-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569803" comment="mozilla-xulrunner190-translations-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569804" comment="mozilla-xulrunner190-x86-1.9.0.10-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569810" comment="mozilla-xulrunner192-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569811" comment="mozilla-xulrunner192-32bit-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569812" comment="mozilla-xulrunner192-gnome-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569813" comment="mozilla-xulrunner192-translations-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569814" comment="mozilla-xulrunner192-x86-1.9.2.12-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569815" comment="orbit2-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569816" comment="orbit2-32bit-2.14.16-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569817" comment="orbit2-x86-2.14.16-2.16 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38613" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="475851" ref_url="https://bugzilla.suse.com/475851" source="BUGZILLA"/>
		<reference ref_id="478080" ref_url="https://bugzilla.suse.com/478080" source="BUGZILLA"/>
		<reference ref_id="479566" ref_url="https://bugzilla.suse.com/479566" source="BUGZILLA"/>
		<reference ref_id="483576" ref_url="https://bugzilla.suse.com/483576" source="BUGZILLA"/>
		<reference ref_id="490004" ref_url="https://bugzilla.suse.com/490004" source="BUGZILLA"/>
		<reference ref_id="490574" ref_url="https://bugzilla.suse.com/490574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0365" ref_url="https://www.suse.com/security/cve/CVE-2009-0365/" source="CVE"/>
		<reference ref_id="CVE-2009-0578" ref_url="https://www.suse.com/security/cve/CVE-2009-0578/" source="CVE"/>
		<description>
The NetworkManager configuration was too permissive and
allowed any user to read secrets (CVE-2009-0365) or
manipulate the configuration of other users (CVE-2009-0578).

Additionally a bug where wifi devices didn't work correctly
when the machine was booted with killswitch turned on has
been fixed. The automatic ethernet connection can now be
edited and NetworkManager can now work without ModemManager.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-02"/>
	<updated date="2009-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/475851">SUSE bug 475851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478080">SUSE bug 478080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479566">SUSE bug 479566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483576">SUSE bug 483576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490004">SUSE bug 490004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490574">SUSE bug 490574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0365/">CVE-2009-0365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0578/">CVE-2009-0578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569818" comment="NetworkManager-0.7.0.r4359-15.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569819" comment="NetworkManager-glib-0.7.0.r4359-15.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569818" comment="NetworkManager-0.7.0.r4359-15.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569819" comment="NetworkManager-glib-0.7.0.r4359-15.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38614" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager-gnome</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="565549" ref_url="https://bugzilla.suse.com/565549" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4144" ref_url="https://www.suse.com/security/cve/CVE-2009-4144/" source="CVE"/>
		<reference ref_id="CVE-2009-4145" ref_url="https://www.suse.com/security/cve/CVE-2009-4145/" source="CVE"/>
		<description>

The following bugs have been fixed:



 nm-applet connected to WPA2 Enterprise networks even if the specified CA certificate file didn't exist (CVE-2009-4144).
 When editing connections in nm-applet the connection object was exported via DBus disclosing potentially sensitive information to local users (CVE-2009-4145).


		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-28"/>
	<updated date="2010-01-28"/>
	<bugzilla href="https://bugzilla.suse.com/565549">SUSE bug 565549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4144/">CVE-2009-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4145/">CVE-2009-4145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569820" comment="NetworkManager-gnome-0.7.0.r1053-11.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569820" comment="NetworkManager-gnome-0.7.0.r1053-11.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38615" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="527539" ref_url="https://bugzilla.suse.com/527539" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
This update of OpenEXR fixes several integer overflows
(CVE-2009-1720) and a denial-of-service (probably execution
of arbitrary code) bug (CVE-2009-1721).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-04"/>
	<updated date="2009-08-04"/>
	<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569821" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569822" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569823" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569821" comment="OpenEXR-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569822" comment="OpenEXR-32bit-1.6.1-83.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569823" comment="OpenEXR-x86-1.6.1-83.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38616" version="1" class="patch">
	<metadata>
		<title>Security update for OpenOffice_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="607095" ref_url="https://bugzilla.suse.com/607095" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0395" ref_url="https://www.suse.com/security/cve/CVE-2010-0395/" source="CVE"/>
		<description>

This update of OpenOffice_org fixes the following security issue:

    * Arbitrary macros written in Python can be executed by bypassing macro
      security permissions. CVE-2010-0395
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395&gt;

It also provides the maintenance update to OpenOffice.org-3.2.1. Details 
about all upstream changes can be found at 
http://development.openoffice.org/releases/3.2.1.html
&lt;http://development.openoffice.org/releases/3.2.1.html&gt; .

For further SUSE Linux Enterprise specific fixes please refer to the 
changelog of the OpenOffice_org RPM package.

		</description>
<advisory from="security@suse.de">
	<issued date="2009-02-21"/>
	<updated date="2009-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/607095">SUSE bug 607095</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0395/">CVE-2010-0395</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569824" comment="procps-3.2.7-151.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569824" comment="procps-3.2.7-151.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38617" version="1" class="patch">
	<metadata>
		<title>Security update for acl and libacl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="567090" ref_url="https://bugzilla.suse.com/567090" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4411" ref_url="https://www.suse.com/security/cve/CVE-2009-4411/" source="CVE"/>
		<description>
The setfacl tool followed symbolic links in recursive (-R) mode even if the --physical (-P) option was specified (CVE-2009-4411). This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-15"/>
	<updated date="2010-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/567090">SUSE bug 567090</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4411/">CVE-2009-4411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569825" comment="acl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569826" comment="libacl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569827" comment="libacl-32bit-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569828" comment="libacl-x86-2.2.47-30.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569825" comment="acl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569826" comment="libacl-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569827" comment="libacl-32bit-2.2.47-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569828" comment="libacl-x86-2.2.47-30.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38618" version="1" class="patch">
	<metadata>
		<title>Security update for Apache 2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="570127" ref_url="https://bugzilla.suse.com/570127" source="BUGZILLA"/>
		<reference ref_id="586572" ref_url="https://bugzilla.suse.com/586572" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<description>

The following bugs have been fixed:



 When using a multithreaded MPM Apache could leak memory of requests
handled by a different thread when processing subrequests
(CVE-2010-0434).
 Specially crafted requests could crash mod_proxy_ajp (CVE-2010-0408).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-04-13"/>
	<updated date="2010-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/570127">SUSE bug 570127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569829" comment="apache2-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569830" comment="apache2-doc-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569831" comment="apache2-example-pages-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569832" comment="apache2-prefork-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569833" comment="apache2-utils-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569834" comment="apache2-worker-2.2.10-2.23.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569829" comment="apache2-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569830" comment="apache2-doc-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569831" comment="apache2-example-pages-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569832" comment="apache2-prefork-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569833" comment="apache2-utils-2.2.10-2.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569834" comment="apache2-worker-2.2.10-2.23.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38619" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="471419" ref_url="https://bugzilla.suse.com/471419" source="BUGZILLA"/>
		<reference ref_id="480948" ref_url="https://bugzilla.suse.com/480948" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5498" ref_url="https://www.suse.com/security/cve/CVE-2008-5498/" source="CVE"/>
		<reference ref_id="CVE-2009-0754" ref_url="https://www.suse.com/security/cve/CVE-2009-0754/" source="CVE"/>
		<description>
php 5.1.9 fixes among other things some security issues:

- Missing bounds checks of an error in the imageRotate
  function of the gd extension potentially allowed
  attackers to read portions of memory (CVE-2008-5498).

- the mbstring.func_overload in .htaccess was applied to
  other virtual hosts on th same machine (CVE-2009-0754)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-19"/>
	<updated date="2009-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/471419">SUSE bug 471419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480948">SUSE bug 480948</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5498/">CVE-2008-5498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0754/">CVE-2009-0754</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569835" comment="apache2-mod_php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569836" comment="php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569837" comment="php5-bcmath-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569838" comment="php5-bz2-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569839" comment="php5-calendar-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569840" comment="php5-ctype-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569841" comment="php5-curl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569842" comment="php5-dba-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569843" comment="php5-dbase-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569844" comment="php5-dom-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569845" comment="php5-exif-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569846" comment="php5-fastcgi-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569847" comment="php5-ftp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569848" comment="php5-gd-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569849" comment="php5-gettext-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569850" comment="php5-gmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569851" comment="php5-hash-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569852" comment="php5-iconv-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569853" comment="php5-json-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569854" comment="php5-ldap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569855" comment="php5-mbstring-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569856" comment="php5-mcrypt-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569857" comment="php5-mysql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569858" comment="php5-odbc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569859" comment="php5-openssl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569860" comment="php5-pcntl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569861" comment="php5-pdo-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569862" comment="php5-pear-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569863" comment="php5-pgsql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569864" comment="php5-pspell-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569865" comment="php5-shmop-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569866" comment="php5-snmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569867" comment="php5-soap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569868" comment="php5-suhosin-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569869" comment="php5-sysvmsg-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569870" comment="php5-sysvsem-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569871" comment="php5-sysvshm-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569872" comment="php5-tokenizer-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569873" comment="php5-wddx-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569874" comment="php5-xmlreader-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569875" comment="php5-xmlrpc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569876" comment="php5-xmlwriter-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569877" comment="php5-xsl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569878" comment="php5-zip-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569879" comment="php5-zlib-5.2.6-50.18.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569835" comment="apache2-mod_php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569836" comment="php5-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569837" comment="php5-bcmath-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569838" comment="php5-bz2-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569839" comment="php5-calendar-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569840" comment="php5-ctype-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569841" comment="php5-curl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569842" comment="php5-dba-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569843" comment="php5-dbase-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569844" comment="php5-dom-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569845" comment="php5-exif-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569846" comment="php5-fastcgi-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569847" comment="php5-ftp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569848" comment="php5-gd-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569849" comment="php5-gettext-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569850" comment="php5-gmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569851" comment="php5-hash-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569852" comment="php5-iconv-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569853" comment="php5-json-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569854" comment="php5-ldap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569855" comment="php5-mbstring-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569856" comment="php5-mcrypt-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569857" comment="php5-mysql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569858" comment="php5-odbc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569859" comment="php5-openssl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569860" comment="php5-pcntl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569861" comment="php5-pdo-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569862" comment="php5-pear-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569863" comment="php5-pgsql-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569864" comment="php5-pspell-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569865" comment="php5-shmop-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569866" comment="php5-snmp-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569867" comment="php5-soap-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569868" comment="php5-suhosin-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569869" comment="php5-sysvmsg-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569870" comment="php5-sysvsem-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569871" comment="php5-sysvshm-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569872" comment="php5-tokenizer-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569873" comment="php5-wddx-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569874" comment="php5-xmlreader-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569875" comment="php5-xmlrpc-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569876" comment="php5-xmlwriter-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569877" comment="php5-xsl-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569878" comment="php5-zip-5.2.6-50.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569879" comment="php5-zlib-5.2.6-50.18.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38620" version="1" class="patch">
	<metadata>
		<title>Security update for avahi</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="480865" ref_url="https://bugzilla.suse.com/480865" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<description>
The avahi-daemon reflector could cause packet storms when reflecting legacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-19"/>
	<updated date="2010-01-19"/>
	<bugzilla href="https://bugzilla.suse.com/480865">SUSE bug 480865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569880" comment="avahi-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569881" comment="avahi-lang-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569882" comment="libavahi-client3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569883" comment="libavahi-client3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569884" comment="libavahi-client3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569885" comment="libavahi-common3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569886" comment="libavahi-common3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569887" comment="libavahi-common3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569888" comment="libavahi-core5-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569889" comment="libdns_sd-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569890" comment="libdns_sd-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569891" comment="libdns_sd-x86-0.6.23-11.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569880" comment="avahi-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569881" comment="avahi-lang-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569882" comment="libavahi-client3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569883" comment="libavahi-client3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569884" comment="libavahi-client3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569885" comment="libavahi-common3-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569886" comment="libavahi-common3-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569887" comment="libavahi-common3-x86-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569888" comment="libavahi-core5-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569889" comment="libdns_sd-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569890" comment="libdns_sd-32bit-0.6.23-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569891" comment="libdns_sd-x86-0.6.23-11.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38621" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="636978" ref_url="https://bugzilla.suse.com/636978" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>

This update fixes an integer overflow in the BZ2_decompress function of 
bzip2/libbz2. This could have been exploited via a crafted archive to cause 
a denial of service or even execute arbitrary code. (CVE-2010-0405)

Security Issue reference:

    * CVE-2010-0405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-17"/>
	<updated date="2010-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569892" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569893" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569894" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569895" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569896" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569892" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569893" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569894" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569895" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569896" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38622" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="567013" ref_url="https://bugzilla.suse.com/567013" source="BUGZILLA"/>
		<reference ref_id="583535" ref_url="https://bugzilla.suse.com/583535" source="BUGZILLA"/>
		<reference ref_id="592198" ref_url="https://bugzilla.suse.com/592198" source="BUGZILLA"/>
		<reference ref_id="599873" ref_url="https://bugzilla.suse.com/599873" source="BUGZILLA"/>
		<reference ref_id="613459" ref_url="https://bugzilla.suse.com/613459" source="BUGZILLA"/>
		<reference ref_id="617153" ref_url="https://bugzilla.suse.com/617153" source="BUGZILLA"/>
		<reference ref_id="637218" ref_url="https://bugzilla.suse.com/637218" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<description>

A buffer overflow in the sid_parse() function of samba could potentially be 
exploited by remote attackers to execute arbitrary code (CVE-2010-3069).

Additionally the update also contains fixes for the following non-security 
issues:

    * bnc#567013 - Failed to join ADS Domain
    * bnc#592198 - Samba 3.0 / 3.2 doesn't work with Windows 2008 R2
      (NTLMv2)
    * bnc#599873 - SAMBA - Problem using NTLM authentication with 2008R2
    * bnc#613459 - winbindd crashes in rpcclisettimeout
    * bnc#617153 - new printers are not seen in samba with registry

Security Issue reference:

    * CVE-2010-3069
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-14"/>
	<updated date="2010-09-14"/>
	<bugzilla href="https://bugzilla.suse.com/567013">SUSE bug 567013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592198">SUSE bug 592198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/599873">SUSE bug 599873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/613459">SUSE bug 613459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617153">SUSE bug 617153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637218">SUSE bug 637218</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569897" comment="cifs-mount-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569898" comment="ldapsmb-1.34b-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569899" comment="libsmbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569900" comment="libsmbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569901" comment="libsmbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569902" comment="libtalloc1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569903" comment="libtalloc1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569904" comment="libtalloc1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569905" comment="libtdb1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569906" comment="libtdb1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569907" comment="libtdb1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569908" comment="libwbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569909" comment="libwbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569910" comment="libwbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569911" comment="samba-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569912" comment="samba-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569913" comment="samba-client-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569914" comment="samba-client-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569915" comment="samba-client-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569916" comment="samba-krb-printing-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569917" comment="samba-winbind-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569918" comment="samba-winbind-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569919" comment="samba-winbind-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569920" comment="samba-x86-3.2.7-11.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569897" comment="cifs-mount-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569898" comment="ldapsmb-1.34b-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569899" comment="libsmbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569900" comment="libsmbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569901" comment="libsmbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569902" comment="libtalloc1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569903" comment="libtalloc1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569904" comment="libtalloc1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569905" comment="libtdb1-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569906" comment="libtdb1-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569907" comment="libtdb1-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569908" comment="libwbclient0-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569909" comment="libwbclient0-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569910" comment="libwbclient0-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569911" comment="samba-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569912" comment="samba-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569913" comment="samba-client-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569914" comment="samba-client-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569915" comment="samba-client-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569916" comment="samba-krb-printing-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569917" comment="samba-winbind-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569918" comment="samba-winbind-32bit-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569919" comment="samba-winbind-x86-3.2.7-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569920" comment="samba-x86-3.2.7-11.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38623" version="1" class="patch">
	<metadata>
		<title>Security update for clamav, clamav-db, clamav-debuginfo, clamav-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="493562" ref_url="https://bugzilla.suse.com/493562" source="BUGZILLA"/>
		<description>
This clamav version upgrade to 0.95.1 fixes a buffer
overflow error in the cli_url_canon() function and a denial
of service condition occuring while parsing malformed UPack
archives.

(cve ids missing still)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/493562">SUSE bug 493562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569921" comment="clamav-0.95.1-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569922" comment="libgcc43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569923" comment="libgcc43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569924" comment="libgcc43-x86-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569925" comment="libstdc++43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569926" comment="libstdc++43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569927" comment="libstdc++43-x86-4.3.3_20081022-11.18 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569921" comment="clamav-0.95.1-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569922" comment="libgcc43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569923" comment="libgcc43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569924" comment="libgcc43-x86-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569925" comment="libstdc++43-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569926" comment="libstdc++43-32bit-4.3.3_20081022-11.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569927" comment="libstdc++43-x86-4.3.3_20081022-11.18 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38624" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="415166" ref_url="https://bugzilla.suse.com/415166" source="BUGZILLA"/>
		<reference ref_id="579475" ref_url="https://bugzilla.suse.com/579475" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>

 This update fixes a heap-based buffer overflow flaw that can happen
while expanding specially-crafted archive files (CVE-2010-0624).
 This updates Dat160 Tape Drive density information (bnc#415166)


		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-28"/>
	<updated date="2010-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/415166">SUSE bug 415166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569928" comment="cpio-2.9-75.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569929" comment="cpio-lang-2.9-75.27.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569928" comment="cpio-2.9-75.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569929" comment="cpio-lang-2.9-75.27.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38625" version="1" class="patch">
	<metadata>
		<title>Security update for cron</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="580800" ref_url="https://bugzilla.suse.com/580800" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>

This update of cron fixes a race condition in crontab that can be used to change the time-stamp of arbitrary files while editing the crontab entry.



 CVE-2010-0424: CVSS v2 Base Score: 3.6
Additionally the return value of initgroups() is verified now.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-19"/>
	<updated date="2010-02-19"/>
	<bugzilla href="https://bugzilla.suse.com/580800">SUSE bug 580800</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569930" comment="cron-4.1-194.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569930" comment="cron-4.1-194.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38626" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="485895" ref_url="https://bugzilla.suse.com/485895" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<description>
Specially crafted tiff files could cause an integer
overflow in the 'imagetops' filter (CVE-2009-0163).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/485895">SUSE bug 485895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569931" comment="cups-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569932" comment="cups-client-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569933" comment="cups-libs-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569934" comment="cups-libs-32bit-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569935" comment="cups-libs-x86-1.3.9-8.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569931" comment="cups-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569932" comment="cups-client-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569933" comment="cups-libs-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569934" comment="cups-libs-32bit-1.3.9-8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569935" comment="cups-libs-x86-1.3.9-8.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38627" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="475103" ref_url="https://bugzilla.suse.com/475103" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<description>
Arbitrary file access via HTTP-redirect has been fixed in
curl. CVE-2009-0037 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/475103">SUSE bug 475103</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569936" comment="curl-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569937" comment="keyutils-libs-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569938" comment="keyutils-libs-32bit-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569939" comment="keyutils-libs-x86-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569940" comment="libcurl4-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569941" comment="libcurl4-32bit-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569942" comment="libcurl4-x86-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569943" comment="libidn-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569944" comment="libidn-32bit-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569945" comment="libidn-x86-1.10-3.18 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569936" comment="curl-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569937" comment="keyutils-libs-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569938" comment="keyutils-libs-32bit-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569939" comment="keyutils-libs-x86-1.2-107.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569940" comment="libcurl4-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569941" comment="libcurl4-32bit-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569942" comment="libcurl4-x86-7.19.0-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569943" comment="libidn-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569944" comment="libidn-32bit-1.10-3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569945" comment="libidn-x86-1.10-3.18 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38628" version="1" class="patch">
	<metadata>
		<title>Security update for Cyrus IMAPD</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="539877" ref_url="https://bugzilla.suse.com/539877" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3235" ref_url="https://www.suse.com/security/cve/CVE-2009-3235/" source="CVE"/>
		<description>
This update fixes another buffer overflow in the Sieve code
(CVE-2009-3235). This can be exploited by users allowed to
use their own sieve scripts to execute arbitrary code
remotely. Additionally the handling of long headers was
improved.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-09-24"/>
	<updated date="2009-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/539877">SUSE bug 539877</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3235/">CVE-2009-3235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569946" comment="cyrus-imapd-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569947" comment="perl-Cyrus-IMAP-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569948" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569946" comment="cyrus-imapd-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569947" comment="perl-Cyrus-IMAP-2.3.11-60.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569948" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38629" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="499104" ref_url="https://bugzilla.suse.com/499104" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
This update of cyrus-sasl improves the output of function
sasl_encode64() by appending a 0 for string termination.
The impact depends on the application that uses
sasl_encode64(). (CVE-2009-0688)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-14"/>
	<updated date="2009-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/499104">SUSE bug 499104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569949" comment="cyrus-sasl-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569950" comment="cyrus-sasl-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569951" comment="cyrus-sasl-crammd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569952" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569953" comment="cyrus-sasl-crammd5-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569954" comment="cyrus-sasl-digestmd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569955" comment="cyrus-sasl-gssapi-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569956" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569957" comment="cyrus-sasl-gssapi-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569958" comment="cyrus-sasl-otp-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569959" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569960" comment="cyrus-sasl-otp-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569961" comment="cyrus-sasl-plain-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569962" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569963" comment="cyrus-sasl-plain-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569964" comment="cyrus-sasl-x86-2.1.22-182.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569949" comment="cyrus-sasl-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569950" comment="cyrus-sasl-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569951" comment="cyrus-sasl-crammd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569952" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569953" comment="cyrus-sasl-crammd5-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569954" comment="cyrus-sasl-digestmd5-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569955" comment="cyrus-sasl-gssapi-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569956" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569957" comment="cyrus-sasl-gssapi-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569958" comment="cyrus-sasl-otp-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569959" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569960" comment="cyrus-sasl-otp-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569961" comment="cyrus-sasl-plain-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569962" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569963" comment="cyrus-sasl-plain-x86-2.1.22-182.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569964" comment="cyrus-sasl-x86-2.1.22-182.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38630" version="1" class="patch">
	<metadata>
		<title>Security update for dbus</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="443307" ref_url="https://bugzilla.suse.com/443307" source="BUGZILLA"/>
		<reference ref_id="486267" ref_url="https://bugzilla.suse.com/486267" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4311" ref_url="https://www.suse.com/security/cve/CVE-2008-4311/" source="CVE"/>
		<description>
The dbus package used a too permissive configuration.
Therefore intended access control for some services was not
applied (CVE-2008-4311).

The new configuration denies access by default. Some dbus
services may break due to this setting and need an updated
configuration as well.

With the previous update wireless networking didn't work
anymore on some machines due to stale files in
/var/run/dbus/at_console. The dbus init script now cleans
up that directory on boot.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-02"/>
	<updated date="2009-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/443307">SUSE bug 443307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486267">SUSE bug 486267</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4311/">CVE-2008-4311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569965" comment="dbus-1-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569966" comment="dbus-1-32bit-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569967" comment="dbus-1-x86-1.2.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569965" comment="dbus-1-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569966" comment="dbus-1-32bit-1.2.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569967" comment="dbus-1-x86-1.2.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38631" version="1" class="patch">
	<metadata>
		<title>Security update for dbus</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="628607" ref_url="https://bugzilla.suse.com/628607" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<description>

A flaw in dbus-glib was fixed that allowed other local programs to bypass 
the 'access' flag on properties. (CVE-2010-1172)

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569968" comment="dbus-1-glib-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569969" comment="dbus-1-glib-32bit-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569970" comment="dbus-1-glib-x86-0.76-34.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569968" comment="dbus-1-glib-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569969" comment="dbus-1-glib-32bit-0.76-34.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569970" comment="dbus-1-glib-x86-0.76-34.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38632" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp-client</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="515599" ref_url="https://bugzilla.suse.com/515599" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0692" ref_url="https://www.suse.com/security/cve/CVE-2009-0692/" source="CVE"/>
		<description>
The DHCP client (dhclient) could be crashed by a malicious
DHCP server sending a overlong subnet field. (CVE-2009-0692)

In some circumstances code execution might be possible, but
might be caught by the buffer overflow checking in newer
distributions. (SLES 10 and 11).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-26"/>
	<updated date="2009-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/515599">SUSE bug 515599</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0692/">CVE-2009-0692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569971" comment="dhcp-client-3.1.1-7.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569971" comment="dhcp-client-3.1.1-7.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38633" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="533710" ref_url="https://bugzilla.suse.com/533710" source="BUGZILLA"/>
		<description>
This update fixes a buffer overflow in the TFTP server code
of dnsmasq. Please note that the TFTP server is disabled by
default.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-25"/>
	<updated date="2009-08-25"/>
	<bugzilla href="https://bugzilla.suse.com/533710">SUSE bug 533710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569972" comment="dnsmasq-2.45-12.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569972" comment="dnsmasq-2.45-12.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38634" version="1" class="patch">
	<metadata>
		<title>Security update for ethereal and wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="523718" ref_url="https://bugzilla.suse.com/523718" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2562" ref_url="https://www.suse.com/security/cve/CVE-2009-2562/" source="CVE"/>
		<description>
Flaws in the AFS dissector allowed attackers to crash
wireshark  via specially crafted network traffic
(CVE-2009-2562).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-18"/>
	<updated date="2009-08-18"/>
	<bugzilla href="https://bugzilla.suse.com/523718">SUSE bug 523718</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2562/">CVE-2009-2562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569973" comment="wireshark-1.0.5-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569973" comment="wireshark-1.0.5-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38635" version="1" class="patch">
	<metadata>
		<title>Security update for Evolution</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="419303" ref_url="https://bugzilla.suse.com/419303" source="BUGZILLA"/>
		<reference ref_id="475541" ref_url="https://bugzilla.suse.com/475541" source="BUGZILLA"/>
		<reference ref_id="477697" ref_url="https://bugzilla.suse.com/477697" source="BUGZILLA"/>
		<reference ref_id="479908" ref_url="https://bugzilla.suse.com/479908" source="BUGZILLA"/>
		<reference ref_id="480091" ref_url="https://bugzilla.suse.com/480091" source="BUGZILLA"/>
		<reference ref_id="484213" ref_url="https://bugzilla.suse.com/484213" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0582" ref_url="https://www.suse.com/security/cve/CVE-2009-0582/" source="CVE"/>
		<description>
camel's NTLM SASL authentication mechanism as used by
evolution did not properly validate server's challenge
packets (CVE-2009-0582). 

This update also includes the following non-security fixes:

- Fixes a critical crasher in mailer component. 
- Fixes creation of recurrence monthly items in GroupWise. 
- Includes fixes for some usability issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-16"/>
	<updated date="2009-04-16"/>
	<bugzilla href="https://bugzilla.suse.com/419303">SUSE bug 419303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475541">SUSE bug 475541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/477697">SUSE bug 477697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/479908">SUSE bug 479908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/480091">SUSE bug 480091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484213">SUSE bug 484213</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0582/">CVE-2009-0582</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569974" comment="evolution-data-server-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569975" comment="evolution-data-server-32bit-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569976" comment="evolution-data-server-lang-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569977" comment="evolution-data-server-x86-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569978" comment="gtkhtml2-3.24.1.1-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569979" comment="gtkhtml2-lang-3.24.1.1-3.23.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569974" comment="evolution-data-server-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569975" comment="evolution-data-server-32bit-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569976" comment="evolution-data-server-lang-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569977" comment="evolution-data-server-x86-2.24.1.1-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569978" comment="gtkhtml2-3.24.1.1-3.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569979" comment="gtkhtml2-lang-3.24.1.1-3.23.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38636" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="475108" ref_url="https://bugzilla.suse.com/475108" source="BUGZILLA"/>
		<reference ref_id="568822" ref_url="https://bugzilla.suse.com/568822" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0547" ref_url="https://www.suse.com/security/cve/CVE-2009-0547/" source="CVE"/>
		<reference ref_id="CVE-2009-0587" ref_url="https://www.suse.com/security/cve/CVE-2009-0587/" source="CVE"/>
		<reference ref_id="CVE-2009-1631" ref_url="https://www.suse.com/security/cve/CVE-2009-1631/" source="CVE"/>
		<description>

This update fixes following vulnerability:



 evolution considered S/MIME signatures to be valid even for modified mails (CVE-2009-0547: CVSS v2 Base Score: 5.0).



Additionally the following bug has been fixed:



 A POP3 server sending overly long lines could crash evolution.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-08"/>
	<updated date="2010-02-08"/>
	<bugzilla href="https://bugzilla.suse.com/475108">SUSE bug 475108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/568822">SUSE bug 568822</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0547/">CVE-2009-0547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0587/">CVE-2009-0587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1631/">CVE-2009-1631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569980" comment="evolution-data-server-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569981" comment="evolution-data-server-32bit-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569982" comment="evolution-data-server-lang-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569983" comment="evolution-data-server-x86-2.24.1.1-11.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569980" comment="evolution-data-server-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569981" comment="evolution-data-server-32bit-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569982" comment="evolution-data-server-lang-2.24.1.1-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569983" comment="evolution-data-server-x86-2.24.1.1-11.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38637" version="1" class="patch">
	<metadata>
		<title>Security update for expat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="566434" ref_url="https://bugzilla.suse.com/566434" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<description>
The previous expat security update (CVE-2009-3560) caused
parse errors with some xml documents.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-08"/>
	<updated date="2010-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/566434">SUSE bug 566434</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569984" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569985" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569986" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569987" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569984" comment="expat-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569985" comment="libexpat1-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569986" comment="libexpat1-32bit-2.0.1-88.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569987" comment="libexpat1-x86-2.0.1-88.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38638" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528746" ref_url="https://bugzilla.suse.com/528746" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<description>
This update of fetchmail improves SSL certificate
validation to stop possible man-in-the-middle attacks by
inserting \0-character in the certificate's subject name.
(CVE-2009-2666)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-07"/>
	<updated date="2009-08-07"/>
	<bugzilla href="https://bugzilla.suse.com/528746">SUSE bug 528746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569988" comment="fetchmail-6.3.8.90-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569989" comment="fetchmailconf-6.3.8.90-13.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569988" comment="fetchmail-6.3.8.90-13.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569989" comment="fetchmailconf-6.3.8.90-13.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38639" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="535570" ref_url="https://bugzilla.suse.com/535570" source="BUGZILLA"/>
		<reference ref_id="535832" ref_url="https://bugzilla.suse.com/535832" source="BUGZILLA"/>
		<reference ref_id="536602" ref_url="https://bugzilla.suse.com/536602" source="BUGZILLA"/>
		<reference ref_id="548072" ref_url="https://bugzilla.suse.com/548072" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3025" ref_url="https://www.suse.com/security/cve/CVE-2009-3025/" source="CVE"/>
		<reference ref_id="CVE-2009-3026" ref_url="https://www.suse.com/security/cve/CVE-2009-3026/" source="CVE"/>
		<reference ref_id="CVE-2009-3083" ref_url="https://www.suse.com/security/cve/CVE-2009-3083/" source="CVE"/>
		<reference ref_id="CVE-2009-3084" ref_url="https://www.suse.com/security/cve/CVE-2009-3084/" source="CVE"/>
		<reference ref_id="CVE-2009-3085" ref_url="https://www.suse.com/security/cve/CVE-2009-3085/" source="CVE"/>
		<reference ref_id="CVE-2009-3615" ref_url="https://www.suse.com/security/cve/CVE-2009-3615/" source="CVE"/>
		<description>
This update of pidgin fixes the following issues:
- CVE-2009-3026: CVSS v2 Base Score: 5.0 Allowed to send
  confidential data unencrypted even if SSL was chosen by
  user.
- CVE-2009-3025: CVSS v2 Base Score: 4.3 Remote denial of
  service in yahoo IM plug-in.
- CVE-2009-3083: CVSS v2 Base Score: 5.0 Remote denial of
  service in MSN plug-in.
- CVE-2009-3084: CVSS v2 Base Score: 5.0 Remote denial of
  service in MSN plug-in.
- CVE-2009-3085: CVSS v2 Base Score: 5.0 Remote denial of
  service in XMPP plug-in.
- CVE-2009-3615: CVSS v2 Base Score: 5.0 Remote denial of
  service in ICQ plug-in.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-02-21"/>
	<updated date="2009-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/535570">SUSE bug 535570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/535832">SUSE bug 535832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536602">SUSE bug 536602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548072">SUSE bug 548072</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3025/">CVE-2009-3025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3026/">CVE-2009-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3083/">CVE-2009-3083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3084/">CVE-2009-3084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3085/">CVE-2009-3085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3615/">CVE-2009-3615</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569990" comment="cdparanoia-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569991" comment="cdparanoia-32bit-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569992" comment="cdparanoia-x86-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569993" comment="desktop-file-utils-0.15-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569994" comment="fam-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569995" comment="fam-32bit-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569996" comment="fam-x86-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569997" comment="gnome-vfs2-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569998" comment="gnome-vfs2-32bit-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569999" comment="gnome-vfs2-x86-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570000" comment="gstreamer-0_10-0.10.21-3.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570001" comment="libogg0-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570002" comment="libogg0-32bit-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570003" comment="libogg0-x86-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570004" comment="liboil-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570005" comment="liboil-32bit-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570006" comment="liboil-x86-0.3.15-3.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569990" comment="cdparanoia-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569991" comment="cdparanoia-32bit-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569992" comment="cdparanoia-x86-IIIalpha9.8-691.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569993" comment="desktop-file-utils-0.15-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569994" comment="fam-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569995" comment="fam-32bit-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569996" comment="fam-x86-2.7.0-130.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569997" comment="gnome-vfs2-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569998" comment="gnome-vfs2-32bit-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569999" comment="gnome-vfs2-x86-2.24.0-7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570000" comment="gstreamer-0_10-0.10.21-3.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570001" comment="libogg0-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570002" comment="libogg0-32bit-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570003" comment="libogg0-x86-1.1.3-87.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570004" comment="liboil-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570005" comment="liboil-32bit-0.3.15-3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570006" comment="liboil-x86-0.3.15-3.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38640" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="485889" ref_url="https://bugzilla.suse.com/485889" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<description>
Freetype was updated to fix some integer overflows that can
be exploited remotely in conjunction with programs like a
web-browser. (CVE-2009-0946) Thanks to Tavis Ormandy who
found the bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-17"/>
	<updated date="2009-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/485889">SUSE bug 485889</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570007" comment="freetype2-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570008" comment="freetype2-32bit-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570009" comment="freetype2-x86-2.3.7-25.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570007" comment="freetype2-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570008" comment="freetype2-32bit-2.3.7-25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570009" comment="freetype2-x86-2.3.7-25.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38641" version="1" class="patch">
	<metadata>
		<title>Security update for fuse</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="582725" ref_url="https://bugzilla.suse.com/582725" source="BUGZILLA"/>
		<description>
A race condition in fusermount allows non-privileged users to umount
any file system (CVE-2010-0789).


Note: this is a re-release of the previous update with a better patch. 

		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-26"/>
	<updated date="2010-02-26"/>
	<bugzilla href="https://bugzilla.suse.com/582725">SUSE bug 582725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570010" comment="fuse-2.7.2-61.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570011" comment="libfuse2-2.7.2-61.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570010" comment="fuse-2.7.2-61.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570011" comment="libfuse2-2.7.2-61.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38642" version="1" class="patch">
	<metadata>
		<title>Security update for GhostScript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="489622" ref_url="https://bugzilla.suse.com/489622" source="BUGZILLA"/>
		<reference ref_id="491897" ref_url="https://bugzilla.suse.com/491897" source="BUGZILLA"/>
		<reference ref_id="492765" ref_url="https://bugzilla.suse.com/492765" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6725" ref_url="https://www.suse.com/security/cve/CVE-2007-6725/" source="CVE"/>
		<reference ref_id="CVE-2008-6679" ref_url="https://www.suse.com/security/cve/CVE-2008-6679/" source="CVE"/>
		<reference ref_id="CVE-2009-0196" ref_url="https://www.suse.com/security/cve/CVE-2009-0196/" source="CVE"/>
		<reference ref_id="CVE-2009-0792" ref_url="https://www.suse.com/security/cve/CVE-2009-0792/" source="CVE"/>
		<description>
Specially crafted file could cause a heap-overflow in JBIG2
decoder (CVE-2009-0196), an integer overflow in ICC library
(CVE-2009-0792), a buffer overflow in BaseFont writer
module (CVE-2008-6679) or crash the CCITTFax decoder
(CVE-2007-6725).

The previous security update introduced a regression that
broke some printer drives. This new update fixes that issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-14"/>
	<updated date="2009-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/489622">SUSE bug 489622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491897">SUSE bug 491897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492765">SUSE bug 492765</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-6725/">CVE-2007-6725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-6679/">CVE-2008-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0196/">CVE-2009-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0792/">CVE-2009-0792</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570012" comment="ghostscript-fonts-other-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570013" comment="ghostscript-fonts-rus-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570014" comment="ghostscript-fonts-std-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570015" comment="ghostscript-library-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570016" comment="ghostscript-omni-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570017" comment="ghostscript-x11-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570018" comment="libgimpprint-4.2.7-32.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570012" comment="ghostscript-fonts-other-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570013" comment="ghostscript-fonts-rus-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570014" comment="ghostscript-fonts-std-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570015" comment="ghostscript-library-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570016" comment="ghostscript-omni-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570017" comment="ghostscript-x11-8.62-32.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570018" comment="libgimpprint-4.2.7-32.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38643" version="1" class="patch">
	<metadata>
		<title>Security update for glib2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="449927" ref_url="https://bugzilla.suse.com/449927" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<description>
Large strings could lead to a heap overflow in the base64
encoding and decoding functions. Attackers could
potentially exploit that to execute arbitrary code
(CVE-2008-4316).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-22"/>
	<updated date="2009-04-22"/>
	<bugzilla href="https://bugzilla.suse.com/449927">SUSE bug 449927</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570019" comment="glib2-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570020" comment="glib2-doc-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570021" comment="glib2-lang-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570022" comment="libgio-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570023" comment="libgio-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570024" comment="libgio-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570025" comment="libglib-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570026" comment="libglib-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570027" comment="libglib-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570028" comment="libgmodule-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570029" comment="libgmodule-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570030" comment="libgmodule-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570031" comment="libgobject-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570032" comment="libgobject-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570033" comment="libgobject-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570034" comment="libgthread-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570035" comment="libgthread-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570036" comment="libgthread-2_0-0-x86-2.18.2-7.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570019" comment="glib2-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570020" comment="glib2-doc-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570021" comment="glib2-lang-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570022" comment="libgio-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570023" comment="libgio-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570024" comment="libgio-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570025" comment="libglib-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570026" comment="libglib-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570027" comment="libglib-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570028" comment="libgmodule-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570029" comment="libgmodule-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570030" comment="libgmodule-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570031" comment="libgobject-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570032" comment="libgobject-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570033" comment="libgobject-2_0-0-x86-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570034" comment="libgthread-2_0-0-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570035" comment="libgthread-2_0-0-32bit-2.18.2-7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570036" comment="libgthread-2_0-0-x86-2.18.2-7.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38644" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="375315" ref_url="https://bugzilla.suse.com/375315" source="BUGZILLA"/>
		<reference ref_id="445636" ref_url="https://bugzilla.suse.com/445636" source="BUGZILLA"/>
		<reference ref_id="513961" ref_url="https://bugzilla.suse.com/513961" source="BUGZILLA"/>
		<reference ref_id="534828" ref_url="https://bugzilla.suse.com/534828" source="BUGZILLA"/>
		<reference ref_id="541773" ref_url="https://bugzilla.suse.com/541773" source="BUGZILLA"/>
		<reference ref_id="569091" ref_url="https://bugzilla.suse.com/569091" source="BUGZILLA"/>
		<reference ref_id="572188" ref_url="https://bugzilla.suse.com/572188" source="BUGZILLA"/>
		<reference ref_id="585879" ref_url="https://bugzilla.suse.com/585879" source="BUGZILLA"/>
		<reference ref_id="592941" ref_url="https://bugzilla.suse.com/592941" source="BUGZILLA"/>
		<reference ref_id="594263" ref_url="https://bugzilla.suse.com/594263" source="BUGZILLA"/>
		<reference ref_id="615556" ref_url="https://bugzilla.suse.com/615556" source="BUGZILLA"/>
		<reference ref_id="646960" ref_url="https://bugzilla.suse.com/646960" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3847" ref_url="https://www.suse.com/security/cve/CVE-2010-3847/" source="CVE"/>
		<reference ref_id="CVE-2010-3856" ref_url="https://www.suse.com/security/cve/CVE-2010-3856/" source="CVE"/>
		<description>

This update of glibc fixes various bugs and security issues:

    * CVE-2010-3847: Decoding of the $ORIGIN special value in various LD_
      environment variables allowed local attackers to execute code in
      context of e.g. setuid root programs, elevating privileges. This
      issue does not affect SUSE as an assertion triggers before the
      respective code is executed. The bug was fixed nevertheless.
    * CVE-2010-3856: The LD_AUDIT environment was not pruned during setuid
      root execution and could load shared libraries from standard system
      library paths. This could be used by local attackers to inject code
      into setuid root programs and so elevated privileges.
    * CVE-2010-0830: Integer overflow causing arbitrary code execution in
      ld.so --verify mode could be induced by a specially crafted binary.
    * CVE-2010-0296: The addmntent() function would not escape the newline
      character properly, allowing the user to insert arbitrary newlines to
      the /etc/mtab; if the addmntent() is run by a setuid mount binary
      that does not do extra input checking, this would allow custom
      entries to be inserted in /etc/mtab.
    * CVE-2008-1391: The strfmon() function contains an integer overflow
      vulnerability in width specifiers handling that could be triggered by
      an attacker that can control the format string passed to strfmon().
    * CVE-2010-0015: Some setups (mainly Solaris-based legacy setups)
      include shadow information (password hashes) as so-called 'adjunct
      passwd' table, mangling it with the rest of passwd columns instead of
      keeping it in the shadow table. Normally, Solaris will disclose this
      information only to clients bound to a priviledged port, but when
      nscd is deployed on the client, getpwnam() would disclose the
      password hashes to all users. New mode 'adjunct as shadow' can now be
      enabled in /etc/default/nss that will move the password hashes from
      the world-readable passwd table to emulated shadow table (that is not
      cached by nscd).

Some invalid behaviour, crashes and memory leaks were fixed:

    * statfs64() would not function properly on IA64 in ia32el emulation
      mode.
    * memcpy() and memset() on power6 would erroneously use a 64-bit
      instruction within 32-bit code in certain corner cases.
    * nscd would not load /etc/host.conf properly before performing host
      resolution - most importantly, multi on in /etc/host.conf would be
      ignored when nscd was used, breaking e.g. resolving records in
      /etc/hosts where single name would point at multiple addresses
    * Removed mapping from lowercase sharp s to uppercase sharp S;
      uppercase S is not a standardly used letter and causes problems for
      ISO encodings.

Some other minor issues were fixed:

    * glibc-locale now better coexists with sap-locale on upgrades by
      regenerating the locale/gconv indexes properly.
    * Ports 623 and 664 may not be allocated by RPC code automatically
      anymore since that may clash with ports used on some IPMI network
      cards.
    * On x86_64, backtrace of a static destructor would stop in the _fini()
      glibc pseudo-routine, making it difficult to find out what originally
      triggered the program termination. The routine now has unwind
      information attached.

Security Issue references:

    * CVE-2010-3847
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847&gt;
    * CVE-2010-3856
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-25"/>
	<updated date="2010-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/375315">SUSE bug 375315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/445636">SUSE bug 445636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513961">SUSE bug 513961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534828">SUSE bug 534828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541773">SUSE bug 541773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/569091">SUSE bug 569091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572188">SUSE bug 572188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585879">SUSE bug 585879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592941">SUSE bug 592941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615556">SUSE bug 615556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646960">SUSE bug 646960</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3847/">CVE-2010-3847</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3856/">CVE-2010-3856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570037" comment="glibc-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570038" comment="glibc-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570039" comment="glibc-devel-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570040" comment="glibc-devel-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570041" comment="glibc-html-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570042" comment="glibc-i18ndata-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570043" comment="glibc-info-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570044" comment="glibc-locale-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570045" comment="glibc-locale-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570046" comment="glibc-locale-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570047" comment="glibc-profile-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570048" comment="glibc-profile-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570049" comment="glibc-profile-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570050" comment="glibc-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570051" comment="nscd-2.9-13.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570037" comment="glibc-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570038" comment="glibc-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570039" comment="glibc-devel-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570040" comment="glibc-devel-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570041" comment="glibc-html-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570042" comment="glibc-i18ndata-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570043" comment="glibc-info-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570044" comment="glibc-locale-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570045" comment="glibc-locale-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570046" comment="glibc-locale-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570047" comment="glibc-profile-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570048" comment="glibc-profile-32bit-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570049" comment="glibc-profile-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570050" comment="glibc-x86-2.9-13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570051" comment="nscd-2.9-13.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38645" version="1" class="patch">
	<metadata>
		<title>Security update for gmime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="576923" ref_url="https://bugzilla.suse.com/576923" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0409" ref_url="https://www.suse.com/security/cve/CVE-2010-0409/" source="CVE"/>
		<description>
This update of gmime fixes a buffer overflow in the GMIME_UUENCODE_LEN macro which allowed possible code execution while processing uuencoded data. (CVE-2010-0409: CVSS v2 Base Score: 5.8)
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-15"/>
	<updated date="2010-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/576923">SUSE bug 576923</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0409/">CVE-2010-0409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570052" comment="gmime-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570053" comment="gmime-doc-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570054" comment="libgmime-2_0-3-2.2.23-1.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570052" comment="gmime-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570053" comment="gmime-doc-2.2.23-1.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570054" comment="libgmime-2_0-3-2.2.23-1.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38646" version="1" class="patch">
	<metadata>
		<title>Security update for GNOME screensaver</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="512308" ref_url="https://bugzilla.suse.com/512308" source="BUGZILLA"/>
		<reference ref_id="550695" ref_url="https://bugzilla.suse.com/550695" source="BUGZILLA"/>
		<reference ref_id="563991" ref_url="https://bugzilla.suse.com/563991" source="BUGZILLA"/>
		<reference ref_id="579250" ref_url="https://bugzilla.suse.com/579250" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0285" ref_url="https://www.suse.com/security/cve/CVE-2010-0285/" source="CVE"/>
		<reference ref_id="CVE-2010-0732" ref_url="https://www.suse.com/security/cve/CVE-2010-0732/" source="CVE"/>
		<description>
		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-18"/>
	<updated date="2010-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/512308">SUSE bug 512308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550695">SUSE bug 550695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/563991">SUSE bug 563991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/579250">SUSE bug 579250</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0285/">CVE-2010-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0732/">CVE-2010-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570055" comment="gnome-screensaver-2.24.0-14.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570056" comment="gnome-screensaver-lang-2.24.0-14.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570055" comment="gnome-screensaver-2.24.0-14.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570056" comment="gnome-screensaver-lang-2.24.0-14.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38647" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="457938" ref_url="https://bugzilla.suse.com/457938" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<description>
The previous security fix for gnutls (CVE-2008-4989)
introduced a regression in the X.509 validation code for
self-signed certificates. 

This update fixes this problem.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/457938">SUSE bug 457938</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570057" comment="gnutls-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570058" comment="libgnutls26-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570059" comment="libgnutls26-32bit-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570060" comment="libgnutls26-x86-2.4.1-24.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570057" comment="gnutls-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570058" comment="libgnutls26-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570059" comment="libgnutls26-32bit-2.4.1-24.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570060" comment="libgnutls26-x86-2.4.1-24.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38648" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="481479" ref_url="https://bugzilla.suse.com/481479" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0586" ref_url="https://www.suse.com/security/cve/CVE-2009-0586/" source="CVE"/>
		<description>
Specially crafted cover art tags in vorbis files could
trigger a heap overflow in the base64 decoder. Attackers
could potentially exploit that to execute arbitrary code
(CVE-2009-0586).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-06"/>
	<updated date="2009-04-06"/>
	<bugzilla href="https://bugzilla.suse.com/481479">SUSE bug 481479</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0586/">CVE-2009-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570061" comment="gstreamer-0_10-plugins-base-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570062" comment="gstreamer-0_10-plugins-base-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570063" comment="gstreamer-0_10-plugins-base-doc-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570064" comment="gstreamer-0_10-plugins-base-lang-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570065" comment="gstreamer-0_10-plugins-base-x86-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570066" comment="libgstinterfaces-0_10-0-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570067" comment="libgstinterfaces-0_10-0-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570068" comment="libgstinterfaces-0_10-0-x86-0.10.21-2.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570061" comment="gstreamer-0_10-plugins-base-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570062" comment="gstreamer-0_10-plugins-base-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570063" comment="gstreamer-0_10-plugins-base-doc-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570064" comment="gstreamer-0_10-plugins-base-lang-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570065" comment="gstreamer-0_10-plugins-base-x86-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570066" comment="libgstinterfaces-0_10-0-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570067" comment="libgstinterfaces-0_10-0-32bit-0.10.21-2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570068" comment="libgstinterfaces-0_10-0-x86-0.10.21-2.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38649" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="510292" ref_url="https://bugzilla.suse.com/510292" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1932" ref_url="https://www.suse.com/security/cve/CVE-2009-1932/" source="CVE"/>
		<description>
Specially crafted files could cause integer overflows in
the PNG decoding module of GStreamer (CVE-2009-1932).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-09"/>
	<updated date="2009-06-09"/>
	<bugzilla href="https://bugzilla.suse.com/510292">SUSE bug 510292</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1932/">CVE-2009-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570069" comment="gstreamer-0_10-plugins-good-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570070" comment="gstreamer-0_10-plugins-good-doc-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570071" comment="gstreamer-0_10-plugins-good-lang-0.10.10-4.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570069" comment="gstreamer-0_10-plugins-good-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570070" comment="gstreamer-0_10-plugins-good-doc-0.10.10-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570071" comment="gstreamer-0_10-plugins-good-lang-0.10.10-4.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38650" version="1" class="patch">
	<metadata>
		<title>Security update for gzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="570331" ref_url="https://bugzilla.suse.com/570331" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>

The following bugs have been fixed:



 Specially crafted gzip archives could lead to gzip allocating a too small huffman table. Attackers could exploit that to crash gzip (CVE-2009-2624).

Specially crafted gzip archives could trigger integer overflows. Attackers could exploit that to crash gzip or potentially execute arbitrary code (CVE-2010-0001). Only 64bit architectures are affected by this flaw.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-20"/>
	<updated date="2010-01-20"/>
	<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570072" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570072" comment="gzip-1.3.12-69.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38651" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="508070" ref_url="https://bugzilla.suse.com/508070" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0153" ref_url="https://www.suse.com/security/cve/CVE-2009-0153/" source="CVE"/>
		<description>
icu does not properly handle invalid byte sequences during
Unicode conversion. Remote attackers could potentially
exploit that to conduct conduct cross-site scripting (XSS)
attacks (CVE-2009-0153).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-23"/>
	<updated date="2009-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/508070">SUSE bug 508070</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0153/">CVE-2009-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570073" comment="libicu-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570074" comment="libicu-32bit-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570075" comment="libicu-doc-4.0-7.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570073" comment="libicu-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570074" comment="libicu-32bit-4.0-7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570075" comment="libicu-doc-4.0-7.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38652" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="498859" ref_url="https://bugzilla.suse.com/498859" source="BUGZILLA"/>
		<reference ref_id="504186" ref_url="https://bugzilla.suse.com/504186" source="BUGZILLA"/>
		<reference ref_id="506710" ref_url="https://bugzilla.suse.com/506710" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1574" ref_url="https://www.suse.com/security/cve/CVE-2009-1574/" source="CVE"/>
		<reference ref_id="CVE-2009-1632" ref_url="https://www.suse.com/security/cve/CVE-2009-1632/" source="CVE"/>
		<description>
This update of ipsec-tools fixes a crash of racoon in
ISAKMP's de-fragmentation code due to a NULL-pointer
dereference. (CVE-2009-1574)  Additionally multiple memory
leaks were fixed that allowed to execute a remote denial of
service attack. (CVE-2009-1632)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-13"/>
	<updated date="2009-06-13"/>
	<bugzilla href="https://bugzilla.suse.com/498859">SUSE bug 498859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504186">SUSE bug 504186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/506710">SUSE bug 506710</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1574/">CVE-2009-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1632/">CVE-2009-1632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570076" comment="ipsec-tools-0.7.1-10.31.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570076" comment="ipsec-tools-0.7.1-10.31.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38653" version="1" class="patch">
	<metadata>
		<title>Security update for iSCSI</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="592928" ref_url="https://bugzilla.suse.com/592928" source="BUGZILLA"/>
		<reference ref_id="618574" ref_url="https://bugzilla.suse.com/618574" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0743" ref_url="https://www.suse.com/security/cve/CVE-2010-0743/" source="CVE"/>
		<reference ref_id="CVE-2010-2221" ref_url="https://www.suse.com/security/cve/CVE-2010-2221/" source="CVE"/>
		<description>

This update of iscscitarget/tgt fixes multiple overflows and a format 
string vulnerability:

    * CVE-2010-2221: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Buffer Errors (CWE-119)
    * CVE-2010-0743: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Format String Vulnerability (CWE-134)

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-04"/>
	<updated date="2010-08-04"/>
	<bugzilla href="https://bugzilla.suse.com/592928">SUSE bug 592928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618574">SUSE bug 618574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0743/">CVE-2010-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2221/">CVE-2010-2221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570077" comment="iscsitarget-0.4.15-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570078" comment="iscsitarget-kmp-default-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570079" comment="iscsitarget-kmp-pae-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570080" comment="iscsitarget-kmp-ppc64-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570081" comment="iscsitarget-kmp-vmi-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570082" comment="iscsitarget-kmp-xen-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570077" comment="iscsitarget-0.4.15-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570078" comment="iscsitarget-kmp-default-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570079" comment="iscsitarget-kmp-pae-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570080" comment="iscsitarget-kmp-ppc64-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570081" comment="iscsitarget-kmp-vmi-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570082" comment="iscsitarget-kmp-xen-0.4.15_2.6.27.48_0.6-94.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38654" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.4.2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="475425" ref_url="https://bugzilla.suse.com/475425" source="BUGZILLA"/>
		<reference ref_id="489052" ref_url="https://bugzilla.suse.com/489052" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-2086" ref_url="https://www.suse.com/security/cve/CVE-2008-2086/" source="CVE"/>
		<reference ref_id="CVE-2008-5339" ref_url="https://www.suse.com/security/cve/CVE-2008-5339/" source="CVE"/>
		<reference ref_id="CVE-2008-5340" ref_url="https://www.suse.com/security/cve/CVE-2008-5340/" source="CVE"/>
		<reference ref_id="CVE-2008-5342" ref_url="https://www.suse.com/security/cve/CVE-2008-5342/" source="CVE"/>
		<reference ref_id="CVE-2008-5343" ref_url="https://www.suse.com/security/cve/CVE-2008-5343/" source="CVE"/>
		<reference ref_id="CVE-2008-5344" ref_url="https://www.suse.com/security/cve/CVE-2008-5344/" source="CVE"/>
		<reference ref_id="CVE-2008-5345" ref_url="https://www.suse.com/security/cve/CVE-2008-5345/" source="CVE"/>
		<reference ref_id="CVE-2008-5346" ref_url="https://www.suse.com/security/cve/CVE-2008-5346/" source="CVE"/>
		<reference ref_id="CVE-2008-5348" ref_url="https://www.suse.com/security/cve/CVE-2008-5348/" source="CVE"/>
		<reference ref_id="CVE-2008-5350" ref_url="https://www.suse.com/security/cve/CVE-2008-5350/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2008-5353" ref_url="https://www.suse.com/security/cve/CVE-2008-5353/" source="CVE"/>
		<reference ref_id="CVE-2008-5354" ref_url="https://www.suse.com/security/cve/CVE-2008-5354/" source="CVE"/>
		<reference ref_id="CVE-2008-5356" ref_url="https://www.suse.com/security/cve/CVE-2008-5356/" source="CVE"/>
		<reference ref_id="CVE-2008-5357" ref_url="https://www.suse.com/security/cve/CVE-2008-5357/" source="CVE"/>
		<reference ref_id="CVE-2008-5359" ref_url="https://www.suse.com/security/cve/CVE-2008-5359/" source="CVE"/>
		<reference ref_id="CVE-2008-5360" ref_url="https://www.suse.com/security/cve/CVE-2008-5360/" source="CVE"/>
		<description>
This update brings the IBM Java 1.4.2 JDK and JRE to
Service Release 13. It fixes lots of bugs and various
security issues:

CVE-2008-5350: A security vulnerability in the Java Runtime
Environment (JRE) may allow an untrusted applet or
application to list the contents of the home directory of
the user running the applet or application.

CVE-2008-5346: A security vulnerability in the Java Runtime
Environment (JRE) with parsing zip files may allow an
untrusted applet or application to read arbitrary memory
locations in the process that the applet or application is
running in.

CVE-2008-5343: A vulnerability in Java Web Start and Java
Plug-in may allow hidden code on a host to make network
connections to that host and to hijack HTTP sessions using
cookies stored in the browser.

CVE-2008-5344: A vulnerability in the Java Runtime
Environment (JRE) with applet classloading may allow an
untrusted applet to read arbitrary files on a system that
the applet runs on and make network connections to hosts
other than the host it was loaded from.

CVE-2008-5359: A buffer overflow vulnerability in the Java
Runtime Environment (JRE) image processing code may allow
an untrusted applet or application to escalate privileges.
For example, an untrusted applet may grant itself
permissions to read and write local files or execute local
applications that are accessible to the user running the
untrusted applet.

CVE-2008-5339: A vulnerability in the Java Runtime
Environment (JRE) may allow an untrusted Java Web Start
application to make network connections to hosts other than
the host that the application is downloaded from.

CVE-2008-5340: A vulnerability in the Java Runtime
Environment with launching Java Web Start applications may
allow an untrusted Java Web Start application to escalate
privileges. For example, an untrusted application may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted application.

CVE-2008-5348: A security vulnerability in the Java Runtime
Environment (JRE) with authenticating users through
Kerberos may lead to a Denial of Service (DoS) to the
system as a whole, due to excessive consumption of
operating system resources.

CVE-2008-2086: A vulnerability in Java Web Start may allow
certain trusted operations to be performed, such as
modifying system properties.

CVE-2008-5345: The Java Runtime Environment (JRE) allows
code loaded from the local filesystem to access localhost.
This may allow code that is maliciously placed on the local
filesystem and then subsequently run, to have network
access to localhost that would not otherwise be allowed if
the code were loaded from a remote host. This may be
leveraged to steal cookies and hijack sessions (for domains
that map a name to the localhost).

CVE-2008-5351: The UTF-8 (Unicode Transformation Format-8)
decoder in the Java Runtime Environment (JRE) accepts
encodings that are longer than the 'shortest' form. This
behavior is not a vulnerability in Java SE. However, it may
be leveraged to exploit systems running software that
relies on the JRE UTF-8 decoder to reject non-shortest form
sequences. For example, non-shortest form sequences may be
decoded into illegal URIs, which may then allow files that
are not otherwise accessible to be read, if the URIs are
not checked following UTF-8 decoding.

CVE-2008-5360: The Java Runtime Environment creates
temporary files with insufficiently random names. This may
be leveraged to write JAR files which may then be loaded as
untrusted applets and Java Web Start applications to access
and provide services from localhost and hence steal cookies.

CVE-2008-5353: A security vulnerability in the Java Runtime
Environment (JRE) related to deserializing calendar objects
may allow an untrusted applet or application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5356: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5354: A buffer overflow vulnerability in the Java
Runtime Environment (JRE) may allow an untrusted Java
application that is launched through the command line to
escalate privileges. For example, the untrusted Java
application may grant itself permissions to read and write
local files or execute local applications that are
accessible to the user running the untrusted Java
application.

 This vulnerability cannot be exploited by an applet or
Java Web Start application.

CVE-2008-5357: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5342: A security vulnerability in the the Java Web
Start BasicService allows untrusted applications that are
downloaded from another system to request local files to be
displayed by the browser of the user running the untrusted
application.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-05"/>
	<updated date="2009-04-05"/>
	<bugzilla href="https://bugzilla.suse.com/475425">SUSE bug 475425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489052">SUSE bug 489052</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-2086/">CVE-2008-2086</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5339/">CVE-2008-5339</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5340/">CVE-2008-5340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5342/">CVE-2008-5342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5343/">CVE-2008-5343</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5344/">CVE-2008-5344</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5345/">CVE-2008-5345</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5346/">CVE-2008-5346</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5348/">CVE-2008-5348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5350/">CVE-2008-5350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5353/">CVE-2008-5353</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5354/">CVE-2008-5354</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5356/">CVE-2008-5356</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5357/">CVE-2008-5357</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5359/">CVE-2008-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5360/">CVE-2008-5360</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570083" comment="java-1_4_2-ibm-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570084" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570085" comment="java-1_4_2-ibm-plugin-1.4.2_sr13-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570083" comment="java-1_4_2-ibm-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570084" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570085" comment="java-1_4_2-ibm-plugin-1.4.2_sr13-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38655" version="1" class="patch">
	<metadata>
		<title>Security update for BEA Java 1.5.0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="472384" ref_url="https://bugzilla.suse.com/472384" source="BUGZILLA"/>
		<description>

BEA Java for Itanium has been updated to version 1.5.0.13.1.2.



This contains all fixes equivalent to Sun JAVA SE 1.5 Update 11.


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-19"/>
	<updated date="2010-02-19"/>
	<bugzilla href="https://bugzilla.suse.com/472384">SUSE bug 472384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570086" comment="java-1_5_0-bea-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570087" comment="java-1_5_0-bea-console-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570088" comment="java-1_5_0-bea-fonts-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570089" comment="java-1_5_0-bea-jdbc-1.5.0.13.1.2-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570086" comment="java-1_5_0-bea-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570087" comment="java-1_5_0-bea-console-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570088" comment="java-1_5_0-bea-fonts-1.5.0.13.1.2-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570089" comment="java-1_5_0-bea-jdbc-1.5.0.13.1.2-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38656" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.6.0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="489052" ref_url="https://bugzilla.suse.com/489052" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5340" ref_url="https://www.suse.com/security/cve/CVE-2008-5340/" source="CVE"/>
		<reference ref_id="CVE-2008-5341" ref_url="https://www.suse.com/security/cve/CVE-2008-5341/" source="CVE"/>
		<reference ref_id="CVE-2008-5342" ref_url="https://www.suse.com/security/cve/CVE-2008-5342/" source="CVE"/>
		<reference ref_id="CVE-2008-5351" ref_url="https://www.suse.com/security/cve/CVE-2008-5351/" source="CVE"/>
		<reference ref_id="CVE-2008-5356" ref_url="https://www.suse.com/security/cve/CVE-2008-5356/" source="CVE"/>
		<reference ref_id="CVE-2008-5357" ref_url="https://www.suse.com/security/cve/CVE-2008-5357/" source="CVE"/>
		<reference ref_id="CVE-2008-5358" ref_url="https://www.suse.com/security/cve/CVE-2008-5358/" source="CVE"/>
		<description>
This update brings the IBM Java 6 JDK and JRE to Service
Release 4. It fixes lots of bugs and various security
issues:

CVE-2008-5341: A vulnerability in the Java Runtime
Environment may allow an untrusted Java Web Start
application to determine the location of the Java Web Start
cache and the username of the user running the Java Web
Start application.

CVE-2008-5340: A vulnerability in the Java Runtime
Environment with launching Java Web Start applications may
allow an untrusted Java Web Start application to escalate
privileges. For example, an untrusted application may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted application.

CVE-2008-5351: The UTF-8 (Unicode Transformation Format-8)
decoder in the Java Runtime Environment (JRE) accepts
encodings that are longer than the 'shortest' form. This
behavior is not a vulnerability in Java SE. However, it may
be leveraged to exploit systems running software that
relies on the JRE UTF-8 decoder to reject non-shortest form
sequences. For example, non-shortest form sequences may be
decoded into illegal URIs, which may then allow files that
are not otherwise accessible to be read, if the URIs are
not checked following UTF-8 decoding.

CVE-2008-5356: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5357: A buffer vulnerability in the Java Runtime
Environment (JRE) with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5358: A buffer overflow vulnerability in the Java
Runtime Environment with processing GIF images may allow an
untrusted Java Web Start application to escalate
privileges. For example, an untrusted application may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2008-5342: A security vulnerability in the the Java Web
Start BasicService allows untrusted applications that are
downloaded from another system to request local files to be
displayed by the browser of the user running the untrusted
application.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-05"/>
	<updated date="2009-04-05"/>
	<bugzilla href="https://bugzilla.suse.com/489052">SUSE bug 489052</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5340/">CVE-2008-5340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5341/">CVE-2008-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5342/">CVE-2008-5342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-5351/">CVE-2008-5351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5356/">CVE-2008-5356</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5357/">CVE-2008-5357</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5358/">CVE-2008-5358</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570090" comment="java-1_6_0-ibm-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570091" comment="java-1_6_0-ibm-alsa-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570092" comment="java-1_6_0-ibm-alsa-x86-1.6.0-124.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570093" comment="java-1_6_0-ibm-fonts-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570094" comment="java-1_6_0-ibm-jdbc-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570095" comment="java-1_6_0-ibm-plugin-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570096" comment="java-1_6_0-ibm-x86-1.6.0-124.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570090" comment="java-1_6_0-ibm-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570091" comment="java-1_6_0-ibm-alsa-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570092" comment="java-1_6_0-ibm-alsa-x86-1.6.0-124.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570093" comment="java-1_6_0-ibm-fonts-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570094" comment="java-1_6_0-ibm-jdbc-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570095" comment="java-1_6_0-ibm-plugin-1.6.0-124.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570096" comment="java-1_6_0-ibm-x86-1.6.0-124.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38657" version="1" class="patch">
	<metadata>
		<title>Security update for KDE4 PIM packages</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="490696" ref_url="https://bugzilla.suse.com/490696" source="BUGZILLA"/>
		<description>
This kdepim4 and kdepimlibs4 update fixes lots of bugs and
one security issue:

KMail 4.1.x executes links in mail without confirmation.
(no cve assigned yet)

It also fixes lots of non-security bugs:

kdepim4:
  - kdepim: make sure we initially create items for
    subresources
  - kdepim: fix autocompletion shortcut error
  - kdepim: reduce linkage
  - akregator: fix copy text from article view widget
    (kde#168865)
  - akregator: fix saving articlelistview settings
    (kde#176262,bnc#430825)
  - akregator: improve prev/next unread article behavior
    when a filter is set (kde#138935)
  - gpgme: Fix persistent progress dialogs for GPG key ops
    (kde#169563)
  - kaddressbook: fix help anchors
  - kaddressbook: set department and org fields on vcard
    export
  - kaddressbook: Fix LDIF import for files with windows
    linebreaks
  - kalarm: fix translation not loaded
  - kalarm: correctly handle failure to create alarm
    resource
  - kalarm: Copying alarm to KOrganizer fails when embedded
    in Kontact (kde#176759)
  - kalarm: Fix kalarmautostart crash on logout
  - kalarm: fix click on system tray icon not showing main
    window
  - kalarm: disabled from enabled alarm colour when
    highlighted in alarm list
  - kalarm: UI fixes
  - kalarm: signal when work hours change
  - kalarm: fix command alarms (kde#175623)
  - kalarm: Fix toolbar settings being lost
  - kalarm: Fix crash if activated again while restoring
    from previous session
  - kalarm: update change log
  - kalarm: correct system tray icon parent
  - kalarm: show idle time on correct virtual desktop
    (kde#153442,kde#174346)
  - kalarm: ensure alarms shown above full-screen windows
  - kalarm: Fix invalid alarm remaining in calendar on
    failure
  - kjots: fix paste of richtext and tabs becoming spaces
    bugs (kde#160600,kde#175100)
  - kmail: fix loss of configured receiving accounts on
    exit with wallet dialog open (kde#169166)
  - kmail: do not execute executables when clicking a link,
    and solve dangling kmmsgbase pointer crash
    (kde#179765,bnc#490696)
  - kmail: fix crash when syncing imap flags (kde#106030)
  - kmail: detect urgent X-Priority correctly
  - kmail: fix opening zip attachments
  - kmail: don't show unconfigurable shortcuts in dialog
  - kmail: fix added subfolders not appearing in the folder
    selection dialog
  - kmail: configure dialog UI fixes
  - kmail: display receiving accounts correctly in config
  - kmail: unread mail layout bug (bug#174304)
  - kmail: don't force duplicate add to addressbook
    (kde#174332)
  - kmail: remove deprecated spamassassin flag (kde#140032)
  - kmail: update detected encoding on inserting file in
    composer (kde#88781)
  - kmail: fix unreactive encoding change dialog
    (kde#149309,kde#145163)
  - kmail: update detected encoding on inserting file in
    composer (kde#88781)
  - kmail: fix out of range in parsing mail bug
  - kmail: various encoding fixes (kde#64815)
  - kmail: remove spurious assert
  - kmail: sieve dialog fixes
  - kmail: missing i18n
  - kmail: Fix the 'open in addressbook' action
  - kmail: attachments check fix
  - kmail: Fix spacing in Configure
  - kmail: fix inline-forwarding of messages with
    attachments. (kde#178128,kde#146921)
  - kmail: don't allow attachment deletion/editing in
    read-only folders (kolab#3324)
  - kmail: fix crash when clicking on one of the invitation
    action links
  - kmail: fix inline forwarding of multipart/mixed messages
  - kmail: fix crashing in templates (kde#178038)
  - knode: fix rules editor crash and saving and loading of
    scoring rules (kde:170030,kde:175045)
  - knode: fix incorrect charset header (kde:169411)
  - knode: safety checks
  - knotes: various crash fixes
  - knotes: don't exit when the last window is closed
    (kde#153244)
  - kontact: fix help anchors
  - kontact: fix crash on opening configure dialog
    (kde#174707)
  - korganizer: fix task filtering (kde#171205)
  - korganizer: public holidays for Chile
  - korganizer: public holidays for Jamaica
  - korganizer: fix crash when deleting categories with
    deep subcategories (kde#153740)
  - korganizer: fix Russian holidays
  - korganizer: allow to change my status even if I'm the
    organizer of this event (kolab#3084)
  - korganizer: Fix crashes on saving new calendar
  - korganizer: correct Norwegian public holidays
  - korganizer: calendar scroll widget fixes
  - korganizer: navigator bar menu fixes
  - korganizer: navigatorbar - fix selectMonth() to emit
    the correct month index
  - korganizer: navigatorbar - layout cleanup
  - korganizer: indicate when subresources are present
  - korganizer: fix missing RTL text in monthviews
  - korganizer: potential setNoActionCursor crash fix
  - korganizer: navigatorbar - fix jumping labels
  - korganizer: navigatorbar - fix crash on exit
  - korganizer: fix alignment of day labels to main matrix
  - korganizer: make do not show to-dos in monthview work
  - korganizer: fix crash on removing attendees (kde#172354)
  - korganizer: fix cancelling imip send
  - korganizer: fix print crashing (kde#160260)
  - korganizer: fix print default year
  - korganizer: fix printing generally
  - korganizer: fix printing UTC incidences (kde)
  - korganizer: fix month view doesnt react to key and
    mouse events (kde#175814)
  - korganizer: make paste work on actual selection
    (kde#175814,kde#132863)
  - korganizer: pasting fix
 - korganizer: fix sorting todos
  - korganizer: menu fixes
  - korganizer: backports to help make Paste work
  - korganizer: type-ahead event creation ignores ctrl keys
  - korganizer: robustness work in synchronous address book
    loading
  - korganizer: paint the all-day item headers
  - korganizer: initialise special dates UI correctly
  - korganizer: disable the configuration area for
    deselected plugins
  - korganizer: hide redundant configure plugin button
  - korganizer: fix agendaview configuration
  - korganizer: ensure agendaview decoration is selected
  - korganizer: fix to-do copying
  - korganizer: todo rich text speedup
  - korganizer: fix what's next view todo links
  - korganizer: fix event duplication when moving events
    with the mouse.
  - korganizer: fix duplicate default resources (bnc#116351)
  - korganizer: fix tab order
  - korganizer: fix performance problems on updateEvents()
  - korganizer: fix new journal is set to date of the first
    day of the week/month (kde#170634)
  - korganizer: fix slow switching calendar views
    (kde#170993)
  - korganizer: maintain selected day on view change
  - korganizer: fix performance problems with month
    switching (kde#166771)
  - korganizer: don't load decoration plugins multiple times
  - korganizer: an attempt at fixing the dreaded crash in
    paintEvent().
  - korganizer: fixes in pasting
  - korganizer: don't lose last day on setting recurring
    events
  - korganizer: updated Slovenian holidays
  - korganizer: avoid assert when adding attachments
  - kresources: blog - remove non-working LiveJournal
    support
  - kresources: birthdays - complete load sequence
  - kresources: birthdays - fix alarms
  - kresources: Write subresource state changes immediately
    (kolab#3314)
  - kresources: groupwise -  fixes to warn on trying to set
    up dud local&lt;-&gt;remote id mappings
  - ktimetracker: fix crash when deleting the last task
    (kde:173543)

kdepimlibs4:
  - fixes a crash on korgac startup triggered when parsing
    the timezoneId from a null string
  - libical safety fix
  - memleak in Generic kmime header
  - test before delete[] is not needed
  - fix memleak in knode
  - fix the kio_sieve related klauncher crashes
  - return better errors for gpgme write failures and
    missing passphrases
  - Fix signing of multiple uids (!= all, though) at the
    same time
  - Print the nextState() call also in the error case
  - gpgme: Fix 'General Error' returned when trying to sign
    an already signed UID again with the same key.
  - gpgme: use better error codes
  - gpgme: Treat GPGME_STATUS_{KEY,SIG}EXPIRED as errors,
    too.
  - gpgme: Add missing gpg_error() call (to set the correct
    source of the error)
  - kblog: fix broken tagging
  - kblog: GData tagging fix
  - fix sending mail fails due to spurious newline in
    server name configuration (kde#175892)
  - fix korganizer crash with akonadi resources (kde#175971)
  - remove use of isNull in icalformat
  - properly initialize kcal::attachment ctor
  - kcal: fix spurious error on empty alarm trigger
  - kcal: inline attachment fixes
  - kcal: crash fixes
  - kldap: crash bug fix (kde#174381)
  - Fix LDAP using simple authentication (kde#163319)
  - ldap: Quote CN parameters correctly. (kolab#3281)
  - update reference test files
  - merge updated testcase runner
  - use .shell versions of tests
  - remove mistaken reference files
  - fix a backporting boo-boo
  - kcal: fix an ical date interpretation bug
  - Fix a crash when using egroupware.
  - Fix a crash in KOrganizer when the addressbook contains
    a LDAP resource.
  - Fixes an assert crash when unloading and then loading a
    vCal resource
  - Fix high traffic rss feed fetches
  - Fix for improperly formatted mailto: links in the
    KOrganizer eventviewer.
  - fixcrash if data() returns null (CID:3969)
  - Fix sieve with dovecot servers
  - Fix parsing of time string to be more conforming to ISO
    8601
  - kcal: Fix iCal export due to wrongly discarded last
    byte (porting bug) (kde#182224)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-20"/>
	<updated date="2009-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/490696">SUSE bug 490696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570097" comment="kde4-akonadi-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570098" comment="kde4-akregator-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570099" comment="kde4-kaddressbook-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570100" comment="kde4-kalarm-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570101" comment="kde4-kjots-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570102" comment="kde4-kmail-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570103" comment="kde4-knode-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570104" comment="kde4-knotes-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570105" comment="kde4-kontact-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570106" comment="kde4-korganizer-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570107" comment="kde4-ktimetracker-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570108" comment="kde4-ktnef-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570109" comment="kdepim4-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570110" comment="kdepim4-wizards-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570111" comment="kdepimlibs4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570112" comment="libakonadi4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570113" comment="libkdepim4-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570114" comment="libkdepimlibs4-4.1.3-9.28.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570097" comment="kde4-akonadi-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570098" comment="kde4-akregator-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570099" comment="kde4-kaddressbook-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570100" comment="kde4-kalarm-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570101" comment="kde4-kjots-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570102" comment="kde4-kmail-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570103" comment="kde4-knode-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570104" comment="kde4-knotes-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570105" comment="kde4-kontact-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570106" comment="kde4-korganizer-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570107" comment="kde4-ktimetracker-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570108" comment="kde4-ktnef-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570109" comment="kdepim4-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570110" comment="kdepim4-wizards-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570111" comment="kdepimlibs4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570112" comment="libakonadi4-4.1.3-9.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570113" comment="libkdepim4-4.1.3-9.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570114" comment="libkdepimlibs4-4.1.3-9.28.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38658" version="1" class="patch">
	<metadata>
		<title>Security update for okular.</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="634743" ref_url="https://bugzilla.suse.com/634743" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2575" ref_url="https://www.suse.com/security/cve/CVE-2010-2575/" source="CVE"/>
		<description>

This update fixes a heap-based overflow in okular. The RLE decompression in 
the TranscribePalmImageToJPEG() function can be exploited to execute 
arbitrary code with user privileges by providing a crafted PDF file. 
(CVE-2010-2575)

Security Issue reference:

    * CVE-2010-2575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-02"/>
	<updated date="2010-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/634743">SUSE bug 634743</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2575/">CVE-2010-2575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570115" comment="kde4-gwenview-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570116" comment="kde4-kcolorchooser-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570117" comment="kde4-kruler-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570118" comment="kde4-ksnapshot-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570119" comment="kde4-okular-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570120" comment="libkipi5-4.1.3-7.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570115" comment="kde4-gwenview-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570116" comment="kde4-kcolorchooser-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570117" comment="kde4-kruler-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570118" comment="kde4-ksnapshot-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570119" comment="kde4-okular-4.1.3-7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570120" comment="libkipi5-4.1.3-7.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38659" version="1" class="patch">
	<metadata>
		<title>Security update for kdm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="584223" ref_url="https://bugzilla.suse.com/584223" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0436" ref_url="https://www.suse.com/security/cve/CVE-2010-0436/" source="CVE"/>
		<description>

The KDE display manager kdm contains a race condition which allows local attackers to make arbitrary files orld writable. CVE-2010-0436 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-15"/>
	<updated date="2010-03-15"/>
	<bugzilla href="https://bugzilla.suse.com/584223">SUSE bug 584223</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0436/">CVE-2010-0436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570121" comment="kde4-kdm-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570122" comment="kde4-kgreeter-plugins-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570123" comment="kde4-kwin-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570124" comment="kdebase4-workspace-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570125" comment="kdebase4-workspace-ksysguardd-4.1.3-18.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570121" comment="kde4-kdm-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570122" comment="kde4-kgreeter-plugins-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570123" comment="kde4-kwin-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570124" comment="kdebase4-workspace-4.1.3-18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570125" comment="kdebase4-workspace-ksysguardd-4.1.3-18.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38660" version="1" class="patch">
	<metadata>
		<title>Security update for kdenetwork</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="516347" ref_url="https://bugzilla.suse.com/516347" source="BUGZILLA"/>
		<reference ref_id="525528" ref_url="https://bugzilla.suse.com/525528" source="BUGZILLA"/>
		<reference ref_id="604709" ref_url="https://bugzilla.suse.com/604709" source="BUGZILLA"/>
		<reference ref_id="653852" ref_url="https://bugzilla.suse.com/653852" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4776" ref_url="https://www.suse.com/security/cve/CVE-2008-4776/" source="CVE"/>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>

This update of kdenetwork fixes several bugs, the security related issues 
are:

    * CVE-2010-1000: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N):
      CWE-22

The 'name' attribute of the 'file' element of metalink files is not 
properly sanitised this can be exploited to download files to arbitrary 
directories.

    * CVE-2008-4776: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P):
      CWE-119

The included libgadu version allowed remote servers to cause a denial of 
service (crash) via a buffer over-read.

Non-security issues:

    * bnc#653852: kopete: ICQ login broken; login server changed
    * bnc#516347: kopete cant connect to yahoo

Security Issue references:

    * CVE-2008-4776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776&gt;
    * CVE-2010-1000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-20"/>
	<updated date="2010-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/516347">SUSE bug 516347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/525528">SUSE bug 525528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604709">SUSE bug 604709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653852">SUSE bug 653852</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4776/">CVE-2008-4776</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570126" comment="kde4-kget-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570127" comment="kde4-knewsticker-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570128" comment="kde4-kopete-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570129" comment="kde4-krdc-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570130" comment="kde4-krfb-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570131" comment="kdenetwork4-filesharing-4.1.3-7.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570126" comment="kde4-kget-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570127" comment="kde4-knewsticker-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570128" comment="kde4-kopete-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570129" comment="kde4-krdc-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570130" comment="kde4-krfb-4.1.3-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570131" comment="kdenetwork4-filesharing-4.1.3-7.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38661" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="512559" ref_url="https://bugzilla.suse.com/512559" source="BUGZILLA"/>
		<reference ref_id="600469" ref_url="https://bugzilla.suse.com/600469" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1725" ref_url="https://www.suse.com/security/cve/CVE-2009-1725/" source="CVE"/>
		<description>

An invalid character reference causing a buffer overflow in khtml has been 
fixed in the kdelibs package. CVE-2009-1725 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2009-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-03"/>
	<updated date="2010-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/512559">SUSE bug 512559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/600469">SUSE bug 600469</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1725/">CVE-2009-1725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570132" comment="kdelibs3-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570133" comment="kdelibs3-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570134" comment="kdelibs3-default-style-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570135" comment="kdelibs3-default-style-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570136" comment="kdelibs3-default-style-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570137" comment="kdelibs3-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570138" comment="kdelibs4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570139" comment="kdelibs4-core-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570140" comment="libkde4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570141" comment="libkde4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570142" comment="libkde4-x86-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570143" comment="libkdecore4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570144" comment="libkdecore4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570145" comment="libkdecore4-x86-4.1.3-8.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570132" comment="kdelibs3-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570133" comment="kdelibs3-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570134" comment="kdelibs3-default-style-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570135" comment="kdelibs3-default-style-32bit-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570136" comment="kdelibs3-default-style-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570137" comment="kdelibs3-x86-3.5.10-23.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570138" comment="kdelibs4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570139" comment="kdelibs4-core-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570140" comment="libkde4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570141" comment="libkde4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570142" comment="libkde4-x86-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570143" comment="libkdecore4-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570144" comment="libkdecore4-32bit-4.1.3-8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570145" comment="libkdecore4-x86-4.1.3-8.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38662" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507328" ref_url="https://bugzilla.suse.com/507328" source="BUGZILLA"/>
		<reference ref_id="557126" ref_url="https://bugzilla.suse.com/557126" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<description>
A  KDELibs Remote Array Overrun (Arbitrary code execution)
was fixed (CVE-2009-0689).
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-07"/>
	<updated date="2010-01-07"/>
	<bugzilla href="https://bugzilla.suse.com/507328">SUSE bug 507328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570146" comment="kdelibs4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570147" comment="kdelibs4-core-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570148" comment="libkde4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570149" comment="libkde4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570150" comment="libkde4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570151" comment="libkdecore4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570152" comment="libkdecore4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570153" comment="libkdecore4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570154" comment="utempter-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570155" comment="utempter-32bit-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570156" comment="utempter-x86-0.5.5-106.18 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570146" comment="kdelibs4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570147" comment="kdelibs4-core-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570148" comment="libkde4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570149" comment="libkde4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570150" comment="libkde4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570151" comment="libkdecore4-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570152" comment="libkdecore4-32bit-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570153" comment="libkdecore4-x86-4.1.3-8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570154" comment="utempter-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570155" comment="utempter-32bit-0.5.5-106.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570156" comment="utempter-x86-0.5.5-106.18 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38663" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="408304" ref_url="https://bugzilla.suse.com/408304" source="BUGZILLA"/>
		<reference ref_id="459065" ref_url="https://bugzilla.suse.com/459065" source="BUGZILLA"/>
		<reference ref_id="460284" ref_url="https://bugzilla.suse.com/460284" source="BUGZILLA"/>
		<reference ref_id="464360" ref_url="https://bugzilla.suse.com/464360" source="BUGZILLA"/>
		<reference ref_id="465854" ref_url="https://bugzilla.suse.com/465854" source="BUGZILLA"/>
		<reference ref_id="467518" ref_url="https://bugzilla.suse.com/467518" source="BUGZILLA"/>
		<reference ref_id="474062" ref_url="https://bugzilla.suse.com/474062" source="BUGZILLA"/>
		<reference ref_id="483706" ref_url="https://bugzilla.suse.com/483706" source="BUGZILLA"/>
		<reference ref_id="484931" ref_url="https://bugzilla.suse.com/484931" source="BUGZILLA"/>
		<reference ref_id="486430" ref_url="https://bugzilla.suse.com/486430" source="BUGZILLA"/>
		<reference ref_id="486803" ref_url="https://bugzilla.suse.com/486803" source="BUGZILLA"/>
		<reference ref_id="487106" ref_url="https://bugzilla.suse.com/487106" source="BUGZILLA"/>
		<reference ref_id="487755" ref_url="https://bugzilla.suse.com/487755" source="BUGZILLA"/>
		<reference ref_id="487987" ref_url="https://bugzilla.suse.com/487987" source="BUGZILLA"/>
		<reference ref_id="489005" ref_url="https://bugzilla.suse.com/489005" source="BUGZILLA"/>
		<reference ref_id="489105" ref_url="https://bugzilla.suse.com/489105" source="BUGZILLA"/>
		<reference ref_id="490368" ref_url="https://bugzilla.suse.com/490368" source="BUGZILLA"/>
		<reference ref_id="490608" ref_url="https://bugzilla.suse.com/490608" source="BUGZILLA"/>
		<reference ref_id="490902" ref_url="https://bugzilla.suse.com/490902" source="BUGZILLA"/>
		<reference ref_id="491289" ref_url="https://bugzilla.suse.com/491289" source="BUGZILLA"/>
		<reference ref_id="491430" ref_url="https://bugzilla.suse.com/491430" source="BUGZILLA"/>
		<reference ref_id="492282" ref_url="https://bugzilla.suse.com/492282" source="BUGZILLA"/>
		<reference ref_id="492760" ref_url="https://bugzilla.suse.com/492760" source="BUGZILLA"/>
		<reference ref_id="492768" ref_url="https://bugzilla.suse.com/492768" source="BUGZILLA"/>
		<reference ref_id="493392" ref_url="https://bugzilla.suse.com/493392" source="BUGZILLA"/>
		<reference ref_id="493991" ref_url="https://bugzilla.suse.com/493991" source="BUGZILLA"/>
		<reference ref_id="494463" ref_url="https://bugzilla.suse.com/494463" source="BUGZILLA"/>
		<reference ref_id="495068" ref_url="https://bugzilla.suse.com/495068" source="BUGZILLA"/>
		<reference ref_id="495515" ref_url="https://bugzilla.suse.com/495515" source="BUGZILLA"/>
		<reference ref_id="495668" ref_url="https://bugzilla.suse.com/495668" source="BUGZILLA"/>
		<reference ref_id="495816" ref_url="https://bugzilla.suse.com/495816" source="BUGZILLA"/>
		<reference ref_id="496027" ref_url="https://bugzilla.suse.com/496027" source="BUGZILLA"/>
		<reference ref_id="496353" ref_url="https://bugzilla.suse.com/496353" source="BUGZILLA"/>
		<reference ref_id="496398" ref_url="https://bugzilla.suse.com/496398" source="BUGZILLA"/>
		<reference ref_id="496399" ref_url="https://bugzilla.suse.com/496399" source="BUGZILLA"/>
		<reference ref_id="496502" ref_url="https://bugzilla.suse.com/496502" source="BUGZILLA"/>
		<reference ref_id="496878" ref_url="https://bugzilla.suse.com/496878" source="BUGZILLA"/>
		<reference ref_id="497807" ref_url="https://bugzilla.suse.com/497807" source="BUGZILLA"/>
		<reference ref_id="498042" ref_url="https://bugzilla.suse.com/498042" source="BUGZILLA"/>
		<reference ref_id="498237" ref_url="https://bugzilla.suse.com/498237" source="BUGZILLA"/>
		<reference ref_id="499558" ref_url="https://bugzilla.suse.com/499558" source="BUGZILLA"/>
		<reference ref_id="499772" ref_url="https://bugzilla.suse.com/499772" source="BUGZILLA"/>
		<reference ref_id="499845" ref_url="https://bugzilla.suse.com/499845" source="BUGZILLA"/>
		<reference ref_id="500508" ref_url="https://bugzilla.suse.com/500508" source="BUGZILLA"/>
		<reference ref_id="501114" ref_url="https://bugzilla.suse.com/501114" source="BUGZILLA"/>
		<reference ref_id="501160" ref_url="https://bugzilla.suse.com/501160" source="BUGZILLA"/>
		<reference ref_id="501224" ref_url="https://bugzilla.suse.com/501224" source="BUGZILLA"/>
		<reference ref_id="501234" ref_url="https://bugzilla.suse.com/501234" source="BUGZILLA"/>
		<reference ref_id="502026" ref_url="https://bugzilla.suse.com/502026" source="BUGZILLA"/>
		<reference ref_id="502425" ref_url="https://bugzilla.suse.com/502425" source="BUGZILLA"/>
		<reference ref_id="502733" ref_url="https://bugzilla.suse.com/502733" source="BUGZILLA"/>
		<reference ref_id="502903" ref_url="https://bugzilla.suse.com/502903" source="BUGZILLA"/>
		<reference ref_id="503038" ref_url="https://bugzilla.suse.com/503038" source="BUGZILLA"/>
		<reference ref_id="503101" ref_url="https://bugzilla.suse.com/503101" source="BUGZILLA"/>
		<reference ref_id="503161" ref_url="https://bugzilla.suse.com/503161" source="BUGZILLA"/>
		<reference ref_id="503457" ref_url="https://bugzilla.suse.com/503457" source="BUGZILLA"/>
		<reference ref_id="505831" ref_url="https://bugzilla.suse.com/505831" source="BUGZILLA"/>
		<reference ref_id="505925" ref_url="https://bugzilla.suse.com/505925" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1192" ref_url="https://www.suse.com/security/cve/CVE-2009-1192/" source="CVE"/>
		<reference ref_id="CVE-2009-1242" ref_url="https://www.suse.com/security/cve/CVE-2009-1242/" source="CVE"/>
		<reference ref_id="CVE-2009-1265" ref_url="https://www.suse.com/security/cve/CVE-2009-1265/" source="CVE"/>
		<reference ref_id="CVE-2009-1337" ref_url="https://www.suse.com/security/cve/CVE-2009-1337/" source="CVE"/>
		<reference ref_id="CVE-2009-1360" ref_url="https://www.suse.com/security/cve/CVE-2009-1360/" source="CVE"/>
		<reference ref_id="CVE-2009-1439" ref_url="https://www.suse.com/security/cve/CVE-2009-1439/" source="CVE"/>
		<description>
The Linux kernel on SUSE Linux Enterprise 11 was updated to
2.6.27.23 and received lots of bugs and security fixes.

Following security issues have been fixed: CVE-2009-1439:
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux
kernel 2.6.29 and earlier allows remote attackers to cause
a denial of service (crash) or potential code execution via
a long nativeFileSystem field in a Tree Connect response to
an SMB mount request.

This requires that kernel can be made to mount a 'cifs'
filesystem from a malicious CIFS server.

CVE-2009-1337: The exit_notify function in kernel/exit.c in
the Linux kernel did not restrict exit signals when the
CAP_KILL capability is held, which allows local users to
send an arbitrary signal to a process by running a program
that modifies the exit_signal field and then uses an exec
system call to launch a setuid application.

The GCC option -fwrapv has been added to compilation to
work around potentially removing integer overflow checks.

CVE-2009-1265: Integer overflow in rose_sendmsg
(sys/net/af_rose.c) in the Linux kernel might allow
attackers to obtain sensitive information via a large
length value, which causes 'garbage' memory to be sent.

CVE-2009-1242: The vmx_set_msr function in
arch/x86/kvm/vmx.c in the VMX implementation in the KVM
subsystem in the Linux kernel on the i386 platform allows
guest OS users to cause a denial of service (OOPS) by
setting the EFER_LME (aka 'Long mode enable') bit in the
Extended Feature Enable Register (EFER) model-specific
register, which is specific to the x86_64 platform.

CVE-2009-1360: The __inet6_check_established function in
net/ipv6/inet6_hashtables.c in the Linux kernel, when
Network Namespace Support (aka NET_NS) is enabled, allows
remote attackers to cause a denial of service (NULL pointer
dereference and system crash) via vectors involving IPv6
packets.

CVE-2009-1192: drivers/char/agp/generic.c in the agp
subsystem in the Linux kernel does not zero out pages that
may later be available to a user-space process, which
allows local users to obtain sensitive information by
reading these pages.

Additionaly a lot of bugs have been fixed and are listed in
the RPM changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-27"/>
	<updated date="2009-05-27"/>
	<bugzilla href="https://bugzilla.suse.com/408304">SUSE bug 408304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/459065">SUSE bug 459065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/460284">SUSE bug 460284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/464360">SUSE bug 464360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465854">SUSE bug 465854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467518">SUSE bug 467518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/474062">SUSE bug 474062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483706">SUSE bug 483706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484931">SUSE bug 484931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486430">SUSE bug 486430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486803">SUSE bug 486803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487106">SUSE bug 487106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487755">SUSE bug 487755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487987">SUSE bug 487987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489005">SUSE bug 489005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489105">SUSE bug 489105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490368">SUSE bug 490368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490608">SUSE bug 490608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/490902">SUSE bug 490902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491289">SUSE bug 491289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/491430">SUSE bug 491430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492282">SUSE bug 492282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492760">SUSE bug 492760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492768">SUSE bug 492768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493392">SUSE bug 493392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493991">SUSE bug 493991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/494463">SUSE bug 494463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495068">SUSE bug 495068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495515">SUSE bug 495515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495668">SUSE bug 495668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495816">SUSE bug 495816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496027">SUSE bug 496027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496353">SUSE bug 496353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496398">SUSE bug 496398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496399">SUSE bug 496399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496502">SUSE bug 496502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496878">SUSE bug 496878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497807">SUSE bug 497807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498042">SUSE bug 498042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498237">SUSE bug 498237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499558">SUSE bug 499558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499772">SUSE bug 499772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499845">SUSE bug 499845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/500508">SUSE bug 500508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501114">SUSE bug 501114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501160">SUSE bug 501160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501224">SUSE bug 501224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501234">SUSE bug 501234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502026">SUSE bug 502026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502425">SUSE bug 502425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502733">SUSE bug 502733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502903">SUSE bug 502903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503038">SUSE bug 503038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503101">SUSE bug 503101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503161">SUSE bug 503161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503457">SUSE bug 503457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505831">SUSE bug 505831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505925">SUSE bug 505925</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1192/">CVE-2009-1192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1242/">CVE-2009-1242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1265/">CVE-2009-1265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1337/">CVE-2009-1337</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1360/">CVE-2009-1360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1439/">CVE-2009-1439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570157" comment="ext4dev-kmp-default-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570158" comment="ext4dev-kmp-pae-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570159" comment="ext4dev-kmp-ppc64-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570160" comment="ext4dev-kmp-vmi-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570161" comment="ext4dev-kmp-xen-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570162" comment="iscsitarget-kmp-default-0.4.15_2.6.27.54_0.2-94.14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570163" comment="kernel-default-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570164" comment="kernel-default-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570165" comment="kernel-default-man-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570166" comment="kernel-kdump-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570167" comment="kernel-pae-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570168" comment="kernel-pae-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570169" comment="kernel-ppc64-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570170" comment="kernel-ppc64-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570171" comment="kernel-source-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570172" comment="kernel-syms-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570173" comment="kernel-vmi-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570174" comment="kernel-vmi-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570175" comment="kernel-xen-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570176" comment="kernel-xen-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570177" comment="oracleasm-kmp-default-2.0.5_2.6.27.54_0.2-7.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570157" comment="ext4dev-kmp-default-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570158" comment="ext4dev-kmp-pae-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570159" comment="ext4dev-kmp-ppc64-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570160" comment="ext4dev-kmp-vmi-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570161" comment="ext4dev-kmp-xen-0_2.6.27.23_0.1-7.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570162" comment="iscsitarget-kmp-default-0.4.15_2.6.27.54_0.2-94.14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570163" comment="kernel-default-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570164" comment="kernel-default-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570165" comment="kernel-default-man-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570166" comment="kernel-kdump-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570167" comment="kernel-pae-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570168" comment="kernel-pae-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570169" comment="kernel-ppc64-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570170" comment="kernel-ppc64-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570171" comment="kernel-source-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570172" comment="kernel-syms-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570173" comment="kernel-vmi-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570174" comment="kernel-vmi-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570175" comment="kernel-xen-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570176" comment="kernel-xen-base-2.6.27.23-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570177" comment="oracleasm-kmp-default-2.0.5_2.6.27.54_0.2-7.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38664" version="1" class="patch">
	<metadata>
		<title>Security update for Kerberos</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="485894" ref_url="https://bugzilla.suse.com/485894" source="BUGZILLA"/>
		<reference ref_id="486722" ref_url="https://bugzilla.suse.com/486722" source="BUGZILLA"/>
		<reference ref_id="486723" ref_url="https://bugzilla.suse.com/486723" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<description>
Clients sending negotiation requests with invalid flags
could crash the kerberos server (CVE-2009-0845).

GSS-API clients could crash when reading from an invalid
address space (CVE-2009-0844).

Invalid length checks could crash applications using the
kerberos ASN.1 parser (CVE-2009-0847).

Under certain circumstances the ASN.1 parser could free an
uninitialized pointer which could crash a kerberos server
or even lead to execution of arbitrary code (CVE-2009-0846).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-06"/>
	<updated date="2009-04-06"/>
	<bugzilla href="https://bugzilla.suse.com/485894">SUSE bug 485894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486723">SUSE bug 486723</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570178" comment="krb5-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570179" comment="krb5-32bit-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570180" comment="krb5-apps-clients-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570181" comment="krb5-apps-servers-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570182" comment="krb5-client-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570183" comment="krb5-server-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570184" comment="krb5-x86-1.6.3-133.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570178" comment="krb5-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570179" comment="krb5-32bit-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570180" comment="krb5-apps-clients-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570181" comment="krb5-apps-servers-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570182" comment="krb5-client-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570183" comment="krb5-server-1.6.3-133.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570184" comment="krb5-x86-1.6.3-133.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38665" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="540247" ref_url="https://bugzilla.suse.com/540247" source="BUGZILLA"/>
		<reference ref_id="547555" ref_url="https://bugzilla.suse.com/547555" source="BUGZILLA"/>
		<reference ref_id="547624" ref_url="https://bugzilla.suse.com/547624" source="BUGZILLA"/>
		<reference ref_id="549487" ref_url="https://bugzilla.suse.com/549487" source="BUGZILLA"/>
		<reference ref_id="550072" ref_url="https://bugzilla.suse.com/550072" source="BUGZILLA"/>
		<reference ref_id="550732" ref_url="https://bugzilla.suse.com/550732" source="BUGZILLA"/>
		<reference ref_id="550917" ref_url="https://bugzilla.suse.com/550917" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3616" ref_url="https://www.suse.com/security/cve/CVE-2009-3616/" source="CVE"/>
		<reference ref_id="CVE-2009-3638" ref_url="https://www.suse.com/security/cve/CVE-2009-3638/" source="CVE"/>
		<reference ref_id="CVE-2009-3640" ref_url="https://www.suse.com/security/cve/CVE-2009-3640/" source="CVE"/>
		<description>
This update of QEMU KVM fixes the following bugs:
- CVE-2009-3616: CVSS v2 Base Score: 8.5 use-after-free bug
  in VNC code which might be used to execute code on the
  host system injected from the guest system
- CVE-2009-3638: CVSS v2 Base Score: 7.2 integer overflow
  in kvm_dev_ioctl_get_supported_cpuid() 
- CVE-2009-3640: CVSS v2 Base Score: 2.1
  update_cr8_intercept() NULL pointer dereference
		</description>
<advisory from="security@suse.de">
	<issued date="2009-11-16"/>
	<updated date="2009-11-16"/>
	<bugzilla href="https://bugzilla.suse.com/540247">SUSE bug 540247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547555">SUSE bug 547555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547624">SUSE bug 547624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/549487">SUSE bug 549487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550072">SUSE bug 550072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550732">SUSE bug 550732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550917">SUSE bug 550917</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3616/">CVE-2009-3616</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3638/">CVE-2009-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3640/">CVE-2009-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570185" comment="kvm-78.0.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570186" comment="kvm-kmp-default-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570187" comment="kvm-kmp-pae-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570185" comment="kvm-78.0.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570186" comment="kvm-kmp-default-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570187" comment="kvm-kmp-pae-78.2.6.30.1_2.6.27.37_0.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38666" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="479606" ref_url="https://bugzilla.suse.com/479606" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0581" ref_url="https://www.suse.com/security/cve/CVE-2009-0581/" source="CVE"/>
		<reference ref_id="CVE-2009-0723" ref_url="https://www.suse.com/security/cve/CVE-2009-0723/" source="CVE"/>
		<reference ref_id="CVE-2009-0733" ref_url="https://www.suse.com/security/cve/CVE-2009-0733/" source="CVE"/>
		<description>
Specially crafted image files could cause an integer
overflow in lcms. Attackers could potentially exploit that
to crash applications using lcms or even execute arbitrary
code (CVE-2009-0723, CVE-2009-0581, CVE-2009-0733).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/479606">SUSE bug 479606</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0581/">CVE-2009-0581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0723/">CVE-2009-0723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0733/">CVE-2009-0733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570188" comment="lcms-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570189" comment="liblcms1-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570190" comment="liblcms1-32bit-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570191" comment="liblcms1-x86-1.17-77.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570188" comment="lcms-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570189" comment="liblcms1-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570190" comment="liblcms1-32bit-1.17-77.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570191" comment="liblcms1-x86-1.17-77.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38667" version="1" class="patch">
	<metadata>
		<title>Security update for libHX13</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="631582" ref_url="https://bugzilla.suse.com/631582" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>

This update fixes a heap-based buffer overflow in HX_split() of libHX. 
(CVE-2010-2947)

Security Issue reference:

    * CVE-2010-2947
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-23"/>
	<updated date="2010-08-23"/>
	<bugzilla href="https://bugzilla.suse.com/631582">SUSE bug 631582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570192" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570193" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570194" comment="libHX13-x86-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570192" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570193" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570194" comment="libHX13-x86-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38668" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="509825" ref_url="https://bugzilla.suse.com/509825" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955/" source="CVE"/>
		<reference ref_id="CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956/" source="CVE"/>
		<description>
This update of libapr-util1 fixes a memory consumption bug
in the XML parser that can cause a remote denial-of-service
vulnerability in applications using APR (WebDAV for
example) (CVE-2009-1955). Additionally a one byte buffer
overflow in function apr_brigade_vprintf() (CVE-2009-1956)
and buffer underflow in function apr_strmatch_precompile()
(CVE-2009-0023) was fixed too. Depending on the application
using this function it can lead to remote denial of service
or information leakage.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-08"/>
	<updated date="2009-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/509825">SUSE bug 509825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570195" comment="libapr-util1-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570196" comment="libapr-util1-32bit-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570197" comment="libapr1-1.3.3-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570198" comment="libapr1-32bit-1.3.3-11.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570195" comment="libapr-util1-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570196" comment="libapr-util1-32bit-1.3.4-12.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570197" comment="libapr1-1.3.3-11.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570198" comment="libapr1-32bit-1.3.3-11.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38669" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="585393" ref_url="https://bugzilla.suse.com/585393" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1192" ref_url="https://www.suse.com/security/cve/CVE-2010-1192/" source="CVE"/>
		<reference ref_id="CVE-2010-1194" ref_url="https://www.suse.com/security/cve/CVE-2010-1194/" source="CVE"/>
		<description>
libesmtp did not properly handle wildcards and embedded null
characters in the Common Name of X.509 certificates (CVE-2010-1192,
CVE-2010-1194). This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-04-30"/>
	<updated date="2010-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/585393">SUSE bug 585393</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1192/">CVE-2010-1192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1194/">CVE-2010-1194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570199" comment="libesmtp-1.0.4-157.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570199" comment="libesmtp-1.0.4-157.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38670" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="637290" ref_url="https://bugzilla.suse.com/637290" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<description>

The Mozilla NSS Library was updated to version 3.12.8 and the Mozilla NSPR 
Library was updated to 4.8.6 to fix various bugs and one security issue:

    * CVE-2010-3170: Disallow wildcard matching in X509 certificate Common
      Names.

This update also has preparations for Firefox 4 support, and a updated Root 
Certificate Authority list.

Security Issue reference:

    * CVE-2010-3170
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-18"/>
	<updated date="2010-10-18"/>
	<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570210" comment="zlib-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570211" comment="zlib-32bit-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570212" comment="zlib-x86-1.2.3-106.34 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570210" comment="zlib-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570211" comment="zlib-32bit-1.2.3-106.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570212" comment="zlib-x86-1.2.3-106.34 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38671" version="1" class="patch">
	<metadata>
		<title>Security update for libgdiplus0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="630756" ref_url="https://bugzilla.suse.com/630756" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>

This update fixes three integer overflows found by Secunia Research member 
Stefan Cornelius that could possibly be exploited to execute arbitrary 
code:

    * gdip_load_tiff_image() by processing specially crafted TIFF images
    * gdip_load_jpeg_image_internal() by processing specially crafted JPEG
      images
    * gdip_read_bmp_image() by processing specially crafted BMP image

Security Issue reference:

    * CVE-2010-1526
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-24"/>
	<updated date="2010-08-24"/>
	<bugzilla href="https://bugzilla.suse.com/630756">SUSE bug 630756</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570213" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570213" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38672" version="1" class="patch">
	<metadata>
		<title>Security update for openLDAP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="555725" ref_url="https://bugzilla.suse.com/555725" source="BUGZILLA"/>
		<reference ref_id="606294" ref_url="https://bugzilla.suse.com/606294" source="BUGZILLA"/>
		<reference ref_id="612430" ref_url="https://bugzilla.suse.com/612430" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0211" ref_url="https://www.suse.com/security/cve/CVE-2010-0211/" source="CVE"/>
		<reference ref_id="CVE-2010-0212" ref_url="https://www.suse.com/security/cve/CVE-2010-0212/" source="CVE"/>
		<description>

Several issues have been fixed in OpenLDAP:

    * specially crafted MODRDN operations can crash the OpenLDAP server
      (CVE-2010-0211 and CVE-2010-0212)
    * syncrepl might loose deletes in refreshAndPersist mode
    * DoS when handling 0-bytes

Security Issues:

    * CVE-2010-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211&gt;
    * CVE-2010-0212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-15"/>
	<updated date="2010-06-15"/>
	<bugzilla href="https://bugzilla.suse.com/555725">SUSE bug 555725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/606294">SUSE bug 606294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612430">SUSE bug 612430</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0211/">CVE-2010-0211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0212/">CVE-2010-0212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570214" comment="libldap-2_4-2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570215" comment="libldap-2_4-2-32bit-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570216" comment="libldap-2_4-2-x86-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570217" comment="openldap2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570218" comment="openldap2-back-meta-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570219" comment="openldap2-client-2.4.12-7.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570214" comment="libldap-2_4-2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570215" comment="libldap-2_4-2-32bit-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570216" comment="libldap-2_4-2-x86-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570217" comment="openldap2-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570218" comment="openldap2-back-meta-2.4.12-7.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570219" comment="openldap2-client-2.4.12-7.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38673" version="1" class="patch">
	<metadata>
		<title>Security update for libtool</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="556122" ref_url="https://bugzilla.suse.com/556122" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
libtool: libltdl may load modules from the current working
directory. CVE-2009-3736 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-12-01"/>
	<updated date="2009-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/556122">SUSE bug 556122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570220" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570221" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570222" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570223" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570224" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570225" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570220" comment="libltdl7-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570221" comment="libltdl7-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570222" comment="libltdl7-x86-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570223" comment="libtool-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570224" comment="libtool-32bit-2.2.6-2.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570225" comment="libtool-x86-2.2.6-2.131.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38674" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="607466" ref_url="https://bugzilla.suse.com/607466" source="BUGZILLA"/>
		<reference ref_id="609551" ref_url="https://bugzilla.suse.com/609551" source="BUGZILLA"/>
		<reference ref_id="637499" ref_url="https://bugzilla.suse.com/637499" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1626" ref_url="https://www.suse.com/security/cve/CVE-2010-1626/" source="CVE"/>
		<reference ref_id="CVE-2010-1848" ref_url="https://www.suse.com/security/cve/CVE-2010-1848/" source="CVE"/>
		<reference ref_id="CVE-2010-1849" ref_url="https://www.suse.com/security/cve/CVE-2010-1849/" source="CVE"/>
		<reference ref_id="CVE-2010-1850" ref_url="https://www.suse.com/security/cve/CVE-2010-1850/" source="CVE"/>
		<reference ref_id="CVE-2010-3677" ref_url="https://www.suse.com/security/cve/CVE-2010-3677/" source="CVE"/>
		<reference ref_id="CVE-2010-3678" ref_url="https://www.suse.com/security/cve/CVE-2010-3678/" source="CVE"/>
		<reference ref_id="CVE-2010-3681" ref_url="https://www.suse.com/security/cve/CVE-2010-3681/" source="CVE"/>
		<reference ref_id="CVE-2010-3682" ref_url="https://www.suse.com/security/cve/CVE-2010-3682/" source="CVE"/>
		<reference ref_id="CVE-2010-3683" ref_url="https://www.suse.com/security/cve/CVE-2010-3683/" source="CVE"/>
		<description>

The following bugs have been fixed:

    * local users could delete data files for tables of other users
      (CVE-2010-1626).
    * authenticated users could gather information for tables they should
      not have access to (CVE-2010-1849)
    * authenticated users could crash mysqld (CVE-2010-1848)
    * authenticated users could potentially execute arbitrary code as the
      user running mysqld (CVE-2010-1850)
    * authenticated users could crash mysqld (CVE-2010-3677, CVE-2010-3678,
      CVE-2010-3681, CVE-2010-3682, CVE-2010-3683)

Security Issue references:

    * CVE-2010-1626
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1626&gt;
    * CVE-2010-1848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1848&gt;
    * CVE-2010-1849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1849&gt;
    * CVE-2010-1850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1850&gt;
    * CVE-2010-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3677&gt;
    * CVE-2010-3678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3678&gt;
    * CVE-2010-3681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681&gt;
    * CVE-2010-3682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3682&gt;
    * CVE-2010-3683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3683&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-30"/>
	<updated date="2010-09-30"/>
	<bugzilla href="https://bugzilla.suse.com/607466">SUSE bug 607466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609551">SUSE bug 609551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637499">SUSE bug 637499</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1626/">CVE-2010-1626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1848/">CVE-2010-1848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1849/">CVE-2010-1849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1850/">CVE-2010-1850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3677/">CVE-2010-3677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3678/">CVE-2010-3678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3681/">CVE-2010-3681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3682/">CVE-2010-3682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3683/">CVE-2010-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570226" comment="libmysqlclient15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570227" comment="libmysqlclient15-32bit-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570228" comment="libmysqlclient15-x86-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570229" comment="libmysqlclient_r15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570230" comment="mysql-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570231" comment="mysql-Max-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570232" comment="mysql-client-5.0.67-13.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570226" comment="libmysqlclient15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570227" comment="libmysqlclient15-32bit-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570228" comment="libmysqlclient15-x86-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570229" comment="libmysqlclient_r15-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570230" comment="mysql-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570231" comment="mysql-Max-5.0.67-13.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570232" comment="mysql-client-5.0.67-13.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38675" version="1" class="patch">
	<metadata>
		<title>Security update for libneon</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528370" ref_url="https://bugzilla.suse.com/528370" source="BUGZILLA"/>
		<reference ref_id="532345" ref_url="https://bugzilla.suse.com/532345" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2408" ref_url="https://www.suse.com/security/cve/CVE-2009-2408/" source="CVE"/>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<description>
neon did not properly handle embedded NUL characters in
X.509 certificates when comparing host names. Attackers
could exploit that to spoof SSL servers (CVE-2009-2408).

Specially crafted XML documents that contain a large number
of nested entity references could cause neon to consume
large amounts of CPU and memory (CVE-2009-2473).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-10-12"/>
	<updated date="2009-10-12"/>
	<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532345">SUSE bug 532345</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2408/">CVE-2009-2408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570233" comment="libneon27-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570234" comment="libneon27-32bit-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570235" comment="libneon27-x86-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570236" comment="neon-0.28.3-2.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570233" comment="libneon27-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570234" comment="libneon27-32bit-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570235" comment="libneon27-x86-0.28.3-2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570236" comment="neon-0.28.3-2.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38676" version="1" class="patch">
	<metadata>
		<title>Security update for libnetpbm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="579903" ref_url="https://bugzilla.suse.com/579903" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4274" ref_url="https://www.suse.com/security/cve/CVE-2009-4274/" source="CVE"/>
		<description>
This update of netpbm fxes a stack-based buffer overflow that could be triggered while processing the contents of XPM headers in image files.
(CVE-2009-4274: CVSS v2 Base Score: 5.8 (moderate) (AV:N/AC:M/Au:N/C:N/I:P/A:P): Buffer Errors (CWE-119))
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-16"/>
	<updated date="2010-02-16"/>
	<bugzilla href="https://bugzilla.suse.com/579903">SUSE bug 579903</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4274/">CVE-2009-4274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570237" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570238" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570239" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570240" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570237" comment="libnetpbm10-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570238" comment="libnetpbm10-32bit-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570239" comment="libnetpbm10-x86-10.26.44-101.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570240" comment="netpbm-10.26.44-101.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38677" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSC</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="480262" ref_url="https://bugzilla.suse.com/480262" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<description>
Private data objects on smartcards initialized with OpenSC
could be accessed without authentication (CVE-2009-0368).

Only blank cards initialized with OpenSC are affected by
this problem. Affected cards need to be manually fixed,
updating the opensc package alone is not sufficient!

Please carefully read and follow the instructions on the
following web site if you are using PIN protected private
data objects on smart cards other than Oberthur, and you
have initialized those cards using OpenSC:
http://en.opensuse.org/Smart_Cards/Advisories
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/480262">SUSE bug 480262</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570241" comment="libopensc2-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570242" comment="libopensc2-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570243" comment="libopensc2-x86-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570244" comment="opensc-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570245" comment="opensc-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570246" comment="opensc-x86-0.11.6-5.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570241" comment="libopensc2-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570242" comment="libopensc2-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570243" comment="libopensc2-x86-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570244" comment="opensc-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570245" comment="opensc-32bit-0.11.6-5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570246" comment="opensc-x86-0.11.6-5.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38678" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="504687" ref_url="https://bugzilla.suse.com/504687" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<description>
Three remote DoS vulnerabilities have been fixed in
OpenSSL: a DTLS epoch record buffer memory DoS
(CVE-2009-1377), a DTLS fragment handling memory DoS
(CVE-2009-1378) and  a DTLS fragment read after a free DoS
(CVE-2009-1379).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-22"/>
	<updated date="2009-05-22"/>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570247" comment="libopenssl0_9_8-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570248" comment="libopenssl0_9_8-32bit-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570249" comment="libopenssl0_9_8-x86-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570250" comment="openssl-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570251" comment="openssl-doc-0.9.8h-30.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570247" comment="libopenssl0_9_8-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570248" comment="libopenssl0_9_8-32bit-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570249" comment="libopenssl0_9_8-x86-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570250" comment="openssl-0.9.8h-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570251" comment="openssl-doc-0.9.8h-30.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38679" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="472745" ref_url="https://bugzilla.suse.com/472745" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<description>
A allocation mistake in libpng's pngread.c has been fixed
(CVE-2009-0040).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-18"/>
	<updated date="2009-03-18"/>
	<bugzilla href="https://bugzilla.suse.com/472745">SUSE bug 472745</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570252" comment="libpng12-0-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570253" comment="libpng12-0-32bit-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570254" comment="libpng12-0-x86-1.2.31-5.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570252" comment="libpng12-0-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570253" comment="libpng12-0-32bit-1.2.31-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570254" comment="libpng12-0-x86-1.2.31-5.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38680" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="617866" ref_url="https://bugzilla.suse.com/617866" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-2249" ref_url="https://www.suse.com/security/cve/CVE-2010-2249/" source="CVE"/>
		<description>

Specially crafted png files could cause crashes or even execution of 
arbitrary code in applications using libpng to process such files 
(CVE-2010-1205, CVE-2010-2249).

Security Issues reference:

    * CVE-2010-1205
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205&gt;
    * CVE-2010-2249
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2249/">CVE-2010-2249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570255" comment="libpng12-0-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570256" comment="libpng12-0-32bit-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570257" comment="libpng12-0-x86-1.2.31-5.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570255" comment="libpng12-0-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570256" comment="libpng12-0-32bit-1.2.31-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570257" comment="libpng12-0-x86-1.2.31-5.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38681" version="1" class="patch">
	<metadata>
		<title>Security update for libpoppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="642785" ref_url="https://bugzilla.suse.com/642785" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>

Specially crafted PDF files could crash poppler or potentially even cause 
execution of arbitrary code (CVE-2010-3702, CVE-2010-3704). This has been 
fixed.

Security Issue references:

    * CVE-2010-3702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702&gt;
    * CVE-2010-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-16"/>
	<updated date="2010-10-16"/>
	<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570258" comment="libpoppler-glib4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570259" comment="libpoppler-qt4-3-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570260" comment="libpoppler4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570261" comment="poppler-tools-0.10.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570258" comment="libpoppler-glib4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570259" comment="libpoppler-qt4-3-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570260" comment="libpoppler4-0.10.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570261" comment="poppler-tools-0.10.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38682" version="1" class="patch">
	<metadata>
		<title>Security update for libpoppler4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="387770" ref_url="https://bugzilla.suse.com/387770" source="BUGZILLA"/>
		<reference ref_id="481795" ref_url="https://bugzilla.suse.com/481795" source="BUGZILLA"/>
		<reference ref_id="487100" ref_url="https://bugzilla.suse.com/487100" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0146" ref_url="https://www.suse.com/security/cve/CVE-2009-0146/" source="CVE"/>
		<reference ref_id="CVE-2009-0147" ref_url="https://www.suse.com/security/cve/CVE-2009-0147/" source="CVE"/>
		<reference ref_id="CVE-2009-0165" ref_url="https://www.suse.com/security/cve/CVE-2009-0165/" source="CVE"/>
		<reference ref_id="CVE-2009-0166" ref_url="https://www.suse.com/security/cve/CVE-2009-0166/" source="CVE"/>
		<reference ref_id="CVE-2009-0755" ref_url="https://www.suse.com/security/cve/CVE-2009-0755/" source="CVE"/>
		<reference ref_id="CVE-2009-0756" ref_url="https://www.suse.com/security/cve/CVE-2009-0756/" source="CVE"/>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<description>
This update of poppler: fix various security bugs that
occur while decoding JBIG2 (CVE-2009-0146, CVE-2009-0147,
CVE-2009-0165, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800,
CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182,
CVE-2009-1183).

Further a denial of service bug in function
FormWidgetChoice::loadDefaults() (CVE-2009-0755) and
JBIG2Stream::readSymbolDictSeg() (CVE-2009-0756) was closed
that could be triggered via malformed PDF files.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-22"/>
	<updated date="2009-06-22"/>
	<bugzilla href="https://bugzilla.suse.com/387770">SUSE bug 387770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/481795">SUSE bug 481795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0146/">CVE-2009-0146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0147/">CVE-2009-0147</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0165/">CVE-2009-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0166/">CVE-2009-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0755/">CVE-2009-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0756/">CVE-2009-0756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570262" comment="libpoppler4-0.10.1-1.30.5 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570262" comment="libpoppler4-0.10.1-1.30.5 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38683" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="609759" ref_url="https://bugzilla.suse.com/609759" source="BUGZILLA"/>
		<reference ref_id="609761" ref_url="https://bugzilla.suse.com/609761" source="BUGZILLA"/>
		<reference ref_id="638233" ref_url="https://bugzilla.suse.com/638233" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1634" ref_url="https://www.suse.com/security/cve/CVE-2010-1634/" source="CVE"/>
		<reference ref_id="CVE-2010-2089" ref_url="https://www.suse.com/security/cve/CVE-2010-2089/" source="CVE"/>
		<reference ref_id="CVE-2010-3493" ref_url="https://www.suse.com/security/cve/CVE-2010-3493/" source="CVE"/>
		<description>

The following issues have been fixed:

    * 

      a race condition in the accept() implementation of smtpd.py could
      lead to a denial of service (CVE-2010-3493).

    * 

      integer overflows and insufficient size checks could crash the
      audioop module (CVE-2010-2089, CVE-2010-1634).

Security Issue references:

    * CVE-2010-2089
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089&gt;
    * CVE-2010-1634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634&gt;
    * CVE-2010-3493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-29"/>
	<updated date="2010-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/609759">SUSE bug 609759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609761">SUSE bug 609761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638233">SUSE bug 638233</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1634/">CVE-2010-1634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2089/">CVE-2010-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3493/">CVE-2010-3493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570263" comment="libpython2_6-1_0-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570264" comment="libpython2_6-1_0-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570265" comment="libpython2_6-1_0-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570266" comment="python-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570267" comment="python-32bit-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570268" comment="python-base-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570269" comment="python-base-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570270" comment="python-base-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570271" comment="python-curses-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570272" comment="python-demo-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570273" comment="python-gdbm-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570274" comment="python-idle-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570275" comment="python-tk-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570276" comment="python-x86-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570277" comment="python-xml-2.6.0-8.8.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570263" comment="libpython2_6-1_0-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570264" comment="libpython2_6-1_0-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570265" comment="libpython2_6-1_0-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570266" comment="python-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570267" comment="python-32bit-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570268" comment="python-base-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570269" comment="python-base-32bit-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570270" comment="python-base-x86-2.6.0-8.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570271" comment="python-curses-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570272" comment="python-demo-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570273" comment="python-gdbm-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570274" comment="python-idle-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570275" comment="python-tk-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570276" comment="python-x86-2.6.0-8.9.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570277" comment="python-xml-2.6.0-8.8.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38684" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="504434" ref_url="https://bugzilla.suse.com/504434" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1788" ref_url="https://www.suse.com/security/cve/CVE-2009-1788/" source="CVE"/>
		<reference ref_id="CVE-2009-1791" ref_url="https://www.suse.com/security/cve/CVE-2009-1791/" source="CVE"/>
		<description>
This update of libsndfile fixes a heap-based buffer
overflow in voc_read_header() (CVE-2009-1788) and a
heap-based buffer overflow in aiff_read_header()
(CVE-2009-1791).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-29"/>
	<updated date="2009-05-29"/>
	<bugzilla href="https://bugzilla.suse.com/504434">SUSE bug 504434</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1788/">CVE-2009-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1791/">CVE-2009-1791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570278" comment="libsndfile-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570279" comment="libsndfile-32bit-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570280" comment="libsndfile-x86-1.0.17-172.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570278" comment="libsndfile-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570279" comment="libsndfile-32bit-1.0.17-172.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570280" comment="libsndfile-x86-1.0.17-172.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38685" version="1" class="patch">
	<metadata>
		<title>Security update for libtheora</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="581722" ref_url="https://bugzilla.suse.com/581722" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<description>
An integer overflow was fixed in libtheora. It could be exploited remotely to execute arbitrary code.
CVE-2009-3389: CVSS v2 Base Score: 9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C): Numeric Errors (CWE-189)
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-24"/>
	<updated date="2010-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/581722">SUSE bug 581722</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570281" comment="libtheora0-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570282" comment="libtheora0-32bit-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570283" comment="libtheora0-x86-1.0.beta2-6.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570281" comment="libtheora0-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570282" comment="libtheora0-32bit-1.0.beta2-6.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570283" comment="libtheora0-x86-1.0.beta2-6.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38686" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="519796" ref_url="https://bugzilla.suse.com/519796" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<description>
This update of the tiff package fixes various integer
overflows in the tools. (CVE-2009-2347)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-07"/>
	<updated date="2009-08-07"/>
	<bugzilla href="https://bugzilla.suse.com/519796">SUSE bug 519796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570284" comment="libtiff3-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570285" comment="libtiff3-32bit-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570286" comment="libtiff3-x86-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570287" comment="tiff-3.8.2-141.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570284" comment="libtiff3-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570285" comment="libtiff3-32bit-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570286" comment="libtiff3-x86-3.8.2-141.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570287" comment="tiff-3.8.2-141.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38687" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="518698" ref_url="https://bugzilla.suse.com/518698" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<description>
This update of libtiff fixes a buffer underflow in
LZWDecodeCompat (CVE-2009-2285).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-03"/>
	<updated date="2009-07-03"/>
	<bugzilla href="https://bugzilla.suse.com/518698">SUSE bug 518698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570288" comment="libtiff3-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570289" comment="libtiff3-32bit-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570290" comment="libtiff3-x86-3.8.2-141.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570288" comment="libtiff3-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570289" comment="libtiff3-32bit-3.8.2-141.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570290" comment="libtiff3-x86-3.8.2-141.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38688" version="1" class="patch">
	<metadata>
		<title>Security update for udev</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="493158" ref_url="https://bugzilla.suse.com/493158" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1185" ref_url="https://www.suse.com/security/cve/CVE-2009-1185/" source="CVE"/>
		<description>
This update fixes a local privilege escalation in udev.

CVE-2009-1185: udev did not check the origin of the netlink
messages. A local attacker could fake device create events
and so gain root privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-14"/>
	<updated date="2009-04-14"/>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1185/">CVE-2009-1185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570291" comment="libvolume_id1-128-13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570292" comment="udev-128-13.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570291" comment="libvolume_id1-128-13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570292" comment="udev-128-13.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38689" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="618155" ref_url="https://bugzilla.suse.com/618155" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<description>

Improperly mapped source privileged ports in guests may allow obtaining 
privileged resources on the host (CVE-2010-2242).

Security Issues:

    * CVE-2010-2242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-23"/>
	<updated date="2010-07-23"/>
	<bugzilla href="https://bugzilla.suse.com/618155">SUSE bug 618155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570293" comment="libvirt-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570294" comment="libvirt-doc-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570295" comment="libvirt-python-0.4.6-14.63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570293" comment="libvirt-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570294" comment="libvirt-doc-0.4.6-14.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570295" comment="libvirt-python-0.4.6-14.63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38690" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="608192" ref_url="https://bugzilla.suse.com/608192" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2663" ref_url="https://www.suse.com/security/cve/CVE-2009-2663/" source="CVE"/>
		<description>

This update of libvorbis fixes a memory corruption while parsing OGG files. 
The bug is exploitable by remote attackers to cause an application crash 
and could probably be exploited to execute arbitrary code. The issue has 
been tracked as CVE-2009-2663
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663&gt; .

		</description>
<advisory from="security@suse.de">
	<issued date="2010-05-28"/>
	<updated date="2010-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2663/">CVE-2009-2663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570296" comment="libvorbis-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570297" comment="libvorbis-32bit-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570298" comment="libvorbis-doc-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570299" comment="libvorbis-x86-1.2.0-79.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570296" comment="libvorbis-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570297" comment="libvorbis-32bit-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570298" comment="libvorbis-doc-1.2.0-79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570299" comment="libvorbis-x86-1.2.0-79.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38691" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="648277" ref_url="https://bugzilla.suse.com/648277" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4008" ref_url="https://www.suse.com/security/cve/CVE-2010-4008/" source="CVE"/>
		<description>

libxml2: Invalid memory access in the xpath handling has been fixed. 
CVE-2010-4008 has been assigned to this issue.

Security Issue reference:

    * CVE-2010-4008
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-03"/>
	<updated date="2010-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/648277">SUSE bug 648277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4008/">CVE-2010-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570300" comment="libxml2-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570301" comment="libxml2-32bit-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570302" comment="libxml2-doc-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570303" comment="libxml2-x86-2.7.1-10.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570300" comment="libxml2-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570301" comment="libxml2-32bit-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570302" comment="libxml2-doc-2.7.1-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570303" comment="libxml2-x86-2.7.1-10.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38692" version="1" class="patch">
	<metadata>
		<title>Security update for lvm2, lvm2-clvm, lvm2-clvm-debuginfo, lvm2-clvm-debugsource, lvm2-debuginfo, lvm2-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="622537" ref_url="https://bugzilla.suse.com/622537" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>

clvmd, when running, allowed unprivileged local users to issue arbitrary 
lvm commands (CVE-2010-2526) via incorrect permissions.

Security Issues:

    * CVE-2010-2526
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2526&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-30"/>
	<updated date="2010-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/622537">SUSE bug 622537</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570304" comment="lvm2-2.02.39-18.26.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570304" comment="lvm2-2.02.39-18.26.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38693" version="1" class="patch">
	<metadata>
		<title>Security update for mipv6d</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="424311" ref_url="https://bugzilla.suse.com/424311" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>

The following issues have been fixed:

    * the mipv6 daemon did not check the origin of netlink messages,
      therefore allowing local users to spoof messages (CVE-2010-2522).
    * remote attackers could cause buffer overflows in mipv6d
      (CVE-2010-2523).

Security Issues reference:

    * CVE-2010-2522
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522&gt;
    * CVE-2010-2523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570305" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570305" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38694" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="546371" ref_url="https://bugzilla.suse.com/546371" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<description>
This update fixes a bug in the Mozilla NSPR helper
libraries, which could be used by remote attackers to
potentially execute code via javascript vectors.

MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad
Pop of Secunia Research reported a heap-based buffer
overflow in Mozilla's string to floating point number
conversion routines. Using this vulnerability an attacker
could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number
which would result in improper memory allocation and the
execution of an arbitrary memory location. This
vulnerability could thus be leveraged by the attacker to
run arbitrary code on a victim's computer.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-11-03"/>
	<updated date="2009-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570306" comment="mozilla-nspr-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570307" comment="mozilla-nspr-32bit-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570308" comment="mozilla-nspr-x86-4.8.2-1.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570306" comment="mozilla-nspr-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570307" comment="mozilla-nspr-32bit-4.8.2-1.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570308" comment="mozilla-nspr-x86-4.8.2-1.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38695" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="495473" ref_url="https://bugzilla.suse.com/495473" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<description>
Firefox version upgrade to 3.0.9 to fix various security
bugs.
(CVE-2009-1302,CVE-2009-1303,CVE-2009-1304,CVE-2009-1305,CVE
-2009-1306,CVE-2009-1307,CVE-2009-1308,CVE-2009-1309,CVE-200
9-1310,CVE-2009-1311,CVE-2009-1312,CVE-2009-0652)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-27"/>
	<updated date="2009-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570309" comment="mozilla-xulrunner190-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570310" comment="mozilla-xulrunner190-32bit-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570311" comment="mozilla-xulrunner190-gnomevfs-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570312" comment="mozilla-xulrunner190-translations-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570313" comment="mozilla-xulrunner190-x86-1.9.0.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570309" comment="mozilla-xulrunner190-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570310" comment="mozilla-xulrunner190-32bit-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570311" comment="mozilla-xulrunner190-gnomevfs-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570312" comment="mozilla-xulrunner190-translations-1.9.0.9-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570313" comment="mozilla-xulrunner190-x86-1.9.0.9-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38696" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="653606" ref_url="https://bugzilla.suse.com/653606" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<description>

This update brings the Mozilla XULRunner engine to version 1.9.1.15, fixing 
various bugs and security issues.

The following security issues were fixed:

    * 

      MFSA 2010-64: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code. References

      Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov and Josh
      Soref reported memory safety problems that affected Firefox 3.6 and
      Firefox 3.5.

          o Memory safety bugs - Firefox 3.6, Firefox 3.5
          o CVE-2010-3176

      Gary Kwong, Martijn Wargers and Siddharth Agarwal reported memory
      safety problems that affected Firefox 3.6 only.

          o Memory safety bugs - Firefox 3.6
          o CVE-2010-3175
    * 

      MFSA 2010-65 / CVE-2010-3179: Security researcher Alexander Miller
      reported that passing an excessively long string to document.write
      could cause text rendering routines to end up in an inconsistent
      state with sections of stack memory being overwritten with the string
      data. An attacker could use this flaw to crash a victim's browser and
      potentially run arbitrary code on their computer.

    * 

      MFSA 2010-66 / CVE-2010-3180: Security researcher Sergey Glazunov
      reported that it was possible to access the locationbar property of a
      window object after it had been closed. Since the closed window's
      memory could have been subsequently reused by the system it was
      possible that an attempt to access the locationbar property could
      result in the execution of attacker-controlled memory.

    * 

      MFSA 2010-67 / CVE-2010-3183: Security researcher regenrecht reported
      via TippingPoint's Zero Day Initiative that when
      window.__lookupGetter__ is called with no arguments the code assumes
      the top JavaScript stack value is a property name. Since there were
      no arguments passed into the function, the top value could represent
      uninitialized memory or a pointer to a previously freed JavaScript
      object. Under such circumstances the value is passed to another
      subroutine which calls through the dangling pointer, potentially
      executing attacker-controlled memory.

    * 

      MFSA 2010-68 / CVE-2010-3177: Google security researcher Robert
      Swiecki reported that functions used by the Gopher parser to convert
      text to HTML tags could be exploited to turn text into executable
      JavaScript. If an attacker could create a file or directory on a
      Gopher server with the encoded script as part of its name the script
      would then run in a victim's browser within the context of the site.

    * 

      MFSA 2010-69 / CVE-2010-3178: Security researcher Eduardo Vela Nava
      reported that if a web page opened a new window and used a
      javascript: URL to make a modal call, such as alert(), then
      subsequently navigated the page to a different domain, once the modal
      call returned the opener of the window could get access to objects in
      the navigated window. This is a violation of the same-origin policy
      and could be used by an attacker to steal information from another
      web site.

    * 

      MFSA 2010-70 / CVE-2010-3170: Security researcher Richard Moore
      reported that when an SSL certificate was created with a common name
      containing a wildcard followed by a partial IP address a valid SSL
      connection could be established with a server whose IP address
      matched the wildcard range by browsing directly to the IP address. It
      is extremely unlikely that such a certificate would be issued by a
      Certificate Authority.

    * 

      MFSA 2010-71 / CVE-2010-3182: Dmitri Gribenko reported that the
      script used to launch Mozilla applications on Linux was effectively
      including the current working directory in the LD_LIBRARY_PATH
      environment variable. If an attacker was able to place into the
      current working directory a malicious shared library with the same
      name as a library that the bootstrapping script depends on the
      attacker could have their library loaded instead of the legitimate
      library.

    * 

      MFSA 2010-73 / CVE-2010-3765: Morten Kr??kvik of Telenor SOC reported
      an exploit targeting particular versions of Firefox 3.6 on Windows XP
      that Telenor found while investigating an intrusion attempt on a
      customer network. The underlying vulnerability, however, was present
      on both the Firefox 3.5 and Firefox 3.6 development branches and
      affected all supported platforms.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-18"/>
	<updated date="2010-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/653606">SUSE bug 653606</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570314" comment="mozilla-xulrunner191-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570315" comment="mozilla-xulrunner191-32bit-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570316" comment="mozilla-xulrunner191-gnomevfs-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570317" comment="mozilla-xulrunner191-translations-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570318" comment="mozilla-xulrunner191-x86-1.9.1.15-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570314" comment="mozilla-xulrunner191-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570315" comment="mozilla-xulrunner191-32bit-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570316" comment="mozilla-xulrunner191-gnomevfs-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570317" comment="mozilla-xulrunner191-translations-1.9.1.15-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570318" comment="mozilla-xulrunner191-x86-1.9.1.15-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38697" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="537141" ref_url="https://bugzilla.suse.com/537141" source="BUGZILLA"/>
		<description>
This update improves the handling of SSL certificates and
fixes a minor usability bug introduced with the last
security update.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-11-25"/>
	<updated date="2009-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/537141">SUSE bug 537141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570319" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570319" comment="mutt-1.5.17-42.33.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38698" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="517311" ref_url="https://bugzilla.suse.com/517311" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2288" ref_url="https://www.suse.com/security/cve/CVE-2009-2288/" source="CVE"/>
		<description>
A shell injection bug in nagios'  statuswml.cgi CGI script
has been fixed. CVE-2009-2288 has been assigned to this
issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-15"/>
	<updated date="2009-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/517311">SUSE bug 517311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2288/">CVE-2009-2288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570320" comment="nagios-3.0.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570321" comment="nagios-www-3.0.6-1.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570320" comment="nagios-3.0.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570321" comment="nagios-www-3.0.6-1.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38699" version="1" class="patch">
	<metadata>
		<title>Security update for ntp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="479341" ref_url="https://bugzilla.suse.com/479341" source="BUGZILLA"/>
		<reference ref_id="482349" ref_url="https://bugzilla.suse.com/482349" source="BUGZILLA"/>
		<reference ref_id="483897" ref_url="https://bugzilla.suse.com/483897" source="BUGZILLA"/>
		<reference ref_id="484653" ref_url="https://bugzilla.suse.com/484653" source="BUGZILLA"/>
		<reference ref_id="501632" ref_url="https://bugzilla.suse.com/501632" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<description>
This update fixes a remote buffer overflow in xntp/ntp
which can be exploited when autokey is enabled to execute
arbitrary code. (CVE-2009-1252) This upfate fixes a buffer
overflow in ntpd that can be triggered by a malicious
server. (CVE-2009-0159)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-08"/>
	<updated date="2009-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/479341">SUSE bug 479341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/482349">SUSE bug 482349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483897">SUSE bug 483897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/484653">SUSE bug 484653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570322" comment="ntp-4.2.4p6-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570323" comment="ntp-doc-4.2.4p6-1.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570322" comment="ntp-4.2.4p6-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570323" comment="ntp-doc-4.2.4p6-1.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38700" version="1" class="patch">
	<metadata>
		<title>Security update for open-iscsi</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="514273" ref_url="https://bugzilla.suse.com/514273" source="BUGZILLA"/>
		<reference ref_id="519402" ref_url="https://bugzilla.suse.com/519402" source="BUGZILLA"/>
		<reference ref_id="528711" ref_url="https://bugzilla.suse.com/528711" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1297" ref_url="https://www.suse.com/security/cve/CVE-2009-1297/" source="CVE"/>
		<description>
The iscsi_discovery tool created predictable temporary
files which potentially allowed attackers to overwrite
system files (CVE-2009-1297). 

Also some non-security bugs have been fixed:
- synchronize startup settings
- fix daemon segfault with CHAP
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-21"/>
	<updated date="2009-08-21"/>
	<bugzilla href="https://bugzilla.suse.com/514273">SUSE bug 514273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/519402">SUSE bug 519402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528711">SUSE bug 528711</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1297/">CVE-2009-1297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570324" comment="open-iscsi-2.0.870-26.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570324" comment="open-iscsi-2.0.870-26.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38701" version="1" class="patch">
	<metadata>
		<title>Security update for openslp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="564504" ref_url="https://bugzilla.suse.com/564504" source="BUGZILLA"/>
		<reference ref_id="597215" ref_url="https://bugzilla.suse.com/597215" source="BUGZILLA"/>
		<reference ref_id="601002" ref_url="https://bugzilla.suse.com/601002" source="BUGZILLA"/>
		<reference ref_id="626444" ref_url="https://bugzilla.suse.com/626444" source="BUGZILLA"/>
		<reference ref_id="642571" ref_url="https://bugzilla.suse.com/642571" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<description>

The openslp daemon could run into an endless loop when receiving specially 
crafted packets (CVE-2010-3609).

Additionally the following non-security bugs were fixed:

    * 564504: Fix handling of DA answers if both active and passive DA
      detection is off
    * 597215: Add configuration options to openSLP: net.slp.DASyncReg makes
      slpd query statically configured DAs for registrations,
      net.slp.isDABackup enables periodic writing of remote registrations
      to a backup file which is also read on startup.
      Both options can be used to decrease the time between the start of
      the slpd daemon and slpd knowing all registrations.
    * 601002: reduce CPU usage spikes on machines with many connections by
      using the kernel netlink interface instead of reading the /proc
      filesystem.
    * 626444: Standard compliance was fixed by stripping leading and
      trailing white spaces when doing string comparisons of scopes.

Security Issue reference:

    * CVE-2010-3609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-13"/>
	<updated date="2010-10-13"/>
	<bugzilla href="https://bugzilla.suse.com/564504">SUSE bug 564504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597215">SUSE bug 597215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601002">SUSE bug 601002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/626444">SUSE bug 626444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642571">SUSE bug 642571</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570325" comment="openslp-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570326" comment="openslp-32bit-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570327" comment="openslp-server-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570328" comment="openslp-x86-1.2.0-172.10.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570325" comment="openslp-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570326" comment="openslp-32bit-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570327" comment="openslp-server-1.2.0-172.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570328" comment="openslp-x86-1.2.0-172.10.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38702" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="509031" ref_url="https://bugzilla.suse.com/509031" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<description>
OpenSSL DTLS remote DoS in ChangeCipherSpec (CVE-2009-1386)
and in out-of-sequence message handling (CVE-2009-1387)
have been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-10"/>
	<updated date="2009-06-10"/>
	<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570329" comment="libopenssl0_9_8-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570330" comment="libopenssl0_9_8-32bit-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570331" comment="libopenssl0_9_8-x86-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570332" comment="openssl-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570333" comment="openssl-doc-0.9.8h-30.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570329" comment="libopenssl0_9_8-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570330" comment="libopenssl0_9_8-32bit-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570331" comment="libopenssl0_9_8-x86-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570332" comment="openssl-0.9.8h-30.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570333" comment="openssl-doc-0.9.8h-30.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38703" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="566238" ref_url="https://bugzilla.suse.com/566238" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4355" ref_url="https://www.suse.com/security/cve/CVE-2009-4355/" source="CVE"/>
		<description>
Incorrect use of an OpenSSL cleanup function can lead to memory
leaks in applications. For example an SSL enabled web server such as
Apache that uses PHP, curl and OpenSSL leaks memory if a SIGHUP
signal was sent to Apache. The OpenSSL cleanup function was made
more robust to avoid memory leaks (CVE-2009-4355).
		</description>
<advisory from="security@suse.de">
	<issued date="2010-01-15"/>
	<updated date="2010-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/566238">SUSE bug 566238</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4355/">CVE-2009-4355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570334" comment="libopenssl0_9_8-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570335" comment="libopenssl0_9_8-32bit-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570336" comment="libopenssl0_9_8-x86-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570337" comment="openssl-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570338" comment="openssl-doc-0.9.8h-30.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570334" comment="libopenssl0_9_8-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570335" comment="libopenssl0_9_8-32bit-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570336" comment="libopenssl0_9_8-x86-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570337" comment="openssl-0.9.8h-30.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570338" comment="openssl-doc-0.9.8h-30.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38704" version="1" class="patch">
	<metadata>
		<title>Security update for openswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="487762" ref_url="https://bugzilla.suse.com/487762" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<description>
By sending a specially crafted Dead Peer Detection (DPD)
packet remote attackers could crash the pluto IKE daemon
(CVE-2009-0790).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-24"/>
	<updated date="2009-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/487762">SUSE bug 487762</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570339" comment="openswan-2.6.16-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570340" comment="openswan-doc-2.6.16-1.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570339" comment="openswan-2.6.16-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570340" comment="openswan-doc-2.6.16-1.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38705" version="1" class="patch">
	<metadata>
		<title>Security update for pango</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="492773" ref_url="https://bugzilla.suse.com/492773" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1194" ref_url="https://www.suse.com/security/cve/CVE-2009-1194/" source="CVE"/>
		<description>
This update of pango fixes a segfault in libpango that can
be triggered by visiting web-sites. (CVE-2009-1194)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-04-28"/>
	<updated date="2009-04-28"/>
	<bugzilla href="https://bugzilla.suse.com/492773">SUSE bug 492773</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1194/">CVE-2009-1194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570341" comment="pango-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570342" comment="pango-32bit-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570343" comment="pango-doc-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570344" comment="pango-x86-1.22.1-3.17.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570341" comment="pango-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570342" comment="pango-32bit-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570343" comment="pango-doc-1.22.1-3.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570344" comment="pango-x86-1.22.1-3.17.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38706" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="609317" ref_url="https://bugzilla.suse.com/609317" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<description>

This update of pcsc-lite fixes a local vulnerability (stack overflow) which 
allowed every user with write-access to '/var/run/pcscd/pcscd.comm' to gain 
root privileges. CVE-2010-0407 has been assigned to this issue.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-05"/>
	<updated date="2010-07-05"/>
	<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570345" comment="pcsc-lite-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570346" comment="pcsc-lite-32bit-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570347" comment="pcsc-lite-x86-1.4.102-1.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570345" comment="pcsc-lite-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570346" comment="pcsc-lite-32bit-1.4.102-1.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570347" comment="pcsc-lite-x86-1.4.102-1.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38707" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="489114" ref_url="https://bugzilla.suse.com/489114" source="BUGZILLA"/>
		<reference ref_id="493978" ref_url="https://bugzilla.suse.com/493978" source="BUGZILLA"/>
		<reference ref_id="498425" ref_url="https://bugzilla.suse.com/498425" source="BUGZILLA"/>
		<reference ref_id="511241" ref_url="https://bugzilla.suse.com/511241" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1391" ref_url="https://www.suse.com/security/cve/CVE-2009-1391/" source="CVE"/>
		<description>
A Buffer overflow in perl, in the base Compress::Raw::Zlib
perl module has been fixed. (CVE-2009-1391)

Additionaly three non security bugs were fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-10"/>
	<updated date="2009-06-10"/>
	<bugzilla href="https://bugzilla.suse.com/489114">SUSE bug 489114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493978">SUSE bug 493978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498425">SUSE bug 498425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511241">SUSE bug 511241</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1391/">CVE-2009-1391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570348" comment="perl-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570349" comment="perl-32bit-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570350" comment="perl-base-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570351" comment="perl-doc-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570352" comment="perl-x86-5.10.0-64.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570348" comment="perl-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570349" comment="perl-32bit-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570350" comment="perl-base-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570351" comment="perl-doc-5.10.0-64.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570352" comment="perl-x86-5.10.0-64.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38708" version="1" class="patch">
	<metadata>
		<title>Security update for perl-HTML-Parser</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="550076" ref_url="https://bugzilla.suse.com/550076" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
Specially crafted HTML documents could cause
perl-HTML-Parser to run into an endless loop
(CVE-2009-3627).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-10-30"/>
	<updated date="2009-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/550076">SUSE bug 550076</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570353" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570353" comment="perl-HTML-Parser-3.56-1.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38709" version="1" class="patch">
	<metadata>
		<title>Security update for perl-IO-Socket-SSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="535554" ref_url="https://bugzilla.suse.com/535554" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3024" ref_url="https://www.suse.com/security/cve/CVE-2009-3024/" source="CVE"/>
		<description>
This update of perl-IO-Socket-SSL improves the hostname
checking of the SSL certificate. (CVE-2009-3024)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-09-02"/>
	<updated date="2009-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/535554">SUSE bug 535554</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3024/">CVE-2009-3024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570354" comment="perl-IO-Socket-SSL-1.16-3.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570354" comment="perl-IO-Socket-SSL-1.16-3.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38710" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="486347" ref_url="https://bugzilla.suse.com/486347" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0922" ref_url="https://www.suse.com/security/cve/CVE-2009-0922/" source="CVE"/>
		<description>
Remote authenticated users could crash the postgresql
server by requesting a conversion with an inappropriate
encoding (CVE-2009-0922).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-03-24"/>
	<updated date="2009-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/486347">SUSE bug 486347</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0922/">CVE-2009-0922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570355" comment="postgresql-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570356" comment="postgresql-contrib-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570357" comment="postgresql-docs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570358" comment="postgresql-libs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570359" comment="postgresql-libs-32bit-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570360" comment="postgresql-libs-x86-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570361" comment="postgresql-server-8.3.7-0.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570355" comment="postgresql-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570356" comment="postgresql-contrib-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570357" comment="postgresql-docs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570358" comment="postgresql-libs-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570359" comment="postgresql-libs-32bit-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570360" comment="postgresql-libs-x86-8.3.7-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570361" comment="postgresql-server-8.3.7-0.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38711" version="1" class="patch">
	<metadata>
		<title>Security update for pyxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="550666" ref_url="https://bugzilla.suse.com/550666" source="BUGZILLA"/>
		<reference ref_id="561561" ref_url="https://bugzilla.suse.com/561561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<description>
Specially crafted XML documents could make pyxml run into
an enless loop, therefore locking up applications using
pyxml (CVE-2009-3720, CVE-2009-3560).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-12-11"/>
	<updated date="2009-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570362" comment="pyxml-0.8.4-194.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570362" comment="pyxml-0.8.4-194.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38712" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="500540" ref_url="https://bugzilla.suse.com/500540" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1572" ref_url="https://www.suse.com/security/cve/CVE-2009-1572/" source="CVE"/>
		<description>
This update fixes a remote denial of service bug in quagga
that can be triggered via an AS path containing ASN
elements whose string representation is longer than
expected. (CVE-2009-1572)
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-08"/>
	<updated date="2009-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/500540">SUSE bug 500540</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1572/">CVE-2009-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570363" comment="quagga-0.99.10-17.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570363" comment="quagga-0.99.10-17.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38713" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="568017" ref_url="https://bugzilla.suse.com/568017" source="BUGZILLA"/>
		<description>
This update of sendmail improves the handling of special-characters in the SSL certificate.
(CVE-2009-4565: CVSS v2 Base Score: 7.5)
		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-18"/>
	<updated date="2010-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/568017">SUSE bug 568017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570364" comment="sendmail-8.14.3-50.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570364" comment="sendmail-8.14.3-50.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38714" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="415678" ref_url="https://bugzilla.suse.com/415678" source="BUGZILLA"/>
		<reference ref_id="420084" ref_url="https://bugzilla.suse.com/420084" source="BUGZILLA"/>
		<reference ref_id="423234" ref_url="https://bugzilla.suse.com/423234" source="BUGZILLA"/>
		<reference ref_id="478019" ref_url="https://bugzilla.suse.com/478019" source="BUGZILLA"/>
		<reference ref_id="499253" ref_url="https://bugzilla.suse.com/499253" source="BUGZILLA"/>
		<reference ref_id="509914" ref_url="https://bugzilla.suse.com/509914" source="BUGZILLA"/>
		<reference ref_id="511568" ref_url="https://bugzilla.suse.com/511568" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3443" ref_url="https://www.suse.com/security/cve/CVE-2008-3443/" source="CVE"/>
		<reference ref_id="CVE-2008-3655" ref_url="https://www.suse.com/security/cve/CVE-2008-3655/" source="CVE"/>
		<reference ref_id="CVE-2008-3656" ref_url="https://www.suse.com/security/cve/CVE-2008-3656/" source="CVE"/>
		<reference ref_id="CVE-2008-3657" ref_url="https://www.suse.com/security/cve/CVE-2008-3657/" source="CVE"/>
		<reference ref_id="CVE-2008-3790" ref_url="https://www.suse.com/security/cve/CVE-2008-3790/" source="CVE"/>
		<reference ref_id="CVE-2008-3905" ref_url="https://www.suse.com/security/cve/CVE-2008-3905/" source="CVE"/>
		<reference ref_id="CVE-2009-0642" ref_url="https://www.suse.com/security/cve/CVE-2009-0642/" source="CVE"/>
		<reference ref_id="CVE-2009-1904" ref_url="https://www.suse.com/security/cve/CVE-2009-1904/" source="CVE"/>
		<description>
This ruby update improves return value checks for openssl
function OCSP_basic_verify() (CVE-2009-0642) which allowed
an attacker to use revoked certificates.

The entropy of DNS identifiers was increased
(CVE-2008-3905) to avaid spoofing attacks.

The code for parsing XML data was vulnerable to a denial of
service bug (CVE-2008-3790).

An attack on algorithm complexity was possible in function
WEBrick::HTTP::DefaultFileHandler() while parsing HTTP
requests (CVE-2008-3656) as well as by using the regex
engine (CVE-2008-3443) causing high CPU load.

Ruby's access restriction code (CVE-2008-3655) as well as
safe-level handling using function DL.dlopen()
(CVE-2008-3657) and big decimal handling (CVE-2009-1904)
was improved.

Bypassing HTTP basic authentication
(authenticate_with_http_digest) is not possible anymore.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-04"/>
	<updated date="2009-07-04"/>
	<bugzilla href="https://bugzilla.suse.com/415678">SUSE bug 415678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/420084">SUSE bug 420084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/423234">SUSE bug 423234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478019">SUSE bug 478019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/499253">SUSE bug 499253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509914">SUSE bug 509914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/511568">SUSE bug 511568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3443/">CVE-2008-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3655/">CVE-2008-3655</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3656/">CVE-2008-3656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-3657/">CVE-2008-3657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3790/">CVE-2008-3790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3905/">CVE-2008-3905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0642/">CVE-2009-0642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1904/">CVE-2009-1904</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570365" comment="ruby-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570366" comment="ruby-doc-html-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570367" comment="ruby-tk-1.8.7.p72-5.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570365" comment="ruby-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570366" comment="ruby-doc-html-1.8.7.p72-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570367" comment="ruby-tk-1.8.7.p72-5.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38715" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="576087" ref_url="https://bugzilla.suse.com/576087" source="BUGZILLA"/>
		<reference ref_id="577347" ref_url="https://bugzilla.suse.com/577347" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2621" ref_url="https://www.suse.com/security/cve/CVE-2009-2621/" source="CVE"/>
		<reference ref_id="CVE-2009-2622" ref_url="https://www.suse.com/security/cve/CVE-2009-2622/" source="CVE"/>
		<reference ref_id="CVE-2009-2855" ref_url="https://www.suse.com/security/cve/CVE-2009-2855/" source="CVE"/>
		<reference ref_id="CVE-2010-0308" ref_url="https://www.suse.com/security/cve/CVE-2010-0308/" source="CVE"/>
		<description>

The following vulnerabilities have been fixed in squid:



 CVE-2009-2855: DoS via special crafted auth header
 CVE-2010-0308: DoS via invalid DoS header


		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-16"/>
	<updated date="2010-03-16"/>
	<bugzilla href="https://bugzilla.suse.com/576087">SUSE bug 576087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577347">SUSE bug 577347</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2621/">CVE-2009-2621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2622/">CVE-2009-2622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2855/">CVE-2009-2855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0308/">CVE-2010-0308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570368" comment="squid-2.7.STABLE5-2.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570368" comment="squid-2.7.STABLE5-2.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38716" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507742" ref_url="https://bugzilla.suse.com/507742" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1957" ref_url="https://www.suse.com/security/cve/CVE-2009-1957/" source="CVE"/>
		<reference ref_id="CVE-2009-1958" ref_url="https://www.suse.com/security/cve/CVE-2009-1958/" source="CVE"/>
		<description>
This update fixes two denial of service bugs that can lead
to a remote pre-auth crash while processing a IKE_SA_INIT
or a IKE_AUTH request. CVE-2009-1957 and CVE-2009-1958 have
been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-08"/>
	<updated date="2009-06-08"/>
	<bugzilla href="https://bugzilla.suse.com/507742">SUSE bug 507742</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1957/">CVE-2009-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1958/">CVE-2009-1958</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570369" comment="strongswan-4.2.8-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570370" comment="strongswan-doc-4.2.8-1.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570369" comment="strongswan-4.2.8-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570370" comment="strongswan-doc-4.2.8-1.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38717" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="582555" ref_url="https://bugzilla.suse.com/582555" source="BUGZILLA"/>
		<reference ref_id="582556" ref_url="https://bugzilla.suse.com/582556" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0426" ref_url="https://www.suse.com/security/cve/CVE-2010-0426/" source="CVE"/>
		<reference ref_id="CVE-2010-0427" ref_url="https://www.suse.com/security/cve/CVE-2010-0427/" source="CVE"/>
		<description>

This update fixes two security issues:



 CVE-2010-0427:CVSS v2 Base Score: 6.6
    Sudo failed to properly reset group permissions, when
    'runas_default' option was used. If a local, unprivileged
    user was authorized by sudoers file to perform their
    sudo commands under default user account, it could lead
    to privilege escalation 
 CVE-2010-0426:CVSS v2 Base Score: 6.6
    A privilege escalation flaw was found in the way
    sudo used to check file paths for pseudocommands.
    If local, unprivileged user was authorized by sudoers
    file to edit one or more files, it could lead to
    execution of arbitrary code, with the privileges
    of privileged system user (root).


		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-01"/>
	<updated date="2010-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/582555">SUSE bug 582555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/582556">SUSE bug 582556</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0426/">CVE-2010-0426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0427/">CVE-2010-0427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570371" comment="sudo-1.6.9p17-21.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570371" comment="sudo-1.6.9p17-21.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38718" version="1" class="patch">
	<metadata>
		<title>Security update for systemtap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="574243" ref_url="https://bugzilla.suse.com/574243" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<description>

This update of systemtab fixes a shell meta character injection 
vulnerability that allows remote users to execute arbitrary commands with 
the privileges of the stap-server. (CVE-2009-4273
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4273&gt; )

Additionally, a remote denial of service bug in the _getargv() function has 
been fixed. (CVE-2010-0411
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0411&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-23"/>
	<updated date="2010-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570372" comment="systemtap-0.7.1-42.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570372" comment="systemtap-0.7.1-42.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38719" version="1" class="patch">
	<metadata>
		<title>Security update for tar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="579475" ref_url="https://bugzilla.suse.com/579475" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
A malicious remote tape server could cause a buffer overflow in tar.
In order to exploit that an attacker would have to trick the victim
to extract a file that causes tar to open a connection to the rmt
server (CVE-2010-0624). It's advisable to always use tar's
--force-local local option to avoid such tricks.
		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-12"/>
	<updated date="2010-03-12"/>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570373" comment="tar-1.20-23.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570373" comment="tar-1.20-23.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38720" version="1" class="patch">
	<metadata>
		<title>Security update for tgt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="592928" ref_url="https://bugzilla.suse.com/592928" source="BUGZILLA"/>
		<reference ref_id="618574" ref_url="https://bugzilla.suse.com/618574" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0743" ref_url="https://www.suse.com/security/cve/CVE-2010-0743/" source="CVE"/>
		<reference ref_id="CVE-2010-2221" ref_url="https://www.suse.com/security/cve/CVE-2010-2221/" source="CVE"/>
		<description>

This update of tgt fixes multiple overflows and a format string 
vulnerability:

    * CVE-2010-2221: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Buffer Errors (CWE-119)
    * CVE-2010-0743: CVSS v2 Base Score: 5.0 (MEDIUM)
      (AV:N/AC:L/Au:N/C:N/I:N/A:P): Format String Vulnerability (CWE-134)

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-19"/>
	<updated date="2010-08-19"/>
	<bugzilla href="https://bugzilla.suse.com/592928">SUSE bug 592928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618574">SUSE bug 618574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0743/">CVE-2010-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2221/">CVE-2010-2221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570374" comment="tgt-0.9.0-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570374" comment="tgt-0.9.0-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38721" version="1" class="patch">
	<metadata>
		<title>Security update for w3m</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="609451" ref_url="https://bugzilla.suse.com/609451" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>

w3m does not handle embedded NUL characters in the common name and in 
subject alternative names of X.509 certificates (CVE-2010-2074
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074&gt; ). This 
update fixes the issue and also turns on verification of x509 certificates 
by default which was not the case before.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-17"/>
	<updated date="2010-06-17"/>
	<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570375" comment="w3m-0.5.2-128.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570375" comment="w3m-0.5.2-128.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38722" version="1" class="patch">
	<metadata>
		<title>Security update for Websphere Community Edition</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="507806" ref_url="https://bugzilla.suse.com/507806" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-5518" ref_url="https://www.suse.com/security/cve/CVE-2008-5518/" source="CVE"/>
		<reference ref_id="CVE-2009-0038" ref_url="https://www.suse.com/security/cve/CVE-2009-0038/" source="CVE"/>
		<reference ref_id="CVE-2009-0039" ref_url="https://www.suse.com/security/cve/CVE-2009-0039/" source="CVE"/>
		<reference ref_id="CVE-2009-0781" ref_url="https://www.suse.com/security/cve/CVE-2009-0781/" source="CVE"/>
		<description>
This update of WebSphere fixes the following
vulnerabilities:
- GERONIMO-3838: close potential denial of service attack
- CVE-2008-5518: fix Apache Geronimo web administration
  console directory traversal vulnerabilities.
- CVE-2009-0038:  fix Apache Geronimo web administration
  console XSS vulnerabilities.
- CVE-2009-0039: fix Apache Geronimo web administration
  console XSRF vulnerabilities.
- CVE-2009-0781: Samples: Fix Apache Tomcat cross-site
  scripting vulnerability.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-06-19"/>
	<updated date="2009-06-19"/>
	<bugzilla href="https://bugzilla.suse.com/507806">SUSE bug 507806</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-5518/">CVE-2008-5518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0038/">CVE-2009-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0039/">CVE-2009-0039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0781/">CVE-2009-0781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570376" comment="websphere-as_ce-2.1.1.2-2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570376" comment="websphere-as_ce-2.1.1.2-2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38723" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="528298" ref_url="https://bugzilla.suse.com/528298" source="BUGZILLA"/>
		<description>
This update wget improves the handling of the  0-character
in the subject name of a SSL certificate.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-12"/>
	<updated date="2009-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/528298">SUSE bug 528298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570377" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570377" comment="wget-1.11.4-1.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38724" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="493584" ref_url="https://bugzilla.suse.com/493584" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1266" ref_url="https://www.suse.com/security/cve/CVE-2009-1266/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<description>
Version upgrade to Wireshark 1.0.7 to fix various
vulnerabilities: CVE-2009-1269: crash while loading a
Tektronix .rf5 file CVE-2009-1268: crash in Check Point
High-Availability Protocol (CPHAP) dissector CVE-2009-1267:
LDAP dissector could crash on Windows CVE-2009-1210:
PROFINET format string bug CVE-2009-1266: additional
PROFINET  format string bugs, a crash in the PCNFSD
dissector
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-25"/>
	<updated date="2009-05-25"/>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1266/">CVE-2009-1266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570378" comment="wireshark-1.0.5-1.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570378" comment="wireshark-1.0.5-1.26.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38725" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="481592" ref_url="https://bugzilla.suse.com/481592" source="BUGZILLA"/>
		<reference ref_id="513921" ref_url="https://bugzilla.suse.com/513921" source="BUGZILLA"/>
		<reference ref_id="526855" ref_url="https://bugzilla.suse.com/526855" source="BUGZILLA"/>
		<reference ref_id="529195" ref_url="https://bugzilla.suse.com/529195" source="BUGZILLA"/>
		<reference ref_id="537370" ref_url="https://bugzilla.suse.com/537370" source="BUGZILLA"/>
		<reference ref_id="541945" ref_url="https://bugzilla.suse.com/541945" source="BUGZILLA"/>
		<reference ref_id="542525" ref_url="https://bugzilla.suse.com/542525" source="BUGZILLA"/>
		<reference ref_id="545470" ref_url="https://bugzilla.suse.com/545470" source="BUGZILLA"/>
		<reference ref_id="547590" ref_url="https://bugzilla.suse.com/547590" source="BUGZILLA"/>
		<reference ref_id="548438" ref_url="https://bugzilla.suse.com/548438" source="BUGZILLA"/>
		<reference ref_id="548443" ref_url="https://bugzilla.suse.com/548443" source="BUGZILLA"/>
		<reference ref_id="548852" ref_url="https://bugzilla.suse.com/548852" source="BUGZILLA"/>
		<reference ref_id="550397" ref_url="https://bugzilla.suse.com/550397" source="BUGZILLA"/>
		<reference ref_id="553631" ref_url="https://bugzilla.suse.com/553631" source="BUGZILLA"/>
		<reference ref_id="553633" ref_url="https://bugzilla.suse.com/553633" source="BUGZILLA"/>
		<reference ref_id="555152" ref_url="https://bugzilla.suse.com/555152" source="BUGZILLA"/>
		<reference ref_id="561912" ref_url="https://bugzilla.suse.com/561912" source="BUGZILLA"/>
		<reference ref_id="564750" ref_url="https://bugzilla.suse.com/564750" source="BUGZILLA"/>
		<reference ref_id="572691" ref_url="https://bugzilla.suse.com/572691" source="BUGZILLA"/>
		<reference ref_id="573748" ref_url="https://bugzilla.suse.com/573748" source="BUGZILLA"/>
		<reference ref_id="576832" ref_url="https://bugzilla.suse.com/576832" source="BUGZILLA"/>
		<reference ref_id="591092" ref_url="https://bugzilla.suse.com/591092" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-3525" ref_url="https://www.suse.com/security/cve/CVE-2009-3525/" source="CVE"/>
		<description>

Collective Xen/201004 Update, containing fixes for the following issues:



 bnc#576832 - pygrub, reiserfs: Fix on-disk structure definition
 bnc#537370 - Xen on SLES 11 does not boot - endless loop in ATA detection
 bnc#561912 - xend leaks memory
 bnc#564750 - Keyboard Caps Lock key works abnormal under SLES11 xen guest OS.
 bnc#548443 - keymap setting not preserved
 bnc#555152 - 'NAME' column in xentop (SLES11) output limited to 10 characters unlike SLES10
 bnc#553631 - L3: diskpart will not run on windows 2008
 bnc#548852 - DL585G2 - plug-in PCI cards fail in IO-APIC mode
 bnc#529195 - xend: disallow ! as a sxp separator
 bnc#550397 - xend: bootable flag of VBD not always of type int
 bnc#545470 - Xen vifname parameter is ignored when using type=ioemu in guest configuration file
 bnc#541945 - xm create -x command does not work in SLES 10 SP2 or SLES 11
 bnc#542525 - xen pygrub vulnerability (CVE-2009-3525)
 bnc#481592 and fate#306125 - Virtual machines are not able to boot from CD to allow upgrade to OES2SP1 (sle10 bug)
 bnc#553633 - Update breaks menu access keys in virt-viewer and still misses some key sequences. (sle10 bug)
fate#306720: xen: virt-manager cdrom handling.
 bnc#547590 - L3: virt-manager is unable of displaying VNC console on remote hosts
 bnc#572691 - libvird segfaults when trying to create a kvm guest
 bnc#573748 - L3: Virsh gives error Device 51712 not connected after updating libvirt modules
 bnc#548438 - libcmpiutil / libvirt-cim does not properly handle CIM_ prefixed
 bnc#513921: Xen doesn't work get an eror when starting the install processes or starting a pervious installed DomU
 bnc#526855: Cannot set MAC address for PV guest in vm-install


		</description>
<advisory from="security@suse.de">
	<issued date="2010-02-20"/>
	<updated date="2010-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/481592">SUSE bug 481592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513921">SUSE bug 513921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/526855">SUSE bug 526855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529195">SUSE bug 529195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537370">SUSE bug 537370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541945">SUSE bug 541945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/542525">SUSE bug 542525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545470">SUSE bug 545470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547590">SUSE bug 547590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548438">SUSE bug 548438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548443">SUSE bug 548443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548852">SUSE bug 548852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550397">SUSE bug 550397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553631">SUSE bug 553631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553633">SUSE bug 553633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/555152">SUSE bug 555152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561912">SUSE bug 561912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564750">SUSE bug 564750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/572691">SUSE bug 572691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573748">SUSE bug 573748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576832">SUSE bug 576832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/591092">SUSE bug 591092</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3525/">CVE-2009-3525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570379" comment="libcmpiutil-0.5-15.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570380" comment="libvirt-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570381" comment="libvirt-cim-0.5.2-8.47.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570382" comment="libvirt-doc-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570383" comment="libvirt-python-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570384" comment="virt-manager-0.5.3-66.42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570385" comment="virt-viewer-0.0.3-3.57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570386" comment="vm-install-0.3.27-0.1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570387" comment="xen-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570388" comment="xen-doc-html-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570389" comment="xen-doc-pdf-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570390" comment="xen-kmp-default-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570391" comment="xen-kmp-pae-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570392" comment="xen-libs-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570393" comment="xen-tools-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570394" comment="xen-tools-domU-3.3.1_18546_24-0.3.7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570379" comment="libcmpiutil-0.5-15.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570380" comment="libvirt-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570381" comment="libvirt-cim-0.5.2-8.47.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570382" comment="libvirt-doc-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570383" comment="libvirt-python-0.4.6-14.60.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570384" comment="virt-manager-0.5.3-66.42.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570385" comment="virt-viewer-0.0.3-3.57.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570386" comment="vm-install-0.3.27-0.1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570387" comment="xen-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570388" comment="xen-doc-html-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570389" comment="xen-doc-pdf-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570390" comment="xen-kmp-default-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570391" comment="xen-kmp-pae-3.3.1_18546_24_2.6.27.45_0.3-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570392" comment="xen-libs-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570393" comment="xen-tools-3.3.1_18546_24-0.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570394" comment="xen-tools-domU-3.3.1_18546_24-0.3.7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38726" version="1" class="patch">
	<metadata>
		<title>Security update for Xerces-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="530717" ref_url="https://bugzilla.suse.com/530717" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<description>
The xerces-j2 package was vulnerable to various bugs while
parsing XML.CVE-2009-2625 has been assigned to this issue.
		</description>
<advisory from="security@suse.de">
	<issued date="2009-08-20"/>
	<updated date="2009-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/530717">SUSE bug 530717</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570395" comment="xerces-j2-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570396" comment="xerces-j2-xml-apis-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570397" comment="xerces-j2-xml-resolver-2.8.1-238.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570395" comment="xerces-j2-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570396" comment="xerces-j2-xml-apis-2.8.1-238.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570397" comment="xerces-j2-xml-resolver-2.8.1-238.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38727" version="1" class="patch">
	<metadata>
		<title>Security update for xpdf</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="502974" ref_url="https://bugzilla.suse.com/502974" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0791" ref_url="https://www.suse.com/security/cve/CVE-2009-0791/" source="CVE"/>
		<description>
Specially crafted PDF documents could crash xpdf or
potentially even allow execution of arbitrary code
(CVE-2009-0791).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-07-27"/>
	<updated date="2009-07-27"/>
	<bugzilla href="https://bugzilla.suse.com/502974">SUSE bug 502974</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0791/">CVE-2009-0791</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570398" comment="xpdf-tools-3.02-138.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570398" comment="xpdf-tools-3.02-138.26.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38728" version="1" class="patch">
	<metadata>
		<title>Security update for YaST2 LDAP module</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11</platform>
		</affected>
		<reference ref_id="492441" ref_url="https://bugzilla.suse.com/492441" source="BUGZILLA"/>
		<reference ref_id="496862" ref_url="https://bugzilla.suse.com/496862" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-1648" ref_url="https://www.suse.com/security/cve/CVE-2009-1648/" source="CVE"/>
		<description>
The YaST2 LDAP module in SUSE Linux Enterprise Server 11
did not initialize the firewall configuration during second
stage installation. Therefore, if an online update required
reboot during second stage firewall settings were not
applied and the firewall turned off (CVE-2009-1648).
		</description>
<advisory from="security@suse.de">
	<issued date="2009-05-18"/>
	<updated date="2009-05-18"/>
	<bugzilla href="https://bugzilla.suse.com/492441">SUSE bug 492441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496862">SUSE bug 496862</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1648/">CVE-2009-1648</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11</cpe>
		<cpe>cpe:/o:suse:suse_sles:11</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032105" comment="SUSE Linux Enterprise Server 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570399" comment="yast2-ldap-server-2.17.21-0.1.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258684" comment="SUSE Linux Enterprise Server for SAP Applications 11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570399" comment="yast2-ldap-server-2.17.21-0.1.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38729" version="1" class="patch">
	<metadata>
		<title>Security update for ConsoleKit</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="686150" ref_url="https://bugzilla.suse.com/686150" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4664" ref_url="https://www.suse.com/security/cve/CVE-2010-4664/" source="CVE"/>
		<description>

Remote users logged in via e.g. ssh could open a consolekit session that is 
considered local and therefore gain additional privileges, e.g. via 
policykit (CVE-2010-4664).

Security Issue reference:

    * CVE-2010-4664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4664&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-27"/>
	<updated date="2011-05-27"/>
	<bugzilla href="https://bugzilla.suse.com/686150">SUSE bug 686150</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4664/">CVE-2010-4664</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570400" comment="ConsoleKit-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570401" comment="ConsoleKit-32bit-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570402" comment="ConsoleKit-x11-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570403" comment="ConsoleKit-x86-0.2.10-64.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570400" comment="ConsoleKit-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570401" comment="ConsoleKit-32bit-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570402" comment="ConsoleKit-x11-0.2.10-64.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570403" comment="ConsoleKit-x86-0.2.10-64.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38730" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570404" comment="MozillaFirefox-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570405" comment="MozillaFirefox-branding-SLED-24-0.4.10.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570406" comment="MozillaFirefox-translations-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570407" comment="libfreebl3-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570408" comment="libfreebl3-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570409" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570410" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570411" comment="mozilla-nss-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570412" comment="mozilla-nss-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570413" comment="mozilla-nss-tools-3.16.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570404" comment="MozillaFirefox-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570405" comment="MozillaFirefox-branding-SLED-24-0.4.10.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570406" comment="MozillaFirefox-translations-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570407" comment="libfreebl3-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570408" comment="libfreebl3-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570409" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570410" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570411" comment="mozilla-nss-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570412" comment="mozilla-nss-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570413" comment="mozilla-nss-tools-3.16.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38731" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="746880" ref_url="https://bugzilla.suse.com/746880" source="BUGZILLA"/>
		<reference ref_id="752879" ref_url="https://bugzilla.suse.com/752879" source="BUGZILLA"/>
		<reference ref_id="754749" ref_url="https://bugzilla.suse.com/754749" source="BUGZILLA"/>
		<reference ref_id="758512" ref_url="https://bugzilla.suse.com/758512" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-0259" ref_url="https://www.suse.com/security/cve/CVE-2012-0259/" source="CVE"/>
		<reference ref_id="CVE-2012-0260" ref_url="https://www.suse.com/security/cve/CVE-2012-0260/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2012-1610" ref_url="https://www.suse.com/security/cve/CVE-2012-1610/" source="CVE"/>
		<reference ref_id="CVE-2012-1798" ref_url="https://www.suse.com/security/cve/CVE-2012-1798/" source="CVE"/>
		<description>

This update of ImageMagick fixes multiple security vulnerabilities that 
could be exploited by attackers via specially crafted image files:

    * CVE-2012-0259 / CVE-2012-1610: Integer overflow when processing EXIF
      directory entries with tags of e.g. format 5 (EXIF_FMT_URATIONAL) and
      a large components count.
    * CVE-2012-0247 / CVE-2012-1185: Integer overflows via 'number_bytes'
      and 'offset' could lead to memory corruption. CVE-2012-0248 /
      CVE-2012-1186: Denial of service via 'profile.c'.
    * CVE-2012-0260: Denial of service via JPEG restart markers (excessive
      CPU consumption).
    * CVE-2012-1798: Copying of invalid memory when reading TIFF EXIF IFD.

Security Issue references:

    * CVE-2012-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247&gt;
    * CVE-2012-0248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248&gt;
    * CVE-2012-1185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185&gt;
    * CVE-2012-1186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186&gt;
    * CVE-2012-0259
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0259&gt;
    * CVE-2012-0260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0260&gt;
    * CVE-2012-1798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1798&gt;
    * CVE-2012-1610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1610&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-27"/>
	<updated date="2012-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754749">SUSE bug 754749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758512">SUSE bug 758512</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0259/">CVE-2012-0259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0260/">CVE-2012-0260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1610/">CVE-2012-1610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1798/">CVE-2012-1798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570414" comment="libMagickCore1-6.4.3.6-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570415" comment="libMagickCore1-32bit-6.4.3.6-7.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570414" comment="libMagickCore1-6.4.3.6-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570415" comment="libMagickCore1-32bit-6.4.3.6-7.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570414" comment="libMagickCore1-6.4.3.6-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570415" comment="libMagickCore1-32bit-6.4.3.6-7.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38732" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570416" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570417" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38733" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570418" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570419" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38734" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570420" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570421" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38735" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570422" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570423" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38736" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570424" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570425" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38737" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570426" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570427" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38738" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570428" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570429" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38739" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570430" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570431" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38740" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570432" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570433" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38741" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570434" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570435" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38742" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570436" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570437" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38743" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570438" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570439" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38744" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570440" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570441" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38745" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570442" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570443" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38746" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570444" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570445" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38747" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570446" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570447" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38748" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570448" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570449" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38749" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570450" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570451" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38750" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570452" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570453" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38751" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570454" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570455" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38752" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570456" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570457" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38753" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570458" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570459" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38754" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570460" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570461" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38755" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570462" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570463" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38756" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).
- CVE-2019-11472: Fixed a denial-of-service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial-of-service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570464" comment="libMagickCore1-6.4.3.6-78.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570465" comment="libMagickCore1-32bit-6.4.3.6-78.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38757" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570466" comment="libMagickCore1-6.4.3.6-78.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570467" comment="libMagickCore1-32bit-6.4.3.6-78.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38758" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570468" comment="libMagickCore1-6.4.3.6-78.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570469" comment="libMagickCore1-32bit-6.4.3.6-78.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38759" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139886" ref_url="https://bugzilla.suse.com/1139886" source="BUGZILLA"/>
		<reference ref_id="1140100" ref_url="https://bugzilla.suse.com/1140100" source="BUGZILLA"/>
		<reference ref_id="1140102" ref_url="https://bugzilla.suse.com/1140102" source="BUGZILLA"/>
		<reference ref_id="1140103" ref_url="https://bugzilla.suse.com/1140103" source="BUGZILLA"/>
		<reference ref_id="1140106" ref_url="https://bugzilla.suse.com/1140106" source="BUGZILLA"/>
		<reference ref_id="1140110" ref_url="https://bugzilla.suse.com/1140110" source="BUGZILLA"/>
		<reference ref_id="1140513" ref_url="https://bugzilla.suse.com/1140513" source="BUGZILLA"/>
		<reference ref_id="1140554" ref_url="https://bugzilla.suse.com/1140554" source="BUGZILLA"/>
		<reference ref_id="1140664" ref_url="https://bugzilla.suse.com/1140664" source="BUGZILLA"/>
		<reference ref_id="1140666" ref_url="https://bugzilla.suse.com/1140666" source="BUGZILLA"/>
		<reference ref_id="1141171" ref_url="https://bugzilla.suse.com/1141171" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory() (bsc#1140554).
- CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a wand/mogrify.c error (bsc#1140513).
- CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in MagickCore/layer.c (bsc#1141171).
- CVE-2019-13295: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
- CVE-2019-13297: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
- CVE-2019-12979: Fixed the use of uninitialized values in SyncImageSettings() (bsc#1139886).
- CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in coders/dpx.c (bsc#1140106).
- CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage() (bsc#1140103).
- CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
- CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
- CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in coders/pcl.c(bsc#1140110).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-30"/>
	<updated date="2019-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570470" comment="libMagickCore1-6.4.3.6-78.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570471" comment="libMagickCore1-32bit-6.4.3.6-78.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38760" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1146068" ref_url="https://bugzilla.suse.com/1146068" source="BUGZILLA"/>
		<reference ref_id="1146211" ref_url="https://bugzilla.suse.com/1146211" source="BUGZILLA"/>
		<reference ref_id="1146212" ref_url="https://bugzilla.suse.com/1146212" source="BUGZILLA"/>
		<reference ref_id="1146213" ref_url="https://bugzilla.suse.com/1146213" source="BUGZILLA"/>
		<reference ref_id="1151781" ref_url="https://bugzilla.suse.com/1151781" source="BUGZILLA"/>
		<reference ref_id="1151782" ref_url="https://bugzilla.suse.com/1151782" source="BUGZILLA"/>
		<reference ref_id="1151783" ref_url="https://bugzilla.suse.com/1151783" source="BUGZILLA"/>
		<reference ref_id="1151786" ref_url="https://bugzilla.suse.com/1151786" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-15139: Fixed a denial-of-service vulnerability in ReadXWDImage. (bsc#1146213)
- CVE-2019-15140: Fixed a use-after-free bug in the Matlab image parser. (bsc#1146212)
- CVE-2019-15141: Fixed a divide-by-zero vulnerability in the MeanShiftImage function. (bsc#1146211)
- CVE-2019-14980: Fixed an application crash resulting from a heap-based buffer over-read in WriteTIFFImage. (bsc#1146068)
- CVE-2019-16708: Fixed a memory leak in magick/xwindow.c (bsc#1151781).
- CVE-2019-16709: Fixed a memory leak in coders/dps.c (bsc#1151782).
- CVE-2019-16710: Fixed a memory leak in coders/dot.c (bsc#1151783).
- CVE-2019-16713: Fixed a memory leak in coders/dot.c (bsc#1151786).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570472" comment="libMagickCore1-6.4.3.6-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570473" comment="libMagickCore1-32bit-6.4.3.6-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38761" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159861" ref_url="https://bugzilla.suse.com/1159861" source="BUGZILLA"/>
		<reference ref_id="1160369" ref_url="https://bugzilla.suse.com/1160369" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-19948: Fixed a heap-based buffer overflow in WriteSGIImage() (bsc#1159861).
- CVE-2019-19949: Fixed a heap-based buffer over-read in WritePNGImage() (bsc#1160369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570474" comment="libMagickCore1-6.4.3.6-78.122.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570475" comment="libMagickCore1-32bit-6.4.3.6-78.122.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38762" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047054" ref_url="https://bugzilla.suse.com/1047054" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-11527: Fixed a denial of service in  inReadDPXImage() (bsc#1047054).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570476" comment="libMagickCore1-6.4.3.6-78.125.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570477" comment="libMagickCore1-32bit-6.4.3.6-78.125.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38763" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570478" comment="libMagickCore1-6.4.3.6-78.128.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570479" comment="libMagickCore1-32bit-6.4.3.6-78.128.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38764" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570480" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570481" comment="libMagickCore1-32bit-6.4.3.6-78.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38765" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed an issue where processing a crafted file could lead to division by zero (bsc#1181836).
- CVE-2020-25665: Fixed heap-based buffer overflow in WritePALMImage (bsc#1179208).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570482" comment="libMagickCore1-6.4.3.6-78.140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570483" comment="libMagickCore1-32bit-6.4.3.6-78.140.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38766" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
- CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
- CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570484" comment="libMagickCore1-6.4.3.6-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570485" comment="libMagickCore1-32bit-6.4.3.6-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38767" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570486" comment="libMagickCore1-6.4.3.6-78.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570487" comment="libMagickCore1-32bit-6.4.3.6-78.146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38768" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570488" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38769" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570489" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38770" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570490" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38771" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570491" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38772" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570492" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38773" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570493" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38774" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570494" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38775" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570495" comment="Mesa-7.7-5.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570496" comment="Mesa-32bit-7.7-5.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38776" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="765204" ref_url="https://bugzilla.suse.com/765204" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1939" ref_url="https://www.suse.com/security/cve/CVE-2012-1939/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1942" ref_url="https://www.suse.com/security/cve/CVE-2012-1942/" source="CVE"/>
		<reference ref_id="CVE-2012-1943" ref_url="https://www.suse.com/security/cve/CVE-2012-1943/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<description>

MozillaFirefox has been updated to 10.0.5ESR fixing various bugs and 
security issues.

    * 

      MFSA 2012-34
      Mozilla developers identified and fixed several memory safety bugs in
      the browser engine used in Firefox and other Mozilla-based products.
      Some of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Jesse Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler,
      Andrew McCreight, and Brian Bondy reported memory safety problems and
      crashes that affect Firefox 12.(CVE-2012-1938)

      Christian Holler reported a memory safety problem that affects
      Firefox ESR. (CVE-2012-1939)

      Igor Bukanov, Olli Pettay, Boris Zbarsky, and Jesse Ruderman reported
      memory safety problems and crashes that affect Firefox ESR and
      Firefox 13. (CVE-2012-1937)

      Ken Russell of Google reported a bug in NVIDIA graphics drivers that
      they needed to work around in the Chromium WebGL implementation.
      Mozilla has done the same in Firefox 13 and ESR 10.0.5.
      (CVE-2011-3101)

    * 

      MFSA 2012-35
      Security researcher James Forshaw of Context Information Security
      found two issues with the Mozilla updater and the Mozilla updater
      service introduced in Firefox 12 for Windows. The first issue allows
      Mozilla's updater to load a local DLL file in a privileged context.
      The updater can be called by the Updater Service or independently on
      systems that do not use the service. The second of these issues
      allows for the updater service to load an arbitrary local DLL file,
      which can then be run with the same system privileges used by the
      service. Both of these issues require local file system access to be
      exploitable.

      Possible Arbitrary Code Execution by Update Service (CVE-2012-1942)
      Updater.exe loads wsock32.dll from application directory
      (CVE-2012-1943)

    * 

      MFSA 2012-36
      Security researcher Adam Barth found that inline event handlers, such
      as onclick, were no longer blocked by Content Security Policy's (CSP)
      inline-script blocking feature. Web applications relying on this
      feature of CSP to protect against cross-site scripting (XSS) were not
      fully protected. (CVE-2012-1944)

    * 

      MFSA 2012-37
      Security researcher Paul Stone reported an attack where an HTML page
      hosted on a Windows share and then loaded could then load Windows
      shortcut files (.lnk) in the same share. These shortcut files could
      then link to arbitrary locations on the local file system of the
      individual loading the HTML page. That page could show the contents
      of these linked files or directories from the local file system in an
      iframe, causing information disclosure.

      This issue could potentially affect Linux machines with samba shares
      enabled. (CVE-2012-1945)

    * 

      MFSA 2012-38
      Security researcher Arthur Gerkis used the Address Sanitizer tool to
      find a use-after-free while replacing/inserting a node in a document.
      This use-after-free could possibly allow for remote code execution.
      (CVE-2012-1946)

    * 

      MFSA 2012-39
      Security researcher Kaspar Brand found a flaw in how the Network
      Security Services (NSS) ASN.1 decoder handles zero length items.
      Effects of this issue depend on the field. One known symptom is an
      unexploitable crash in handling OCSP responses. NSS also mishandles
      zero-length basic constraints, assuming default values for some types
      that should be rejected as malformed. These issues have been
      addressed in NSS 3.13.4, which is now being used by Mozilla.
      (CVE-2012-0441)

    * 

      MFSA 2012-40
      Security researcher Abhishek Arya of Google used the Address
      Sanitizer tool to uncover several issues: two heap buffer overflow
      bugs and a use-after-free problem. The first heap buffer overflow was
      found in conversion from unicode to native character sets when the
      function fails. The use-after-free occurs in nsFrameList when working
      with column layout with absolute positioning in a container that
      changes size. The second buffer overflow occurs in nsHTMLReflowState
      when a window is resized on a page with nested columns and a
      combination of absolute and relative positioning. All three of these
      issues are potentially exploitable.

      Heap-buffer-overflow in utf16_to_isolatin1 (CVE-2012-1947)
      Heap-use-after-free in nsFrameList::FirstChild (CVE-2012-1940)

      Heap-buffer-overflow in nsHTMLReflowState::CalculateHypotheticalBox,
      with nested multi-column, relative position, and absolute position
      (CVE-2012-1941)

More information on security issues can be found on:
http://www.mozilla.org/security/announce/
&lt;http://www.mozilla.org/security/announce/&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-12"/>
	<updated date="2012-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1939/">CVE-2012-1939</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1942/">CVE-2012-1942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1943/">CVE-2012-1943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570497" comment="MozillaFirefox-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570498" comment="MozillaFirefox-translations-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570499" comment="libfreebl3-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570500" comment="libfreebl3-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570501" comment="libfreebl3-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570502" comment="mozilla-nspr-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570503" comment="mozilla-nspr-32bit-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570504" comment="mozilla-nspr-x86-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570505" comment="mozilla-nss-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570506" comment="mozilla-nss-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570507" comment="mozilla-nss-tools-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570508" comment="mozilla-nss-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570509" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570510" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570511" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570512" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570513" comment="mozilla-xulrunner192-x86-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570497" comment="MozillaFirefox-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570498" comment="MozillaFirefox-translations-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570499" comment="libfreebl3-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570500" comment="libfreebl3-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570501" comment="libfreebl3-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570502" comment="mozilla-nspr-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570503" comment="mozilla-nspr-32bit-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570504" comment="mozilla-nspr-x86-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570505" comment="mozilla-nss-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570506" comment="mozilla-nss-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570507" comment="mozilla-nss-tools-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570508" comment="mozilla-nss-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570509" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570510" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570511" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570512" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570513" comment="mozilla-xulrunner192-x86-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570497" comment="MozillaFirefox-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570498" comment="MozillaFirefox-translations-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570499" comment="libfreebl3-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570500" comment="libfreebl3-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570501" comment="libfreebl3-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570502" comment="mozilla-nspr-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570503" comment="mozilla-nspr-32bit-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570504" comment="mozilla-nspr-x86-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570505" comment="mozilla-nss-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570506" comment="mozilla-nss-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570507" comment="mozilla-nss-tools-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570508" comment="mozilla-nss-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570509" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570510" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570511" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570512" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570513" comment="mozilla-xulrunner192-x86-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570497" comment="MozillaFirefox-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570498" comment="MozillaFirefox-translations-10.0.5-0.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570499" comment="libfreebl3-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570500" comment="libfreebl3-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570501" comment="libfreebl3-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570502" comment="mozilla-nspr-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570503" comment="mozilla-nspr-32bit-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570504" comment="mozilla-nspr-x86-4.9.1-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570505" comment="mozilla-nss-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570506" comment="mozilla-nss-32bit-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570507" comment="mozilla-nss-tools-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570508" comment="mozilla-nss-x86-3.13.5-0.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569805" comment="mozilla-xulrunner191-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569806" comment="mozilla-xulrunner191-32bit-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569807" comment="mozilla-xulrunner191-gnomevfs-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569808" comment="mozilla-xulrunner191-translations-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569809" comment="mozilla-xulrunner191-x86-1.9.1.11-0.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570509" comment="mozilla-xulrunner192-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570510" comment="mozilla-xulrunner192-32bit-1.9.2.24-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570511" comment="mozilla-xulrunner192-gnome-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570512" comment="mozilla-xulrunner192-translations-1.9.2.24-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570513" comment="mozilla-xulrunner192-x86-1.9.2.24-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38777" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 38.5.0 ESR.

It fixes the following security issues:

* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570514" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570515" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38778" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570516" comment="MozillaFirefox-38.8.0esr-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570517" comment="MozillaFirefox-translations-38.8.0esr-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38779" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated to version 3.21.1, mozilla-nspr to version 4.12.

These security issues were fixed in 45.3.0ESR:
- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)
- CVE-2016-2830: Favicon network connection can persist when page is closed (MFSA 2016-63)
- CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)
- CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 (MFSA 2016-65)
- CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA 2016-67)
- CVE-2016-5254: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)
- CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)
- CVE-2016-5259: Use-after-free in service workers with nested sync events (MFSA 2016-73)
- CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)
- CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)
- CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)
- CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)
- CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
- CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Security issues fixed in 45.2.0.ESR:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-12"/>
	<updated date="2016-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570518" comment="MozillaFirefox-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570519" comment="MozillaFirefox-branding-SLED-45.0-20.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570520" comment="MozillaFirefox-translations-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570521" comment="firefox-fontconfig-2.11.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570522" comment="libfreebl3-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570523" comment="libfreebl3-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570524" comment="mozilla-nspr-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570525" comment="mozilla-nspr-32bit-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570526" comment="mozilla-nss-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570527" comment="mozilla-nss-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570528" comment="mozilla-nss-tools-3.21.1-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38780" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570529" comment="MozillaFirefox-45.4.0esr-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570530" comment="MozillaFirefox-translations-45.4.0esr-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38781" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570531" comment="MozillaFirefox-45.6.0esr-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570532" comment="MozillaFirefox-translations-45.6.0esr-66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38782" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-10"/>
	<updated date="2017-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570533" comment="MozillaFirefox-45.7.0esr-69.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570534" comment="MozillaFirefox-translations-45.7.0esr-69.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38783" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-21"/>
	<updated date="2017-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570535" comment="MozillaFirefox-45.8.0esr-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570536" comment="MozillaFirefox-translations-45.8.0esr-74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38784" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570537" comment="MozillaFirefox-45.9.0esr-77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570538" comment="MozillaFirefox-translations-45.9.0esr-77.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570539" comment="libfreebl3-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570540" comment="libfreebl3-32bit-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570541" comment="mozilla-nspr-4.13.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570542" comment="mozilla-nspr-32bit-4.13.1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570543" comment="mozilla-nss-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570544" comment="mozilla-nss-32bit-3.29.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570545" comment="mozilla-nss-tools-3.29.5-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38785" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 52.3 ESR fixes several issues.

These security issues were fixed:

- CVE-2017-7807: Domain hijacking through AppCache fallback (bsc#1052829)
- CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts (bsc#1052829)
- CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID (bsc#1052829)
- CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections (bsc#1052829)
- CVE-2017-7787: Same-origin policy bypass with iframes through page reloads (bsc#1052829)
- CVE-2017-7786: Buffer overflow while painting non-displayable SVG (bsc#1052829)
- CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM (bsc#1052829)
- CVE-2017-7784: Use-after-free with image observers (bsc#1052829)
- CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements (bsc#1052829)
- CVE-2017-7798: XUL injection in the style editor in devtools (bsc#1052829)
- CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher (bsc#1052829)
- CVE-2017-7779: Various memory safety bugs (bsc#1052829)
- CVE-2017-7800: Use-after-free in WebSockets during disconnection (bsc#1052829)
- CVE-2017-7801: Use-after-free with marquee during window resizing (bsc#1052829)
- CVE-2017-7802: Use-after-free resizing image elements (bsc#1052829)
- CVE-2017-7803: CSP containing 'sandbox' improperly applied (bsc#1052829)

This non-security issue was fixed:

- bsc#1031485: Prevent firefox from hanging after a while in FUTEX_WAIT_PRIVATE if cgroups are enabled 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570546" comment="MozillaFirefox-52.3.0esr-78.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570547" comment="MozillaFirefox-branding-SLED-52-21.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570548" comment="MozillaFirefox-translations-52.3.0esr-78.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570549" comment="firefox-libffi4-5.3.1+r233831-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570550" comment="firefox-libgcc_s1-5.3.1+r233831-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570551" comment="firefox-libstdc++6-5.3.1+r233831-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38786" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570552" comment="MozillaFirefox-52.5.0esr-78.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570553" comment="MozillaFirefox-translations-52.5.0esr-78.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38787" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570554" comment="MozillaFirefox-52.6.0esr-78.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570555" comment="MozillaFirefox-translations-52.6.0esr-78.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38788" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.2 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570556" comment="MozillaFirefox-52.7.3esr-78.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570557" comment="MozillaFirefox-translations-52.7.3esr-78.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38789" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 52.8 fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570558" comment="MozillaFirefox-52.8.0esr-78.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570559" comment="MozillaFirefox-translations-52.8.0esr-78.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38790" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570560" comment="MozillaFirefox-52.8.1esr-78.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570561" comment="MozillaFirefox-translations-52.8.1esr-78.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38791" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570562" comment="MozillaFirefox-52.9.0esr-78.32.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570563" comment="MozillaFirefox-translations-52.9.0esr-78.32.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38792" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).
- CVE-2019-11708: Fix sandbox escape using Prompt:Open (bsc#1138872).
- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Non-security issues fixed:

- Fix broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570564" comment="MozillaFirefox-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570565" comment="MozillaFirefox-translations-common-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570566" comment="MozillaFirefox-translations-other-60.8.0esr-78.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38793" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).

Update mozilla-nss to version 3.47.1 (bsc#1158527):

Security issues fixed:

- CVE-2019-11745: EncryptUpdate should use maxout, not block size.

Bug fixes:

- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)

Update mozilla-nspr to version 4.23:

Bug fixes:

- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570567" comment="MozillaFirefox-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570568" comment="MozillaFirefox-translations-common-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570569" comment="MozillaFirefox-translations-other-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570570" comment="libfreebl3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570571" comment="libfreebl3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570572" comment="libsoftokn3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570573" comment="libsoftokn3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570574" comment="mozilla-nspr-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570575" comment="mozilla-nspr-32bit-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570576" comment="mozilla-nss-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570577" comment="mozilla-nss-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570578" comment="mozilla-nss-certs-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570579" comment="mozilla-nss-certs-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570580" comment="mozilla-nss-tools-3.47.1-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38794" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570581" comment="MozillaFirefox-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570582" comment="MozillaFirefox-translations-common-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570583" comment="MozillaFirefox-translations-other-68.4.1-78.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38795" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="1163368" ref_url="https://bugzilla.suse.com/1163368" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to version 68.5.0 ESR (bsc#1163368).


Security issues fixed:

- CVE-2020-6796: Fixed a missing bounds check on shared memory in the parent process (bsc#1163368).
- CVE-2020-6798: Fixed a JavaScript code injection issue caused by the incorrect parsing of template tags (bsc#1163368).
- CVE-2020-6799: Fixed a local arbitrary code execution issue when handling PDF links from other applications (bsc#1163368).
- CVE-2020-6800: Fixed several memory safety bugs (bsc#1163368).


Non-security issues fixed:

- Fixed various issues opening files with spaces in their path (bmo#1601905, bmo#1602726).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570584" comment="MozillaFirefox-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570585" comment="MozillaFirefox-translations-common-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570586" comment="MozillaFirefox-translations-other-68.5.0-78.61.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38796" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665)

- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully
  escape website-controlled data potentially leading to command injection
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally
  identifiable information were exposed to websites with camera or microphone
  permission
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570587" comment="MozillaFirefox-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570588" comment="MozillaFirefox-translations-common-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570589" comment="MozillaFirefox-translations-other-68.6.0-78.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38797" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.6.1 ESR
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570590" comment="MozillaFirefox-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570591" comment="MozillaFirefox-translations-common-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570592" comment="MozillaFirefox-translations-other-68.6.1-78.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38798" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570593" comment="MozillaFirefox-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570594" comment="MozillaFirefox-translations-common-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570595" comment="MozillaFirefox-translations-other-68.7.0-78.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38799" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1162828" ref_url="https://bugzilla.suse.com/1162828" source="BUGZILLA"/>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:


- Firefox Extended Support Release 68.8.0 ESR
  MFSA 2020-17 (bsc#1171186)
  * CVE-2020-12387 (bmo#1545345)
    Use-after-free during worker shutdown
  * CVE-2020-12388 (bmo#1618911)
    Sandbox escape with improperly guarded Access Tokens
  * CVE-2020-12389 (bmo#1554110)
    Sandbox escape with improperly separated process types
  * CVE-2020-6831 (bmo#1632241)
    Buffer overflow in SCTP chunk input validation
  * CVE-2020-12392 (bmo#1614468)
    Arbitrary local file access with 'Copy as cURL'
  * CVE-2020-12393 (bmo#1615471)
    Devtools' 'Copy as cURL' feature did not fully escape
    website-controlled data, potentially leading to command
    injection
  * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704,
    bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076,
    bmo#1631508)
    Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8

- Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
  and firefox-libgcc_s1, those packages don't provide some capabilities,
  we have to disable AutoReqProv in MozillaFirefox too so they're not added as
  automatic requirements. (bsc#1162828)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162828">SUSE bug 1162828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570596" comment="MozillaFirefox-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570597" comment="MozillaFirefox-translations-common-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570598" comment="MozillaFirefox-translations-other-68.8.0-78.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38800" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570599" comment="MozillaFirefox-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570600" comment="MozillaFirefox-translations-common-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570601" comment="MozillaFirefox-translations-other-68.9.0-78.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38801" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570602" comment="MozillaFirefox-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570603" comment="MozillaFirefox-branding-SLED-78-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570604" comment="MozillaFirefox-translations-common-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570605" comment="MozillaFirefox-translations-other-78.0.1-78.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38802" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Fix broken translation-loading (boo#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more

- Mozilla Firefox 78.1 ESR
  * Fixed: Various stability, functionality, and security fixe
    (MFSA 2020-32) (bsc#1174538).
  * CVE-2020-15652 (bmo#1634872)
    Potential leak of redirect targets when loading scripts in a
    worker
  * CVE-2020-6514 (bmo#1642792)
    WebRTC data channel leaks internal address to peer
  * CVE-2020-15655 (bmo#1645204)
    Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653 (bmo#1521542)
    Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463 (bmo#1635293)
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656 (bmo#1647293)
    Type confusion for special arguments in IonMonkey
  * CVE-2020-15658 (bmo#1637745)
    Overriding file type when saving to disk
  * CVE-2020-15657 (bmo#1644954)
    DLL hijacking due to incorrect loading path
  * CVE-2020-15654 (bmo#1648333)
    Custom cursor can overlay user interface
  * CVE-2020-15659 (bmo#1550133, bmo#1633880, bmo#1643613,
    bmo#1644839, bmo#1645835, bmo#1646006, bmo#1646787,
    bmo#1649347, bmo#1650811, bmo#1651678)
    Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

- Add sle11-icu-generation-python3.patch to fix icu-generation
  on big endian platforms 

- Mozilla Firefox 78.0.2 ESR
  * MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570606" comment="MozillaFirefox-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570607" comment="MozillaFirefox-translations-common-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570608" comment="MozillaFirefox-translations-other-78.1.0-78.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38803" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570609" comment="MozillaFirefox-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570610" comment="MozillaFirefox-translations-common-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570611" comment="MozillaFirefox-translations-other-78.2.0-78.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38804" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1175046" ref_url="https://bugzilla.suse.com/1175046" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
- Fixed problems with compiler builtins on SLE-11 (bsc#1175046)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175046">SUSE bug 1175046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570612" comment="MozillaFirefox-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570613" comment="MozillaFirefox-translations-common-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570614" comment="MozillaFirefox-translations-other-78.3.0-78.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38805" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570615" comment="MozillaFirefox-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570616" comment="MozillaFirefox-translations-common-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570617" comment="MozillaFirefox-translations-other-78.4.0-78.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38806" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570618" comment="MozillaFirefox-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570619" comment="MozillaFirefox-translations-common-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570620" comment="MozillaFirefox-translations-other-78.4.1-78.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38807" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570621" comment="MozillaFirefox-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570622" comment="MozillaFirefox-translations-common-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570623" comment="MozillaFirefox-translations-other-78.5.0-78.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38808" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570624" comment="MozillaFirefox-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570625" comment="MozillaFirefox-translations-common-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570626" comment="MozillaFirefox-translations-other-78.6.0-78.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38809" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570627" comment="MozillaFirefox-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570628" comment="MozillaFirefox-translations-common-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570629" comment="MozillaFirefox-translations-other-78.6.1-78.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38810" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570630" comment="MozillaFirefox-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570631" comment="MozillaFirefox-translations-common-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570632" comment="MozillaFirefox-translations-other-78.7.0-78.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38811" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181848" ref_url="https://bugzilla.suse.com/1181848" source="BUGZILLA"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.7.1 ESR (bsc#1181848)

- Fixed: Prevent access to NTFS special paths that could lead to filesystem corruption. 
- Buffer overflow in depth pitch calculations for compressed textures 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181848">SUSE bug 1181848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570633" comment="MozillaFirefox-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570634" comment="MozillaFirefox-translations-common-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570635" comment="MozillaFirefox-translations-other-78.7.1-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38812" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570636" comment="MozillaFirefox-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570637" comment="MozillaFirefox-translations-common-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570638" comment="MozillaFirefox-translations-other-78.8.0-78.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38813" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570639" comment="MozillaFirefox-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570640" comment="MozillaFirefox-translations-common-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570641" comment="MozillaFirefox-translations-other-78.9.0-78.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38814" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570642" comment="MozillaFirefox-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570643" comment="MozillaFirefox-translations-common-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570644" comment="MozillaFirefox-translations-other-78.10.0-78.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38815" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570645" comment="MozillaFirefox-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570646" comment="MozillaFirefox-translations-common-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570647" comment="MozillaFirefox-translations-other-78.11.0-78.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38816" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625243" comment="MozillaFirefox-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625244" comment="MozillaFirefox-translations-common-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625245" comment="MozillaFirefox-translations-other-78.12.0-78.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38817" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630646" comment="MozillaFirefox-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630647" comment="MozillaFirefox-translations-common-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630648" comment="MozillaFirefox-translations-other-78.13.0-78.137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38818" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-01"/>
	<updated date="2021-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634730" comment="MozillaFirefox-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634731" comment="MozillaFirefox-translations-common-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634732" comment="MozillaFirefox-translations-other-78.14.0-78.140.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38819" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:
	  
MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654421" comment="MozillaFirefox-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654422" comment="MozillaFirefox-translations-common-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654423" comment="MozillaFirefox-translations-other-91.3.0-78.151.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38820" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659367" comment="MozillaFirefox-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659368" comment="MozillaFirefox-translations-common-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659369" comment="MozillaFirefox-translations-other-91.4.0-78.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38821" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663814" comment="MozillaFirefox-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663815" comment="MozillaFirefox-translations-common-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663816" comment="MozillaFirefox-translations-other-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663817" comment="libfreebl3-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663818" comment="libfreebl3-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663819" comment="libsoftokn3-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663820" comment="libsoftokn3-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663821" comment="mozilla-nss-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663822" comment="mozilla-nss-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663823" comment="mozilla-nss-certs-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663824" comment="mozilla-nss-certs-32bit-3.68.2-38.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663825" comment="mozilla-nss-tools-3.68.2-38.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38822" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668898" comment="MozillaFirefox-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668899" comment="MozillaFirefox-translations-common-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668900" comment="MozillaFirefox-translations-other-91.6.0-78.162.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38823" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672457" comment="MozillaFirefox-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672458" comment="MozillaFirefox-translations-common-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672459" comment="MozillaFirefox-translations-other-91.7.0-78.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38824" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This MozillaFirefox and Mozilla NSS update fixes several security and 
non-security issues.

MozillaFirefox has been updated to 24.5.0esr which fixes following issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to version 3.16

    * required for Firefox 29
    * CVE-2014-1492_ In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570648" comment="MozillaFirefox-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570649" comment="MozillaFirefox-branding-SLED-24-0.4.10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570650" comment="MozillaFirefox-translations-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570651" comment="libfreebl3-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570652" comment="libfreebl3-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570653" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570654" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570655" comment="mozilla-nss-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570656" comment="mozilla-nss-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570657" comment="mozilla-nss-tools-3.16-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570648" comment="MozillaFirefox-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570649" comment="MozillaFirefox-branding-SLED-24-0.4.10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570650" comment="MozillaFirefox-translations-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570651" comment="libfreebl3-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570652" comment="libfreebl3-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570653" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570654" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570655" comment="mozilla-nss-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570656" comment="mozilla-nss-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570657" comment="mozilla-nss-tools-3.16-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38825" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570658" comment="MozillaFirefox-31.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570659" comment="MozillaFirefox-translations-31.6.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38826" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570660" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38827" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, rust-cbindgen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652557" comment="MozillaFirefox-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652558" comment="MozillaFirefox-branding-SLED-91-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652559" comment="MozillaFirefox-translations-common-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652560" comment="MozillaFirefox-translations-other-91.2.0-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38828" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="574266" ref_url="https://bugzilla.suse.com/574266" source="BUGZILLA"/>
		<reference ref_id="686093" ref_url="https://bugzilla.suse.com/686093" source="BUGZILLA"/>
		<reference ref_id="694218" ref_url="https://bugzilla.suse.com/694218" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<description>

NetworkManager did not pin a certificate's subject to an ESSID. A rogue 
access point could therefore be used to conduct MITM attacks by using any 
other valid certificate issued by same CA as used in the original network 
(CVE-2006-7246). This has been fixed.

Please note that existing WPA2 Enterprise connections need to be deleted 
and re-created to take advantage of the new security checks.

Security Issue reference:

    * CVE-2006-7246
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7246&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-05"/>
	<updated date="2011-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/574266">SUSE bug 574266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686093">SUSE bug 686093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694218">SUSE bug 694218</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570661" comment="NetworkManager-0.7.1_git20090811-3.9.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570662" comment="NetworkManager-glib-0.7.1_git20090811-3.9.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570663" comment="NetworkManager-gnome-0.7.1-5.15.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570664" comment="wpa_supplicant-0.6.9-4.5.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570661" comment="NetworkManager-0.7.1_git20090811-3.9.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570662" comment="NetworkManager-glib-0.7.1_git20090811-3.9.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570663" comment="NetworkManager-gnome-0.7.1-5.15.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570664" comment="wpa_supplicant-0.6.9-4.5.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38829" version="1" class="patch">
	<metadata>
		<title>Security update for NetworkManager-gnome</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="574266" ref_url="https://bugzilla.suse.com/574266" source="BUGZILLA"/>
		<reference ref_id="732700" ref_url="https://bugzilla.suse.com/732700" source="BUGZILLA"/>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<description>

NetworkManager did not pin a certificate's subject to an ESSID. A rogue 
access point could therefore be used to conduct MITM attacks by using any 
other valid certificate issued by same CA as used in the original network 
(CVE-2006-7246).

Please note that existing WPA2 Enterprise connections need to be deleted 
and re-created to take advantage of the new security checks.

This is a re-release of the previous update to also enable the checks for 
EAP-TLS.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-10"/>
	<updated date="2012-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/574266">SUSE bug 574266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732700">SUSE bug 732700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570665" comment="NetworkManager-gnome-0.7.1-5.15.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570665" comment="NetworkManager-gnome-0.7.1-5.15.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38830" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-kde4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="663413" ref_url="https://bugzilla.suse.com/663413" source="BUGZILLA"/>
		<reference ref_id="726349" ref_url="https://bugzilla.suse.com/726349" source="BUGZILLA"/>
		<description>
This NetworkManager-kde4 update fixes the following security and non security issues: 

- Fixed a long standing security issue. This makes knetworkmanager probe the RADIUS server for a CA certificate subject and hash if no CA certificate is specified. knetworkmanager then stores this data and send it to NetworkManager for it to do a network validation in the absence of a real certificate (bsc#726349)

- Disabled the loading by default of the NetworkManager plasma applet since it doesn't work.
- Fixed a crash due to the use of an uninitialized variable in the plasma applet in case someone runs it manually (bsc#663413)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/663413">SUSE bug 663413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726349">SUSE bug 726349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570666" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570667" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570668" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570669" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570670" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570671" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38831" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570672" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564202" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38832" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040109" ref_url="https://bugzilla.suse.com/1040109" source="BUGZILLA"/>
		<reference ref_id="1040112" ref_url="https://bugzilla.suse.com/1040112" source="BUGZILLA"/>
		<reference ref_id="1040113" ref_url="https://bugzilla.suse.com/1040113" source="BUGZILLA"/>
		<reference ref_id="1040115" ref_url="https://bugzilla.suse.com/1040115" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator function inhalf.h (bsc#1040115).    
- CVE-2017-9112: Fixed invalid read of size 1 in the getBits function in ImfHuf.cpp. (This was already fixed by the previous update bug not referenced.) (bsc#1040112)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570673" comment="OpenEXR-1.6.1-83.17.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570674" comment="OpenEXR-32bit-1.6.1-83.17.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38833" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061305" ref_url="https://bugzilla.suse.com/1061305" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2017-14988: Fixed a denial of service in Header::readfrom() (bsc#1061305).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570675" comment="OpenEXR-1.6.1-83.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570676" comment="OpenEXR-32bit-1.6.1-83.17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38834" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1169574" ref_url="https://bugzilla.suse.com/1169574" source="BUGZILLA"/>
		<reference ref_id="1169576" ref_url="https://bugzilla.suse.com/1169576" source="BUGZILLA"/>
		<reference ref_id="1169578" ref_url="https://bugzilla.suse.com/1169578" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp (bsc#1169574).
- CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp (bsc#1169576).
- CVE-2020-11761: Fixed an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder:refill in ImfFastHuf.cpp (bsc#1169578).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570677" comment="OpenEXR-1.6.1-83.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570678" comment="OpenEXR-32bit-1.6.1-83.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38835" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179879" ref_url="https://bugzilla.suse.com/1179879" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2020-16588: Fixed a null pointer deference in generatePreview (bsc#1179879).
- CVE-2020-16589: Fixed a heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp (bsc#1179879).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570679" comment="OpenEXR-1.6.1-83.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570680" comment="OpenEXR-32bit-1.6.1-83.17.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38836" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184172" ref_url="https://bugzilla.suse.com/1184172" source="BUGZILLA"/>
		<reference ref_id="1184173" ref_url="https://bugzilla.suse.com/1184173" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173)
- CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570681" comment="OpenEXR-1.6.1-83.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570682" comment="OpenEXR-32bit-1.6.1-83.17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38837" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570683" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570684" comment="OpenEXR-32bit-1.6.1-83.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38838" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657133" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657134" comment="OpenEXR-32bit-1.6.1-83.17.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38839" version="1" class="patch">
	<metadata>
		<title>Security update for OpenOffice_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607095" ref_url="https://bugzilla.suse.com/607095" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0395" ref_url="https://www.suse.com/security/cve/CVE-2010-0395/" source="CVE"/>
		<description>

This update of OpenOffice_org fixes the following security issue:

    * Arbitrary macros written in Python can be executed by bypassing macro
      security permissions. CVE-2010-0395
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395&gt;

It also provides the maintenance update to OpenOffice.org-3.2.1. Details 
about all upstream changes can be found at 
http://development.openoffice.org/releases/3.2.1.html
&lt;http://development.openoffice.org/releases/3.2.1.html&gt; .

For further SUSE Linux Enterprise specific fixes please refer to the 
changelog of the OpenOffice_org RPM package.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-05-05"/>
	<updated date="2010-05-05"/>
	<bugzilla href="https://bugzilla.suse.com/607095">SUSE bug 607095</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0395/">CVE-2010-0395</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570685" comment="libpython2_6-1_0-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570686" comment="libpython2_6-1_0-32bit-2.6.0-8.9.20 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570685" comment="libpython2_6-1_0-2.6.0-8.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570686" comment="libpython2_6-1_0-32bit-2.6.0-8.9.20 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38840" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570687" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564204" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38841" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141844" ref_url="https://bugzilla.suse.com/1141844" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Secuirty issue fixed:

- CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570688" comment="SDL-1.2.13-106.14.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570689" comment="SDL-32bit-1.2.13-106.14.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38842" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679743" comment="SDL-1.2.13-106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679744" comment="SDL-32bit-1.2.13-106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38843" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38844" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570691" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38845" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664250" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38846" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1112916" ref_url="https://bugzilla.suse.com/1112916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10729" ref_url="https://www.suse.com/security/cve/CVE-2016-10729/" source="CVE"/>
		<description>
This update for amanda fixes the following issues:

Security issue fixed:

- CVE-2016-10729: Fixed a local privilege escalation from amanda to root via unsafe tar command options (bsc#1112916).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10729/">CVE-2016-10729</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570692" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38847" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
This update for ant fixes the following security issue:

- CVE-2018-10886: Prevent arbitrary file write with specially crafted zip files
  (bsc#1100053).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570693" comment="ant-1.7.0-200.26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570694" comment="ant-trax-1.7.0-200.26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38848" version="1" class="patch">
	<metadata>
		<title>Security update for Apache2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="688472" ref_url="https://bugzilla.suse.com/688472" source="BUGZILLA"/>
		<reference ref_id="722545" ref_url="https://bugzilla.suse.com/722545" source="BUGZILLA"/>
		<reference ref_id="727071" ref_url="https://bugzilla.suse.com/727071" source="BUGZILLA"/>
		<reference ref_id="728533" ref_url="https://bugzilla.suse.com/728533" source="BUGZILLA"/>
		<reference ref_id="728876" ref_url="https://bugzilla.suse.com/728876" source="BUGZILLA"/>
		<reference ref_id="729181" ref_url="https://bugzilla.suse.com/729181" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1473" ref_url="https://www.suse.com/security/cve/CVE-2011-1473/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-3639" ref_url="https://www.suse.com/security/cve/CVE-2011-3639/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<description>

This update fixes several security issues in the Apache2 webserver.

    * CVE-2011-3639, CVE-2011-3368, CVE-2011-4317: This update also
      includes several fixes for a mod_proxy reverse exposure via
      RewriteRule or ProxyPassMatch directives.
    * CVE-2011-1473: Fixed the SSL renegotiation DoS by disabling
      renegotiation by default.
    * CVE-2011-3607: Integer overflow in ap_pregsub function resulting in a
      heap based buffer overflow could potentially allow local attackers to
      gain privileges.

Also a non-security bug was fixed:

    * httpd-2.2.x-bnc727071-mod_authnz_ldap-utf8.diff: make non-ascii eg
      UTF8 passwords work with mod_authnz_ldap. [bnc#727071]

Security Issue references:

    * CVE-2011-3639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3639&gt;
    * CVE-2011-3368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368&gt;
    * CVE-2011-4317
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317&gt;
    * CVE-2011-1473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1473&gt;
    * CVE-2011-3607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-30"/>
	<updated date="2011-11-30"/>
	<bugzilla href="https://bugzilla.suse.com/688472">SUSE bug 688472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727071">SUSE bug 727071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728533">SUSE bug 728533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1473/">CVE-2011-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3639/">CVE-2011-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570695" comment="apache2-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570696" comment="apache2-doc-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570697" comment="apache2-example-pages-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570698" comment="apache2-prefork-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570699" comment="apache2-utils-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570700" comment="apache2-worker-2.2.12-1.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570695" comment="apache2-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570696" comment="apache2-doc-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570697" comment="apache2-example-pages-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570698" comment="apache2-prefork-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570699" comment="apache2-utils-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570700" comment="apache2-worker-2.2.12-1.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570695" comment="apache2-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570696" comment="apache2-doc-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570697" comment="apache2-example-pages-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570698" comment="apache2-prefork-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570699" comment="apache2-utils-2.2.12-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570700" comment="apache2-worker-2.2.12-1.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38849" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570701" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570702" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570703" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570704" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570705" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570706" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38850" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570707" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570708" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570709" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570710" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570711" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570712" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38851" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570713" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570714" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570715" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570716" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570717" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570718" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38852" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570719" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570720" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570721" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570722" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570723" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570724" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38853" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570725" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570726" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570727" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570728" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570729" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570730" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38854" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570731" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570732" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570733" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570734" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570735" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570736" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38855" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570737" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570738" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570739" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570740" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570741" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570742" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38856" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145738" ref_url="https://bugzilla.suse.com/1145738" source="BUGZILLA"/>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-16"/>
	<updated date="2019-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570743" comment="apache2-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570744" comment="apache2-doc-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570745" comment="apache2-example-pages-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570746" comment="apache2-prefork-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570747" comment="apache2-utils-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570748" comment="apache2-worker-2.2.34-70.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38857" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570749" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570750" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570751" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570752" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570753" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570754" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38858" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="1182703" ref_url="https://bugzilla.suse.com/1182703" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Fixed potential content spoofing with default error pages(bsc#118270)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570755" comment="apache2-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570756" comment="apache2-doc-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570757" comment="apache2-example-pages-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570758" comment="apache2-prefork-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570759" comment="apache2-utils-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570760" comment="apache2-worker-2.2.34-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38859" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570761" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570762" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570763" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570764" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570765" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570766" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38860" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633944" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633945" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633946" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633947" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633948" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633949" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38861" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673620" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673621" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673622" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673623" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673624" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673625" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38862" version="1" class="patch">
	<metadata>
		<title>Security update for Apache2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="728876" ref_url="https://bugzilla.suse.com/728876" source="BUGZILLA"/>
		<reference ref_id="738067" ref_url="https://bugzilla.suse.com/738067" source="BUGZILLA"/>
		<reference ref_id="738855" ref_url="https://bugzilla.suse.com/738855" source="BUGZILLA"/>
		<reference ref_id="739783" ref_url="https://bugzilla.suse.com/739783" source="BUGZILLA"/>
		<reference ref_id="741243" ref_url="https://bugzilla.suse.com/741243" source="BUGZILLA"/>
		<reference ref_id="741874" ref_url="https://bugzilla.suse.com/741874" source="BUGZILLA"/>
		<reference ref_id="743743" ref_url="https://bugzilla.suse.com/743743" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6750" ref_url="https://www.suse.com/security/cve/CVE-2007-6750/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<description>

This update of apache2 and libapr1 fixes regressions and several security 
problems.

    * CVE-2012-0031: Fixed a scoreboard corruption (shared mem segment) by
      child causes crash of privileged parent (invalid free()) during
      shutdown.
    * CVE-2012-0053: Fixed an issue in error responses that could expose
      'httpOnly' cookies when no custom ErrorDocument is specified for
      status code 400'.
    * CVE-2007-6750: The 'mod_reqtimeout' module was backported from Apache
      2.2.21 to help mitigate the 'Slowloris' Denial of Service attack.

You need to enable the 'mod_reqtimeout' module in your existing apache 
configuration to make it effective, e.g. in the APACHE_MODULES line in 
/etc/sysconfig/apache2.
For more detailed information, check also the README file.

Also the following bugs have been fixed:

    * Fixed init script action 'check-reload' to avoid potential crashes.
      bnc#728876
    * An overlapping memcpy() was replaced by memmove() to make this work
      with newer glibcs. bnc#738067 bnc#741874
    * libapr1: reset errno to zero to not return previous value despite
      good status of new operation. bnc#739783

Security Issue references:

    * CVE-2007-6750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750&gt;
    * CVE-2012-0031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031&gt;
    * CVE-2012-0053
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-03"/>
	<updated date="2012-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738067">SUSE bug 738067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738855">SUSE bug 738855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739783">SUSE bug 739783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741243">SUSE bug 741243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741874">SUSE bug 741874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743743">SUSE bug 743743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6750/">CVE-2007-6750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570767" comment="apache2-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570768" comment="apache2-doc-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570769" comment="apache2-example-pages-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570770" comment="apache2-prefork-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570771" comment="apache2-utils-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570772" comment="apache2-worker-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570773" comment="libapr1-1.3.3-11.18.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570774" comment="libapr1-32bit-1.3.3-11.18.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570767" comment="apache2-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570768" comment="apache2-doc-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570769" comment="apache2-example-pages-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570770" comment="apache2-prefork-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570771" comment="apache2-utils-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570772" comment="apache2-worker-2.2.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570773" comment="libapr1-1.3.3-11.18.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570774" comment="libapr1-32bit-1.3.3-11.18.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38863" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="927845" ref_url="https://bugzilla.suse.com/927845" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<description>

This update for apache2-mod_jk fixes the following issues:

Security issues fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
- CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules for subtrees of previous JkMount rules, which allowed remote attackers to access otherwise restricted artifacts via unspecified vectors (bsc#927845).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570775" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38864" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570776" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38865" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570777" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38866" version="1" class="patch">
	<metadata>
		<title>Security update for php5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="772580" ref_url="https://bugzilla.suse.com/772580" source="BUGZILLA"/>
		<reference ref_id="772582" ref_url="https://bugzilla.suse.com/772582" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2688" ref_url="https://www.suse.com/security/cve/CVE-2012-2688/" source="CVE"/>
		<reference ref_id="CVE-2012-3365" ref_url="https://www.suse.com/security/cve/CVE-2012-3365/" source="CVE"/>
		<description>

This update fixes two security issues of PHP5:

    * Potential overflow in _php_stream_scandir. (CVE-2012-2688
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688&gt; )
    * open_basedir bypass via SQLite extension. (CVE-2012-3365
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-02"/>
	<updated date="2012-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/772580">SUSE bug 772580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772582">SUSE bug 772582</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2688/">CVE-2012-2688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3365/">CVE-2012-3365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570778" comment="apache2-mod_php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570779" comment="php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570780" comment="php5-bcmath-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570781" comment="php5-bz2-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570782" comment="php5-calendar-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570783" comment="php5-ctype-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570784" comment="php5-curl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570785" comment="php5-dba-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570786" comment="php5-dbase-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570787" comment="php5-dom-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570788" comment="php5-exif-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570789" comment="php5-fastcgi-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570790" comment="php5-ftp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570791" comment="php5-gd-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570792" comment="php5-gettext-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570793" comment="php5-gmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570794" comment="php5-hash-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570795" comment="php5-iconv-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570796" comment="php5-json-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570797" comment="php5-ldap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570798" comment="php5-mbstring-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570799" comment="php5-mcrypt-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570800" comment="php5-mysql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570801" comment="php5-odbc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570802" comment="php5-openssl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570803" comment="php5-pcntl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570804" comment="php5-pdo-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570805" comment="php5-pear-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570806" comment="php5-pgsql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570807" comment="php5-pspell-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570808" comment="php5-shmop-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570809" comment="php5-snmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570810" comment="php5-soap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570811" comment="php5-suhosin-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570812" comment="php5-sysvmsg-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570813" comment="php5-sysvsem-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570814" comment="php5-sysvshm-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570815" comment="php5-tokenizer-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570816" comment="php5-wddx-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570817" comment="php5-xmlreader-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570818" comment="php5-xmlrpc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570819" comment="php5-xmlwriter-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570820" comment="php5-xsl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570821" comment="php5-zip-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570822" comment="php5-zlib-5.2.14-0.7.30.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570778" comment="apache2-mod_php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570779" comment="php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570780" comment="php5-bcmath-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570781" comment="php5-bz2-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570782" comment="php5-calendar-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570783" comment="php5-ctype-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570784" comment="php5-curl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570785" comment="php5-dba-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570786" comment="php5-dbase-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570787" comment="php5-dom-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570788" comment="php5-exif-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570789" comment="php5-fastcgi-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570790" comment="php5-ftp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570791" comment="php5-gd-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570792" comment="php5-gettext-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570793" comment="php5-gmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570794" comment="php5-hash-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570795" comment="php5-iconv-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570796" comment="php5-json-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570797" comment="php5-ldap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570798" comment="php5-mbstring-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570799" comment="php5-mcrypt-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570800" comment="php5-mysql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570801" comment="php5-odbc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570802" comment="php5-openssl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570803" comment="php5-pcntl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570804" comment="php5-pdo-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570805" comment="php5-pear-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570806" comment="php5-pgsql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570807" comment="php5-pspell-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570808" comment="php5-shmop-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570809" comment="php5-snmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570810" comment="php5-soap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570811" comment="php5-suhosin-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570812" comment="php5-sysvmsg-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570813" comment="php5-sysvsem-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570814" comment="php5-sysvshm-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570815" comment="php5-tokenizer-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570816" comment="php5-wddx-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570817" comment="php5-xmlreader-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570818" comment="php5-xmlrpc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570819" comment="php5-xmlwriter-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570820" comment="php5-xsl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570821" comment="php5-zip-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570822" comment="php5-zlib-5.2.14-0.7.30.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570778" comment="apache2-mod_php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570779" comment="php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570780" comment="php5-bcmath-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570781" comment="php5-bz2-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570782" comment="php5-calendar-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570783" comment="php5-ctype-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570784" comment="php5-curl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570785" comment="php5-dba-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570786" comment="php5-dbase-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570787" comment="php5-dom-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570788" comment="php5-exif-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570789" comment="php5-fastcgi-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570790" comment="php5-ftp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570791" comment="php5-gd-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570792" comment="php5-gettext-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570793" comment="php5-gmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570794" comment="php5-hash-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570795" comment="php5-iconv-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570796" comment="php5-json-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570797" comment="php5-ldap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570798" comment="php5-mbstring-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570799" comment="php5-mcrypt-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570800" comment="php5-mysql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570801" comment="php5-odbc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570802" comment="php5-openssl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570803" comment="php5-pcntl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570804" comment="php5-pdo-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570805" comment="php5-pear-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570806" comment="php5-pgsql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570807" comment="php5-pspell-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570808" comment="php5-shmop-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570809" comment="php5-snmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570810" comment="php5-soap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570811" comment="php5-suhosin-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570812" comment="php5-sysvmsg-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570813" comment="php5-sysvsem-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570814" comment="php5-sysvshm-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570815" comment="php5-tokenizer-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570816" comment="php5-wddx-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570817" comment="php5-xmlreader-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570818" comment="php5-xmlrpc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570819" comment="php5-xmlwriter-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570820" comment="php5-xsl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570821" comment="php5-zip-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570822" comment="php5-zlib-5.2.14-0.7.30.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570778" comment="apache2-mod_php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570779" comment="php5-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570780" comment="php5-bcmath-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570781" comment="php5-bz2-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570782" comment="php5-calendar-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570783" comment="php5-ctype-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570784" comment="php5-curl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570785" comment="php5-dba-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570786" comment="php5-dbase-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570787" comment="php5-dom-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570788" comment="php5-exif-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570789" comment="php5-fastcgi-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570790" comment="php5-ftp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570791" comment="php5-gd-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570792" comment="php5-gettext-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570793" comment="php5-gmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570794" comment="php5-hash-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570795" comment="php5-iconv-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570796" comment="php5-json-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570797" comment="php5-ldap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570798" comment="php5-mbstring-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570799" comment="php5-mcrypt-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570800" comment="php5-mysql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570801" comment="php5-odbc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570802" comment="php5-openssl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570803" comment="php5-pcntl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570804" comment="php5-pdo-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570805" comment="php5-pear-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570806" comment="php5-pgsql-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570807" comment="php5-pspell-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570808" comment="php5-shmop-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570809" comment="php5-snmp-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570810" comment="php5-soap-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570811" comment="php5-suhosin-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570812" comment="php5-sysvmsg-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570813" comment="php5-sysvsem-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570814" comment="php5-sysvshm-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570815" comment="php5-tokenizer-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570816" comment="php5-wddx-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570817" comment="php5-xmlreader-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570818" comment="php5-xmlrpc-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570819" comment="php5-xmlwriter-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570820" comment="php5-xsl-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570821" comment="php5-zip-5.2.14-0.7.30.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570822" comment="php5-zlib-5.2.14-0.7.30.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38867" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="757549" ref_url="https://bugzilla.suse.com/757549" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<description>

Apache2 mod_python has been changed to enable randomized hashes to help 
fixing denial of service problems by injecting prepared values into Python 
hash functions. (CVE-2012-1150)

As some Python scripts might need a known hashing order, the old behaviour 
can be restored using a newly introduced module option called

PythonRandomizeHashes

The option is default on, but can be disabled if necessary for 
compatibility with above scripts.

Security Issue reference:

    * CVE-2012-1150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-03"/>
	<updated date="2012-05-03"/>
	<bugzilla href="https://bugzilla.suse.com/757549">SUSE bug 757549</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570823" comment="apache2-mod_python-3.3.1-147.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570823" comment="apache2-mod_python-3.3.1-147.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570823" comment="apache2-mod_python-3.3.1-147.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38868" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="947731" ref_url="https://bugzilla.suse.com/947731" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1338" ref_url="https://www.suse.com/security/cve/CVE-2015-1338/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issue fixed:
- CVE-2015-1338: Insecurely created crash dumps could lead to a DoS or privilege escalation through
  malicious symlinks. (bsc#947731)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-24"/>
	<updated date="2017-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1338/">CVE-2015-1338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570824" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570825" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570826" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38869" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140986" ref_url="https://bugzilla.suse.com/1140986" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7307" ref_url="https://www.suse.com/security/cve/CVE-2019-7307/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issues fixed:

- CVE-2019-7307: Fixed a TOCTOU issue, which allows local users to read arbitrary files. (bsc#1140986)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140986">SUSE bug 1140986</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7307/">CVE-2019-7307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570827" comment="apport-0.114-12.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570828" comment="apport-crashdb-sle-0.114-0.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570829" comment="apport-gtk-0.114-12.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38870" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155479" ref_url="https://bugzilla.suse.com/1155479" source="BUGZILLA"/>
		<reference ref_id="1155481" ref_url="https://bugzilla.suse.com/1155481" source="BUGZILLA"/>
		<reference ref_id="1155482" ref_url="https://bugzilla.suse.com/1155482" source="BUGZILLA"/>
		<reference ref_id="1174108" ref_url="https://bugzilla.suse.com/1174108" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11482" ref_url="https://www.suse.com/security/cve/CVE-2019-11482/" source="CVE"/>
		<reference ref_id="CVE-2019-11485" ref_url="https://www.suse.com/security/cve/CVE-2019-11485/" source="CVE"/>
		<reference ref_id="CVE-2019-15790" ref_url="https://www.suse.com/security/cve/CVE-2019-15790/" source="CVE"/>
		<reference ref_id="CVE-2020-15701" ref_url="https://www.suse.com/security/cve/CVE-2020-15701/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

- CVE-2019-11482: Fixed TOCTTOU race conditions when creating a core file (bsc#1155479).
- CVE-2019-11485: Fixed a permission issue with the directory of lock files (bsc#1155481)
- CVE-2019-15790: Fixed the privilleges that reads /proc/$PID/ files to avoid potential information disclosure (bsc#1155482).
- CVE-2020-15701: Fixed a denial of service while parsing apport-ignore.xml (bsc#1174108).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-21"/>
	<updated date="2020-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155479">SUSE bug 1155479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155481">SUSE bug 1155481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155482">SUSE bug 1155482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174108">SUSE bug 1174108</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11482/">CVE-2019-11482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11485/">CVE-2019-11485</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15790/">CVE-2019-15790</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15701/">CVE-2020-15701</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570830" comment="apport-0.114-12.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570831" comment="apport-crashdb-sle-0.114-0.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570832" comment="apport-gtk-0.114-12.8.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38871" version="1" class="patch">
	<metadata>
		<title>Security update for ark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="708268" ref_url="https://bugzilla.suse.com/708268" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>

Ark was prone to a path traversal vulnerability allowing a 
maliciously-crafted zip file to allow for an arbitrary file to be displayed 
and, if the user has appropriate credentials, removed (CVE-2011-2725).

Security Issue reference:

    * CVE-2011-2725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2725&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-29"/>
	<updated date="2012-02-29"/>
	<bugzilla href="https://bugzilla.suse.com/708268">SUSE bug 708268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570833" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570834" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570835" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570836" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570837" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570838" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570839" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570840" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570841" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570842" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570843" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570833" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570834" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570835" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570836" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570837" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570838" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570839" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570840" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570841" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570842" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570843" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38872" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="764521" ref_url="https://bugzilla.suse.com/764521" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2653" ref_url="https://www.suse.com/security/cve/CVE-2012-2653/" source="CVE"/>
		<description>

arpwatch was improperly dropping its privileges. This has been fixed.

Security Issue reference:

    * CVE-2012-2653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2653&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-18"/>
	<updated date="2012-07-18"/>
	<bugzilla href="https://bugzilla.suse.com/764521">SUSE bug 764521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2653/">CVE-2012-2653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570844" comment="arpwatch-2.1a15-131.23.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570844" comment="arpwatch-2.1a15-131.23.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570844" comment="arpwatch-2.1a15-131.23.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38873" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616451" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38874" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1153892" ref_url="https://bugzilla.suse.com/1153892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-17544: Fixed a stack-based buffer over-read in acommon:unescape in common/getdata.cpp via an isolated backslash (bsc#1153892).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570845" comment="aspell-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570846" comment="aspell-32bit-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570847" comment="aspell-ispell-0.60.6-26.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38875" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<description>
This update for aspell fixes the following security issue:

- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570848" comment="aspell-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570849" comment="aspell-32bit-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570850" comment="aspell-ispell-0.60.6-26.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38876" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627833" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627834" comment="aspell-32bit-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627835" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38877" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570851" comment="atftp-0.7.0-135.16.16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38878" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190522" ref_url="https://bugzilla.suse.com/1190522" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41054" ref_url="https://www.suse.com/security/cve/CVE-2021-41054/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-41054: Fixed buffer overflow caused by combination of data, OACK, and other options (bsc#1190522).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190522">SUSE bug 1190522</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41054/">CVE-2021-41054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633873" comment="atftp-0.7.0-135.16.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38879" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195619" ref_url="https://bugzilla.suse.com/1195619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46671" ref_url="https://www.suse.com/security/cve/CVE-2021-46671/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

-  CVE-2021-46671: Fixed a potential information leak in atftpd (bsc#1195619). 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1195619">SUSE bug 1195619</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46671/">CVE-2021-46671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667670" comment="atftp-0.7.0-135.16.16.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38880" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570852" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570853" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38881" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
The augeas package was updated to fix the following security issue:

- CVE-2014-8119: backported path escaping patch (bsc#925225)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570854" comment="augeas-0.8.1-7.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570855" comment="augeas-lenses-0.8.1-7.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570856" comment="libaugeas0-0.8.1-7.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38882" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
This update for augeas fixes the following issues:

Security issue fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
   by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-19"/>
	<updated date="2018-03-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570857" comment="augeas-0.8.1-7.23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570858" comment="augeas-lenses-0.8.1-7.23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570859" comment="libaugeas0-0.8.1-7.23.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38883" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck' 
(CVE-2012-3386).

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue references:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570860" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38884" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570861" comment="avahi-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570862" comment="avahi-lang-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570863" comment="avahi-utils-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570864" comment="libavahi-client3-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570865" comment="libavahi-client3-32bit-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570866" comment="libavahi-common3-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570867" comment="libavahi-common3-32bit-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570868" comment="libavahi-core5-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570869" comment="libdns_sd-0.6.23-11.25.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570870" comment="libdns_sd-32bit-0.6.23-11.25.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38885" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085255" ref_url="https://bugzilla.suse.com/1085255" source="BUGZILLA"/>
		<description>
This update for avahi fixes the following issues:

- Increase data and stack limits (bsc#1085255). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-18"/>
	<updated date="2021-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085255">SUSE bug 1085255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570871" comment="avahi-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570872" comment="avahi-lang-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570873" comment="avahi-utils-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570874" comment="libavahi-client3-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570875" comment="libavahi-client3-32bit-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570876" comment="libavahi-common3-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570877" comment="libavahi-common3-32bit-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570878" comment="libavahi-core5-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570879" comment="libdns_sd-0.6.23-11.25.25.6.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570880" comment="libdns_sd-32bit-0.6.23-11.25.25.6.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38886" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570881" comment="avahi-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570882" comment="avahi-lang-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570883" comment="avahi-utils-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570884" comment="libavahi-client3-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570885" comment="libavahi-client3-32bit-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570886" comment="libavahi-common3-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570887" comment="libavahi-common3-32bit-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570888" comment="libavahi-core5-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570889" comment="libdns_sd-0.6.23-11.25.25.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570890" comment="libdns_sd-32bit-0.6.23-11.25.25.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38887" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570891" comment="axis-1.4-236.38.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38888" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134598" ref_url="https://bugzilla.suse.com/1134598" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<description>
This update for axis fixes the following issues:

Security issue fixed:

- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check against X.509 certificate name (bsc#1134598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570892" comment="axis-1.4-236.38.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38889" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="770795" ref_url="https://bugzilla.suse.com/770795" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3410" ref_url="https://www.suse.com/security/cve/CVE-2012-3410/" source="CVE"/>
		<description>

Parsing the /dev/fd prefix could have lead to a stack-based buffer overflow 
which could have been exploited by attackers to bypass security 
restrictions. This has been fixed.

Security Issue reference:

    * CVE-2012-3410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-13"/>
	<updated date="2012-07-13"/>
	<bugzilla href="https://bugzilla.suse.com/770795">SUSE bug 770795</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3410/">CVE-2012-3410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570893" comment="bash-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570894" comment="bash-doc-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570895" comment="bash-x86-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570896" comment="libreadline5-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570897" comment="libreadline5-32bit-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570898" comment="libreadline5-x86-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570899" comment="readline-doc-5.2-147.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570893" comment="bash-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570894" comment="bash-doc-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570895" comment="bash-x86-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570896" comment="libreadline5-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570897" comment="libreadline5-32bit-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570898" comment="libreadline5-x86-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570899" comment="readline-doc-5.2-147.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570893" comment="bash-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570894" comment="bash-doc-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570895" comment="bash-x86-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570896" comment="libreadline5-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570897" comment="libreadline5-32bit-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570898" comment="libreadline5-x86-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570899" comment="readline-doc-5.2-147.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570893" comment="bash-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570894" comment="bash-doc-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570895" comment="bash-x86-3.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570896" comment="libreadline5-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570897" comment="libreadline5-32bit-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570898" comment="libreadline5-x86-5.2-147.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570899" comment="readline-doc-5.2-147.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38890" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
This update for bash fixes the following issues:

Security issue fixed:

- CVE-2016-9401: Fixed a denial of service with popd, where a user supplied address would be free'd (bsc#1010845).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-17"/>
	<updated date="2020-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570900" comment="bash-3.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570901" comment="bash-doc-3.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570902" comment="libreadline5-5.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570903" comment="libreadline5-32bit-5.2-148.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570904" comment="readline-doc-5.2-148.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38891" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="772945" ref_url="https://bugzilla.suse.com/772945" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<description>

The bind nameserver was updated to fix a crash (denial of service) during 
high DNSSEC validation load (CVE-2012-3817)

Security Issues:

    * CVE-2012-3817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-30"/>
	<updated date="2012-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570905" comment="bind-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570906" comment="bind-chrootenv-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570907" comment="bind-doc-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570908" comment="bind-libs-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570909" comment="bind-libs-32bit-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570910" comment="bind-libs-x86-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570911" comment="bind-utils-9.6ESVR7P2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570905" comment="bind-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570906" comment="bind-chrootenv-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570907" comment="bind-doc-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570908" comment="bind-libs-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570909" comment="bind-libs-32bit-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570910" comment="bind-libs-x86-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570911" comment="bind-utils-9.6ESVR7P2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570905" comment="bind-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570906" comment="bind-chrootenv-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570907" comment="bind-doc-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570908" comment="bind-libs-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570909" comment="bind-libs-32bit-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570910" comment="bind-libs-x86-9.6ESVR7P2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570911" comment="bind-utils-9.6ESVR7P2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38892" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570912" comment="bind-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570913" comment="bind-chrootenv-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570914" comment="bind-devel-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570915" comment="bind-doc-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570916" comment="bind-libs-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570917" comment="bind-libs-32bit-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570918" comment="bind-utils-9.6ESVR11W1-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570912" comment="bind-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570913" comment="bind-chrootenv-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570914" comment="bind-devel-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570915" comment="bind-doc-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570916" comment="bind-libs-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570917" comment="bind-libs-32bit-9.6ESVR11W1-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570918" comment="bind-utils-9.6ESVR11W1-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38893" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00012.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570919" comment="bind-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570920" comment="bind-chrootenv-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570921" comment="bind-devel-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570922" comment="bind-doc-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570923" comment="bind-libs-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570924" comment="bind-libs-32bit-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570925" comment="bind-utils-9.6ESVR11W1-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570919" comment="bind-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570920" comment="bind-chrootenv-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570921" comment="bind-devel-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570922" comment="bind-doc-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570923" comment="bind-libs-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570924" comment="bind-libs-32bit-9.6ESVR11W1-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570925" comment="bind-utils-9.6ESVR11W1-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38894" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<description>

This update for bind fixes the following issues: 

- Fix remote denial of service by misparsing incoming responses
  (CVE-2015-8000, bsc#958861).

A non security issues was also fixed:
- Fix a regression in caching entries with a ttl of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570926" comment="bind-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570927" comment="bind-chrootenv-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570928" comment="bind-doc-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570929" comment="bind-libs-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570930" comment="bind-libs-32bit-9.6ESVR11W1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570931" comment="bind-utils-9.6ESVR11W1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38895" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570932" comment="bind-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570933" comment="bind-chrootenv-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570934" comment="bind-doc-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570935" comment="bind-libs-9.6ESVR11W1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570936" comment="bind-utils-9.6ESVR11W1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38896" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-07"/>
	<updated date="2016-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570937" comment="bind-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570938" comment="bind-chrootenv-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570939" comment="bind-doc-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570940" comment="bind-libs-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570941" comment="bind-libs-32bit-9.6ESVR11W1-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570942" comment="bind-utils-9.6ESVR11W1-0.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38897" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570943" comment="bind-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570944" comment="bind-chrootenv-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570945" comment="bind-doc-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570946" comment="bind-libs-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570947" comment="bind-libs-32bit-9.6ESVR11W1-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570948" comment="bind-utils-9.6ESVR11W1-0.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38898" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<description>

This update for bind fixes the following issue:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570949" comment="bind-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570950" comment="bind-chrootenv-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570951" comment="bind-doc-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570952" comment="bind-libs-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570953" comment="bind-libs-32bit-9.6ESVR11W1-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570954" comment="bind-utils-9.6ESVR11W1-0.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38899" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570955" comment="bind-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570956" comment="bind-chrootenv-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570957" comment="bind-doc-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570958" comment="bind-libs-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570959" comment="bind-libs-32bit-9.6ESVR11W1-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570960" comment="bind-utils-9.6ESVR11W1-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38900" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570961" comment="bind-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570962" comment="bind-chrootenv-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570963" comment="bind-doc-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570964" comment="bind-libs-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570965" comment="bind-libs-32bit-9.6ESVR11W1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570966" comment="bind-utils-9.6ESVR11W1-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38901" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570967" comment="bind-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570968" comment="bind-chrootenv-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570969" comment="bind-doc-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570970" comment="bind-libs-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570971" comment="bind-libs-32bit-9.6ESVR11W1-0.31.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570972" comment="bind-utils-9.6ESVR11W1-0.31.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38902" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issue fixed:

- CVE-2016-2775: Fixed a denial of service vulnerability related to very long query names (bsc#989528).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570973" comment="bind-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570974" comment="bind-chrootenv-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570975" comment="bind-doc-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570976" comment="bind-libs-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570977" comment="bind-libs-32bit-9.6ESVR11W1-0.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570978" comment="bind-utils-9.6ESVR11W1-0.31.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38903" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-11"/>
	<updated date="2020-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570979" comment="bind-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570980" comment="bind-chrootenv-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570981" comment="bind-doc-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570982" comment="bind-libs-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570983" comment="bind-libs-32bit-9.6ESVR11W1-0.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570984" comment="bind-utils-9.6ESVR11W1-0.31.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38904" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570985" comment="bind-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570986" comment="bind-chrootenv-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570987" comment="bind-doc-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570988" comment="bind-libs-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570989" comment="bind-libs-32bit-9.6ESVR11W1-0.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570990" comment="bind-utils-9.6ESVR11W1-0.31.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38905" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570991" comment="bind-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570992" comment="bind-chrootenv-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570993" comment="bind-doc-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570994" comment="bind-libs-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570995" comment="bind-libs-32bit-9.6ESVR11W1-0.31.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570996" comment="bind-utils-9.6ESVR11W1-0.31.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38906" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654149" comment="bind-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654150" comment="bind-chrootenv-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654151" comment="bind-doc-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654152" comment="bind-libs-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654153" comment="bind-libs-32bit-9.6ESVR11W1-0.31.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654154" comment="bind-utils-9.6ESVR11W1-0.31.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38907" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1057342" ref_url="https://bugzilla.suse.com/1057342" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

Security issue fixed:

- CVE-2017-1000250: Fixed Out-of-bounds heap read in service_search_attr_req check if there is enough data to continue otherwise return an error (bsc#1057342).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570997" comment="bluez-4.51-1.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570998" comment="libbluetooth3-4.51-1.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38908" version="1" class="patch">
	<metadata>
		<title>Security update for boost</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="765443" ref_url="https://bugzilla.suse.com/765443" source="BUGZILLA"/>
		<reference ref_id="767949" ref_url="https://bugzilla.suse.com/767949" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2677" ref_url="https://www.suse.com/security/cve/CVE-2012-2677/" source="CVE"/>
		<description>

The following issue has been fixed:

    * boost::pool's ordered_malloc could have overflowed when calculating
      the allocation size (CVE-2012-2677).

Security Issue reference:

    * CVE-2012-2677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-05"/>
	<updated date="2012-07-05"/>
	<bugzilla href="https://bugzilla.suse.com/765443">SUSE bug 765443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767949">SUSE bug 767949</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2677/">CVE-2012-2677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570999" comment="boost-license-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571000" comment="libboost_program_options1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571001" comment="libboost_regex1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571002" comment="libboost_signals1_36_0-1.36.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570999" comment="boost-license-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571000" comment="libboost_program_options1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571001" comment="libboost_regex1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571002" comment="libboost_signals1_36_0-1.36.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570999" comment="boost-license-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571000" comment="libboost_program_options1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571001" comment="libboost_regex1_36_0-1.36.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571002" comment="libboost_signals1_36_0-1.36.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38909" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571003" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38910" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="985601" ref_url="https://bugzilla.suse.com/985601" source="BUGZILLA"/>
		<reference ref_id="985706" ref_url="https://bugzilla.suse.com/985706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<description>
This update for bsdtar fixes the following issues:

- CVE-2015-8915: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985601).
- CVE-2015-8925: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985706).
- CVE-2017-14503: Fixed an out of bounds read within lha_read_data_none() 
  in archive_read_support_format_lha.c (bsc#1059139).
- CVE-2016-8687: Fixed a buffer overflow when printing a filename (bsc#1005070).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985601">SUSE bug 985601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571004" comment="libarchive2-2.5.5-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38911" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="648080" ref_url="https://bugzilla.suse.com/648080" source="BUGZILLA"/>
		<reference ref_id="648086" ref_url="https://bugzilla.suse.com/648086" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3332" ref_url="https://www.suse.com/security/cve/CVE-2010-3332/" source="CVE"/>
		<reference ref_id="CVE-2010-4159" ref_url="https://www.suse.com/security/cve/CVE-2010-4159/" source="CVE"/>
		<description>

The following security bugs have been fixed:

    * Mono was vulnerable to a padding oracle attack (CVE-2010-3332).
    * Mono loaded shared libraries from the current directory
      (CVE-2010-4159).

Security Issue references:

    * CVE-2010-3332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3332&gt;
    * CVE-2010-4159
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4159&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-31"/>
	<updated date="2011-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/648080">SUSE bug 648080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648086">SUSE bug 648086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3332/">CVE-2010-3332</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-4159/">CVE-2010-4159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571005" comment="mono-core-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571006" comment="mono-data-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571007" comment="mono-data-postgresql-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571008" comment="mono-data-sqlite-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571009" comment="mono-locale-extras-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571010" comment="mono-nunit-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571011" comment="mono-web-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571012" comment="mono-winforms-2.0.1-1.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571005" comment="mono-core-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571006" comment="mono-data-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571007" comment="mono-data-postgresql-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571008" comment="mono-data-sqlite-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571009" comment="mono-locale-extras-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571010" comment="mono-nunit-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571011" comment="mono-web-2.0.1-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571012" comment="mono-winforms-2.0.1-1.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38912" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="636978" ref_url="https://bugzilla.suse.com/636978" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>

This update fixes an integer overflow in the BZ2_decompress function of 
bzip2/libbz2. This could have been exploited via a crafted archive to cause 
a denial of service or even execute arbitrary code. (CVE-2010-0405)

Security Issue reference:

    * CVE-2010-0405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-17"/>
	<updated date="2010-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569892" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569893" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569894" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569895" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569896" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569892" comment="bzip2-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569893" comment="bzip2-doc-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569894" comment="libbz2-1-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569895" comment="libbz2-1-32bit-1.0.5-34.253.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569896" comment="libbz2-1-x86-1.0.5-34.253.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38913" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571013" comment="bzip2-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571014" comment="bzip2-doc-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571015" comment="libbz2-1-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571016" comment="libbz2-1-32bit-1.0.5-34.256.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38914" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571017" comment="bzip2-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571018" comment="bzip2-doc-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571019" comment="libbz2-1-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571020" comment="libbz2-1-32bit-1.0.5-34.256.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38915" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571021" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571022" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571023" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38916" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633398" comment="cairo-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633399" comment="cairo-32bit-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633400" comment="cairo-doc-1.8.8-2.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38917" version="1" class="patch">
	<metadata>
		<title>Security update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="753610" ref_url="https://bugzilla.suse.com/753610" source="BUGZILLA"/>
		<reference ref_id="753611" ref_url="https://bugzilla.suse.com/753611" source="BUGZILLA"/>
		<reference ref_id="753613" ref_url="https://bugzilla.suse.com/753613" source="BUGZILLA"/>
		<reference ref_id="767574" ref_url="https://bugzilla.suse.com/767574" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<description>

The following issue has been fixed:

    * Viruses contained in specially crafted tar or CHM files could have
      evaded detection by clamav (CVE-2012-1457, CVE-2012-1458,
      CVE-2012-1459).

Security Issue references:

    * CVE-2012-1457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457&gt;
    * CVE-2012-1458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458&gt;
    * CVE-2012-1459
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-22"/>
	<updated date="2012-06-22"/>
	<bugzilla href="https://bugzilla.suse.com/753610">SUSE bug 753610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753611">SUSE bug 753611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753613">SUSE bug 753613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571024" comment="clamav-0.97.5-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571024" comment="clamav-0.97.5-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571024" comment="clamav-0.97.5-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571024" comment="clamav-0.97.5-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38918" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571025" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38919" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571026" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38920" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571027" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38921" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571028" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38922" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571029" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38923" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571030" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38924" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571031" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38925" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571032" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38926" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571033" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38927" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571034" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38928" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657135" comment="clamav-0.103.4-0.20.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657136" comment="clamav-openssl1-0.103.4-0.20.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38929" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664013" comment="clamav-0.103.5-0.20.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664014" comment="clamav-openssl1-0.103.5-0.20.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38930" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="927949" ref_url="https://bugzilla.suse.com/927949" source="BUGZILLA"/>
		<reference ref_id="928749" ref_url="https://bugzilla.suse.com/928749" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1865" ref_url="https://www.suse.com/security/cve/CVE-2015-1865/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
This update for coreutils fixes the following issues:

Security issues fixed:

- CVE-2015-1865: Fixed an arbitrary file deletion (bsc#927949).
- CVE-2015-4041, CVE-2015-4042: Fixed a buffer overflow related to case conversion (bsc#928749).
- CVE-2017-2616: Fixed su PAM local SIGKILL denial of service (bsc#1023041).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-27"/>
	<updated date="2019-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927949">SUSE bug 927949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1865/">CVE-2015-1865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571035" comment="coreutils-6.12-32.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571036" comment="coreutils-lang-6.12-32.41.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38931" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155199" ref_url="https://bugzilla.suse.com/1155199" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2019-14866: Fixed an improper validation of the values written 
  in the header of a TAR file through the to_oct() function which could 
  have led to unexpected TAR generation (bsc#1155199).	  
- CVE-2016-2037: Fixed an out-of-bounds write in the way cpio parses 
  certain cpio files (bsc#963448).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571037" comment="cpio-2.9-75.81.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571038" comment="cpio-lang-2.9-75.81.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38932" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630756" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630757" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38933" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631548" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631549" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38934" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571039" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571040" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38935" version="1" class="patch">
	<metadata>
		<title>Security update for cron (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046229" ref_url="https://bugzilla.suse.com/1046229" source="BUGZILLA"/>
		<reference ref_id="1128935" ref_url="https://bugzilla.suse.com/1128935" source="BUGZILLA"/>
		<reference ref_id="1128937" ref_url="https://bugzilla.suse.com/1128937" source="BUGZILLA"/>
		<reference ref_id="932499" ref_url="https://bugzilla.suse.com/932499" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
This update for cron fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9704: Fixed an insufficient check in the return value of calloc which
  could allow a local user to create Denial of Service by crashing the deamon (bsc#1128937).
- CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to
  exhaust the memory resulting in Denial of Service (bsc#1128935).

Other issues addressed: 

- Fixed an issue with SElinux where cron jobs were bocked when [permisive mode is selected (bsc#1046229).
- Removed a duplicate sprintf and made some monepage changes (bsc#932499). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1046229">SUSE bug 1046229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932499">SUSE bug 932499</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571041" comment="cron-4.1-194.211.213.3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38936" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="899486" ref_url="https://bugzilla.suse.com/899486" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
This update for ctags fixes the following issues:

- CVE-2014-7204: Fixes a potential denial of service caused by an endless loop in javascript parser (bsc#899486).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571042" comment="ctags-2013.10.2-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38937" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="601830" ref_url="https://bugzilla.suse.com/601830" source="BUGZILLA"/>
		<reference ref_id="680210" ref_url="https://bugzilla.suse.com/680210" source="BUGZILLA"/>
		<reference ref_id="680212" ref_url="https://bugzilla.suse.com/680212" source="BUGZILLA"/>
		<reference ref_id="700987" ref_url="https://bugzilla.suse.com/700987" source="BUGZILLA"/>
		<reference ref_id="711490" ref_url="https://bugzilla.suse.com/711490" source="BUGZILLA"/>
		<reference ref_id="715643" ref_url="https://bugzilla.suse.com/715643" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-2431" ref_url="https://www.suse.com/security/cve/CVE-2010-2431/" source="CVE"/>
		<reference ref_id="CVE-2010-2432" ref_url="https://www.suse.com/security/cve/CVE-2010-2432/" source="CVE"/>
		<reference ref_id="CVE-2011-2896" ref_url="https://www.suse.com/security/cve/CVE-2011-2896/" source="CVE"/>
		<reference ref_id="CVE-2011-3170" ref_url="https://www.suse.com/security/cve/CVE-2011-3170/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 601830: CSRF via admin web interface (CVE-2010-0540)
    * 680210: users in group 'lp' can overwrite arbitrary files
      (CVE-2010-2431)
    * 680212: denial of service via cupsDoAuthentication (CVE-2010-2432)
    * 711490: heap overflow in gif decoder (CVE-2011-2896)
    * 715643: heap overflow in gif decoder (CVE-2011-3170)

Security Issue references:

    * CVE-2011-2896
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896&gt;
    * CVE-2010-2432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2432&gt;
    * CVE-2010-2431
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431&gt;
    * CVE-2011-3170
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170&gt;
    * CVE-2010-0540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-21"/>
	<updated date="2011-09-21"/>
	<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2431/">CVE-2010-2431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2432/">CVE-2010-2432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2896/">CVE-2011-2896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3170/">CVE-2011-3170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571043" comment="cups-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571044" comment="cups-client-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571045" comment="cups-libs-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571046" comment="cups-libs-32bit-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571047" comment="cups-libs-x86-1.3.9-8.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571043" comment="cups-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571044" comment="cups-client-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571045" comment="cups-libs-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571046" comment="cups-libs-32bit-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571047" comment="cups-libs-x86-1.3.9-8.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571043" comment="cups-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571044" comment="cups-client-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571045" comment="cups-libs-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571046" comment="cups-libs-32bit-1.3.9-8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571047" comment="cups-libs-x86-1.3.9-8.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38938" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571048" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571049" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571050" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571051" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38939" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571052" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571053" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571054" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571055" comment="cups-libs-32bit-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38940" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571056" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571057" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571058" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571059" comment="cups-libs-32bit-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38941" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571060" comment="cups-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571061" comment="cups-client-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571062" comment="cups-libs-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571063" comment="cups-libs-32bit-1.3.9-8.46.56.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38942" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571064" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571065" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571066" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571067" comment="cups-libs-32bit-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38943" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-26"/>
	<updated date="2016-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571068" comment="curl-7.19.7-1.20.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571069" comment="libcurl4-7.19.7-1.20.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571070" comment="libcurl4-32bit-7.19.7-1.20.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38944" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571071" comment="curl-7.19.7-1.20.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571072" comment="libcurl4-7.19.7-1.20.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571073" comment="libcurl4-32bit-7.19.7-1.20.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38945" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571074" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571075" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571076" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571077" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571078" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571079" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38946" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571080" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571081" comment="curl-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571082" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571083" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571084" comment="libcurl4-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571085" comment="libcurl4-openssl1-32bit-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38947" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571086" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571087" comment="curl-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571088" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571089" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571090" comment="libcurl4-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571091" comment="libcurl4-openssl1-32bit-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38948" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571092" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571093" comment="curl-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571094" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571095" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571096" comment="libcurl4-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571097" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38949" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571098" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571099" comment="curl-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571100" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571101" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571102" comment="libcurl4-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571103" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38950" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571104" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571105" comment="curl-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571106" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571107" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571108" comment="libcurl4-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571109" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38951" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571110" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571111" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571112" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571113" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571114" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571115" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38952" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571116" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571117" comment="curl-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571118" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571119" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571120" comment="libcurl4-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571121" comment="libcurl4-openssl1-32bit-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38953" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571122" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571123" comment="curl-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571124" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571125" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571126" comment="libcurl4-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571127" comment="libcurl4-openssl1-32bit-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38954" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571128" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571129" comment="curl-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571130" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571131" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571132" comment="libcurl4-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571133" comment="libcurl4-openssl1-32bit-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38955" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571134" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571135" comment="curl-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571136" comment="libcurl4-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571137" comment="libcurl4-32bit-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571138" comment="libcurl4-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571139" comment="libcurl4-openssl1-32bit-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38956" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571140" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571141" comment="curl-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571142" comment="libcurl4-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571143" comment="libcurl4-32bit-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571144" comment="libcurl4-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571145" comment="libcurl4-openssl1-32bit-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38957" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571146" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571147" comment="curl-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571148" comment="libcurl4-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571149" comment="libcurl4-32bit-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571150" comment="libcurl4-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571151" comment="libcurl4-openssl1-32bit-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38958" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571152" comment="curl-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571153" comment="curl-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571154" comment="libcurl4-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571155" comment="libcurl4-32bit-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571156" comment="libcurl4-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571157" comment="libcurl4-openssl1-32bit-7.37.0-70.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38959" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571158" comment="curl-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571159" comment="curl-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571160" comment="libcurl4-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571161" comment="libcurl4-32bit-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571162" comment="libcurl4-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571163" comment="libcurl4-openssl1-32bit-7.37.0-70.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38960" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571164" comment="curl-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571165" comment="curl-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571166" comment="libcurl4-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571167" comment="libcurl4-32bit-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571168" comment="libcurl4-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571169" comment="libcurl4-openssl1-32bit-7.37.0-70.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38961" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571170" comment="curl-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571171" comment="curl-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571172" comment="libcurl4-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571173" comment="libcurl4-32bit-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571174" comment="libcurl4-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571175" comment="libcurl4-openssl1-32bit-7.37.0-70.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38962" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571176" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571177" comment="curl-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571178" comment="libcurl4-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571179" comment="libcurl4-32bit-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571180" comment="libcurl4-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571181" comment="libcurl4-openssl1-32bit-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38963" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626169" comment="curl-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626170" comment="curl-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626171" comment="libcurl4-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626172" comment="libcurl4-32bit-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626173" comment="libcurl4-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626174" comment="libcurl4-openssl1-32bit-7.37.0-70.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38964" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633950" comment="curl-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633951" comment="curl-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633952" comment="libcurl4-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633953" comment="libcurl4-32bit-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633954" comment="libcurl4-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633955" comment="libcurl4-openssl1-32bit-7.37.0-70.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38965" version="1" class="patch">
	<metadata>
		<title>Security update for CVS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="744059" ref_url="https://bugzilla.suse.com/744059" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>

A heap-based buffer overflow flaw was found in the way CVS read proxy 
connection HTTP responses. An attacker could exploit this to cause the 
application to crash or, potentially, execute arbitrary code in the context 
of the user running the application (CVE-2012-0804).

Security Issue reference:

    * CVE-2012-0804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-22"/>
	<updated date="2012-02-22"/>
	<bugzilla href="https://bugzilla.suse.com/744059">SUSE bug 744059</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571182" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571183" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571182" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571183" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38966" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571184" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571185" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38967" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="718428" ref_url="https://bugzilla.suse.com/718428" source="BUGZILLA"/>
		<reference ref_id="719998" ref_url="https://bugzilla.suse.com/719998" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3372" ref_url="https://www.suse.com/security/cve/CVE-2011-3372/" source="CVE"/>
		<reference ref_id="CVE-2011-3481" ref_url="https://www.suse.com/security/cve/CVE-2011-3481/" source="CVE"/>
		<description>

An authentication bypass (CVE-2011-3372) and a DoS vulnerability 
(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.

Security Issue references:

    * CVE-2011-3372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372&gt;
    * CVE-2011-3481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3481&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-05"/>
	<updated date="2011-10-05"/>
	<bugzilla href="https://bugzilla.suse.com/718428">SUSE bug 718428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719998">SUSE bug 719998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3372/">CVE-2011-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3481/">CVE-2011-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571186" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571187" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571188" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571186" comment="cyrus-imapd-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571187" comment="perl-Cyrus-IMAP-2.3.11-60.65.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571188" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38968" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571189" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571190" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571191" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38969" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1058021" ref_url="https://bugzilla.suse.com/1058021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14230" ref_url="https://www.suse.com/security/cve/CVE-2017-14230/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

Security issue fixed:

- CVE-2017-14230: Fixed a off-by-one error in prefix calculation for the LIST command that could cause use of uninitialized memory (bsc#1058021).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1058021">SUSE bug 1058021</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14230/">CVE-2017-14230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571192" comment="cyrus-imapd-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571193" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571194" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38970" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189313" ref_url="https://bugzilla.suse.com/1189313" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33582" ref_url="https://www.suse.com/security/cve/CVE-2021-33582/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

- CVE-2021-33582: Fixed possible hash denial of service (bsc#1189313).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189313">SUSE bug 1189313</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33582/">CVE-2021-33582</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632634" comment="cyrus-imapd-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632635" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632636" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38971" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571195" comment="cyrus-sasl-openssl1-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571196" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571197" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571198" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571199" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571200" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571201" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571202" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571203" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571204" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571205" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571206" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571207" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38972" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-18"/>
	<updated date="2020-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571208" comment="cyrus-sasl-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571209" comment="cyrus-sasl-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571210" comment="cyrus-sasl-crammd5-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571211" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571212" comment="cyrus-sasl-digestmd5-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571213" comment="cyrus-sasl-gssapi-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571214" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571215" comment="cyrus-sasl-otp-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571216" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571217" comment="cyrus-sasl-plain-2.1.22-182.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571218" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38973" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669459" comment="cyrus-sasl-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669460" comment="cyrus-sasl-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669461" comment="cyrus-sasl-crammd5-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669462" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669463" comment="cyrus-sasl-digestmd5-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669464" comment="cyrus-sasl-gssapi-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669465" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669466" comment="cyrus-sasl-otp-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669467" comment="cyrus-sasl-otp-32bit-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669468" comment="cyrus-sasl-plain-2.1.22-182.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669469" comment="cyrus-sasl-plain-32bit-2.1.22-182.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38974" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669470" comment="cyrus-sasl-openssl1-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669471" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669472" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669473" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669474" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669475" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669476" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669477" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669478" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669479" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669480" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669481" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669482" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38975" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571219" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571220" comment="dbus-1-32bit-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571221" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38976" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="762108" ref_url="https://bugzilla.suse.com/762108" source="BUGZILLA"/>
		<reference ref_id="772924" ref_url="https://bugzilla.suse.com/772924" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<description>

This update of dhcp fixes two security vulnerabilities:

    * Malformed client identifiers could cause a Denial of Service
      (excessive CPU consumption), effectively causing further client
      requests to not be processed anymore. (CVE-2012-3571
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571&gt; )
    * Two unspecified memory leaks. (CVE-2012-3954
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954&gt; )

Additionally, the following issues were fixed:

    * The init script of dhcp-server was fixed to check syntax and fail on
      force-reload and restart to avoid stopping of running daemon followed
      by start failure
    * Added libgcc_s.so to chroot, so the server can report an assert/crash
      line.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-13"/>
	<updated date="2012-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/762108">SUSE bug 762108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571222" comment="dhcp-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571223" comment="dhcp-client-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571224" comment="dhcp-relay-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571225" comment="dhcp-server-3.1.3.ESV-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571222" comment="dhcp-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571223" comment="dhcp-client-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571224" comment="dhcp-relay-3.1.3.ESV-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571225" comment="dhcp-server-3.1.3.ESV-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38977" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-26"/>
	<updated date="2016-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571226" comment="dhcp-3.1.3.ESV-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571227" comment="dhcp-client-3.1.3.ESV-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571228" comment="dhcp-relay-3.1.3.ESV-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571229" comment="dhcp-server-3.1.3.ESV-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38978" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-10"/>
	<updated date="2017-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571230" comment="dhcp-3.1.3.ESV-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571231" comment="dhcp-client-3.1.3.ESV-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571232" comment="dhcp-relay-3.1.3.ESV-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571233" comment="dhcp-server-3.1.3.ESV-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38979" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2017-3144: Plugs a socket descriptor leak in OMAPI (bsc#1076119)
- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571234" comment="dhcp-3.1.3.ESV-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571235" comment="dhcp-client-3.1.3.ESV-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571236" comment="dhcp-relay-3.1.3.ESV-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571237" comment="dhcp-server-3.1.3.ESV-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38980" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="758227" ref_url="https://bugzilla.suse.com/758227" source="BUGZILLA"/>
		<reference ref_id="760334" ref_url="https://bugzilla.suse.com/760334" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2152" ref_url="https://www.suse.com/security/cve/CVE-2012-2152/" source="CVE"/>
		<description>

A stack overflow in dhcpcd was fixed which could be used by network local 
attackers to crash the dhcpcd and so causing loss of DHCP functionality. 
(CVE-2012-2152)

Security Issue references:

    * CVE-2012-2152
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2152&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-18"/>
	<updated date="2012-05-18"/>
	<bugzilla href="https://bugzilla.suse.com/758227">SUSE bug 758227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760334">SUSE bug 760334</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2152/">CVE-2012-2152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571238" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571238" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571238" comment="dhcpcd-3.2.3-44.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38981" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571239" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38982" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpv6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="675052" ref_url="https://bugzilla.suse.com/675052" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<description>

A rogue DHCP server could instruct clients to use a host name that contains 
shell meta characters. Since many scripts in the system do not expect 
unusal characters in the system's host name the DHCP client needs to 
sanitize the host name offered by the server (CVE-2011-0997).

Security Issue reference:

    * CVE-2011-0997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-02"/>
	<updated date="2011-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571240" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571240" comment="dhcpv6-1.0.22-3.21.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38983" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1146569" ref_url="https://bugzilla.suse.com/1146569" source="BUGZILLA"/>
		<reference ref_id="1146571" ref_url="https://bugzilla.suse.com/1146571" source="BUGZILLA"/>
		<reference ref_id="1146572" ref_url="https://bugzilla.suse.com/1146572" source="BUGZILLA"/>
		<reference ref_id="1146702" ref_url="https://bugzilla.suse.com/1146702" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571241" comment="libdjvulibre21-3.5.21-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38984" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156188" ref_url="https://bugzilla.suse.com/1156188" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:
- CVE-2019-18804: Fixed a null pointer dereference (bsc#1156188).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571242" comment="libdjvulibre21-3.5.21-3.6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38985" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571243" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38986" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571244" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38987" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624088" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38988" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627836" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38989" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="928867" ref_url="https://bugzilla.suse.com/928867" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>

The DNS server dnsmasq was updated to fix one security issue:

    * CVE-2015-3294: A remote unauthenticated attacker could have caused a
      denial of service (DoS) or read memory from the heap, potentially
      disclosing information such as performed DNS queries or encryption
      keys. (bsc#928867)

Security Issues:

    * CVE-2015-3294
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-01"/>
	<updated date="2015-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571245" comment="dnsmasq-2.45-12.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38990" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2017-14491: DNS - 2 byte heap based overflow. [bsc#1060354]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571246" comment="dnsmasq-2.45-12.27.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38991" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="708243" ref_url="https://bugzilla.suse.com/708243" source="BUGZILLA"/>
		<reference ref_id="769256" ref_url="https://bugzilla.suse.com/769256" source="BUGZILLA"/>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, the following bugs were fixed:

    * badblocks was enhanced to work with very large partitions.
      (bsc#932539)
    * e2fsck was fixed to mark sparse journals as invalid. (bnc#769256)
    * dumpe2fs usage on mounted filesystems was clarified. (bnc#708243)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-29"/>
	<updated date="2015-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/708243">SUSE bug 708243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769256">SUSE bug 769256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571247" comment="e2fsprogs-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571248" comment="libblkid1-2.16-6.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571249" comment="libcom_err2-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571250" comment="libcom_err2-32bit-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571251" comment="libext2fs2-1.41.9-2.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571252" comment="libuuid1-2.16-6.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571253" comment="libuuid1-32bit-2.16-6.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571254" comment="uuid-runtime-2.16-6.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38992" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1160571" ref_url="https://bugzilla.suse.com/1160571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-05"/>
	<updated date="2020-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571255" comment="e2fsprogs-1.41.9-2.6.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571256" comment="libcom_err2-1.41.9-2.6.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571257" comment="libcom_err2-32bit-1.41.9-2.6.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571258" comment="libext2fs2-1.41.9-2.6.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38993" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="735342" ref_url="https://bugzilla.suse.com/735342" source="BUGZILLA"/>
		<reference ref_id="745372" ref_url="https://bugzilla.suse.com/745372" source="BUGZILLA"/>
		<reference ref_id="745581" ref_url="https://bugzilla.suse.com/745581" source="BUGZILLA"/>
		<reference ref_id="745584" ref_url="https://bugzilla.suse.com/745584" source="BUGZILLA"/>
		<reference ref_id="745825" ref_url="https://bugzilla.suse.com/745825" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3145" ref_url="https://www.suse.com/security/cve/CVE-2011-3145/" source="CVE"/>
		<description>

ecryptfs-utils was updated to fix a security issue and some bugs.

Security issue fixed: mount.ecryptfs_private did not set correct group 
ownerships when it modifies mtab (CVE-2011-3145).

Also some bugs that made this set of tools non-working were fixed.

You need to manually hand setuid root permissions to 
/sbin/mount.ecryptfs_private if you want to use it as a non-root user.

Security Issues:

    * CVE-2011-3145
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3145&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-20"/>
	<updated date="2012-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/735342">SUSE bug 735342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745372">SUSE bug 745372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745581">SUSE bug 745581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745584">SUSE bug 745584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745825">SUSE bug 745825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3145/">CVE-2011-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571259" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571260" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571261" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571259" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571260" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571261" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571259" comment="ecryptfs-utils-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571260" comment="ecryptfs-utils-32bit-61-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571261" comment="ecryptfs-utils-x86-61-1.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38994" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571262" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38995" version="1" class="patch">
	<metadata>
		<title>Security update for ed</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="474587" ref_url="https://bugzilla.suse.com/474587" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3916" ref_url="https://www.suse.com/security/cve/CVE-2008-3916/" source="CVE"/>
		<description>

This update fixes a heap-based buffer overflow in ed which can be exploited 
remotely only with user-assistance. CVE-2008-3916: CVSS v2 Base Score: 9.3 
(HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C): Buffer Errors (CWE-119)

Security Issue reference:

    * CVE-2008-3916
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-01-11"/>
	<updated date="2011-01-11"/>
	<bugzilla href="https://bugzilla.suse.com/474587">SUSE bug 474587</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3916/">CVE-2008-3916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571263" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571263" comment="ed-0.2-1001.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38996" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<description>

This update for ed fixes the following security issues:

- CVE-2017-5357: An invalid free in the regular expression handling
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571264" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38997" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009430164" comment="elfutils-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430165" comment="libasm1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430166" comment="libasm1-32bit-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430167" comment="libdw1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430168" comment="libdw1-32bit-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430169" comment="libebl1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430170" comment="libebl1-32bit-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430171" comment="libelf1-0.137-8.24.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009430172" comment="libelf1-32bit-0.137-8.24.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38998" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed:

- CVE-2018-16403:Fixed a heap-based buffer over-read in in libdw/dwarf_getabbrev.c 
  and libwd/dwarf_hasattr.c which could have lead to denial of service (bsc#1107067).
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472). 
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571265" comment="elfutils-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571266" comment="libasm1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571267" comment="libasm1-32bit-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571268" comment="libdw1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571269" comment="libdw1-32bit-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571270" comment="libebl1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571271" comment="libebl1-32bit-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571272" comment="libelf1-0.137-8.24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571273" comment="libelf1-32bit-0.137-8.24.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38999" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571274" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571275" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571276" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571277" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571278" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39000" version="1" class="patch">
	<metadata>
		<title>Security update for evince</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="671064" ref_url="https://bugzilla.suse.com/671064" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<description>

This update of evince fixes a buffer overflow in linetoken(). 
(CVE-2011-0433)

Security Issue reference:

    * CVE-2011-0433
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-17"/>
	<updated date="2011-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/671064">SUSE bug 671064</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571279" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571280" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571281" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571279" comment="evince-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571280" comment="evince-doc-2.28.2-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571281" comment="evince-lang-2.28.2-0.7.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39001" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571282" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571283" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571284" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39002" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571285" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571286" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571287" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39003" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571288" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39004" version="1" class="patch">
	<metadata>
		<title>Security update for expat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="750914" ref_url="https://bugzilla.suse.com/750914" source="BUGZILLA"/>
		<reference ref_id="751464" ref_url="https://bugzilla.suse.com/751464" source="BUGZILLA"/>
		<reference ref_id="751465" ref_url="https://bugzilla.suse.com/751465" source="BUGZILLA"/>
		<reference ref_id="755377" ref_url="https://bugzilla.suse.com/755377" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<description>

This update of expat fixes the following bugs:

    * hash collision attack that could lead to exessive CPU usage
      (CVE-2012-0876)
    * expat didn't close file descriptors in some cases (CVE-2012-1147)
    * specially crafted xml files could lead to a memory leak
      (CVE-2012-1148)

Security Issue references:

    * CVE-2012-0876
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876&gt;
    * CVE-2012-1147
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147&gt;
    * CVE-2012-1148
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755377">SUSE bug 755377</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571289" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571290" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571291" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571292" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571289" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571290" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571291" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571292" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571289" comment="expat-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571290" comment="libexpat1-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571291" comment="libexpat1-32bit-2.0.1-88.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571292" comment="libexpat1-x86-2.0.1-88.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39005" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571293" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571294" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571295" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39006" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571296" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571297" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571298" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39007" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571299" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571300" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571301" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39008" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1139937" ref_url="https://bugzilla.suse.com/1139937" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2018-20843: Fixed a denial of service triggered by high resource consumption 
  in the XML parser when XML names contain a large amount of colons (bsc#1139937).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571302" comment="expat-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571303" comment="libexpat1-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571304" comment="libexpat1-32bit-2.0.1-88.42.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39009" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571305" comment="expat-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571306" comment="libexpat1-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571307" comment="libexpat1-32bit-2.0.1-88.42.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39010" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664120" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664121" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664122" comment="libexpat1-32bit-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39011" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666458" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666459" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666460" comment="libexpat1-32bit-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39012" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669483" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669484" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669485" comment="libexpat1-32bit-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39013" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671290" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671291" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671292" comment="libexpat1-32bit-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39014" version="1" class="patch">
	<metadata>
		<title>Security update for facter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="917383" ref_url="https://bugzilla.suse.com/917383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1426" ref_url="https://www.suse.com/security/cve/CVE-2015-1426/" source="CVE"/>
		<description>
This update for facter fixes the following issues:

- CVE-2015-1426: Prevent the EC2 metadata fact from collecting security credentials (bsc#917383).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917383">SUSE bug 917383</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1426/">CVE-2015-1426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571308" comment="facter-1.6.18-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39015" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571309" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39016" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571310" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571311" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39017" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627042" comment="fetchmail-6.3.8.90-13.20.22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627043" comment="fetchmailconf-6.3.8.90-13.20.22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39018" version="1" class="patch">
	<metadata>
		<title>Security update for file-roller (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="937635" ref_url="https://bugzilla.suse.com/937635" source="BUGZILLA"/>
		<description>
This update for file-roller fixes the following issues:

- Fixed a potential denial of service when extracting a zip files (bsc#937635).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937635">SUSE bug 937635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571312" comment="file-roller-2.28.2-0.3.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571313" comment="file-roller-lang-2.28.2-0.3.3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39019" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="742826" ref_url="https://bugzilla.suse.com/742826" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0450" ref_url="https://www.suse.com/security/cve/CVE-2012-0450/" source="CVE"/>
		<description>

This update provides Mozilla Firefox 10, which provides many fixes, 
security and feature enhancements.

For a detailed list, please have a look at

http://www.mozilla.org/en-US/firefox/10.0/releasenotes/
&lt;http://www.mozilla.org/en-US/firefox/10.0/releasenotes/&gt;

and

http://www.mozilla.org/de/firefox/features/
&lt;http://www.mozilla.org/de/firefox/features/&gt;

The following security issues have been fixed in this update:

    * 

      Mozilla developers identified and fixed several memory safety bugs in
      the browser engine used in Firefox and other Mozilla-based products.
      Some of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code. (MFSA 2012-01
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-01.html&gt; , 
      CVE-2012-0442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442&gt; , 
      CVE-2012-0443
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443&gt; )

    * 

      Alex Dvorov reported that an attacker could replace a sub-frame in
      another domain's document by using the name attribute of the
      sub-frame as a form submission target. This can potentially allow for
      phishing attacks against users and violates the HTML5 frame
      navigation policy. (MFSA 2012-03
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-03.html&gt; , 
      CVE-2012-0445
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0445&gt; )

    * 

      Security researcher regenrecht reported via TippingPoint's Zero Day
      Initiative that removed child nodes of nsDOMAttribute can be accessed
      under certain circumstances because of a premature notification of
      AttributeChildRemoved. This use-after-free of the child nodes could
      possibly allow for for remote code execution. (MFSA 2012-04
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-04.html&gt; , 
      CVE-2011-3659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659&gt; )

    * 

      Mozilla security researcher moz_bug_r_a4 reported that frame scripts
      bypass XPConnect security checks when calling untrusted objects. This
      allows for cross-site scripting (XSS) attacks through web pages and
      Firefox extensions. The fix enables the Script Security Manager (SSM)
      to force security checks on all frame scripts. (MFSA 2012-05
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-05.html&gt; , 
      CVE-2012-0446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0446&gt; )

    * 

      Mozilla developer Tim Abraldes reported that when encoding images as
      image/vnd.microsoft.icon the resulting data was always a fixed size,
      with uninitialized memory appended as padding beyond the size of the
      actual image. This is the result of mImageBufferSize in the encoder
      being initialized with a value different than the size of the source
      image. There is the possibility of sensitive data from uninitialized
      memory being appended to a PNG image when converted fron an ICO
      format image. This sensitive data may then be disclosed in the
      resulting image. ((MFSA 2012-06)
      http://www.mozilla.org/security/announce/2012/mfsa2012-06.html],
      [CVE-2012-0447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0447&gt; )

    * 

      Security researcher regenrecht reported via TippingPoint's Zero Day
      Initiative the possibility of memory corruption during the decoding
      of Ogg Vorbis files. This can cause a crash during decoding and has
      the potential for remote code execution. (MFSA 2012-07
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-07.html&gt; , 
      CVE-2012-0444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444&gt; )

    * 

      Security researchers Nicolas Gregoire and Aki Helin independently
      reported that when processing a malformed embedded XSLT stylesheet,
      Firefox can crash due to a memory corruption. While there is no
      evidence that this is directly exploitable, there is a possibility of
      remote code execution. (MFSA 2012-08
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-08.html&gt; , 
      CVE-2012-0449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449&gt; )

    * 

      magicant starmen reported that if a user chooses to export their
      Firefox Sync key the 'Firefox Recovery Key.html' file is saved with
      incorrect permissions, making the file contents potentially readable
      by other users on Linux and OS X systems. (MFSA 2012-09
      &lt;http://www.mozilla.org/security/announce/2012/mfsa2012-09.html&gt; , 
      CVE-2012-0450
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0450&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-03"/>
	<updated date="2012-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/742826">SUSE bug 742826</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0450/">CVE-2012-0450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571314" comment="MozillaFirefox-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571315" comment="MozillaFirefox-branding-SLED-7-0.6.7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571316" comment="MozillaFirefox-translations-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571317" comment="mozilla-kde4-integration-0.6.3-5.6.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571314" comment="MozillaFirefox-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571315" comment="MozillaFirefox-branding-SLED-7-0.6.7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571316" comment="MozillaFirefox-translations-10.0-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571317" comment="mozilla-kde4-integration-0.6.3-5.6.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39020" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="758408" ref_url="https://bugzilla.suse.com/758408" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.4 ESR release to fix various bugs 
and security issues.

    * 

      MFSA 2012-20: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

      Christian Holler a reported memory safety and security problem
      affecting Firefox 11. (CVE-2012-0468)

      Bob Clary, Christian Holler, Brian Hackett, Bobby Holley, Gary Kwong,
      Hilary Hall, Honza Bambas, Jesse Ruderman, Julian Seward, and Olli
      Pettay reported memory safety problems and crashes that affect
      Firefox ESR and Firefox 11. (CVE-2012-0467)

    * 

      MFSA 2012-22 / CVE-2012-0469: Using the Address Sanitizer tool,
      security researcher Aki Helin from OUSPG found that IDBKeyRange of
      indexedDB remains in the XPConnect hashtable instead of being
      unlinked before being destroyed. When it is destroyed, this causes a
      use-after-free, which is potentially exploitable.

    * 

      MFSA 2012-23 / CVE-2012-0470: Using the Address Sanitizer tool,
      security researcher Atte Kettunen from OUSPG found a heap corruption
      in gfxImageSurface which allows for invalid frees and possible remote
      code execution. This happens due to float error, resulting from
      graphics values being passed through different number systems.

    * 

      MFSA 2012-24 / CVE-2012-0471: Anne van Kesteren of Opera Software
      found a multi-octet encoding issue where certain octets will destroy
      the following octets in the processing of some multibyte character
      sets. This can leave users vulnerable to cross-site scripting (XSS)
      attacks on maliciously crafted web pages.

    * 

      MFSA 2012-25 / CVE-2012-0472: Security research firm iDefense
      reported that researcher wushi of team509 discovered a memory
      corruption on Windows Vista and Windows 7 systems with hardware
      acceleration disabled or using incompatible video drivers. This is
      created by using cairo-dwrite to attempt to render fonts on an
      unsupported code path. This corruption causes a potentially
      exploitable crash on affected systems.

    * 

      MFSA 2012-26 / CVE-2012-0473: Mozilla community member Matias
      Juntunen discovered an error in WebGLBuffer where
      FindMaxElementInSubArray receives wrong template arguments from
      FindMaxUshortElement. This bug causes maximum index to be computed
      incorrectly within WebGL.drawElements, allowing the reading of
      illegal video memory.

    * 

      MFSA 2012-27 / CVE-2012-0474: Security researchers Jordi Chancel and
      Eddy Bordi reported that they could short-circuit page loads to show
      the address of a different site than what is loaded in the window in
      the addressbar. Security researcher Chris McGowen independently
      reported the same flaw, and further demonstrated that this could lead
      to loading scripts from the attacker's site, leaving users vulnerable
      to cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-28 / CVE-2012-0475: Security researcher Simone Fabiano
      reported that if a cross-site XHR or WebSocket is opened on a web
      server on a non-standard port for web traffic while using an IPv6
      address, the browser will send an ambiguous origin headers if the
      IPv6 address contains at least 2 consecutive 16-bit fields of zeroes.
      If there is an origin access control list that uses IPv6 literals,
      this issue could be used to bypass these access controls on the
      server.

    * 

      MFSA 2012-29 / CVE-2012-0477: Security researcher Masato Kinugawa
      found that during the decoding of ISO-2022-KR and ISO-2022-CN
      character sets, characters near 1024 bytes are treated incorrectly,
      either doubling or deleting bytes. On certain pages it might be
      possible for an attacker to pad the output of the page such that
      these errors fall in the right place to affect the structure of the
      page, allowing for cross-site script (XSS) injection.

    * 

      MFSA 2012-30 / CVE-2012-0478: Mozilla community member Ms2ger found
      an image rendering issue with WebGL when texImage2D uses use
      JSVAL_TO_OBJECT on arbitrary objects. This can lead to a crash on a
      maliciously crafted web page. While there is no evidence that this is
      directly exploitable, there is a possibility of remote code
      execution.

    * 

      MFSA 2012-31 / CVE-2011-3062: Mateusz Jurczyk of the Google Security
      Team discovered an off-by-one error in the OpenType Sanitizer using
      the Address Sanitizer tool. This can lead to an out-of-bounds read
      and execution of an uninitialized function pointer during parsing and
      possible remote code execution.

    * 

      MFSA 2012-32 / CVE-2011-1187: Security researcher Daniel Divricean
      reported that a defect in the error handling of javascript errors can
      leak the file names and location of javascript files on a server,
      leading to inadvertent information disclosure and a vector for
      further attacks.

    * 

      MFSA 2012-33 / CVE-2012-0479: Security researcher Jeroen van der Gun
      reported that if RSS or Atom XML invalid content is loaded over
      HTTPS, the addressbar updates to display the new location of the
      loaded resource, including SSL indicators, while the main window
      still displays the previously loaded content. This allows for
      phishing attacks where a malicious page can spoof the identify of
      another seemingly secure site.

Security Issue references:

    * CVE-2012-0468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468&gt;
    * CVE-2012-0469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469&gt;
    * CVE-2012-0470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470&gt;
    * CVE-2012-0471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471&gt;
    * CVE-2012-0472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472&gt;
    * CVE-2012-0473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473&gt;
    * CVE-2012-0474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474&gt;
    * CVE-2012-0477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477&gt;
    * CVE-2012-0478
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478&gt;
    * CVE-2011-3062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062&gt;
    * CVE-2012-0479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-26"/>
	<updated date="2012-04-26"/>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571318" comment="MozillaFirefox-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571319" comment="MozillaFirefox-translations-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571320" comment="libfreebl3-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571321" comment="libfreebl3-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571322" comment="libfreebl3-x86-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571323" comment="mozilla-nss-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571324" comment="mozilla-nss-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571325" comment="mozilla-nss-tools-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571326" comment="mozilla-nss-x86-3.13.4-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571318" comment="MozillaFirefox-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571319" comment="MozillaFirefox-translations-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571320" comment="libfreebl3-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571321" comment="libfreebl3-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571322" comment="libfreebl3-x86-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571323" comment="mozilla-nss-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571324" comment="mozilla-nss-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571325" comment="mozilla-nss-tools-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571326" comment="mozilla-nss-x86-3.13.4-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571318" comment="MozillaFirefox-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571319" comment="MozillaFirefox-translations-10.0.4-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571320" comment="libfreebl3-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571321" comment="libfreebl3-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571322" comment="libfreebl3-x86-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571323" comment="mozilla-nss-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571324" comment="mozilla-nss-32bit-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571325" comment="mozilla-nss-tools-3.13.4-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571326" comment="mozilla-nss-x86-3.13.4-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39021" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="771583" ref_url="https://bugzilla.suse.com/771583" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1964" ref_url="https://www.suse.com/security/cve/CVE-2012-1964/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 10.0.6ESR security release fixing 
various bugs and several security issues, some critical.

The following security issues have been fixed:

    * 

      MFSA 2012-42: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

    * 

      CVE-2012-1948: Benoit Jacob, Jesse Ruderman, Christian Holler, and
      Bill McCloskey reported memory safety problems and crashes that
      affect Firefox ESR 10 and Firefox 13.

    * 

      MFSA 2012-43 / CVE-2012-1950: Security researcher Mario Gomes
      andresearch firm Code Audit Labs reported a mechanism to
      short-circuit page loads through drag and drop to the addressbar by
      canceling the page load. This causes the address of the previously
      site entered to be displayed in the addressbar instead of the
      currently loaded page. This could lead to potential phishing attacks
      on users.

    * 

      MFSA 2012-44 Google security researcher Abhishek Arya used the
      Address Sanitizer tool to uncover four issues: two use-after-free
      problems, one out of bounds read bug, and a bad cast. The first
      use-afte.r-free problem is caused when an array of
      nsSMILTimeValueSpec objects is destroyed but attempts are made to
      call into objects in this array later. The second use-after-free
      problem is in nsDocument::AdoptNode when it adopts into an empty
      document and then adopts into another document, emptying the first
      one. The heap buffer overflow is in ElementAnimations when data is
      read off of end of an array and then pointers are dereferenced. The
      bad cast happens when nsTableFrame::InsertFrames is called with
      frames in aFrameList that are a mix of row group frames and column
      group frames. AppendFrames is not able to handle this mix.

      All four of these issues are potentially exploitable.

          o CVE-2012-1951: Heap-use-after-free in
            nsSMILTimeValueSpec::IsEventBased
          o CVE-2012-1954: Heap-use-after-free in nsDocument::AdoptNode
          o CVE-2012-1953: Out of bounds read in
            ElementAnimations::EnsureStyleRuleFor
          o CVE-2012-1952: Bad cast in nsTableFrame::InsertFrames
    * 

      MFSA 2012-45 / CVE-2012-1955: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, calls to history.forward and history.back are used to navigate
      to a site while displaying the previous site in the addressbar but
      changing the baseURI to the newer site. This can be used for phishing
      by allowing the user input form or other data on the newer,
      attacking, site while appearing to be on the older, displayed site.

    * 

      MFSA 2012-46 / CVE-2012-1966: Mozilla security researcher
      moz_bug_r_a4 reported a cross-site scripting (XSS) attack through the
      context menu using a data: URL. In this issue, context menu
      functionality ('View Image', 'Show only this frame', and 'View
      background image') are disallowed in a javascript: URL but allowed in
      a data: URL, allowing for XSS. This can lead to arbitrary code
      execution.

    * 

      MFSA 2012-47 / CVE-2012-1957: Security researcher Mario Heiderich
      reported that javascript could be executed in the HTML feed-view
      using tag within the RSS . This problem is due to tags not being
      filtered out during parsing and can lead to a potential cross-site
      scripting (XSS) attack. The flaw existed in a parser utility class
      and could affect other parts of the browser or add-ons which rely on
      that class to sanitize untrusted input.

    * 

      MFSA 2012-48 / CVE-2012-1958: Security researcher Arthur Gerkis used
      the Address Sanitizer tool to find a use-after-free in
      nsGlobalWindow::PageHidden when mFocusedContent is released and
      oldFocusedContent is used afterwards. This use-after-free could
      possibly allow for remote code execution.

    * 

      MFSA 2012-49 / CVE-2012-1959: Mozilla developer Bobby Holley found
      that same-compartment security wrappers (SCSW) can be bypassed by
      passing them to another compartment. Cross-compartment wrappers often
      do not go through SCSW, but have a filtering policy built into them.
      When an object is wrapped cross-compartment, the SCSW is stripped off
      and, when the object is read read back, it is not known that SCSW was
      previously present, resulting in a bypassing of SCSW. This could
      result in untrusted content having access to the XBL that implements
      browser functionality.

    * 

      MFSA 2012-50 / CVE-2012-1960: Google developer Tony Payne reported an
      out of bounds (OOB) read in QCMS, Mozilla's color management library.
      With a carefully crafted color profile portions of a user's memory
      could be incorporated into a transformed image and possibly
      deciphered.

    * 

      MFSA 2012-51 / CVE-2012-1961: Bugzilla developer Frederic Buclin
      reported that the 'X-Frame-Options header is ignored when the value
      is duplicated, for example X-Frame-Options: SAMEORIGIN, SAMEORIGIN.
      This duplication occurs for unknown reasons on some websites and when
      it occurs results in Mozilla browsers not being protected against
      possible clickjacking attacks on those pages.

    * 

      MFSA 2012-52 / CVE-2012-1962: Security researcher Bill Keese reported
      a memory corruption. This is caused by JSDependentString::undepend
      changing a dependent string into a fixed string when there are
      additional dependent strings relying on the same base. When the
      undepend occurs during conversion, the base data is freed, leaving
      other dependent strings with dangling pointers. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-53 / CVE-2012-1963: Security researcher Karthikeyan
      Bhargavan of Prosecco at INRIA reported Content Security Policy (CSP)
      1.0 implementation errors. CSP violation reports generated by Firefox
      and sent to the 'report-uri' location include sensitive data within
      the 'blocked-uri' parameter. These include fragment components and
      query strings even if the 'blocked-uri' parameter has a different
      origin than the protected resource. This can be used to retrieve a
      user's OAuth 2.0 access tokens and OpenID credentials by malicious
      sites.

    * 

      MFSA 2012-54 / CVE-2012-1964: Security Researcher Matt McCutchen
      reported that a clickjacking attack using the certificate warning
      page. A man-in-the-middle (MITM) attacker can use an iframe to
      display its own certificate error warning page (about:certerror) with
      the 'Add Exception' button of a real warning page from a malicious
      site. This can mislead users to adding a certificate exception for a
      different site than the perceived one. This can lead to compromised
      communications with the user perceived site through the MITM attack
      once the certificate exception has been added.

    * 

      MFSA 2012-55 / CVE-2012-1965: Security researchers Mario Gomes and
      Soroush Dalili reported that since Mozilla allows the pseudo-protocol
      feed: to prefix any valid URL, it is possible to construct
      feed:javascript: URLs that will execute scripts in some contexts. On
      some sites it may be possible to use this to evade output filtering
      that would otherwise strip javascript: URLs and thus contribute to
      cross-site scripting (XSS) problems on these sites.

    * 

      MFSA 2012-56 / CVE-2012-1967: Mozilla security researcher
      moz_bug_r_a4 reported a arbitrary code execution attack using a
      javascript: URL. The Gecko engine features a JavaScript sandbox
      utility that allows the browser or add-ons to safely execute script
      in the context of a web page. In certain cases, javascript: URLs are
      executed in such a sandbox with insufficient context that can allow
      those scripts to escape from the sandbox and run with elevated
      privilege. This can lead to arbitrary code execution.

Security Issue references:

    * CVE-2012-1967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967&gt;
    * CVE-2012-1948
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948&gt;
    * CVE-2012-1949
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949&gt;
    * CVE-2012-1951
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951&gt;
    * CVE-2012-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952&gt;
    * CVE-2012-1953
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953&gt;
    * CVE-2012-1954
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954&gt;
    * CVE-2012-1966
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966&gt;
    * CVE-2012-1958
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958&gt;
    * CVE-2012-1959
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959&gt;
    * CVE-2012-1962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962&gt;
    * CVE-2012-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950&gt;
    * CVE-2012-1955
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955&gt;
    * CVE-2012-1957
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957&gt;
    * CVE-2012-1961
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961&gt;
    * CVE-2012-1963
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963&gt;
    * CVE-2012-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964&gt;
    * CVE-2012-1965
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-19"/>
	<updated date="2012-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1964/">CVE-2012-1964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571327" comment="MozillaFirefox-10.0.6-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571328" comment="MozillaFirefox-branding-SLED-7-0.6.7.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571329" comment="MozillaFirefox-translations-10.0.6-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571327" comment="MozillaFirefox-10.0.6-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571328" comment="MozillaFirefox-branding-SLED-7-0.6.7.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571329" comment="MozillaFirefox-translations-10.0.6-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571327" comment="MozillaFirefox-10.0.6-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571328" comment="MozillaFirefox-branding-SLED-7-0.6.7.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571329" comment="MozillaFirefox-translations-10.0.6-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39022" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571330" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571331" comment="MozillaFirefox-branding-SLED-7-0.6.7.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571332" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571333" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571334" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571335" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571336" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39023" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="783533" ref_url="https://bugzilla.suse.com/783533" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.9ESR security release which fixes 
bugs and security issues:

    * 

      MFSA 2012-73 / CVE-2012-3977: Security researchers Thai Duong and
      Juliano Rizzo reported that SPDY's request header compression leads
      to information leakage, which can allow the extraction of private
      data such as session cookies, even over an encrypted SSL connection.
      (This does not affect Firefox 10 as it does not feature the SPDY
      extension. It was silently fixed for Firefox 15.)

    * 

      MFSA 2012-74: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-3983: Henrik Skupin, Jesse Ruderman and moz_bug_r_a4
      reported memory safety problems and crashes that affect Firefox 15.

    * 

      CVE-2012-3982: Christian Holler and Jesse Ruderman reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      15.

    * 

      MFSA 2012-75 / CVE-2012-3984: Security researcher David Bloom of Cue
      discovered that 'select' elements are always-on-top chromeless
      windows and that navigation away from a page with an active 'select'
      menu does not remove this window.When another menu is opened
      programmatically on a new page, the original 'select' menu can be
      retained and arbitrary HTML content within it rendered, allowing an
      attacker to cover arbitrary portions of the new page through absolute
      positioning/scrolling, leading to spoofing attacks. Security
      researcher Jordi Chancel found a variation that would allow for
      click-jacking attacks was well.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Navigation away from a page with an active 'select' dropdown menu can
      be used for URL spoofing, other evil

      Firefox 10.0.1 : Navigation away from a page with multiple active
      'select' dropdown menu can be used for Spoofing And ClickJacking with
      XPI using window.open and geolocalisation

    * 

      MFSA 2012-76 / CVE-2012-3985: Security researcher Collin Jackson
      reported a violation of the HTML5 specifications for document.domain
      behavior. Specified behavior requires pages to only have access to
      windows in a new document.domain but the observed violation allowed
      pages to retain access to windows from the page's initial origin in
      addition to the new document.domain. This could potentially lead to
      cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-77 / CVE-2012-3986: Mozilla developer Johnny Stenback
      discovered that several methods of a feature used for testing
      (DOMWindowUtils) are not protected by existing security checks,
      allowing these methods to be called through script by web pages. This
      was addressed by adding the existing security checks to these
      methods.

    * 

      MFSA 2012-78 / CVE-2012-3987: Security researcher Warren He reported
      that when a page is transitioned into Reader Mode in Firefox for
      Android, the resulting page has chrome privileges and its content is
      not thoroughly sanitized. A successful attack requires user enabling
      of reader mode for a malicious page, which could then perform an
      attack similar to cross-site scripting (XSS) to gain the privileges
      allowed to Firefox on an Android device. This has been fixed by
      changing the Reader Mode page into an unprivileged page.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-79 / CVE-2012-3988: Security researcher Soroush Dalili
      reported that a combination of invoking full screen mode and
      navigating backwards in history could, in some circumstances, cause a
      hang or crash due to a timing dependent use-after-free pointer
      reference. This crash may be potentially exploitable.

    * 

      MFSA 2012-80 / CVE-2012-3989: Mozilla community member Ms2ger
      reported a crash due to an invalid cast when using the instanceof
      operator on certain types of JavaScript objects. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-81 / CVE-2012-3991: Mozilla community member Alice White
      reported that when the GetProperty function is invoked through JSAPI,
      security checking can be bypassed when getting cross-origin
      properties. This potentially allowed for arbitrary code execution.

    * 

      MFSA 2012-82 / CVE-2012-3994: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location and top can be shadowed by Object.defineProperty
      as well. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

    * 

      MFSA 2012-83: Security researcher Mariusz Mlynski reported that when
      InstallTrigger fails, it throws an error wrapped in a Chrome Object
      Wrapper (COW) that fails to specify exposed properties. These can
      then be added to the resulting object by an attacker, allowing access
      to chrome privileged functions through script.

      While investigating this issue, Mozilla security researcher
      moz_bug_r_a4 found that COW did not disallow accessing of properties
      from a standard prototype in some situations, even when the original
      issue had been fixed.

      These issues could allow for a cross-site scripting (XSS) attack or
      arbitrary code execution.

    * 

      CVE-2012-3993: XrayWrapper pollution via unsafe COW

    * 

      CVE-2012-4184: ChromeObjectWrapper is not implemented as intended

    * 

      MFSA 2012-84 / CVE-2012-3992: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, writes to location.hash can be used in concert with scripted
      history navigation to cause a specific website to be loaded into the
      history object. The baseURI can then be changed to this stored site,
      allowing an attacker to inject a script or intercept posted data
      posted to a location specified with a relative path.

    * 

      MFSA 2012-85: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series of use-after-free,
      buffer overflow, and out of bounds read issues using the Address
      Sanitizer tool in shipped software. These issues are potentially
      exploitable, allowing for remote code execution. We would also like
      to thank Abhishek for reporting two additional use-after-free flaws
      introduced during Firefox 16 development and fixed before general
      release.

    * 

      CVE-2012-3995: Out of bounds read in IsCSSWordSpacingSpace

    * 

      CVE-2012-4179: Heap-use-after-free in
      nsHTMLCSSUtils::CreateCSSPropertyTxn

    * 

      CVE-2012-4180: Heap-buffer-overflow in
      nsHTMLEditor::IsPrevCharInNodeWhitespace

    * 

      CVE-2012-4181: Heap-use-after-free in
      nsSMILAnimationController::DoSample

    * 

      CVE-2012-4182: Heap-use-after-free in nsTextEditRules::WillInsert

    * 

      CVE-2012-4183: Heap-use-after-free in
      DOMSVGTests::GetRequiredFeatures

    * 

      MFSA 2012-86: Security researcher Atte Kettunen from OUSPG reported
      several heap memory corruption issues found using the Address
      Sanitizer tool. These issues are potentially exploitable, allowing
      for remote code execution.

    * 

      CVE-2012-4185: Global-buffer-overflow in nsCharTraits::length

    * 

      CVE-2012-4186: Heap-buffer-overflow in nsWaveReader::DecodeAudioData

    * 

      CVE-2012-4187: Crash with ASSERTION: insPos too small

    * 

      CVE-2012-4188: Heap-buffer-overflow in Convolve3x3

    * 

      MFSA 2012-87 / CVE-2012-3990: Security researcher miaubiz used the
      Address Sanitizer tool to discover a use-after-free in the IME State
      Manager code. This could lead to a potentially exploitable crash.

    * 

      MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla security
      researcher moz_bug_r_a4 reported a regression where security wrappers
      are unwrapped without doing a security check in defaultValue(). This
      can allow for improper access access to the Location object. In
      versions 15 and earlier of affected products, there was also the
      potential for arbitrary code execution.

Security Issue reference:

    * CVE-2012-3977
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977&gt;
    * CVE-2012-3982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982&gt;
    * CVE-2012-3983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983&gt;
    * CVE-2012-3984
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984&gt;
    * CVE-2012-3985
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985&gt;
    * CVE-2012-3986
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986&gt;
    * CVE-2012-3987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987&gt;
    * CVE-2012-3988
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988&gt;
    * CVE-2012-3989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989&gt;
    * CVE-2012-3990
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990&gt;
    * CVE-2012-3991
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991&gt;
    * CVE-2012-3992
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992&gt;
    * CVE-2012-3993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993&gt;
    * CVE-2012-3994
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994&gt;
    * CVE-2012-3995
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995&gt;
    * CVE-2012-4179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179&gt;
    * CVE-2012-4180
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180&gt;
    * CVE-2012-4181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181&gt;
    * CVE-2012-4182
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182&gt;
    * CVE-2012-4183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183&gt;
    * CVE-2012-4184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184&gt;
    * CVE-2012-4185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185&gt;
    * CVE-2012-4186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186&gt;
    * CVE-2012-4187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187&gt;
    * CVE-2012-4188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188&gt;
    * CVE-2012-4192
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192&gt;
    * CVE-2012-4193
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571337" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571338" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39024" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issues have been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571339" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571340" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571341" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39025" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571342" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571343" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571344" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571345" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571346" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39026" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571347" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571348" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571349" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571350" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571351" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571352" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39027" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="803326" ref_url="https://bugzilla.suse.com/803326" source="BUGZILLA"/>
		<reference ref_id="804248" ref_url="https://bugzilla.suse.com/804248" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.3ESR release.

Besides the major version update from the 10ESR stable release line to the 
17ESR stable release line, this update brings critical security and 
bugfixes:

    * 

      MFSA 2013-28: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and buffer
      overflow problems rated as low to critical security issues in shipped
      software. Some of these issues are potentially exploitable, allowing
      for remote code execution. We would also like to thank Abhishek for
      reporting four additional use-after-free and out of bounds write
      flaws introduced during Firefox development that were fixed before
      general release.

    * 

      The following issues have been fixed in Firefox 19 and ESR 17.0.3:

          o Heap-use-after-free in nsOverflowContinuationTracker::Finish,
            with -moz-columns (CVE-2013-0780)
          o Heap-buffer-overflow WRITE in
            nsSaveAsCharset::DoCharsetConversion (CVE-2013-0782)
    * 

      MFSA 2013-27 / CVE-2013-0776: Google security researcher Michal
      Zalewski reported an issue where the browser displayed the content of
      a proxy's 407 response if a user canceled the proxy's authentication
      prompt. In this circumstance, the addressbar will continue to show
      the requested site's address, including HTTPS addresses that appear
      to be secure. This spoofing of addresses can be used for phishing
      attacks by fooling users into entering credentials, for example.

    * 

      MFSA 2013-26 / CVE-2013-0775: Security researcher Nils reported a
      use-after-free in nsImageLoadingContent when content script is
      executed. This could allow for arbitrary code execution.

    * 

      MFSA 2013-25 / CVE-2013-0774: Mozilla security researcher Frederik
      Braun discovered that since Firefox 15 the file system location of
      the active browser profile was available to JavaScript workers. While
      not dangerous by itself, this could potentially be combined with
      other vulnerabilities to target the profile in an attack.

    * 

      MFSA 2013-24 / CVE-2013-0773: Mozilla developer Bobby Holley
      discovered that it was possible to bypass some protections in Chrome
      Object Wrappers (COW) and System Only Wrappers (SOW), making their
      prototypes mutable by web content. This could be used leak
      information from chrome objects and possibly allow for arbitrary code
      execution.

    * 

      MFSA 2013-23 / CVE-2013-0765: Mozilla developer Boris Zbarsky
      reported that in some circumstances a wrapped WebIDL object can be
      wrapped multiple times, overwriting the existing wrapped state. This
      could lead to an exploitable condition in rare cases.

    * 

      MFSA 2013-22 / CVE-2013-0772: Using the Address Sanitizer tool,
      security researcher Atte Kettunen from OUSPG found an out-of-bounds
      read while rendering GIF format images. This could cause a
      non-exploitable crash and could also attempt to render normally
      inaccesible data as part of the image.

    * 

      MFSA 2013-21: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew
      McCreight, Joe Drew, and Wayne Mery reported memory safety problems
      and crashes that affect Firefox ESR 17, and Firefox 18.

    * 

      Memory safety bugs fixed in Firefox ESR 17.0.3, and Firefox 19
      (CVE-2013-0783)

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-25"/>
	<updated date="2013-02-25"/>
	<bugzilla href="https://bugzilla.suse.com/803326">SUSE bug 803326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590759" comment="MozillaFirefox-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590760" comment="MozillaFirefox-branding-SLED-7-0.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590761" comment="MozillaFirefox-translations-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571356" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571357" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590762" comment="mozilla-nspr-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590325" comment="mozilla-nspr-32bit-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590763" comment="mozilla-nss-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590326" comment="mozilla-nss-32bit-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590764" comment="mozilla-nss-tools-3.14.2-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590759" comment="MozillaFirefox-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590760" comment="MozillaFirefox-branding-SLED-7-0.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590761" comment="MozillaFirefox-translations-17.0.3esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571356" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571357" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590762" comment="mozilla-nspr-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590325" comment="mozilla-nspr-32bit-4.9.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590763" comment="mozilla-nss-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590326" comment="mozilla-nss-32bit-3.14.2-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590764" comment="mozilla-nss-tools-3.14.2-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39028" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="808243" ref_url="https://bugzilla.suse.com/808243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.4ESR release which fixes one 
important security issue:

    * MFSA 2013-29 / CVE-2013-0787: VUPEN Security, via TippingPoint's Zero
      Day Initiative, reported a use-after-free within the HTML editor when
      content script is run by the document.execCommand() function while
      internal editor operations are occurring. This could allow for
      arbitrary code execution.

Security Issue reference:

    * CVE-2013-0787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-11"/>
	<updated date="2013-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571363" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571364" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39029" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android 19. (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571365" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571366" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571367" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571368" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571369" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571370" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571371" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39030" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.6ESR security release.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-17"/>
	<updated date="2013-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571372" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571373" comment="MozillaFirefox-branding-SLED-7-0.6.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571374" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571375" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571376" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571377" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571378" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571379" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571380" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571381" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571372" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571373" comment="MozillaFirefox-branding-SLED-7-0.6.9.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571374" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571375" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571376" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571377" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571378" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571379" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571380" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571381" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39031" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security issues:

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

Security Issue references:

    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-28"/>
	<updated date="2013-06-28"/>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571382" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571383" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571384" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571382" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571383" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571384" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39032" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-02"/>
	<updated date="2013-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571385" comment="MozillaFirefox-17.0.10esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571386" comment="MozillaFirefox-branding-SLED-7-0.6.9.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571387" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571385" comment="MozillaFirefox-17.0.10esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571386" comment="MozillaFirefox-branding-SLED-7-0.6.9.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571387" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39033" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.3.0ESR security release.

The Following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Also Mozilla NSS was updated to the 3.15.4 release.

    * required for Firefox 27
    * regular CA root store update (1.96)
    * some OSCP improvments
    * other bugfixes

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-13"/>
	<updated date="2014-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592823" comment="MozillaFirefox-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592824" comment="MozillaFirefox-branding-SLED-24-0.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592825" comment="MozillaFirefox-translations-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571391" comment="firefox-libgcc_s1-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571392" comment="firefox-libstdc++6-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571393" comment="libfreebl3-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571394" comment="libfreebl3-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571395" comment="mozilla-nspr-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571396" comment="mozilla-nspr-32bit-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571397" comment="mozilla-nss-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571398" comment="mozilla-nss-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571399" comment="mozilla-nss-tools-3.15.4-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592823" comment="MozillaFirefox-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592824" comment="MozillaFirefox-branding-SLED-24-0.4.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592825" comment="MozillaFirefox-translations-24.3.0esr-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571391" comment="firefox-libgcc_s1-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571392" comment="firefox-libstdc++6-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571393" comment="libfreebl3-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571394" comment="libfreebl3-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571395" comment="mozilla-nspr-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571396" comment="mozilla-nspr-32bit-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571397" comment="mozilla-nss-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571398" comment="mozilla-nss-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571399" comment="mozilla-nss-tools-3.15.4-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39034" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571400" comment="MozillaFirefox-24.4.0esr-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571401" comment="MozillaFirefox-branding-SLED-24-0.4.10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571402" comment="MozillaFirefox-translations-24.4.0esr-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571403" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39035" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558, CVE-2014-1559, CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571404" comment="MozillaFirefox-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571405" comment="MozillaFirefox-translations-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571406" comment="libfreebl3-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571407" comment="libfreebl3-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571408" comment="mozilla-nss-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571409" comment="mozilla-nss-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571410" comment="mozilla-nss-tools-3.16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571404" comment="MozillaFirefox-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571405" comment="MozillaFirefox-translations-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571406" comment="libfreebl3-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571407" comment="libfreebl3-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571408" comment="mozilla-nss-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571409" comment="mozilla-nss-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571410" comment="mozilla-nss-tools-3.16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39036" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571411" comment="MozillaFirefox-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571412" comment="MozillaFirefox-translations-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571413" comment="libfreebl3-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571414" comment="libfreebl3-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571415" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571416" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571417" comment="mozilla-nss-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571418" comment="mozilla-nss-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571419" comment="mozilla-nss-tools-3.16.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571411" comment="MozillaFirefox-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571412" comment="MozillaFirefox-translations-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571413" comment="libfreebl3-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571414" comment="libfreebl3-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571415" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571416" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571417" comment="mozilla-nss-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571418" comment="mozilla-nss-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571419" comment="mozilla-nss-tools-3.16.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39037" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571420" comment="MozillaFirefox-31.3.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571421" comment="MozillaFirefox-translations-31.3.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571420" comment="MozillaFirefox-31.3.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571421" comment="MozillaFirefox-translations-31.3.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39038" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificates list.

For more information, please refer to 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt; .

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-15"/>
	<updated date="2015-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571422" comment="MozillaFirefox-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571423" comment="MozillaFirefox-translations-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571424" comment="libfreebl3-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571425" comment="libfreebl3-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571426" comment="mozilla-nss-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571427" comment="mozilla-nss-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571428" comment="mozilla-nss-tools-3.17.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571422" comment="MozillaFirefox-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571423" comment="MozillaFirefox-translations-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571424" comment="libfreebl3-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571425" comment="libfreebl3-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571426" comment="mozilla-nss-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571427" comment="mozilla-nss-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571428" comment="mozilla-nss-tools-3.17.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39039" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported, through 
HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's 
implementation of typed array bounds checking in JavaScript just-in-time 
compilation (JIT) and its management of bounds checking for heap access. 
This flaw can be leveraged into the reading and writing of memory allowing 
for arbitrary code execution on the local system.

    * MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571429" comment="MozillaFirefox-31.5.3esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571430" comment="MozillaFirefox-translations-31.5.3esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571429" comment="MozillaFirefox-31.5.3esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571430" comment="MozillaFirefox-translations-31.5.3esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39040" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571431" comment="MozillaFirefox-31.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571432" comment="MozillaFirefox-translations-31.7.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39041" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="943557" ref_url="https://bugzilla.suse.com/943557" source="BUGZILLA"/>
		<reference ref_id="943558" ref_url="https://bugzilla.suse.com/943558" source="BUGZILLA"/>
		<reference ref_id="943608" ref_url="https://bugzilla.suse.com/943608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 38.2.1 ESR, fixing two severe security bugs. (bsc#943608)

* MFSA 2015-94/CVE-2015-4497 (bsc#943557): Use-after-free when resizing canvas element during restyling
* MFSA 2015-95/CVE-2015-4498 (bsc#943558): Add-on notification bypass through data URLs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-04"/>
	<updated date="2015-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571433" comment="MozillaFirefox-38.2.1esr-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571434" comment="MozillaFirefox-translations-38.2.1esr-17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571433" comment="MozillaFirefox-38.2.1esr-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571434" comment="MozillaFirefox-translations-38.2.1esr-17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39042" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571435" comment="MozillaFirefox-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571436" comment="MozillaFirefox-translations-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571437" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39043" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571438" comment="MozillaFirefox-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571439" comment="MozillaFirefox-branding-SLED-38-12.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571440" comment="MozillaFirefox-translations-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571441" comment="libfreebl3-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571442" comment="libfreebl3-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571443" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571444" comment="mozilla-nss-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571445" comment="mozilla-nss-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571446" comment="mozilla-nss-tools-3.19.2.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39044" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing
following security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  Memory leak in libstagefright when deleting an array during
  MP4 processing
* MFSA 2016-21/CVE-2016-1958
  Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961
  Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962
  Use-after-free when using multiple WebRTC data channels
* MFSA 2016-27/CVE-2016-1964
  Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974
  Out-of-bounds read in HTML parser following a failed
  allocation
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Font vulnerabilities in the Graphite 2 library

Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following bugs:
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes

Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571447" comment="MozillaFirefox-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571448" comment="MozillaFirefox-translations-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571449" comment="libfreebl3-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571450" comment="libfreebl3-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571451" comment="mozilla-nspr-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571452" comment="mozilla-nspr-32bit-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571453" comment="mozilla-nss-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571454" comment="mozilla-nss-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571455" comment="mozilla-nss-tools-3.20.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39045" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571456" comment="MozillaFirefox-52.4.0esr-78.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571457" comment="MozillaFirefox-translations-52.4.0esr-78.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571458" comment="libfreebl3-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571459" comment="libfreebl3-32bit-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571460" comment="mozilla-nss-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571461" comment="mozilla-nss-32bit-3.29.5-38.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571462" comment="mozilla-nss-tools-3.29.5-38.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39046" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-glib2, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145550" ref_url="https://bugzilla.suse.com/1145550" source="BUGZILLA"/>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox, firefox-glib2, firefox-gtk3 fixes the following issues:

Mozilla Firefox was updated to the 60.9.0esr release:

Security Advisory MFSA 2019-27:

* Use-after-free while manipulating video
  CVE-2019-11746 (bmo#1564449, bsc#1149297)
* XSS by breaking out of title and textarea elements using innerHTML
  CVE-2019-11744 (bmo#1562033, bsc#1149297)
* Same-origin policy violation with SVG filters and canvas to steal
  cross-origin images
  CVE-2019-11742 (bmo#1559715, bsc#1149303)
* Privilege escalation with Mozilla Maintenance Service in custom
  Firefox installation location
  CVE-2019-11753 (bmo#1574980, bsc#1149295)
* Use-after-free while extracting a key value in IndexedDB
  CVE-2019-11752 (bmo#1501152, bsc#1149296)
* Sandbox escape through Firefox Sync
  CVE-2019-9812 (bmo#1538008, bmo#1538015, bsc#1149294)
* Cross-origin access to unload event attributes
  CVE-2019-11743 (bmo#1560495, bsc#1149298)
  Navigation-Timing Level 2 specification
* Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
  CVE-2019-11740 (bmo#1563133, bmo#1573160, bsc#1149299)

- Rebuild glib2 schemas on SLE-11 (bsc#1145550)

Changes in firefox-glib2:

- Fix the rpm macros %glib2_gsettings_schema_* which were replaced with
  %nil in Factory because they're no longer needed, but we still need
  them in SLE11 (bsc#1145550)

Changes in firefox-gtk3:

- Rebuild so %glib2_gsettings_schema_post gets called with fixed 
  rpm macros %glib2_gsettings_schema_* in firefox-glib2 package
  which were replaced with %nil in Factory because they're no 
  longer needed, but we still need them in SLE11 (bsc#1145550)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145550">SUSE bug 1145550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571463" comment="MozillaFirefox-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571464" comment="MozillaFirefox-translations-common-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571465" comment="MozillaFirefox-translations-other-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571466" comment="firefox-gio-branding-upstream-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571467" comment="firefox-glib2-lang-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571468" comment="firefox-glib2-tools-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571469" comment="firefox-gtk3-branding-upstream-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571470" comment="firefox-gtk3-data-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571471" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571472" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571473" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571474" comment="firefox-gtk3-immodule-thai-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571475" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571476" comment="firefox-gtk3-immodule-xim-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571477" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571478" comment="firefox-gtk3-lang-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571479" comment="firefox-gtk3-tools-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571480" comment="firefox-libgtk-3-0-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571481" comment="libfirefox-gio-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571482" comment="libfirefox-glib-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571483" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571484" comment="libfirefox-gobject-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571485" comment="libfirefox-gthread-2_0-0-2.54.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39047" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000036" ref_url="https://bugzilla.suse.com/1000036" source="BUGZILLA"/>
		<reference ref_id="1001652" ref_url="https://bugzilla.suse.com/1001652" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="104105" ref_url="https://bugzilla.suse.com/104105" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1047925" ref_url="https://bugzilla.suse.com/1047925" source="BUGZILLA"/>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1058013" ref_url="https://bugzilla.suse.com/1058013" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1066953" ref_url="https://bugzilla.suse.com/1066953" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1072320" ref_url="https://bugzilla.suse.com/1072320" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="1073796" ref_url="https://bugzilla.suse.com/1073796" source="BUGZILLA"/>
		<reference ref_id="1073798" ref_url="https://bugzilla.suse.com/1073798" source="BUGZILLA"/>
		<reference ref_id="1073799" ref_url="https://bugzilla.suse.com/1073799" source="BUGZILLA"/>
		<reference ref_id="1073803" ref_url="https://bugzilla.suse.com/1073803" source="BUGZILLA"/>
		<reference ref_id="1073808" ref_url="https://bugzilla.suse.com/1073808" source="BUGZILLA"/>
		<reference ref_id="1073818" ref_url="https://bugzilla.suse.com/1073818" source="BUGZILLA"/>
		<reference ref_id="1073823" ref_url="https://bugzilla.suse.com/1073823" source="BUGZILLA"/>
		<reference ref_id="1073829" ref_url="https://bugzilla.suse.com/1073829" source="BUGZILLA"/>
		<reference ref_id="1073830" ref_url="https://bugzilla.suse.com/1073830" source="BUGZILLA"/>
		<reference ref_id="1073832" ref_url="https://bugzilla.suse.com/1073832" source="BUGZILLA"/>
		<reference ref_id="1073846" ref_url="https://bugzilla.suse.com/1073846" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="1097401" ref_url="https://bugzilla.suse.com/1097401" source="BUGZILLA"/>
		<reference ref_id="1097404" ref_url="https://bugzilla.suse.com/1097404" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1104841" ref_url="https://bugzilla.suse.com/1104841" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130694" ref_url="https://bugzilla.suse.com/1130694" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1134209" ref_url="https://bugzilla.suse.com/1134209" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1144919" ref_url="https://bugzilla.suse.com/1144919" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1146090" ref_url="https://bugzilla.suse.com/1146090" source="BUGZILLA"/>
		<reference ref_id="1146091" ref_url="https://bugzilla.suse.com/1146091" source="BUGZILLA"/>
		<reference ref_id="1146093" ref_url="https://bugzilla.suse.com/1146093" source="BUGZILLA"/>
		<reference ref_id="1146094" ref_url="https://bugzilla.suse.com/1146094" source="BUGZILLA"/>
		<reference ref_id="1146095" ref_url="https://bugzilla.suse.com/1146095" source="BUGZILLA"/>
		<reference ref_id="1146097" ref_url="https://bugzilla.suse.com/1146097" source="BUGZILLA"/>
		<reference ref_id="1146099" ref_url="https://bugzilla.suse.com/1146099" source="BUGZILLA"/>
		<reference ref_id="1146100" ref_url="https://bugzilla.suse.com/1146100" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="1153423" ref_url="https://bugzilla.suse.com/1153423" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="1447070" ref_url="https://bugzilla.suse.com/1447070" source="BUGZILLA"/>
		<reference ref_id="1447409" ref_url="https://bugzilla.suse.com/1447409" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="845955" ref_url="https://bugzilla.suse.com/845955" source="BUGZILLA"/>
		<reference ref_id="865853" ref_url="https://bugzilla.suse.com/865853" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="937414" ref_url="https://bugzilla.suse.com/937414" source="BUGZILLA"/>
		<reference ref_id="947747" ref_url="https://bugzilla.suse.com/947747" source="BUGZILLA"/>
		<reference ref_id="948045" ref_url="https://bugzilla.suse.com/948045" source="BUGZILLA"/>
		<reference ref_id="948602" ref_url="https://bugzilla.suse.com/948602" source="BUGZILLA"/>
		<reference ref_id="955142" ref_url="https://bugzilla.suse.com/955142" source="BUGZILLA"/>
		<reference ref_id="957814" ref_url="https://bugzilla.suse.com/957814" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="961254" ref_url="https://bugzilla.suse.com/961254" source="BUGZILLA"/>
		<reference ref_id="962297" ref_url="https://bugzilla.suse.com/962297" source="BUGZILLA"/>
		<reference ref_id="966076" ref_url="https://bugzilla.suse.com/966076" source="BUGZILLA"/>
		<reference ref_id="966077" ref_url="https://bugzilla.suse.com/966077" source="BUGZILLA"/>
		<reference ref_id="985201" ref_url="https://bugzilla.suse.com/985201" source="BUGZILLA"/>
		<reference ref_id="986541" ref_url="https://bugzilla.suse.com/986541" source="BUGZILLA"/>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="998743" ref_url="https://bugzilla.suse.com/998743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2882" ref_url="https://www.suse.com/security/cve/CVE-2013-2882/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<description>

This update contains the Mozilla Firefox ESR 68.2 release.

Mozilla Firefox was updated to ESR 68.2 release:

* Enterprise: New administrative policies were added. More
  information and templates are available at the Policy
  Templates page.

* Various security fixes:
  MFSA 2019-33 (bsc#1154738)
  * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
  * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
  * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
  * CVE-2019-11759: Stack buffer overflow in HKDF output
  * CVE-2019-11760: Stack buffer overflow in WebRTC networking
  * CVE-2019-11761: Unintended access to a privileged JSONView object
  * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
  * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
  * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2

Other Issues resolved:

* [bsc#1104841] Newer versions of firefox have a dependency on
                GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
                inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
                scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528]  Firefox malfunctions due to broken omni.ja
                archives

		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-17"/>
	<updated date="2020-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000036">SUSE bug 1000036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104105">SUSE bug 104105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047925">SUSE bug 1047925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058013">SUSE bug 1058013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066953">SUSE bug 1066953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073796">SUSE bug 1073796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073798">SUSE bug 1073798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073799">SUSE bug 1073799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073803">SUSE bug 1073803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073808">SUSE bug 1073808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073818">SUSE bug 1073818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073823">SUSE bug 1073823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073829">SUSE bug 1073829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073830">SUSE bug 1073830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073832">SUSE bug 1073832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073846">SUSE bug 1073846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104841">SUSE bug 1104841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130694">SUSE bug 1130694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134209">SUSE bug 1134209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144919">SUSE bug 1144919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153423">SUSE bug 1153423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447070">SUSE bug 1447070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447409">SUSE bug 1447409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845955">SUSE bug 845955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865853">SUSE bug 865853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947747">SUSE bug 947747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948045">SUSE bug 948045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948602">SUSE bug 948602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955142">SUSE bug 955142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961254">SUSE bug 961254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962297">SUSE bug 962297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966076">SUSE bug 966076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966077">SUSE bug 966077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986541">SUSE bug 986541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998743">SUSE bug 998743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2882/">CVE-2013-2882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571486" comment="MozillaFirefox-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571487" comment="MozillaFirefox-branding-SLED-68-21.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571488" comment="MozillaFirefox-translations-common-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571489" comment="MozillaFirefox-translations-other-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571490" comment="firefox-atk-lang-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571491" comment="firefox-gdk-pixbuf-lang-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571492" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571493" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571494" comment="firefox-gio-branding-upstream-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571495" comment="firefox-glib2-lang-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571496" comment="firefox-glib2-tools-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571497" comment="firefox-gtk3-branding-upstream-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571498" comment="firefox-gtk3-data-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571499" comment="firefox-gtk3-immodule-amharic-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571500" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571501" comment="firefox-gtk3-immodule-multipress-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571502" comment="firefox-gtk3-immodule-thai-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571503" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571504" comment="firefox-gtk3-immodule-xim-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571505" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571506" comment="firefox-gtk3-lang-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571507" comment="firefox-gtk3-tools-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571508" comment="firefox-libatk-1_0-0-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571509" comment="firefox-libcairo-gobject2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571510" comment="firefox-libcairo2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571511" comment="firefox-libffi4-5.3.1+r233831-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571512" comment="firefox-libffi7-3.2.1.git259-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571513" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571514" comment="firefox-libgtk-3-0-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571515" comment="firefox-libharfbuzz0-1.7.5-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571516" comment="firefox-libpango-1_0-0-1.40.14-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571517" comment="libfirefox-gio-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571518" comment="libfirefox-glib-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571519" comment="libfirefox-gmodule-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571520" comment="libfirefox-gobject-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571521" comment="libfirefox-gthread-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571522" comment="libfreebl3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571523" comment="libfreebl3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571524" comment="libsoftokn3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571525" comment="libsoftokn3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571526" comment="mozilla-nspr-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571527" comment="mozilla-nspr-32bit-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571528" comment="mozilla-nss-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571529" comment="mozilla-nss-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571530" comment="mozilla-nss-certs-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571531" comment="mozilla-nss-certs-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571532" comment="mozilla-nss-tools-3.45-38.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39048" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137338" ref_url="https://bugzilla.suse.com/1137338" source="BUGZILLA"/>
		<description>

This update contains Mozilla Firefox 60.7ESR.

It brings lots of security fixes and other improvements.

It also includes new additional helper libraries to allow Firefox to run on SUSE Linux Enterprise 11.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137338">SUSE bug 1137338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571533" comment="MozillaFirefox-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571534" comment="MozillaFirefox-branding-SLED-60-21.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571535" comment="MozillaFirefox-translations-common-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571536" comment="MozillaFirefox-translations-other-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571537" comment="firefox-at-spi2-core-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571538" comment="firefox-at-spi2-core-lang-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571539" comment="firefox-atk-lang-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571540" comment="firefox-dbus-1-glib-0.76-34.2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571541" comment="firefox-gdk-pixbuf-lang-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571542" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571543" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571544" comment="firefox-gio-branding-upstream-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571545" comment="firefox-glib2-lang-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571546" comment="firefox-glib2-tools-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571547" comment="firefox-gtk3-branding-upstream-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571548" comment="firefox-gtk3-data-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571549" comment="firefox-gtk3-immodule-amharic-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571550" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571551" comment="firefox-gtk3-immodule-multipress-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571552" comment="firefox-gtk3-immodule-thai-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571553" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571554" comment="firefox-gtk3-immodule-xim-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571555" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571556" comment="firefox-gtk3-lang-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571557" comment="firefox-gtk3-tools-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571558" comment="firefox-libatk-1_0-0-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571559" comment="firefox-libatk-bridge-2_0-0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571560" comment="firefox-libatspi0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571561" comment="firefox-libcairo-gobject2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571562" comment="firefox-libcairo2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571563" comment="firefox-libfreetype6-2.9-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571564" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571565" comment="firefox-libgtk-3-0-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571566" comment="firefox-libharfbuzz0-1.7.5-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571567" comment="firefox-libpango-1_0-0-1.40.14-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571568" comment="firefox-libpixman-1-0-0.34.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571569" comment="libfirefox-gio-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571570" comment="libfirefox-glib-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571571" comment="libfirefox-gmodule-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571572" comment="libfirefox-gobject-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571573" comment="libfirefox-gthread-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571574" comment="libfreebl3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571575" comment="libfreebl3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571576" comment="libsoftokn3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571577" comment="libsoftokn3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571578" comment="mozilla-nspr-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571579" comment="mozilla-nspr-32bit-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571580" comment="mozilla-nss-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571581" comment="mozilla-nss-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571582" comment="mozilla-nss-certs-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571583" comment="mozilla-nss-certs-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571584" comment="mozilla-nss-tools-3.41.1-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39049" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571585" comment="MozillaFirefox-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571586" comment="MozillaFirefox-branding-SLED-31.0-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571587" comment="MozillaFirefox-translations-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571588" comment="libfreebl3-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571589" comment="libfreebl3-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571590" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571591" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571592" comment="mozilla-nss-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571593" comment="mozilla-nss-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571594" comment="mozilla-nss-tools-3.17.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571585" comment="MozillaFirefox-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571586" comment="MozillaFirefox-branding-SLED-31.0-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571587" comment="MozillaFirefox-translations-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571588" comment="libfreebl3-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571589" comment="libfreebl3-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571590" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571591" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571592" comment="mozilla-nss-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571593" comment="mozilla-nss-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571594" comment="mozilla-nss-tools-3.17.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39050" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571595" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571596" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566534" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39051" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671852" comment="libFLAC++6-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671853" comment="libFLAC8-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671854" comment="libFLAC8-32bit-1.2.1-68.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39052" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="698451" ref_url="https://bugzilla.suse.com/698451" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2964" ref_url="https://www.suse.com/security/cve/CVE-2011-2964/" source="CVE"/>
		<description>

The foomatic print filters of the hplip package contained a remote code 
execution vulnerability. Remote users, if allowed to access a print server 
such as CUPS, could execute arbitrary commands as lp system user.

CVE-2011-2697: CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P): Input 
Validation (CWE-20)

Security Issue references:

    * CVE-2011-2697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697&gt;
    * CVE-2011-2964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2964&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-08"/>
	<updated date="2011-08-08"/>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2964/">CVE-2011-2964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571597" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571597" comment="foomatic-filters-3.0.2-269.35.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39053" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571598" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39054" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571599" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571600" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571601" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571602" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571603" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39055" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571604" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571605" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571606" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571607" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571608" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39056" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180525" ref_url="https://bugzilla.suse.com/1180525" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- Moved logrotate options into specific parts for each config as 'global' options
  will persist past and clobber global options in the main logrotate config (bsc#1180525)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180525">SUSE bug 1180525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571609" comment="freeradius-server-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571610" comment="freeradius-server-dialupadmin-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571611" comment="freeradius-server-doc-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571612" comment="freeradius-server-libs-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571613" comment="freeradius-server-utils-2.1.1-7.25.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39057" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="750937" ref_url="https://bugzilla.suse.com/750937" source="BUGZILLA"/>
		<reference ref_id="750938" ref_url="https://bugzilla.suse.com/750938" source="BUGZILLA"/>
		<reference ref_id="750939" ref_url="https://bugzilla.suse.com/750939" source="BUGZILLA"/>
		<reference ref_id="750940" ref_url="https://bugzilla.suse.com/750940" source="BUGZILLA"/>
		<reference ref_id="750941" ref_url="https://bugzilla.suse.com/750941" source="BUGZILLA"/>
		<reference ref_id="750942" ref_url="https://bugzilla.suse.com/750942" source="BUGZILLA"/>
		<reference ref_id="750943" ref_url="https://bugzilla.suse.com/750943" source="BUGZILLA"/>
		<reference ref_id="750944" ref_url="https://bugzilla.suse.com/750944" source="BUGZILLA"/>
		<reference ref_id="750945" ref_url="https://bugzilla.suse.com/750945" source="BUGZILLA"/>
		<reference ref_id="750946" ref_url="https://bugzilla.suse.com/750946" source="BUGZILLA"/>
		<reference ref_id="750947" ref_url="https://bugzilla.suse.com/750947" source="BUGZILLA"/>
		<reference ref_id="750948" ref_url="https://bugzilla.suse.com/750948" source="BUGZILLA"/>
		<reference ref_id="750949" ref_url="https://bugzilla.suse.com/750949" source="BUGZILLA"/>
		<reference ref_id="750950" ref_url="https://bugzilla.suse.com/750950" source="BUGZILLA"/>
		<reference ref_id="750951" ref_url="https://bugzilla.suse.com/750951" source="BUGZILLA"/>
		<reference ref_id="750952" ref_url="https://bugzilla.suse.com/750952" source="BUGZILLA"/>
		<reference ref_id="750953" ref_url="https://bugzilla.suse.com/750953" source="BUGZILLA"/>
		<reference ref_id="750954" ref_url="https://bugzilla.suse.com/750954" source="BUGZILLA"/>
		<reference ref_id="750955" ref_url="https://bugzilla.suse.com/750955" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<description>

Specially crafted font files could have caused buffer overflows in 
freetype. This has been fixed.

Security Issue references:

    * CVE-2012-1129
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129&gt;
    * CVE-2012-1127
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127&gt;
    * CVE-2012-1140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140&gt;
    * CVE-2012-1138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138&gt;
    * CVE-2012-1131
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131&gt;
    * CVE-2012-1141
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141&gt;
    * CVE-2012-1132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132&gt;
    * CVE-2012-1139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139&gt;
    * CVE-2012-1137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137&gt;
    * CVE-2012-1126
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126&gt;
    * CVE-2012-1142
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142&gt;
    * CVE-2012-1128
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128&gt;
    * CVE-2012-1130
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130&gt;
    * CVE-2012-1136
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136&gt;
    * CVE-2012-1143
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143&gt;
    * CVE-2012-1133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133&gt;
    * CVE-2012-1135
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135&gt;
    * CVE-2012-1144
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144&gt;
    * CVE-2012-1134
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-03-28"/>
	<updated date="2012-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/750937">SUSE bug 750937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750938">SUSE bug 750938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750939">SUSE bug 750939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750940">SUSE bug 750940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750941">SUSE bug 750941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750942">SUSE bug 750942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750943">SUSE bug 750943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750944">SUSE bug 750944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750945">SUSE bug 750945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750946">SUSE bug 750946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750947">SUSE bug 750947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750948">SUSE bug 750948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750949">SUSE bug 750949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750950">SUSE bug 750950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750951">SUSE bug 750951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750952">SUSE bug 750952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750953">SUSE bug 750953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750954">SUSE bug 750954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750955">SUSE bug 750955</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571614" comment="freetype2-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571615" comment="freetype2-32bit-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571616" comment="freetype2-x86-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571617" comment="ft2demos-2.3.7-25.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571614" comment="freetype2-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571615" comment="freetype2-32bit-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571616" comment="freetype2-x86-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571617" comment="ft2demos-2.3.7-25.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571614" comment="freetype2-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571615" comment="freetype2-32bit-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571616" comment="freetype2-x86-2.3.7-25.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571617" comment="ft2demos-2.3.7-25.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39058" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571618" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571619" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571620" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39059" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571621" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571622" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571623" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39060" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571624" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571625" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571626" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39061" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571627" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571628" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39062" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
This update for fuse fixes the following security issue:

- CVE-2018-10906: fusermount was vulnerable to a restriction bypass when
  SELinux is active. This allowed non-root users to mount a FUSE file system with
  the 'allow_other' mount option regardless of whether 'user_allow_other' is set
  in the fuse configuration. An attacker may use this flaw to mount a FUSE file
  system, accessible by other users, and trick them into accessing files on that
  file system, possibly causing Denial of Service or other unspecified effects
  (bsc#1101797).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571629" comment="fuse-2.7.2-61.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571630" comment="libfuse2-2.7.2-61.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39063" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<description>
This update for gcc43 fixes the following issues:

Security issues fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

Support for new security mitigations added:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection.  [bnc#1039513]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571631" comment="cpp43-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571632" comment="gcc43-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571633" comment="gcc43-32bit-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571634" comment="gcc43-c++-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571635" comment="gcc43-fortran-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571636" comment="gcc43-fortran-32bit-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571637" comment="gcc43-info-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571638" comment="gcc43-locale-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571639" comment="libstdc++43-devel-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571640" comment="libstdc++43-devel-32bit-4.3.4_20091019-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571641" comment="libstdc++43-doc-4.3.4_20091019-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39064" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571642" comment="cpp43-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571643" comment="gcc43-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571644" comment="gcc43-32bit-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571645" comment="gcc43-c++-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571646" comment="gcc43-fortran-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571647" comment="gcc43-fortran-32bit-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571648" comment="gcc43-info-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571649" comment="gcc43-locale-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571650" comment="libstdc++43-devel-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571651" comment="libstdc++43-devel-32bit-4.3.4_20091019-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571652" comment="libstdc++43-doc-4.3.4_20091019-7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39065" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="878067" ref_url="https://bugzilla.suse.com/878067" source="BUGZILLA"/>
		<reference ref_id="889990" ref_url="https://bugzilla.suse.com/889990" source="BUGZILLA"/>
		<reference ref_id="899871" ref_url="https://bugzilla.suse.com/899871" source="BUGZILLA"/>
		<reference ref_id="917169" ref_url="https://bugzilla.suse.com/917169" source="BUGZILLA"/>
		<reference ref_id="919274" ref_url="https://bugzilla.suse.com/919274" source="BUGZILLA"/>
		<reference ref_id="922534" ref_url="https://bugzilla.suse.com/922534" source="BUGZILLA"/>
		<reference ref_id="924525" ref_url="https://bugzilla.suse.com/924525" source="BUGZILLA"/>
		<reference ref_id="924687" ref_url="https://bugzilla.suse.com/924687" source="BUGZILLA"/>
		<reference ref_id="927993" ref_url="https://bugzilla.suse.com/927993" source="BUGZILLA"/>
		<reference ref_id="930176" ref_url="https://bugzilla.suse.com/930176" source="BUGZILLA"/>
		<reference ref_id="934689" ref_url="https://bugzilla.suse.com/934689" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="947772" ref_url="https://bugzilla.suse.com/947772" source="BUGZILLA"/>
		<reference ref_id="947791" ref_url="https://bugzilla.suse.com/947791" source="BUGZILLA"/>
		<reference ref_id="948168" ref_url="https://bugzilla.suse.com/948168" source="BUGZILLA"/>
		<reference ref_id="949000" ref_url="https://bugzilla.suse.com/949000" source="BUGZILLA"/>
		<reference ref_id="951644" ref_url="https://bugzilla.suse.com/951644" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="970009" ref_url="https://bugzilla.suse.com/970009" source="BUGZILLA"/>
		<reference ref_id="976627" ref_url="https://bugzilla.suse.com/976627" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="981311" ref_url="https://bugzilla.suse.com/981311" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bsc#1028744]
- Backport patch for PR65612. [bsc#1022062]
- Re-spin to provide missing libasan0-32bit and other multilibs via the updated product description.  [bsc#951644]
- Fixed for DR#1288.  [bsc#1011348]
- Fix libffi issue for armv7l.  [bsc#988274]
- Fixed a kernel miscompile on aarch64.  [bnc #981311]
- Fixed a ppc64le internal compiler error. [bnc #976627]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed samba build on AARCH64.  [bsc#970009]
- Build without GRAPHITE where cloog-isl is not available.
- Fixed HTM builtins on powerpc.  [bsc#955382]
- Fixed build of SLOF.  [bsc#949000]
- Fixed C++11 std::random_device short reads, CVE-2015-5276.  [bsc#945842]
- Fixed libffi issues on aarch64.  [bsc#948168]
- Fixed no_instrument_function attribute handling on PPC64 with -mprofile-kernel.  [bsc#947791]
- Enable 32bit code generation for ppc64le but do not build 32bit
  target libraries.  Fixes ppc64le kernel compile.
- Update to GCC 4.8.5 release. 
  * Fixes bogus integer overflow in constant expression.  [bsc#934689]
  * Fixes ICE with atomics on aarch64.  [bsc#930176]
- Fixed reload issue on S390.
- Add patch to keep functions leaf when they are instrumented for
  profiling on s390[x].  [bsc#899871]
- Avoid accessing invalid memory when passing aggregates by value.  [bsc#922534]
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11
  again.  [bsc#927993]
- Update to gcc-4_8-branch head (r221715).
  * Includes GCC 4.8.4 release.
  * Includes fix for -imacros bug.  [bsc#917169]
  * Includes fix for incorrect -Warray-bounds warnings.  [bsc#919274]
  * Includes updated -mhotpatch for s390x.  [bsc#924525]
  * Includes fix for ppc64le issue with doubleword vector extract.
    [bsc#924687]
- Backport rework of the memory allocator for C++ exceptions used in OOM situations.  [bsc#889990]
- Remove invalid use of glibc internals in TSAN.
- Update to gcc-4_8-branch head (r218481).
  * Includes patches to allow building against ISL 0.14.
- Disable all languages but C, C++, Fortran and Ada.  [fate#316860]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878067">SUSE bug 878067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889990">SUSE bug 889990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899871">SUSE bug 899871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917169">SUSE bug 917169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919274">SUSE bug 919274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922534">SUSE bug 922534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924525">SUSE bug 924525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924687">SUSE bug 924687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927993">SUSE bug 927993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930176">SUSE bug 930176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934689">SUSE bug 934689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947772">SUSE bug 947772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947791">SUSE bug 947791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948168">SUSE bug 948168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949000">SUSE bug 949000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951644">SUSE bug 951644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970009">SUSE bug 970009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976627">SUSE bug 976627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981311">SUSE bug 981311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571653" comment="cpp48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571654" comment="gcc48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571655" comment="gcc48-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571656" comment="gcc48-c++-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571657" comment="gcc48-fortran-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571658" comment="gcc48-fortran-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571659" comment="gcc48-info-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571660" comment="gcc48-locale-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571661" comment="libasan0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571662" comment="libasan0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571663" comment="libatomic1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571664" comment="libatomic1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571665" comment="libgcc_s1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571666" comment="libgcc_s1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571667" comment="libgfortran3-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571668" comment="libgfortran3-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571669" comment="libgomp1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571670" comment="libgomp1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571671" comment="libitm1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571672" comment="libitm1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571673" comment="libmpfr4-3.1.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571674" comment="libquadmath0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571675" comment="libquadmath0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571676" comment="libstdc++48-devel-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571677" comment="libstdc++48-devel-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571678" comment="libstdc++6-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571679" comment="libstdc++6-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571680" comment="libtsan0-4.8.5-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39066" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1082130" ref_url="https://bugzilla.suse.com/1082130" source="BUGZILLA"/>
		<reference ref_id="1083945" ref_url="https://bugzilla.suse.com/1083945" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="1093797" ref_url="https://bugzilla.suse.com/1093797" source="BUGZILLA"/>
		<reference ref_id="1131264" ref_url="https://bugzilla.suse.com/1131264" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1177947" ref_url="https://bugzilla.suse.com/1177947" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="1185395" ref_url="https://bugzilla.suse.com/1185395" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

- CVE-2019-14250: Fixed an integer overflow that could lead to an invalid memory
  access (bsc#1142649).

Non-security fixes:
- Fixed an issue with manual page builds (bsc#1185395).
- Fixed an issue with static initializers (bsc#1177947).
- Fixed an issue with exception handling on s390x (bsc#1161913).
- Fixed a reload bug on aarch64 (bsc#1093797).
- Added a Spectre V2 mitigation for s390x (bsc#1083945).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082130">SUSE bug 1082130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083945">SUSE bug 1083945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093797">SUSE bug 1093797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131264">SUSE bug 1131264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177947">SUSE bug 1177947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185395">SUSE bug 1185395</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678381" comment="cpp48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678382" comment="gcc48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678383" comment="gcc48-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678384" comment="gcc48-c++-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678385" comment="gcc48-fortran-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678386" comment="gcc48-fortran-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678387" comment="gcc48-info-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678388" comment="gcc48-locale-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678389" comment="libasan0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678390" comment="libasan0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678391" comment="libatomic1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678392" comment="libatomic1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678393" comment="libgcc_s1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678394" comment="libgcc_s1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678395" comment="libgfortran3-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678396" comment="libgfortran3-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678397" comment="libgomp1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678398" comment="libgomp1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678399" comment="libitm1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678400" comment="libitm1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678401" comment="libquadmath0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678402" comment="libquadmath0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678403" comment="libstdc++48-devel-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678404" comment="libstdc++48-devel-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678405" comment="libstdc++6-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678406" comment="libstdc++6-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678407" comment="libtsan0-4.8.5-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39067" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571681" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39068" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571682" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39069" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571683" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39070" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571684" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39071" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571685" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39072" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571686" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39073" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="1140120" ref_url="https://bugzilla.suse.com/1140120" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

Security vulnerability addressed:

- CVE-2017-7890: Fixed a buffer over-read into uninitialized memory (bsc#1050241).
- CVE-2019-6978: Fixed a double free in the GD graphics library (bsc#1123522).
- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140120).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-09"/>
	<updated date="2020-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571687" comment="gd-2.0.36.RC1-52.33.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39074" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571688" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571689" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571690" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571691" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571692" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571693" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571694" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39075" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571695" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571696" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571697" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571698" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571699" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571700" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571701" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39076" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571702" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571703" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571704" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571705" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571706" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571707" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571708" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39077" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571709" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571710" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571711" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571712" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571713" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571714" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571715" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39078" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571716" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571717" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571718" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571719" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571720" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571721" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571722" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39079" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571723" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571724" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571725" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571726" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571727" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571728" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571729" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39080" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571730" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571731" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571732" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571733" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571734" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571735" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571736" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39081" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571737" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571738" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571739" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571740" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571741" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571742" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571743" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39082" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571744" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571745" comment="giflib-progs-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39083" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571746" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571747" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571748" comment="giflib-progs-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39084" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571749" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571750" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571751" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571752" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571753" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571754" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571755" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571756" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571757" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571758" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571759" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571760" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571761" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39085" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571762" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571763" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571764" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571765" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571766" comment="libgio-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571767" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571768" comment="libglib-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571769" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571770" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571771" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571772" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571773" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571774" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39086" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1191489" ref_url="https://bugzilla.suse.com/1191489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:


- CVE-2021-3800: Fixed a file content leak in pkexec due to charset aliases (bsc#1191489).
- CVE-2018-16428: Fixed a NULL pointer dereference in g_markup_parse_context_end_parse() (bsc#1107121).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-22"/>
	<updated date="2022-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191489">SUSE bug 1191489</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672765" comment="glib2-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672766" comment="glib2-doc-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672767" comment="glib2-lang-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672768" comment="libgio-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672769" comment="libgio-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672770" comment="libglib-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672771" comment="libglib-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672772" comment="libgmodule-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672773" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672774" comment="libgobject-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672775" comment="libgobject-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672776" comment="libgthread-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672777" comment="libgthread-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39087" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="847227" ref_url="https://bugzilla.suse.com/847227" source="BUGZILLA"/>
		<reference ref_id="863499" ref_url="https://bugzilla.suse.com/863499" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="945779" ref_url="https://bugzilla.suse.com/945779" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)
- CVE-2013-2207: pt_chown tricked into granting access to another users pseudo-terminal (bsc#830257)
- CVE-2013-4458: Stack (frame) overflow in getaddrinfo() when called with AF_INET6 (bsc#847227)
- CVE-2014-8121: denial of service issue in the NSS backends (bsc#918187)
- bsc#920338: Read past end of pattern in fnmatch
- CVE-2015-1781: buffer overflow in nss_dns (bsc#927080)

The following non-security bugs were fixed:

- bnc#892065: SIGSEV tst-setlocale3 in glibc-2.11.3-17.68.1
- bnc#863499: Memory leak in getaddrinfo when many RRs are returned
- bsc#892065: Avoid unbound alloca in setenv
- bsc#945779: Properly reread entry after failure in nss_files getent function
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863499">SUSE bug 863499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571775" comment="glibc-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571776" comment="glibc-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571777" comment="glibc-devel-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571778" comment="glibc-devel-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571779" comment="glibc-html-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571780" comment="glibc-i18ndata-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571781" comment="glibc-info-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571782" comment="glibc-locale-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571783" comment="glibc-locale-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571784" comment="glibc-profile-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571785" comment="glibc-profile-32bit-2.11.1-0.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571786" comment="nscd-2.11.1-0.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39088" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="864081" ref_url="https://bugzilla.suse.com/864081" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>

This update for glibc fixes the following issues:

Security issues fixed:
- CVE-2016-1234: Fixed a buffer overflow with glob() with GLOB_ALTDIRFUNC and crafted directory (bsc#969727).
- CVE-2016-3075: Fixed a stack overflow in _nss_dns_getnetbyname_r (bsc#973164)
- CVE-2016-3706: Fixed a getaddrinfo stack overflow in hostent conversion (bsc#980483)
- CVE-2016-4429: Avoid a stack overflow due to alloca usage in clntudp_call (bsc#980854)

Also fixed some bugs:
- Don't touch user-controlled stdio locks in forked child (bsc#864081)
- Fix memory leak in _nss_dns_gethostbyname4_r (bsc#973010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/864081">SUSE bug 864081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571787" comment="glibc-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571788" comment="glibc-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571789" comment="glibc-devel-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571790" comment="glibc-devel-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571791" comment="glibc-html-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571792" comment="glibc-i18ndata-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571793" comment="glibc-info-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571794" comment="glibc-locale-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571795" comment="glibc-locale-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571796" comment="glibc-profile-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571797" comment="glibc-profile-32bit-2.11.1-0.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571798" comment="nscd-2.11.1-0.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39089" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571799" comment="glibc-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571800" comment="glibc-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571801" comment="glibc-devel-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571802" comment="glibc-devel-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571803" comment="glibc-html-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571804" comment="glibc-i18ndata-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571805" comment="glibc-info-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571806" comment="glibc-locale-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571807" comment="glibc-locale-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571808" comment="glibc-profile-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571809" comment="glibc-profile-32bit-2.11.1-0.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571810" comment="nscd-2.11.1-0.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39090" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571811" comment="glibc-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571812" comment="glibc-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571813" comment="glibc-devel-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571814" comment="glibc-devel-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571815" comment="glibc-html-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571816" comment="glibc-i18ndata-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571817" comment="glibc-info-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571818" comment="glibc-locale-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571819" comment="glibc-locale-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571820" comment="glibc-profile-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571821" comment="glibc-profile-32bit-2.11.1-0.80.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571822" comment="nscd-2.11.1-0.80.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39091" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551:  Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571823" comment="glibc-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571824" comment="glibc-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571825" comment="glibc-devel-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571826" comment="glibc-devel-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571827" comment="glibc-html-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571828" comment="glibc-i18ndata-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571829" comment="glibc-info-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571830" comment="glibc-locale-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571831" comment="glibc-locale-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571832" comment="glibc-profile-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571833" comment="glibc-profile-32bit-2.11.1-0.80.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571834" comment="nscd-2.11.1-0.80.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39092" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-22"/>
	<updated date="2018-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571835" comment="glibc-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571836" comment="glibc-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571837" comment="glibc-devel-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571838" comment="glibc-devel-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571839" comment="glibc-html-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571840" comment="glibc-i18ndata-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571841" comment="glibc-info-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571842" comment="glibc-locale-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571843" comment="glibc-locale-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571844" comment="glibc-profile-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571845" comment="glibc-profile-32bit-2.11.1-0.80.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571846" comment="nscd-2.11.1-0.80.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39093" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571847" comment="glibc-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571848" comment="glibc-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571849" comment="glibc-devel-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571850" comment="glibc-devel-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571851" comment="glibc-html-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571852" comment="glibc-i18ndata-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571853" comment="glibc-info-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571854" comment="glibc-locale-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571855" comment="glibc-locale-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571856" comment="glibc-profile-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571857" comment="glibc-profile-32bit-2.11.1-0.80.12.846 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571858" comment="nscd-2.11.1-0.80.12.846 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39094" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583).
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580).
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-20"/>
	<updated date="2018-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571859" comment="glibc-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571860" comment="glibc-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571861" comment="glibc-devel-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571862" comment="glibc-devel-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571863" comment="glibc-html-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571864" comment="glibc-i18ndata-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571865" comment="glibc-info-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571866" comment="glibc-locale-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571867" comment="glibc-locale-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571868" comment="glibc-profile-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571869" comment="glibc-profile-32bit-2.11.1-0.80.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571870" comment="nscd-2.11.1-0.80.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39095" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571871" comment="glibc-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571872" comment="glibc-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571873" comment="glibc-devel-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571874" comment="glibc-devel-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571875" comment="glibc-html-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571876" comment="glibc-i18ndata-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571877" comment="glibc-info-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571878" comment="glibc-locale-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571879" comment="glibc-locale-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571880" comment="glibc-profile-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571881" comment="glibc-profile-32bit-2.11.1-0.80.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571882" comment="nscd-2.11.1-0.80.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39096" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489, BZ #27896)
- CVE-2021-35942: Fixed handle overflow in wordexp positional parameter number (bsc#1187911, BZ #28011)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-18"/>
	<updated date="2022-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673626" comment="glibc-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673627" comment="glibc-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673628" comment="glibc-devel-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673629" comment="glibc-devel-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673630" comment="glibc-html-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673631" comment="glibc-i18ndata-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673632" comment="glibc-info-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673633" comment="glibc-locale-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673634" comment="glibc-locale-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673635" comment="glibc-profile-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673636" comment="glibc-profile-32bit-2.11.1-0.80.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673637" comment="nscd-2.11.1-0.80.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39097" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
		</affected>
		<reference ref_id="645140" ref_url="https://bugzilla.suse.com/645140" source="BUGZILLA"/>
		<reference ref_id="680833" ref_url="https://bugzilla.suse.com/680833" source="BUGZILLA"/>
		<reference ref_id="700876" ref_url="https://bugzilla.suse.com/700876" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>

The implementation of the blowfish based password hashing method had a bug 
affecting passwords that contain 8bit characters (e.g. umlauts). Affected 
passwords are potentially faster to crack via brute force methods 
(CVE-2011-2483).

SUSE's crypt() implementation supports the blowfish password hashing 
function (id $2a) and system logins by default also use this method. This 
update eliminates the bug in the $2a implementation. After installing the 
update existing $2a hashes therefore no longer match hashes generated with 
the new, correct implementation if the password contains 8bit characters. 
For system logins via PAM the pam_unix2 module activates a compat mode and 
keeps processing existing $2a hashes with the old algorithm. This ensures 
no user gets locked out. New passwords hashes are created with the id '$2y' 
to unambiguously identify them as generated with the correct 
implementation.

Note: To actually migrate hashes to the new algorithm all users are advised 
to change passwords after the update.

Services that do not use PAM but do use crypt() to store passwords using 
the blowfish hash do not have such a compat mode. That means users with 
8bit passwords that use such services will not be able to log in anymore 
after the update. As workaround administrators may edit the service's 
password database and change stored hashes from $2a to $2x. This will 
result in crypt() using the old algorithm. Users should be required to 
change their passwords to make sure they are migrated to the correct 
algorithm.

FAQ:

Q: I only use ASCII characters in passwords, am I a affected in any way?
A: No.

Q: What's the meaning of the ids before and after the update?
A: Before the update:
$2a -&gt; buggy algorithm

After the update:
$2x -&gt; buggy algorithm
$2a -&gt; correct algorithm
$2y -&gt; correct algorithm

System logins using PAM have a compat mode enabled by default:
$2x -&gt; buggy algorithm
$2a -&gt; buggy algorithm
$2y -&gt; correct algorithm

Q: How do I require users to change their password on next login?
A: Run the following command as root for each user:
chage -d 0

Q: I run an application that has $2a hashes in it's password database. Some 
users complain that they can not log in anymore.
A: Edit the password database and change the '$2a' prefix of the affected 
users' hashes to '$2x'. They will be able to log in again but should change 
their password ASAP.

Q: How do I turn off the compat mode for system logins?
A: Set BLOWFISH_2a2x=no in /etc/default/passwd

Security Issue reference:

    * CVE-2011-2483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-07-30"/>
	<updated date="2011-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/645140">SUSE bug 645140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680833">SUSE bug 680833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700876">SUSE bug 700876</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571883" comment="glibc-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571884" comment="glibc-32bit-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571885" comment="glibc-devel-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571886" comment="glibc-devel-32bit-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571887" comment="glibc-html-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571888" comment="glibc-i18ndata-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571889" comment="glibc-info-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571890" comment="glibc-locale-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571891" comment="glibc-locale-32bit-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571892" comment="glibc-locale-x86-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571893" comment="glibc-profile-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571894" comment="glibc-profile-32bit-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571895" comment="glibc-profile-x86-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571896" comment="glibc-x86-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571897" comment="libxcrypt-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571898" comment="libxcrypt-32bit-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571899" comment="libxcrypt-x86-3.0.3-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571900" comment="nscd-2.11.1-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571901" comment="pam-modules-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571902" comment="pam-modules-32bit-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571903" comment="pam-modules-x86-11-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571904" comment="pwdutils-3.2.8-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571905" comment="pwdutils-plugin-audit-3.2.8-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39098" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This update for gmp fixes the following issues:

- CVE-2021-43618: Fixed buffer overflow on malformed input to mpz_inp_raw (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658238" comment="gmp-4.2.3-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658239" comment="gmp-32bit-4.2.3-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39099" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-session (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1048274" ref_url="https://bugzilla.suse.com/1048274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171/" source="CVE"/>
		<description>


This update for gnome-session fixes the following issues:

- CVE-2017-11171: Fix a denial of service condition. an unauthenticated local user
  can create ICE connections, causing a file descriptor leak in
  gnome-session (bsc#1048274).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571906" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571907" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39100" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1044638" ref_url="https://bugzilla.suse.com/1044638" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="1117464" ref_url="https://bugzilla.suse.com/1117464" source="BUGZILLA"/>
		<reference ref_id="1117465" ref_url="https://bugzilla.suse.com/1117465" source="BUGZILLA"/>
		<reference ref_id="375175" ref_url="https://bugzilla.suse.com/375175" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19491" ref_url="https://www.suse.com/security/cve/CVE-2018-19491/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<description>
This update for gnuplot fixes the following issues:

Security issues fixed:

- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
- CVE-2018-19491: Fixed a buffer overflow in the PS_options function (bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
- CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a
  Denial of Service (bsc#1044638)

Non-security issues fixed:

- postscript output does not show any German 'umlauts' (bsc#375175)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044638">SUSE bug 1044638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117464">SUSE bug 1117464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117465">SUSE bug 1117465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/375175">SUSE bug 375175</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19491/">CVE-2018-19491</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571908" comment="gnuplot-4.2.3-7.3.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39101" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="739898" ref_url="https://bugzilla.suse.com/739898" source="BUGZILLA"/>
		<reference ref_id="753301" ref_url="https://bugzilla.suse.com/753301" source="BUGZILLA"/>
		<reference ref_id="754223" ref_url="https://bugzilla.suse.com/754223" source="BUGZILLA"/>
		<reference ref_id="754953" ref_url="https://bugzilla.suse.com/754953" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<description>

This update of GnuTLS fixes multiple vulnerabilities:

    * CVE-2012-1569: remote attackers could cause a denial of service (heap
      memory corruption and application crash) via an issue in the
      asn1_get_length_der() function
    * CVE-2012-1573: crafted GenericBlockCipher structures allow remote
      attackers to cause a denial of service (heap memory corruption and
      application crash)
    * CVE-2012-0390: A vulnerability in the DTLS implementation which could
      allow remote attackers to recover partial plaintext via a timing
      side-channel attack was fixed.

In addition, support for customizing the signing function was added.

Security Issue references:

    * CVE-2012-0390
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-15"/>
	<updated date="2012-06-15"/>
	<bugzilla href="https://bugzilla.suse.com/739898">SUSE bug 739898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753301">SUSE bug 753301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754223">SUSE bug 754223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754953">SUSE bug 754953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571909" comment="gnutls-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571910" comment="libgnutls-extra26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571911" comment="libgnutls26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571912" comment="libgnutls26-32bit-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571913" comment="libgnutls26-x86-2.4.1-24.39.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571909" comment="gnutls-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571910" comment="libgnutls-extra26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571911" comment="libgnutls26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571912" comment="libgnutls26-32bit-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571913" comment="libgnutls26-x86-2.4.1-24.39.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571909" comment="gnutls-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571910" comment="libgnutls-extra26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571911" comment="libgnutls26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571912" comment="libgnutls26-32bit-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571913" comment="libgnutls26-x86-2.4.1-24.39.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571909" comment="gnutls-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571910" comment="libgnutls-extra26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571911" comment="libgnutls26-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571912" comment="libgnutls26-32bit-2.4.1-24.39.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571913" comment="libgnutls26-x86-2.4.1-24.39.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39102" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571914" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571915" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39103" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571916" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571917" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39104" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571918" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571919" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571920" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39105" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571921" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571922" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571923" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39106" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- CVE-2018-10846: Improve mitigations against Lucky 13 class of attacks (PRIME + PROBE) (bsc#1105460).
- CVE-2017-10790: Fixed a denial of service in the _asn1_check_identifier() function (bsc#1047002).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571924" comment="gnutls-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571925" comment="libgnutls26-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571926" comment="libgnutls26-32bit-2.4.1-24.39.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39107" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571927" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571928" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39108" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571929" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571930" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39109" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1124847" ref_url="https://bugzilla.suse.com/1124847" source="BUGZILLA"/>
		<reference ref_id="1141093" ref_url="https://bugzilla.suse.com/1141093" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

Security issue fixed:

- CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093)

Non-security issue fixed:

- Allow coredumps in X11 desktop sessions (bsc#1124847).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124847">SUSE bug 1124847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571931" comment="gpg2-2.0.9-25.33.42.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571932" comment="gpg2-lang-2.0.9-25.33.42.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39110" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571933" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571934" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39111" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1093447" ref_url="https://bugzilla.suse.com/1093447" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2018-10196: Fixed a null dereference in rebuild_vlis (bsc#1093447).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571935" comment="graphviz-2.20.2-8.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571936" comment="graphviz-gd-2.20.2-8.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571937" comment="graphviz-gnome-2.20.2-8.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39112" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-19"/>
	<updated date="2019-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571938" comment="gstreamer-0_10-plugins-base-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571939" comment="gstreamer-0_10-plugins-base-32bit-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571940" comment="gstreamer-0_10-plugins-base-doc-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571941" comment="gstreamer-0_10-plugins-base-lang-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571942" comment="libgstapp-0_10-0-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571943" comment="libgstapp-0_10-0-32bit-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571944" comment="libgstinterfaces-0_10-0-0.10.25-1.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571945" comment="libgstinterfaces-0_10-0-32bit-0.10.25-1.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39113" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571946" comment="gtk2-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571947" comment="gtk2-32bit-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571948" comment="gtk2-doc-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571949" comment="gtk2-lang-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571950" comment="gtk2-x86-2.18.9-0.20.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571946" comment="gtk2-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571947" comment="gtk2-32bit-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571948" comment="gtk2-doc-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571949" comment="gtk2-lang-2.18.9-0.20.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571950" comment="gtk2-x86-2.18.9-0.20.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39114" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<description>
This update for gtk2 fixes the following security issues:

- CVE-2015-4491: Check for overflow before allocating memory when scaling (bsc#942801)
- CVE-2015-7674: overflow when scaling GIF files (bsc#948791)
- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issue was fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-26"/>
	<updated date="2016-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571951" comment="gtk2-2.18.9-0.20.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571952" comment="gtk2-32bit-2.18.9-0.20.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571953" comment="gtk2-doc-2.18.9-0.20.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571954" comment="gtk2-lang-2.18.9-0.20.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39115" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>

This update for gtk2 fixes the following issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571955" comment="gtk2-2.18.9-0.20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571956" comment="gtk2-32bit-2.18.9-0.20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571957" comment="gtk2-doc-2.18.9-0.20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571958" comment="gtk2-lang-2.18.9-0.20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39116" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="1074462" ref_url="https://bugzilla.suse.com/1074462" source="BUGZILLA"/>
		<reference ref_id="726376" ref_url="https://bugzilla.suse.com/726376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000422" ref_url="https://www.suse.com/security/cve/CVE-2017-1000422/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
- CVE-2017-6312: Integer overflow in io-ico.c in gdk-pixbuf allowed context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations (boo#1027026).
- Protect against access to negative array indexes (BGO#778584).
- CVE-2017-6314: The make_available_at_least function in io-tiff.c in gdk-pixbuf allowed context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file (boo#1027025).
- CVE-2017-6313: Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allowed context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file (boo#1027024).
- CVE-2017-1000422: Gnome gdk-pixbuf older was vulnerable to several integer overflows in the gif_get_lzw function resulting in memory corruption and potential code execution (boo#1074462).

This non-security issue was fixed:

- Prevent endless loop when listing a directory that may not be listed (bnc#726376).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074462">SUSE bug 1074462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726376">SUSE bug 726376</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000422/">CVE-2017-1000422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571959" comment="gtk2-2.18.9-0.20.27.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571960" comment="gtk2-32bit-2.18.9-0.20.27.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571961" comment="gtk2-doc-2.18.9-0.20.27.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571962" comment="gtk2-lang-2.18.9-0.20.27.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39117" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<description>
This update for gtk2 fixes the following security issues:

- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571963" comment="gtk2-2.18.9-0.20.27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571964" comment="gtk2-32bit-2.18.9-0.20.27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571965" comment="gtk2-doc-2.18.9-0.20.27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571966" comment="gtk2-lang-2.18.9-0.20.27.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39118" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571967" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39119" version="1" class="patch">
	<metadata>
		<title>Security update for okular</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="634743" ref_url="https://bugzilla.suse.com/634743" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2575" ref_url="https://www.suse.com/security/cve/CVE-2010-2575/" source="CVE"/>
		<description>

This update fixes a heap-based overflow in okular. The RLE decompression in 
the TranscribePalmImageToJPEG() function can be exploited to execute 
arbitrary code with user privileges by providing a crafted PDF file. 
(CVE-2010-2575)

Security Issue reference:

    * CVE-2010-2575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-02"/>
	<updated date="2010-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/634743">SUSE bug 634743</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2575/">CVE-2010-2575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571968" comment="gwenview-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571969" comment="kcolorchooser-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571970" comment="kruler-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571971" comment="ksnapshot-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571972" comment="libkexiv2-7-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571973" comment="libkipi6-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571974" comment="okular-4.3.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571968" comment="gwenview-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571969" comment="kcolorchooser-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571970" comment="kruler-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571971" comment="ksnapshot-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571972" comment="libkexiv2-7-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571973" comment="libkipi6-4.3.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571974" comment="okular-4.3.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39120" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="704608" ref_url="https://bugzilla.suse.com/704608" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<description>

This update provides an update of hplip to version 3.11.10:

    * Fixed insecure tmp file handling in hpcupsfax.cpp CVE-2011-2722 see
      https://bugs.launchpad.net/hplip/+bug/809904 (bnc#704608).
    * New tech classes for HP OfficeJet Pro 8100, HP Deskjet 3070 B611
      series and HP Photosmart 7510 e-All-in-One.
    * Added new subtech class for HP Photosmart 6510 e-All-in-one.
    * Modified the error message which was displayed in case of missing
      .asc file for manual plug-in install.
    * Several more supported printers and all-in-one devices.
    * Several bug fixies.

For details see http://hplipopensource.com/hplip-web/release_notes.html
&lt;http://hplipopensource.com/hplip-web/release_notes.html&gt;

Security Issue reference:

    * CVE-2011-2722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-19"/>
	<updated date="2011-10-19"/>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571975" comment="hplip-3.11.10-0.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571976" comment="hplip-hpijs-3.11.10-0.6.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571975" comment="hplip-3.11.10-0.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571976" comment="hplip-hpijs-3.11.10-0.6.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39121" version="1" class="patch">
	<metadata>
		<title>Security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1151867" ref_url="https://bugzilla.suse.com/1151867" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
This update for hunspell fixes the following issues:

- CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring (bsc#1151867).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571977" comment="hunspell-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571978" comment="hunspell-32bit-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571979" comment="hunspell-tools-1.2.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39122" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4409" ref_url="https://www.suse.com/security/cve/CVE-2010-4409/" source="CVE"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<description>

The following bugs have been fixed:

    * Specially crafted strings could cause a buffer overflow in icu
      (CVE-2011-4599).
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409)

Security Issue references:

    * CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt;
    * CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-16"/>
	<updated date="2012-01-16"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4409/">CVE-2010-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571980" comment="libicu-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571981" comment="libicu-32bit-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571982" comment="libicu-doc-4.0-7.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571980" comment="libicu-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571981" comment="libicu-32bit-4.0-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571982" comment="libicu-doc-4.0-7.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39123" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571983" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564562" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571984" comment="libicu-doc-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39124" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571985" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564566" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571986" comment="libicu-doc-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39125" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571987" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564570" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571988" comment="libicu-doc-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39126" version="1" class="patch">
	<metadata>
		<title>Security update for inn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="776967" ref_url="https://bugzilla.suse.com/776967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3523" ref_url="https://www.suse.com/security/cve/CVE-2012-3523/" source="CVE"/>
		<description>

A STARTTLS injection issue has been fixed in inn. CVE-2012-3523 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-05"/>
	<updated date="2012-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/776967">SUSE bug 776967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3523/">CVE-2012-3523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571989" comment="inn-2.4.2-170.21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39127" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1154302" ref_url="https://bugzilla.suse.com/1154302" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3692" ref_url="https://www.suse.com/security/cve/CVE-2019-3692/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2019-3692: Fixed a local privilege escalation from any user to 'news' (bsc#1154302).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154302">SUSE bug 1154302</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3692/">CVE-2019-3692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571990" comment="inn-2.4.2-170.21.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39128" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571991" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39129" version="1" class="patch">
	<metadata>
		<title>Security update for inst-source-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="604730" ref_url="https://bugzilla.suse.com/604730" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0427" ref_url="https://www.suse.com/security/cve/CVE-2012-0427/" source="CVE"/>
		<description>

Multiple code execution flaws have been fixed that could have been 
exploited via specially crafted file names / directory path names.

Security Issue reference:

    * CVE-2012-0427
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0427&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-04"/>
	<updated date="2012-10-04"/>
	<bugzilla href="https://bugzilla.suse.com/604730">SUSE bug 604730</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0427/">CVE-2012-0427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571992" comment="inst-source-utils-2012.10.4-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39130" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="931989" ref_url="https://bugzilla.suse.com/931989" source="BUGZILLA"/>
		<reference ref_id="939810" ref_url="https://bugzilla.suse.com/939810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<description>
ipsec-tools was updated to fix one security issue and a bug.

This security issue was fixed:

- CVE-2015-4047: racoon/gssapi.c in ipsec-tools allowed remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests (bsc#931989).

Due to a packaging error, the racoonf.conf config file was symlinked to /usr/share/doc/packages/ipsec-tools/examples/racoon/samples/racoon.conf
on some processor platforms, edits might have happened only in this example file.

Before upgrading, please check if /etc/racoon/racoon.conf is a symlink to this example file and backup the content. (bsc#939810)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939810">SUSE bug 939810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571993" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39131" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571994" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39132" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954102" ref_url="https://bugzilla.suse.com/954102" source="BUGZILLA"/>
		<description>

This update to jakarta-commons-collections 3.2.2 fixes the following security issues:

* bsc#954102 code-execution by unserialization
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954102">SUSE bug 954102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39133" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="846174" ref_url="https://bugzilla.suse.com/846174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<description>

jakarta-commons-fileupload received the following security fix:

A poison null byte flaw was found in the implementation of the DiskFileItem 
class. A remote attacker would have been able to supply a serialized 
instance of the DiskFileItem class, which if deserialized on a server, 
could have used this flaw to write arbitrary content to any location on the 
server that has been permitted by the user running the application server 
process. (CVE-2013-2186)

Security Issue reference:

    * CVE-2013-2186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571998" comment="jakarta-commons-fileupload-1.1.1-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571999" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39134" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39135" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="803332" ref_url="https://bugzilla.suse.com/803332" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>

The following issue has been fixed:

    * SSL certificate hostname verification was not done and is fixed by
      this update. (CVE-2012-5783)

Security Issue reference:

    * CVE-2012-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-28"/>
	<updated date="2013-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/803332">SUSE bug 803332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572000" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39136" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39137" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="725758" ref_url="https://bugzilla.suse.com/725758" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted JPEG2000 files could cause a heap buffer overflow
      in jasper (CVE-2011-4516, CVE-2011-4517)

Security Issue references:

    * CVE-2011-4516
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516&gt;
    * CVE-2011-4517
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-07"/>
	<updated date="2011-12-07"/>
	<bugzilla href="https://bugzilla.suse.com/725758">SUSE bug 725758</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572003" comment="libjasper-1.900.1-134.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572004" comment="libjasper-32bit-1.900.1-134.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572005" comment="libjasper-x86-1.900.1-134.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572003" comment="libjasper-1.900.1-134.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572004" comment="libjasper-32bit-1.900.1-134.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572005" comment="libjasper-x86-1.900.1-134.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39138" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572006" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572007" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39139" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572008" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572009" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39140" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572010" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572011" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39141" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010783" ref_url="https://bugzilla.suse.com/1010783" source="BUGZILLA"/>
		<reference ref_id="1087020" ref_url="https://bugzilla.suse.com/1087020" source="BUGZILLA"/>
		<reference ref_id="1117505" ref_url="https://bugzilla.suse.com/1117505" source="BUGZILLA"/>
		<reference ref_id="1117507" ref_url="https://bugzilla.suse.com/1117507" source="BUGZILLA"/>
		<reference ref_id="1117508" ref_url="https://bugzilla.suse.com/1117508" source="BUGZILLA"/>
		<reference ref_id="1117511" ref_url="https://bugzilla.suse.com/1117511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:

- CVE-2018-19540: Fixed  a heap based overflow in jas_icctxtdesc_input (bsc#1117508).
- CVE-2018-19541: Fix heap based overread in jas_image_depalettize (bsc#1117507).    
- CVE-2018-19542: Fixed a denial of service in jp2_decode (bsc#1117505).
- CVE-2018-19539: Fixed a denial of service in jas_image_readcmpt (bsc#1117511).
- CVE-2018-9055: Fixed a denial of service in jpc_firstone (bsc#1087020).
- CVE-2016-9396: Fixed a denial of service in jpc_cox_getcompparms (bsc#1010783).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572012" comment="libjasper-1.900.14-134.33.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572013" comment="libjasper-32bit-1.900.14-134.33.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39142" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010786" ref_url="https://bugzilla.suse.com/1010786" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1011829" ref_url="https://bugzilla.suse.com/1011829" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9397" ref_url="https://www.suse.com/security/cve/CVE-2016-9397/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2016-9397: Fix assert in jpc_dequantize (bsc#1010786).
- CVE-2016-9557: Fix signed integer overflow (bsc#1011829).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9397/">CVE-2016-9397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572014" comment="libjasper-1.900.14-134.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572015" comment="libjasper-32bit-1.900.14-134.33.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39143" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572016" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572017" comment="libjasper-32bit-1.900.14-134.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39144" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668400" comment="libjasper-1.900.14-134.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668401" comment="libjasper-32bit-1.900.14-134.33.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39145" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="763805" ref_url="https://bugzilla.suse.com/763805" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2012-0499" ref_url="https://www.suse.com/security/cve/CVE-2012-0499/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<description>

IBM Java 1.4.2 SR13 FP12 has been released which fixes various bugs and 
security issues.

http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt; has more informations.

CVEs addressed:
CVE-2011-3563 CVE-2012-0499 CVE-2012-0502 CVE-2012-0503 CVE-2012-0505 
CVE-2012-0506

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-29"/>
	<updated date="2012-05-29"/>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0499/">CVE-2012-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572018" comment="java-1_4_2-ibm-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572019" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572020" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.12-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572018" comment="java-1_4_2-ibm-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572019" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572020" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.12-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572018" comment="java-1_4_2-ibm-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572019" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572020" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.12-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572018" comment="java-1_4_2-ibm-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572019" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.12-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572020" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.12-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39146" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.6.0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="752306" ref_url="https://bugzilla.suse.com/752306" source="BUGZILLA"/>
		<reference ref_id="758470" ref_url="https://bugzilla.suse.com/758470" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0498" ref_url="https://www.suse.com/security/cve/CVE-2012-0498/" source="CVE"/>
		<reference ref_id="CVE-2012-0499" ref_url="https://www.suse.com/security/cve/CVE-2012-0499/" source="CVE"/>
		<reference ref_id="CVE-2012-0500" ref_url="https://www.suse.com/security/cve/CVE-2012-0500/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0507" ref_url="https://www.suse.com/security/cve/CVE-2012-0507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html" source="SUSE-SU"/>
		<description>

IBM Java 1.6.0 was updated to SR10-FP1, fixing various security issues.

More information can be found on:

http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2012-0502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502&gt;
    * CVE-2012-0503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503&gt;
    * CVE-2012-0506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506&gt;
    * CVE-2012-0507
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507&gt;
    * CVE-2011-3563
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563&gt;
    * CVE-2012-0500
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0500&gt;
    * CVE-2012-0497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497&gt;
    * CVE-2012-0498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0498&gt;
    * CVE-2012-0499
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0499&gt;
    * CVE-2012-0500
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0500&gt;
    * CVE-2012-0501
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501&gt;
    * CVE-2012-0505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505&gt;
    * CVE-2011-5035
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-27"/>
	<updated date="2012-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/752306">SUSE bug 752306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0498/">CVE-2012-0498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0499/">CVE-2012-0499</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0500/">CVE-2012-0500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0507/">CVE-2012-0507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572021" comment="java-1_6_0-ibm-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572022" comment="java-1_6_0-ibm-alsa-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572023" comment="java-1_6_0-ibm-fonts-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572024" comment="java-1_6_0-ibm-jdbc-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572025" comment="java-1_6_0-ibm-plugin-1.6.0_sr10.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572021" comment="java-1_6_0-ibm-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572022" comment="java-1_6_0-ibm-alsa-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572023" comment="java-1_6_0-ibm-fonts-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572024" comment="java-1_6_0-ibm-jdbc-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572025" comment="java-1_6_0-ibm-plugin-1.6.0_sr10.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572021" comment="java-1_6_0-ibm-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572022" comment="java-1_6_0-ibm-alsa-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572023" comment="java-1_6_0-ibm-fonts-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572024" comment="java-1_6_0-ibm-jdbc-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572025" comment="java-1_6_0-ibm-plugin-1.6.0_sr10.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572021" comment="java-1_6_0-ibm-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572022" comment="java-1_6_0-ibm-alsa-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572023" comment="java-1_6_0-ibm-fonts-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572024" comment="java-1_6_0-ibm-jdbc-1.6.0_sr10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572025" comment="java-1_6_0-ibm-plugin-1.6.0_sr10.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39147" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572026" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572028" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572029" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572026" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572028" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572029" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39148" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572031" comment="java-1_6_0-ibm-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572032" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572033" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572034" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39149" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<description>

This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572035" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572036" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572037" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572038" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39150" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572039" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572040" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572041" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572042" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39151" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572043" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572044" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572045" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572046" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39152" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm to 8.0-4.1 fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572047" comment="java-1_6_0-ibm-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572048" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572049" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572050" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.41-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39153" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:


  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572051" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572052" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572053" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572054" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39154" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<description>
This update for java-1_6_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 6.0.16.50 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2017-10355 CVE-2017-10357
    CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350
    CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-19"/>
	<updated date="2017-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572055" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572056" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572057" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572058" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39155" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572059" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572060" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572061" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572062" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39156" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="771791" ref_url="https://bugzilla.suse.com/771791" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2806" ref_url="https://www.suse.com/security/cve/CVE-2012-2806/" source="CVE"/>
		<description>

This update to libjpeg fixes a heap overflow in the JPEG decompression 
functions. (CVE-2012-2806
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2806&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-24"/>
	<updated date="2012-07-24"/>
	<bugzilla href="https://bugzilla.suse.com/771791">SUSE bug 771791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2806/">CVE-2012-2806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572063" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572064" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572065" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572066" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572063" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572064" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572065" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572066" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572063" comment="jpeg-6b-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572064" comment="libjpeg-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572065" comment="libjpeg-32bit-6.2.0-879.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572066" comment="libjpeg-x86-6.2.0-879.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39157" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572067" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572068" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572069" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39158" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This update for jpeg fixes the following issue:

Security issue fixed: 

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11212: Fixed divide by zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-14498: Fixed denial of service in get_8bit_row in rdbmp.c (bsc#1128712).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572070" comment="jpeg-6b-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572071" comment="libjpeg-6.2.0-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572072" comment="libjpeg-32bit-6.2.0-879.12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39159" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="1172995" ref_url="https://bugzilla.suse.com/1172995" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="CVE-2020-14152" ref_url="https://www.suse.com/security/cve/CVE-2020-14152/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

- CVE-2020-14152: Fixed an improper implementation which vould have potentially exhausted the memory (bsc#1172995).
- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14152/">CVE-2020-14152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572073" comment="jpeg-6b-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572074" comment="libjpeg-6.2.0-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572075" comment="libjpeg-32bit-6.2.0-879.12.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39160" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572076" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572077" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572078" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572079" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572080" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39161" version="1" class="patch">
	<metadata>
		<title>Security update for kdenetwork</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="604709" ref_url="https://bugzilla.suse.com/604709" source="BUGZILLA"/>
		<reference ref_id="653852" ref_url="https://bugzilla.suse.com/653852" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-4776" ref_url="https://www.suse.com/security/cve/CVE-2008-4776/" source="CVE"/>
		<reference ref_id="CVE-2010-1000" ref_url="https://www.suse.com/security/cve/CVE-2010-1000/" source="CVE"/>
		<description>

This update of kdenetwork fixes several bugs, the security related issues 
are:

    * CVE-2010-1000: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N):
      CWE-22

The 'name' attribute of the 'file' element of metalink files is not 
properly sanitised this can be exploited to download files to arbitrary 
directories.

Non-security issues:

    * bnc#653852: kopete: ICQ login broken; login server changed

Security Issue references:

    * CVE-2008-4776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776&gt;
    * CVE-2010-1000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-19"/>
	<updated date="2010-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/604709">SUSE bug 604709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653852">SUSE bug 653852</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4776/">CVE-2008-4776</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1000/">CVE-2010-1000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572081" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572082" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572083" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572084" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572085" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572081" comment="kdenetwork4-filesharing-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572082" comment="kget-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572083" comment="kopete-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572084" comment="krdc-4.3.5-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572085" comment="krfb-4.3.5-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39162" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572113" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39163" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572114" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572115" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572116" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572117" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572118" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39164" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572119" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564597" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572120" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564601" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39165" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="686652" ref_url="https://bugzilla.suse.com/686652" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1168" ref_url="https://www.suse.com/security/cve/CVE-2011-1168/" source="CVE"/>
		<description>

This update fixes a cross-site scripting (XSS) vulnerability in the way 
KHTML handles error pages. (CVE-2011-1168
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1168&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-18"/>
	<updated date="2011-04-18"/>
	<bugzilla href="https://bugzilla.suse.com/686652">SUSE bug 686652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1168/">CVE-2011-1168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572121" comment="kdelibs4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572122" comment="kdelibs4-core-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572123" comment="kdelibs4-doc-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572124" comment="libkde4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572125" comment="libkde4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572126" comment="libkde4-x86-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572127" comment="libkdecore4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572128" comment="libkdecore4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572129" comment="libkdecore4-x86-4.3.5-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572121" comment="kdelibs4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572122" comment="kdelibs4-core-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572123" comment="kdelibs4-doc-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572124" comment="libkde4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572125" comment="libkde4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572126" comment="libkde4-x86-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572127" comment="libkdecore4-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572128" comment="libkdecore4-32bit-4.3.5-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572129" comment="libkdecore4-x86-4.3.5-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39166" version="1" class="patch">
	<metadata>
		<title>Security update for kdirstat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868682" ref_url="https://bugzilla.suse.com/868682" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527/" source="CVE"/>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in
      kcleanup

Security Issues:

    * CVE-2014-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527&gt;
    * CVE-2014-2528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572130" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39167" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="611264" ref_url="https://bugzilla.suse.com/611264" source="BUGZILLA"/>
		<reference ref_id="617344" ref_url="https://bugzilla.suse.com/617344" source="BUGZILLA"/>
		<reference ref_id="624072" ref_url="https://bugzilla.suse.com/624072" source="BUGZILLA"/>
		<reference ref_id="652942" ref_url="https://bugzilla.suse.com/652942" source="BUGZILLA"/>
		<reference ref_id="668194" ref_url="https://bugzilla.suse.com/668194" source="BUGZILLA"/>
		<reference ref_id="676204" ref_url="https://bugzilla.suse.com/676204" source="BUGZILLA"/>
		<reference ref_id="688079" ref_url="https://bugzilla.suse.com/688079" source="BUGZILLA"/>
		<reference ref_id="693639" ref_url="https://bugzilla.suse.com/693639" source="BUGZILLA"/>
		<reference ref_id="697920" ref_url="https://bugzilla.suse.com/697920" source="BUGZILLA"/>
		<reference ref_id="700449" ref_url="https://bugzilla.suse.com/700449" source="BUGZILLA"/>
		<reference ref_id="704280" ref_url="https://bugzilla.suse.com/704280" source="BUGZILLA"/>
		<reference ref_id="713148" ref_url="https://bugzilla.suse.com/713148" source="BUGZILLA"/>
		<reference ref_id="714507" ref_url="https://bugzilla.suse.com/714507" source="BUGZILLA"/>
		<reference ref_id="716850" ref_url="https://bugzilla.suse.com/716850" source="BUGZILLA"/>
		<reference ref_id="717994" ref_url="https://bugzilla.suse.com/717994" source="BUGZILLA"/>
		<reference ref_id="719793" ref_url="https://bugzilla.suse.com/719793" source="BUGZILLA"/>
		<reference ref_id="720374" ref_url="https://bugzilla.suse.com/720374" source="BUGZILLA"/>
		<reference ref_id="721366" ref_url="https://bugzilla.suse.com/721366" source="BUGZILLA"/>
		<reference ref_id="727834" ref_url="https://bugzilla.suse.com/727834" source="BUGZILLA"/>
		<reference ref_id="729247" ref_url="https://bugzilla.suse.com/729247" source="BUGZILLA"/>
		<reference ref_id="731809" ref_url="https://bugzilla.suse.com/731809" source="BUGZILLA"/>
		<reference ref_id="733761" ref_url="https://bugzilla.suse.com/733761" source="BUGZILLA"/>
		<reference ref_id="734300" ref_url="https://bugzilla.suse.com/734300" source="BUGZILLA"/>
		<reference ref_id="734900" ref_url="https://bugzilla.suse.com/734900" source="BUGZILLA"/>
		<reference ref_id="737326" ref_url="https://bugzilla.suse.com/737326" source="BUGZILLA"/>
		<reference ref_id="738210" ref_url="https://bugzilla.suse.com/738210" source="BUGZILLA"/>
		<reference ref_id="738503" ref_url="https://bugzilla.suse.com/738503" source="BUGZILLA"/>
		<reference ref_id="738528" ref_url="https://bugzilla.suse.com/738528" source="BUGZILLA"/>
		<reference ref_id="738679" ref_url="https://bugzilla.suse.com/738679" source="BUGZILLA"/>
		<reference ref_id="740180" ref_url="https://bugzilla.suse.com/740180" source="BUGZILLA"/>
		<reference ref_id="740895" ref_url="https://bugzilla.suse.com/740895" source="BUGZILLA"/>
		<reference ref_id="740969" ref_url="https://bugzilla.suse.com/740969" source="BUGZILLA"/>
		<reference ref_id="742210" ref_url="https://bugzilla.suse.com/742210" source="BUGZILLA"/>
		<reference ref_id="742358" ref_url="https://bugzilla.suse.com/742358" source="BUGZILLA"/>
		<reference ref_id="743209" ref_url="https://bugzilla.suse.com/743209" source="BUGZILLA"/>
		<reference ref_id="743619" ref_url="https://bugzilla.suse.com/743619" source="BUGZILLA"/>
		<reference ref_id="744163" ref_url="https://bugzilla.suse.com/744163" source="BUGZILLA"/>
		<reference ref_id="744658" ref_url="https://bugzilla.suse.com/744658" source="BUGZILLA"/>
		<reference ref_id="745422" ref_url="https://bugzilla.suse.com/745422" source="BUGZILLA"/>
		<reference ref_id="745699" ref_url="https://bugzilla.suse.com/745699" source="BUGZILLA"/>
		<reference ref_id="745832" ref_url="https://bugzilla.suse.com/745832" source="BUGZILLA"/>
		<reference ref_id="745929" ref_url="https://bugzilla.suse.com/745929" source="BUGZILLA"/>
		<reference ref_id="746980" ref_url="https://bugzilla.suse.com/746980" source="BUGZILLA"/>
		<reference ref_id="747028" ref_url="https://bugzilla.suse.com/747028" source="BUGZILLA"/>
		<reference ref_id="747430" ref_url="https://bugzilla.suse.com/747430" source="BUGZILLA"/>
		<reference ref_id="747445" ref_url="https://bugzilla.suse.com/747445" source="BUGZILLA"/>
		<reference ref_id="748112" ref_url="https://bugzilla.suse.com/748112" source="BUGZILLA"/>
		<reference ref_id="748279" ref_url="https://bugzilla.suse.com/748279" source="BUGZILLA"/>
		<reference ref_id="748812" ref_url="https://bugzilla.suse.com/748812" source="BUGZILLA"/>
		<reference ref_id="749342" ref_url="https://bugzilla.suse.com/749342" source="BUGZILLA"/>
		<reference ref_id="749569" ref_url="https://bugzilla.suse.com/749569" source="BUGZILLA"/>
		<reference ref_id="749886" ref_url="https://bugzilla.suse.com/749886" source="BUGZILLA"/>
		<reference ref_id="750079" ref_url="https://bugzilla.suse.com/750079" source="BUGZILLA"/>
		<reference ref_id="750171" ref_url="https://bugzilla.suse.com/750171" source="BUGZILLA"/>
		<reference ref_id="751322" ref_url="https://bugzilla.suse.com/751322" source="BUGZILLA"/>
		<reference ref_id="751844" ref_url="https://bugzilla.suse.com/751844" source="BUGZILLA"/>
		<reference ref_id="751880" ref_url="https://bugzilla.suse.com/751880" source="BUGZILLA"/>
		<reference ref_id="752491" ref_url="https://bugzilla.suse.com/752491" source="BUGZILLA"/>
		<reference ref_id="752634" ref_url="https://bugzilla.suse.com/752634" source="BUGZILLA"/>
		<reference ref_id="752972" ref_url="https://bugzilla.suse.com/752972" source="BUGZILLA"/>
		<reference ref_id="755178" ref_url="https://bugzilla.suse.com/755178" source="BUGZILLA"/>
		<reference ref_id="755537" ref_url="https://bugzilla.suse.com/755537" source="BUGZILLA"/>
		<reference ref_id="756448" ref_url="https://bugzilla.suse.com/756448" source="BUGZILLA"/>
		<reference ref_id="756840" ref_url="https://bugzilla.suse.com/756840" source="BUGZILLA"/>
		<reference ref_id="757917" ref_url="https://bugzilla.suse.com/757917" source="BUGZILLA"/>
		<reference ref_id="758532" ref_url="https://bugzilla.suse.com/758532" source="BUGZILLA"/>
		<reference ref_id="758813" ref_url="https://bugzilla.suse.com/758813" source="BUGZILLA"/>
		<reference ref_id="759544" ref_url="https://bugzilla.suse.com/759544" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083/" source="CVE"/>
		<reference ref_id="CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086/" source="CVE"/>
		<reference ref_id="CVE-2011-4622" ref_url="https://www.suse.com/security/cve/CVE-2011-4622/" source="CVE"/>
		<reference ref_id="CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045/" source="CVE"/>
		<reference ref_id="CVE-2012-0879" ref_url="https://www.suse.com/security/cve/CVE-2012-0879/" source="CVE"/>
		<reference ref_id="CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090/" source="CVE"/>
		<reference ref_id="CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097/" source="CVE"/>
		<reference ref_id="CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP1 kernel have been updated to the 2.6.32.59 
stable release to fix a lot of bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-2133: A use after free bug in hugetlb support could be used
      by local attackers to crash the system.
    * CVE-2012-1097: A null pointer dereference bug in the regsets proc
      file could be used by local attackers to perhaps crash the system.
      With mmap_min_addr is set and enabled, exploitation is unlikely.
    * CVE-2012-0879: A reference counting issue in CLONE_IO could be used
      by local attackers to cause a denial of service (out of memory).
    * CVE-2012-1090: A file handle leak in CIFS code could be used by local
      attackers to crash the system.
    * CVE-2011-1083: Large nested epoll chains could be used by local
      attackers to cause a denial of service (excessive CPU consumption).
    * CVE-2011-4622: When using KVM, programming a PIT timer without a
      irqchip configuration, can be used to crash the kvm guest. This
      likely can be done only by a privileged guest user.
    * CVE-2012-0045: A KVM 32bit guest crash in 'syscall' opcode handling
      was fixed that could be caused by local attackers.
    * CVE-2011-4086: Fixed a oops in jbd/jbd2 that could be caused by
      specific filesystem access patterns.

The following non-security issues have been fixed:

X86:

    * x86: fix the initialization of physnode_map (bnc#748112).
    * x86: Allow bootmem reserves at greater than 8G node offset within a
      node (bnc#740895).
    * x86, tsc: Fix SMI induced variation in quick_pit_calibrate().
      (bnc#751322)
    * x86, efi: Work around broken firmware. (bnc#714507)

BONDING:

    * bonding: update speed/duplex for NETDEV_CHANGE (bnc#752634).
    * bonding: comparing a u8 with -1 is always false (bnc#752634).
    * bonding: start slaves with link down for ARP monitor (bnc#752634).
    * bonding: send gratuitous ARP for all addresses (bnc#752491).

XFS:

    * xfs: Fix excessive inode syncing when project quota is exceeded
      (bnc#756448).
    * xfs: Fix oops on IO error during xlog_recover_process_iunlinks()
      (bnc#716850).

SCSI:

    * scsi/ses: Handle non-unique element descriptors (bnc#749342,
      bnc#617344).
    * scsi/sd: mark busy sd majors as allocated (bug#744658).
    * scsi: Check for invalid sdev in scsi_prep_state_check() (bnc#734300).

MD/RAID:

    * md: fix possible corruption of array metadata on shutdown.
    * md: ensure changes to write-mostly are reflected in metadata
      (bnc#755178).
    * md: do not set md arrays to readonly on shutdown (bnc#740180,
      bnc#713148, bnc#734900).

XEN:

    * smpboot: adjust ordering of operations.
    * x86-64: provide a memset() that can deal with 4Gb or above at a time
      (bnc#738528).
    * blkfront: properly fail packet requests (bnc#745929).
    * Update Xen patches to 2.6.32.57.
    * xenbus: Reject replies with payload &gt; XENSTORE_PAYLOAD_MAX.
    * xenbus_dev: add missing error checks to watch handling.
    * Refresh other Xen patches (bnc#652942, bnc#668194, bnc#688079).
    * fix Xen-specific kABI issue in Linux 2.6.19.

NFS:

    * NFSD: Fill in WCC data for REMOVE, RMDIR, MKNOD, and MKDIR
      (bnc#751880).
    * nfs: Include SYNC flag when comparing mount options with NOAC flag
      (bnc#745422).
    * NFS returns EIO for EDQUOT and others (bnc#747028).
    * lockd: fix arg parsing for grace_period and timeout (bnc#733761).
    * nfs: allow nfs4leasetime to be set before starting servers
      (bnc#733761).
    * nfs: handle d_revalidate of dot correctly (bnc#731809).

S/390:

    * ctcmpc: use correct idal word list for ctcmpc (bnc#750171,LTC#79264).
    * qeth: synchronize discipline module loading (bnc#747430,LTC#78788).
    * qdio: avoid race leading to stall when tolerating CQ
      (bnc#737326,LTC#76599).
    * kernel: no storage key operations for invalid page table entries
      (bnc#737326,LTC#77697).

OTHER:

    * tlan: add cast needed for proper 64 bit operation (bnc#756840).
    * dl2k: Tighten ioctl permissions (bnc#758813).
    * tg3: Fix RSS ring refill race condition (bnc#757917).
    * usbhid: fix error handling of not enough bandwidth (bnc#704280).
    * pagecache limit: Fix the shmem deadlock (bnc#755537).
    * tty_audit: fix tty_audit_add_data live lock on audit disabled
      (bnc#721366).
    * ixgbe: driver sets all WOL flags upon initialization so that machine
      is powered on as soon at it is switched off (bnc#693639)
    * PCI: Set device power state to PCI_D0 for device without native PM
      support (bnc#752972).
    * dlm: Do not allocate a fd for peeloff (bnc#729247).
    * sctp: Export sctp_do_peeloff (bnc#729247).
    * epoll: Do not limit non-nested epoll paths (bnc#676204).
    * mlx4: Limit MSI-X vector allocation (bnc#624072).
    * mlx4: Changing interrupt scheme (bnc#624072).
    * mlx4_en: Assigning TX irq per ring (bnc#624072).
    * mlx4_en: Restoring RX buffer pointer in case of failure (bnc#624072).
    * mlx4_en: using new mlx4 interrupt scheme (bnc#624072).
    * igb: Fix for Alt MAC Address feature on 82580 and later devices
      (bnc#746980).
    * igb: Power down link when interface is down (bnc#745699).
    * igb: use correct bits to identify if managability is enabled
      (bnc#743209).
    * intel_agp: Do not oops with zero stolen memory (bnc#738679).
    * agp: fix scratch page cleanup (bnc#738679).
    * hugetlb: add generic definition of NUMA_NO_NODE (bnc#751844).
    * sched: Fix proc_sched_set_task() (bnc#717994).
    * PM: Print a warning if firmware is requested when tasks are frozen
      (bnc#749886).
    * PM / Sleep: Fix freezer failures due to racy
      usermodehelper_is_disabled() (bnc#749886).
    * PM / Sleep: Fix read_unlock_usermodehelper() call (bnc#749886).
    * firmware loader: allow builtin firmware load even if usermodehelper
      is disabled (bnc#749886).
    * PM / Hibernate: Enable usermodehelpers in software_resume() error
      path (bnc#744163).
    * ipv6: Allow inet6_dump_addr() to handle more than 64 addresses
      (bnc#748279).
    * ipv6: fix refcnt problem related to POSTDAD state (bnc#743619).
    * be2net: change to show correct physical link status (bnc#727834).
    * be2net: changes to properly provide phy details (bnc#727834).
    * aio: fix race between io_destroy() and io_submit() (bnc#747445
      bnc#611264).
    * intel-iommu: Check for identity mapping candidate using system dma
      mask (bnc#700449).
    * intel-iommu: Dont cache iova above 32bit (bnc#700449).
    * intel-iommu: Add domain check in domain_remove_one_dev_info
      (bnc#700449).
    * intel-iommu: Provide option to enable 64-bit IOMMU pass through mode
      (bnc#700449).
    * intel-iommu: Remove Host Bridge devices from identity mapping
      (bnc#700449).
    * intel-iommu: Speed up processing of the identity_mapping function
      (bnc#700449).
    * intel-iommu: Use coherent DMA mask when requested (bnc#700449).
    * 1: Fix accounting of softirq time when idle (bnc#719793).
    * driver-core: fix race between device_register and driver_register
      (bnc#742358).
    * dcache: patches.fixes/large-hash-dcache_init-fix.patch: Fix oops when
      initializing large hash on &gt; 16TB machine (bnc#742210).
    * kdump: Save PG_compound or PG_head value in VMCOREINFO (bnc#738503).
    * Update config files: disable NET_9P_RDMA (bnc#720374).
    * cdc-wdm: fix race leading leading to memory corruption (bnc#759544).

Security Issue references:

    * CVE-2011-1083
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083&gt;
    * CVE-2011-4086
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086&gt;
    * CVE-2011-4622
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4622&gt;
    * CVE-2012-0045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0045&gt;
    * CVE-2012-0879
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0879&gt;
    * CVE-2012-1090
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1090&gt;
    * CVE-2012-1097
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1097&gt;
    * CVE-2012-2133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-28"/>
	<updated date="2012-04-28"/>
	<bugzilla href="https://bugzilla.suse.com/611264">SUSE bug 611264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617344">SUSE bug 617344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624072">SUSE bug 624072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652942">SUSE bug 652942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668194">SUSE bug 668194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688079">SUSE bug 688079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693639">SUSE bug 693639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697920">SUSE bug 697920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700449">SUSE bug 700449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704280">SUSE bug 704280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713148">SUSE bug 713148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714507">SUSE bug 714507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716850">SUSE bug 716850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717994">SUSE bug 717994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719793">SUSE bug 719793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/720374">SUSE bug 720374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/721366">SUSE bug 721366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727834">SUSE bug 727834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729247">SUSE bug 729247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/731809">SUSE bug 731809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/733761">SUSE bug 733761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734300">SUSE bug 734300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734900">SUSE bug 734900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/737326">SUSE bug 737326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738210">SUSE bug 738210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738503">SUSE bug 738503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738528">SUSE bug 738528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738679">SUSE bug 738679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740180">SUSE bug 740180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740895">SUSE bug 740895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740969">SUSE bug 740969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742210">SUSE bug 742210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742358">SUSE bug 742358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743209">SUSE bug 743209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743619">SUSE bug 743619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744163">SUSE bug 744163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744658">SUSE bug 744658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745422">SUSE bug 745422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745699">SUSE bug 745699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745929">SUSE bug 745929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746980">SUSE bug 746980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747028">SUSE bug 747028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747430">SUSE bug 747430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747445">SUSE bug 747445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748112">SUSE bug 748112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748279">SUSE bug 748279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748812">SUSE bug 748812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749342">SUSE bug 749342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749569">SUSE bug 749569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749886">SUSE bug 749886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750079">SUSE bug 750079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750171">SUSE bug 750171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751322">SUSE bug 751322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751844">SUSE bug 751844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751880">SUSE bug 751880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752491">SUSE bug 752491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752634">SUSE bug 752634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752972">SUSE bug 752972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755178">SUSE bug 755178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755537">SUSE bug 755537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756448">SUSE bug 756448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756840">SUSE bug 756840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757917">SUSE bug 757917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758813">SUSE bug 758813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759544">SUSE bug 759544</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4622/">CVE-2011-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0879/">CVE-2012-0879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572131" comment="btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572132" comment="btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572133" comment="btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572134" comment="ext4dev-kmp-default-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572135" comment="ext4dev-kmp-pae-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572136" comment="ext4dev-kmp-ppc64-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572137" comment="ext4dev-kmp-trace-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572138" comment="ext4dev-kmp-xen-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572139" comment="hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572140" comment="hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572141" comment="hyper-v-kmp-trace-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572142" comment="iscsitarget-kmp-default-1.4.19_2.6.32.19_0.3-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572143" comment="kernel-default-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572144" comment="kernel-default-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572145" comment="kernel-default-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572146" comment="kernel-default-man-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572147" comment="kernel-ec2-2.6.32.59-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572148" comment="kernel-ec2-base-2.6.32.59-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572149" comment="kernel-ec2-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572150" comment="kernel-pae-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572151" comment="kernel-pae-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572152" comment="kernel-pae-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572153" comment="kernel-ppc64-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572154" comment="kernel-ppc64-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572155" comment="kernel-ppc64-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572156" comment="kernel-source-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572157" comment="kernel-syms-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572158" comment="kernel-trace-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572159" comment="kernel-trace-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572160" comment="kernel-trace-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572161" comment="kernel-xen-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572162" comment="kernel-xen-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572163" comment="kernel-xen-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572164" comment="oracleasm-kmp-default-2.0.5_2.6.32.19_0.3-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572165" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572166" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572167" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572131" comment="btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572132" comment="btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572133" comment="btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572134" comment="ext4dev-kmp-default-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572135" comment="ext4dev-kmp-pae-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572136" comment="ext4dev-kmp-ppc64-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572137" comment="ext4dev-kmp-trace-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572138" comment="ext4dev-kmp-xen-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572139" comment="hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572140" comment="hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572141" comment="hyper-v-kmp-trace-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572142" comment="iscsitarget-kmp-default-1.4.19_2.6.32.19_0.3-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572143" comment="kernel-default-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572144" comment="kernel-default-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572145" comment="kernel-default-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572146" comment="kernel-default-man-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572147" comment="kernel-ec2-2.6.32.59-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572148" comment="kernel-ec2-base-2.6.32.59-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572149" comment="kernel-ec2-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572150" comment="kernel-pae-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572151" comment="kernel-pae-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572152" comment="kernel-pae-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572153" comment="kernel-ppc64-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572154" comment="kernel-ppc64-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572155" comment="kernel-ppc64-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572156" comment="kernel-source-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572157" comment="kernel-syms-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572158" comment="kernel-trace-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572159" comment="kernel-trace-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572160" comment="kernel-trace-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572161" comment="kernel-xen-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572162" comment="kernel-xen-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572163" comment="kernel-xen-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572164" comment="oracleasm-kmp-default-2.0.5_2.6.32.19_0.3-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572165" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572166" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572167" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572131" comment="btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572132" comment="btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572133" comment="btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572134" comment="ext4dev-kmp-default-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572135" comment="ext4dev-kmp-pae-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572136" comment="ext4dev-kmp-ppc64-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572137" comment="ext4dev-kmp-trace-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572138" comment="ext4dev-kmp-xen-0_2.6.32.59_0.3-7.9.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572139" comment="hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572140" comment="hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572141" comment="hyper-v-kmp-trace-0_2.6.32.59_0.3-0.18.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572142" comment="iscsitarget-kmp-default-1.4.19_2.6.32.19_0.3-0.7.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572143" comment="kernel-default-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572144" comment="kernel-default-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572145" comment="kernel-default-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572146" comment="kernel-default-man-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572147" comment="kernel-ec2-2.6.32.59-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572148" comment="kernel-ec2-base-2.6.32.59-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572149" comment="kernel-ec2-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572150" comment="kernel-pae-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572151" comment="kernel-pae-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572152" comment="kernel-pae-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572153" comment="kernel-ppc64-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572154" comment="kernel-ppc64-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572155" comment="kernel-ppc64-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572156" comment="kernel-source-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572157" comment="kernel-syms-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572158" comment="kernel-trace-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572159" comment="kernel-trace-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572160" comment="kernel-trace-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572161" comment="kernel-xen-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572162" comment="kernel-xen-base-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572163" comment="kernel-xen-devel-2.6.32.59-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572164" comment="oracleasm-kmp-default-2.0.5_2.6.32.19_0.3-7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572165" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572166" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572167" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39168" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="564324" ref_url="https://bugzilla.suse.com/564324" source="BUGZILLA"/>
		<reference ref_id="573330" ref_url="https://bugzilla.suse.com/573330" source="BUGZILLA"/>
		<reference ref_id="603738" ref_url="https://bugzilla.suse.com/603738" source="BUGZILLA"/>
		<reference ref_id="609196" ref_url="https://bugzilla.suse.com/609196" source="BUGZILLA"/>
		<reference ref_id="612729" ref_url="https://bugzilla.suse.com/612729" source="BUGZILLA"/>
		<reference ref_id="623307" ref_url="https://bugzilla.suse.com/623307" source="BUGZILLA"/>
		<reference ref_id="624850" ref_url="https://bugzilla.suse.com/624850" source="BUGZILLA"/>
		<reference ref_id="629901" ref_url="https://bugzilla.suse.com/629901" source="BUGZILLA"/>
		<reference ref_id="629908" ref_url="https://bugzilla.suse.com/629908" source="BUGZILLA"/>
		<reference ref_id="638860" ref_url="https://bugzilla.suse.com/638860" source="BUGZILLA"/>
		<reference ref_id="639261" ref_url="https://bugzilla.suse.com/639261" source="BUGZILLA"/>
		<reference ref_id="640278" ref_url="https://bugzilla.suse.com/640278" source="BUGZILLA"/>
		<reference ref_id="643249" ref_url="https://bugzilla.suse.com/643249" source="BUGZILLA"/>
		<reference ref_id="644219" ref_url="https://bugzilla.suse.com/644219" source="BUGZILLA"/>
		<reference ref_id="644350" ref_url="https://bugzilla.suse.com/644350" source="BUGZILLA"/>
		<reference ref_id="644373" ref_url="https://bugzilla.suse.com/644373" source="BUGZILLA"/>
		<reference ref_id="646045" ref_url="https://bugzilla.suse.com/646045" source="BUGZILLA"/>
		<reference ref_id="647392" ref_url="https://bugzilla.suse.com/647392" source="BUGZILLA"/>
		<reference ref_id="647497" ref_url="https://bugzilla.suse.com/647497" source="BUGZILLA"/>
		<reference ref_id="647775" ref_url="https://bugzilla.suse.com/647775" source="BUGZILLA"/>
		<reference ref_id="648308" ref_url="https://bugzilla.suse.com/648308" source="BUGZILLA"/>
		<reference ref_id="649231" ref_url="https://bugzilla.suse.com/649231" source="BUGZILLA"/>
		<reference ref_id="649257" ref_url="https://bugzilla.suse.com/649257" source="BUGZILLA"/>
		<reference ref_id="649820" ref_url="https://bugzilla.suse.com/649820" source="BUGZILLA"/>
		<reference ref_id="650109" ref_url="https://bugzilla.suse.com/650109" source="BUGZILLA"/>
		<reference ref_id="650111" ref_url="https://bugzilla.suse.com/650111" source="BUGZILLA"/>
		<reference ref_id="650113" ref_url="https://bugzilla.suse.com/650113" source="BUGZILLA"/>
		<reference ref_id="650116" ref_url="https://bugzilla.suse.com/650116" source="BUGZILLA"/>
		<reference ref_id="650128" ref_url="https://bugzilla.suse.com/650128" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2963" ref_url="https://www.suse.com/security/cve/CVE-2010-2963/" source="CVE"/>
		<reference ref_id="CVE-2010-3865" ref_url="https://www.suse.com/security/cve/CVE-2010-3865/" source="CVE"/>
		<reference ref_id="CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904/" source="CVE"/>
		<description>

This update of the SUSE Linux Enterprise Server 11 SP1 kernel brings the 
kernel to 2.6.32.24 and fixes some critical security bugs and other 
non-security bugs.

Following security bugs were fixed:

    * 

      CVE-2010-3865: A iovec integer overflow in RDS sockets was fixed
      which could lead to local attackers gaining kernel privileges.

    * 

      CVE-2010-3904: A local privilege escalation in RDS sockets allowed
      local attackers to gain privileges.

      Please note that the net/rds socket protocol module only lives in the
      -extra kernel package, which is not installed by default on the SUSE
      Linux Enterprise Server 11.

    * 

      CVE-2010-2963: A problem in the compat ioctl handling in video4linux
      allowed local attackers with a video device plugged in to gain
      privileges on x86_64 systems.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-11-03"/>
	<updated date="2010-11-03"/>
	<bugzilla href="https://bugzilla.suse.com/564324">SUSE bug 564324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/573330">SUSE bug 573330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603738">SUSE bug 603738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/609196">SUSE bug 609196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612729">SUSE bug 612729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623307">SUSE bug 623307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/624850">SUSE bug 624850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629901">SUSE bug 629901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629908">SUSE bug 629908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638860">SUSE bug 638860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639261">SUSE bug 639261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/640278">SUSE bug 640278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643249">SUSE bug 643249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644219">SUSE bug 644219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644350">SUSE bug 644350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644373">SUSE bug 644373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646045">SUSE bug 646045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647392">SUSE bug 647392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647497">SUSE bug 647497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647775">SUSE bug 647775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648308">SUSE bug 648308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649231">SUSE bug 649231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649257">SUSE bug 649257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649820">SUSE bug 649820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650109">SUSE bug 650109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650111">SUSE bug 650111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650113">SUSE bug 650113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650116">SUSE bug 650116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/650128">SUSE bug 650128</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2963/">CVE-2010-2963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3865/">CVE-2010-3865</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572168" comment="kernel-ec2-2.6.32.24-0.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572169" comment="kernel-ec2-base-2.6.32.24-0.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39169" version="1" class="patch">
	<metadata>
		<title>Security update for Kerberos 5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="698471" ref_url="https://bugzilla.suse.com/698471" source="BUGZILLA"/>
		<reference ref_id="738632" ref_url="https://bugzilla.suse.com/738632" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>

This update of krb5 fixes two security issues.

    * CVE-2011-4862: A remote code execution in the kerberized telnet
      daemon was fixed. (This only affects the ktelnetd from the krb5-appl
      RPM, not the regular telnetd supplied by SUSE.)
    * CVE-2011-1526 / MITKRB5-SA-2011-005: Fixed krb5 ftpd unauthorized
      file access problems.

Security Issue reference:

    * CVE-2011-4862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-29"/>
	<updated date="2011-12-29"/>
	<bugzilla href="https://bugzilla.suse.com/698471">SUSE bug 698471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738632">SUSE bug 738632</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572170" comment="krb5-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572171" comment="krb5-32bit-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572172" comment="krb5-apps-clients-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572173" comment="krb5-apps-servers-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572174" comment="krb5-client-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572176" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572177" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572178" comment="krb5-server-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572179" comment="krb5-x86-1.6.3-133.48.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572170" comment="krb5-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572171" comment="krb5-32bit-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572172" comment="krb5-apps-clients-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572173" comment="krb5-apps-servers-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572174" comment="krb5-client-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572176" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572177" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572178" comment="krb5-server-1.6.3-133.48.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572179" comment="krb5-x86-1.6.3-133.48.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39170" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572180" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566764" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572181" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572182" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572183" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572185" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572186" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572187" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39171" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572188" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572189" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572190" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572191" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572192" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39172" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572193" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572194" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572195" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572196" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572197" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39173" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572198" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572199" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572200" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572201" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572202" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572203" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39174" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770172" ref_url="https://bugzilla.suse.com/770172" source="BUGZILLA"/>
		<reference ref_id="816413" ref_url="https://bugzilla.suse.com/816413" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="952190" ref_url="https://bugzilla.suse.com/952190" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1015" ref_url="https://www.suse.com/security/cve/CVE-2012-1015/" source="CVE"/>
		<reference ref_id="CVE-2013-1416" ref_url="https://www.suse.com/security/cve/CVE-2013-1416/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- Incorrect string handling in build_principal_va can lead to DOS. (bsc#952190, CVE-2015-2697)
- Fix potential heap corruption and crash vulnerability described in MIT krb5 Security Advisory 2012-001. 
  (bsc#770172, CVE-2012-1015)
- Fix prep_reprocess_req NULL pointer deref. (bsc#816413, CVE-2013-1416)
- Fix Denial of service in krb5_read_message. (bsc#918595, CVE-2014-5355)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-12"/>
	<updated date="2017-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1015/">CVE-2012-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1416/">CVE-2013-1416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572204" comment="krb5-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572205" comment="krb5-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572206" comment="krb5-apps-clients-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572207" comment="krb5-apps-servers-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572208" comment="krb5-client-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572209" comment="krb5-devel-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572210" comment="krb5-devel-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572211" comment="krb5-doc-1.8.6-133.49.121.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572212" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572213" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572214" comment="krb5-server-1.8.6-133.49.121.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39175" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025126" ref_url="https://bugzilla.suse.com/1025126" source="BUGZILLA"/>
		<reference ref_id="1049819" ref_url="https://bugzilla.suse.com/1049819" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-11368: Fix an unintended assertion failure in KDC (bsc#1049819)


Also the openssl1 LDAP library build is now used for the LDAP plugin components. (bsc#1025126).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025126">SUSE bug 1025126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572215" comment="krb5-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572216" comment="krb5-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572217" comment="krb5-apps-clients-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572218" comment="krb5-apps-servers-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572219" comment="krb5-client-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572220" comment="krb5-devel-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572221" comment="krb5-devel-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572222" comment="krb5-doc-1.8.6-133.49.125.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572223" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572224" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572225" comment="krb5-server-1.8.6-133.49.125.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39176" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issues:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572226" comment="krb5-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572227" comment="krb5-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572228" comment="krb5-apps-clients-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572229" comment="krb5-apps-servers-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572230" comment="krb5-client-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572231" comment="krb5-devel-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572232" comment="krb5-devel-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572233" comment="krb5-doc-1.8.6-133.49.125.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572234" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572235" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572236" comment="krb5-server-1.8.6-133.49.125.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39177" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572237" comment="krb5-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572238" comment="krb5-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572239" comment="krb5-apps-clients-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572240" comment="krb5-apps-servers-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572241" comment="krb5-client-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572242" comment="krb5-devel-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572243" comment="krb5-devel-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572244" comment="krb5-doc-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572245" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572246" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572247" comment="krb5-server-1.8.6-133.49.125.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39178" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572248" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566770" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572249" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572250" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572251" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572253" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572254" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572255" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39179" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572256" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572257" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572258" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572259" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572261" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572262" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572263" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39180" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572264" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572265" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572266" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572267" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572269" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572270" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572271" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39181" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="695510" ref_url="https://bugzilla.suse.com/695510" source="BUGZILLA"/>
		<reference ref_id="705304" ref_url="https://bugzilla.suse.com/705304" source="BUGZILLA"/>
		<reference ref_id="740165" ref_url="https://bugzilla.suse.com/740165" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2527" ref_url="https://www.suse.com/security/cve/CVE-2011-2527/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<description>

The following vulnerabilities have been fixed in KVM:

    * buffer overflow in e1000 device emulation (CVE-2012-0029)
    * missing initgroups() for -runas (CVE-2011-2527)

Security Issue references:

    * CVE-2011-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2527&gt;
    * CVE-2012-0029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-16"/>
	<updated date="2012-01-16"/>
	<bugzilla href="https://bugzilla.suse.com/695510">SUSE bug 695510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705304">SUSE bug 705304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2527/">CVE-2011-2527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572272" comment="kvm-0.12.5-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572272" comment="kvm-0.12.5-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572272" comment="kvm-0.12.5-1.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39182" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572273" comment="kvm-0.12.5-1.30.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572273" comment="kvm-0.12.5-1.30.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39183" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="1179466" ref_url="https://bugzilla.suse.com/1179466" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="942845" ref_url="https://bugzilla.suse.com/942845" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2017-2633: memory corruption due to unchecked resolution limit in VNC. (bsc#1026612)
- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2019-14378: heap buffer overflow during packet reassembly in slirp networking implementation. (bsc#1143794)
- CVE-2020-1983: use-after-free in ip_reass function in ip_input.c. (bsc#1170940)
- CVE-2020-29130: out-of-bounds access while processing ARP packets. (bsc#1179467)
- CVE-2013-4530: fix buffer overun on invalid state load. (bsc#864682)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2015-5225 heap memory corruption in vnc_refresh_server_surface. (bsc#942845)
- CVE-2020-29129: out-of-bounds access while processing NCSI packets. (bsc#1179466)
- CVE-2020-8608: potential OOB access due to unsafe snprintf() usages. (bsc#1163018)
- CVE-2017-5715: speculative side channel attacks on various CPU platforms aka 'SpectreAttack' and 'MeltdownAttack'. (bsc#1068032)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942845">SUSE bug 942845</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626551" comment="kvm-0.12.5-1.31.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39184" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630649" comment="kvm-0.12.5-1.31.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39185" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS allowed 
remote attackers to cause a denial of service (crash) via a crafted (1) ICC 
color profile to the icctrans utility or (2) TIFF image to the tiffdiff 
utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572274" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572275" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39186" version="1" class="patch">
	<metadata>
		<title>Security update for less (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="921719" ref_url="https://bugzilla.suse.com/921719" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
This update for less fixes the following issues:

Security issue fixed:

- CVE-2014-9488: Malformed UTF-8 data could have caused an out of bounds read in 
  the UTF-8 decoding routines, causing an invalid read access (bsc#921719).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921719">SUSE bug 921719</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572276" comment="less-424b-10.24.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39187" version="1" class="patch">
	<metadata>
		<title>Security update for lha (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="962528" ref_url="https://bugzilla.suse.com/962528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1925" ref_url="https://www.suse.com/security/cve/CVE-2016-1925/" source="CVE"/>
		<description>

lha was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1925: Buffer Overflow while parsing level0 and level1 headers (bsc#962528).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-28"/>
	<updated date="2016-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1925/">CVE-2016-1925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572277" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39188" version="1" class="patch">
	<metadata>
		<title>Security update for libHX13</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="631582" ref_url="https://bugzilla.suse.com/631582" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>

This update fixes a heap-based buffer overflow in HX_split() of libHX. 
(CVE-2010-2947)

Security Issue reference:

    * CVE-2010-2947
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-23"/>
	<updated date="2010-08-23"/>
	<bugzilla href="https://bugzilla.suse.com/631582">SUSE bug 631582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570192" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570193" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570194" comment="libHX13-x86-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570192" comment="libHX13-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570193" comment="libHX13-32bit-1.23-4.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570194" comment="libHX13-x86-1.23-4.1.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39189" version="1" class="patch">
	<metadata>
		<title>Security update for libapr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="650435" ref_url="https://bugzilla.suse.com/650435" source="BUGZILLA"/>
		<reference ref_id="693778" ref_url="https://bugzilla.suse.com/693778" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 650435: remote DoS in APR (CVE-2010-1623)
    * 693778: unconstrained recursion when processing patterns
      (CVE-2011-0419,CVE-2011-1928)

Security Issue reference:

    * CVE-2011-0419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419&gt;
    * CVE-2010-1623
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623&gt;
    * CVE-2011-1928
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-07-07"/>
	<updated date="2011-07-07"/>
	<bugzilla href="https://bugzilla.suse.com/650435">SUSE bug 650435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572278" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572279" comment="libapr-util1-32bit-1.3.4-12.22.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572280" comment="libapr1-1.3.3-11.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572281" comment="libapr1-32bit-1.3.3-11.18.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572278" comment="libapr-util1-1.3.4-12.22.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572279" comment="libapr-util1-32bit-1.3.4-12.22.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572280" comment="libapr1-1.3.3-11.18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572281" comment="libapr1-32bit-1.3.3-11.18.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39190" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572282" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39191" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="moderate" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572283" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39192" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670907" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39193" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681248" comment="libcaca-0.99.beta13b-49.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39194" version="1" class="patch">
	<metadata>
		<title>Security update for libcap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="727715" ref_url="https://bugzilla.suse.com/727715" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4099" ref_url="https://www.suse.com/security/cve/CVE-2011-4099/" source="CVE"/>
		<description>

The following bug has been fixed:

    * capsh did not chdir('/') after callling chroot(). Programs could
      therefore access the current directory outside of the chroot
      (CVE-2011-4099).

Security Issue reference:

    * CVE-2011-4099
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4099&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-05"/>
	<updated date="2011-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/727715">SUSE bug 727715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4099/">CVE-2011-4099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572284" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572285" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572286" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572287" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572284" comment="libcap-progs-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572285" comment="libcap2-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572286" comment="libcap2-32bit-2.11-2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572287" comment="libcap2-x86-2.11-2.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39195" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630423" comment="libcares2-1.7.4-7.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39196" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1082821" ref_url="https://bugzilla.suse.com/1082821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<description>
This update for libcdio and libcdio-mini fixes the following issues:

Security issue fixed: 

- CVE-2017-18199: Fixed a NULL Pointer Dereference in realloc_symlink which could allow remote attackers to cause Denial of Service (bsc#1082821).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572288" comment="libcdio7-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572289" comment="libcdio7-32bit-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572290" comment="libcdio_cdda0-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572291" comment="libcdio_paranoia0-0.80-8.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39197" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030747" ref_url="https://bugzilla.suse.com/1030747" source="BUGZILLA"/>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

Bug fixes:

- bsc#1030747: Unable to use freezer sub system via libcgroup API when both freezer and cpuset subsystems are used.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1030747">SUSE bug 1030747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572292" comment="libcgroup1-0.37.1-5.19.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39198" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-13"/>
	<updated date="2019-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572293" comment="libcroco-0_6-3-0.6.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572294" comment="libcroco-0_6-3-32bit-0.6.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39199" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631918" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631919" comment="libcroco-0_6-3-32bit-0.6.1-122.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39200" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572295" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572296" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572297" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572298" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572299" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39201" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592414" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592415" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591139" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592416" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592417" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592418" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592419" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592414" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592415" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591139" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592416" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592417" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592418" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592419" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39202" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629508" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39203" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572307" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39204" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572308" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39205" version="1" class="patch">
	<metadata>
		<title>Security update for libexif</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="771229" ref_url="https://bugzilla.suse.com/771229" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>

Various overflows and other security related bugs in libexif were found by 
the Google Security team and fixed by the libexif developers.

Security Issue references:

    * CVE-2012-2812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812&gt;
    * CVE-2012-2813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813&gt;
    * CVE-2012-2814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814&gt;
    * CVE-2012-2836
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836&gt;
    * CVE-2012-2837
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837&gt;
    * CVE-2012-2840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840&gt;
    * CVE-2012-2841
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-17"/>
	<updated date="2012-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572309" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572310" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572311" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572309" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572310" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572311" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572309" comment="libexif-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572310" comment="libexif-32bit-0.6.17-2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572311" comment="libexif-x86-0.6.17-2.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39206" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572312" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572313" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39207" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572314" comment="libexif-0.6.17-2.14.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572315" comment="libexif-32bit-0.6.17-2.14.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39208" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="637290" ref_url="https://bugzilla.suse.com/637290" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<description>

The Mozilla NSS Library was updated to version 3.12.8 and the Mozilla NSPR 
Library was updated to 4.8.6 to fix various bugs and one security issue:

    * CVE-2010-3170: Disallow wildcard matching in X509 certificate Common
      Names.

This update also has preparations for Firefox 4 support, and a updated Root 
Certificate Authority list.

Security Issue reference:

    * CVE-2010-3170
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-18"/>
	<updated date="2010-10-18"/>
	<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570200" comment="libfreebl3-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570201" comment="libfreebl3-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570202" comment="libfreebl3-x86-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570203" comment="mozilla-nspr-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570204" comment="mozilla-nspr-32bit-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570205" comment="mozilla-nspr-x86-4.8.6-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570206" comment="mozilla-nss-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570207" comment="mozilla-nss-32bit-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570208" comment="mozilla-nss-tools-3.12.8-1.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570209" comment="mozilla-nss-x86-3.12.8-1.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39209" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

libgcrypt has been updated to fix a cryptographic weakness.

    * CVE-2013-4242: libgcrypt was affected by the Yarom/Falkner
      flush+reload side-channel attach on RSA secret keys, that could have
      potentially leaked the key data to attackers on the same machine.

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-06"/>
	<updated date="2014-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572316" comment="libgcrypt11-1.4.1-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572317" comment="libgcrypt11-32bit-1.4.1-6.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572316" comment="libgcrypt11-1.4.1-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572317" comment="libgcrypt11-32bit-1.4.1-6.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39210" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<description>


This update fixes the following issues:
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572318" comment="libgcrypt11-1.4.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572319" comment="libgcrypt11-32bit-1.4.1-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39211" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572320" comment="libgcrypt11-1.4.1-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572321" comment="libgcrypt11-32bit-1.4.1-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39212" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following security issue:

- CVE-2017-7526: Hardening against local side-channel attack. (bsc#1046607)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-18"/>
	<updated date="2017-07-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572322" comment="libgcrypt11-1.4.1-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572323" comment="libgcrypt11-32bit-1.4.1-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39213" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issue fixed:

- CVE-2019-13627: Mitigated against an ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-16"/>
	<updated date="2019-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572324" comment="libgcrypt11-1.4.1-6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572325" comment="libgcrypt11-32bit-1.4.1-6.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39214" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572326" comment="libgcrypt11-1.4.1-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572327" comment="libgcrypt11-32bit-1.4.1-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39215" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572328" comment="libgcrypt11-1.4.1-6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572329" comment="libgcrypt11-32bit-1.4.1-6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39216" version="1" class="patch">
	<metadata>
		<title>Security update for libgdiplus0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="630756" ref_url="https://bugzilla.suse.com/630756" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-1526" ref_url="https://www.suse.com/security/cve/CVE-2010-1526/" source="CVE"/>
		<description>

This update fixes three integer overflows found by Secunia Research member 
Stefan Cornelius that could possibly be exploited to execute arbitrary 
code:

    * gdip_load_tiff_image() by processing specially crafted TIFF images
    * gdip_load_jpeg_image_internal() by processing specially crafted JPEG
      images
    * gdip_read_bmp_image() by processing specially crafted BMP image

Security Issue reference:

    * CVE-2010-1526
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-24"/>
	<updated date="2010-08-24"/>
	<bugzilla href="https://bugzilla.suse.com/630756">SUSE bug 630756</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1526/">CVE-2010-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570213" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570213" comment="libgdiplus0-2.0-11.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39217" version="1" class="patch">
	<metadata>
		<title>Security update for libgnomesu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="695627" ref_url="https://bugzilla.suse.com/695627" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>

The libgnomesu pam backend did not check the return value of the setuid() 
functions. Local users could exploit that to gain root privileges 
(CVE-2011-1946).

Note: this is just a re-release of the previous update to fix a regression 
unrelated to the security issue.

Security Issue reference:

    * CVE-2011-1946
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-06-29"/>
	<updated date="2011-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/695627">SUSE bug 695627</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572330" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572331" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572332" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572330" comment="libgnomesu-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572331" comment="libgnomesu-lang-1.0.0-307.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572332" comment="libgnomesu0-1.0.0-307.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39218" version="1" class="patch">
	<metadata>
		<title>Security update for libgssglue</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="694598" ref_url="https://bugzilla.suse.com/694598" source="BUGZILLA"/>
		<description>

This update fixes insecure getenv() usage in libgssglue, which could be 
used under some circumstances by local attackers do gain root privileges.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-27"/>
	<updated date="2011-05-27"/>
	<bugzilla href="https://bugzilla.suse.com/694598">SUSE bug 694598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572333" comment="libgssglue1-0.1-20.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572333" comment="libgssglue1-0.1-20.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39219" version="1" class="patch">
	<metadata>
		<title>Security update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-15"/>
	<updated date="2018-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572334" comment="libical0-0.43-1.2.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572335" comment="libical0-32bit-0.43-1.2.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39220" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572336" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572337" comment="libidn-32bit-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39221" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572338" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572339" comment="libidn-32bit-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39222" version="1" class="patch">
	<metadata>
		<title>Security update for libjasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>

This update for libjasper fixes multiple off-by-one errors which could 
allow remote attackers to execute arbitrary code via a heap-based buffer 
overflow triggered by a crafted jp2 (JPEG 2000) file. (bsc#906364, 
CVE-2014-9029)

Security Issues:

    * CVE-2014-9029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572340" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566826" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39223" version="1" class="patch">
	<metadata>
		<title>Security update for libksba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572341" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39224" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572342" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39225" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572343" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39226" version="1" class="patch">
	<metadata>
		<title>Security update for openLDAP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="606294" ref_url="https://bugzilla.suse.com/606294" source="BUGZILLA"/>
		<reference ref_id="612430" ref_url="https://bugzilla.suse.com/612430" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0211" ref_url="https://www.suse.com/security/cve/CVE-2010-0211/" source="CVE"/>
		<reference ref_id="CVE-2010-0212" ref_url="https://www.suse.com/security/cve/CVE-2010-0212/" source="CVE"/>
		<description>

Several issues have been fixed in OpenLDAP:

    * specially crafted MODRDN operations can crash the OpenLDAP server
      (CVE-2010-0211 and CVE-2010-0212)
    * syncrepl might loose deletes in refreshAndPersist mode

Security Issues:

    * CVE-2010-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211&gt;
    * CVE-2010-0212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-16"/>
	<updated date="2010-06-16"/>
	<bugzilla href="https://bugzilla.suse.com/606294">SUSE bug 606294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612430">SUSE bug 612430</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0211/">CVE-2010-0211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0212/">CVE-2010-0212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572344" comment="libldap-2_4-2-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572345" comment="libldap-2_4-2-32bit-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572346" comment="libldap-2_4-2-x86-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572347" comment="openldap2-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572348" comment="openldap2-back-meta-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572349" comment="openldap2-client-2.4.20-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572344" comment="libldap-2_4-2-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572345" comment="libldap-2_4-2-32bit-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572346" comment="libldap-2_4-2-x86-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572347" comment="openldap2-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572348" comment="openldap2-back-meta-2.4.20-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572349" comment="openldap2-client-2.4.20-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39227" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101)
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097)  ()
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572350" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572351" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572352" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39228" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062458" ref_url="https://bugzilla.suse.com/1062458" source="BUGZILLA"/>
		<reference ref_id="1067336" ref_url="https://bugzilla.suse.com/1067336" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2017-15101: Buffer overflow in findTable (bsc#1067336).
- CVE-2014-8184: stack-based buffer overflow in findTable() (bsc#1062458).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572353" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572354" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572355" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39229" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<description>
This update for liblouis, python-louis fixes the following issues:

Security issues fixed:

- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars()
  in compileTranslationTable.c (bsc#1095827)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572356" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572357" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572358" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39230" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<description>
This update for liblouis and python-louis fixes the following issue:

Security issue fixed: 

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572359" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572360" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572361" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39231" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

- CVE-2018-12085: Fixed an off-by-one error resulting in a buffer overrun (bsc#1097103).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572362" comment="liblouis-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572363" comment="liblouis0-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572364" comment="python-louis-1.7.0-1.3.19.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39232" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572365" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572366" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572365" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572366" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39233" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572367" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563448" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39234" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<description>

This update for libmspack fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could be exploited to cause a denial of service (endless loop).
      (bsc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572368" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39235" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572369" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39236" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572370" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39237" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141680" ref_url="https://bugzilla.suse.com/1141680" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issue fixed: 

- CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file
  which could have led to information disclosure (bsc#1141680).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572371" comment="libmspack0-0.0.20060920alpha-74.11.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39238" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="765092" ref_url="https://bugzilla.suse.com/765092" source="BUGZILLA"/>
		<reference ref_id="769062" ref_url="https://bugzilla.suse.com/769062" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2122" ref_url="https://www.suse.com/security/cve/CVE-2012-2122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00024.html" source="SUSE-SU"/>
		<description>

MySQL has been upgraded to version 5.0.96 to fix several vulnerabilities.

Security Issue reference:

    * CVE-2012-2122
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122&gt;
    * CVE-2012-0075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0075&gt;
    * CVE-2012-0114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0114&gt;
    * CVE-2012-0490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0490&gt;
    * CVE-2012-0484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0484&gt;
    * CVE-2012-0102
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0102&gt;
    * CVE-2012-0101
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0101&gt;
    * CVE-2012-0087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0087&gt;
    * CVE-2009-5026
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5026&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-31"/>
	<updated date="2012-07-31"/>
	<bugzilla href="https://bugzilla.suse.com/765092">SUSE bug 765092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769062">SUSE bug 769062</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2122/">CVE-2012-2122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572372" comment="libmysqlclient15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572373" comment="libmysqlclient15-32bit-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572374" comment="libmysqlclient15-x86-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572375" comment="libmysqlclient_r15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572376" comment="mysql-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572377" comment="mysql-Max-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572378" comment="mysql-client-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572379" comment="mysql-tools-5.0.96-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572372" comment="libmysqlclient15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572373" comment="libmysqlclient15-32bit-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572374" comment="libmysqlclient15-x86-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572375" comment="libmysqlclient_r15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572376" comment="mysql-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572377" comment="mysql-Max-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572378" comment="mysql-client-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572379" comment="mysql-tools-5.0.96-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572372" comment="libmysqlclient15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572373" comment="libmysqlclient15-32bit-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572374" comment="libmysqlclient15-x86-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572375" comment="libmysqlclient_r15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572376" comment="mysql-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572377" comment="mysql-Max-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572378" comment="mysql-client-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572379" comment="mysql-tools-5.0.96-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572372" comment="libmysqlclient15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572373" comment="libmysqlclient15-32bit-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572374" comment="libmysqlclient15-x86-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572375" comment="libmysqlclient_r15-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572376" comment="mysql-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572377" comment="mysql-Max-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572378" comment="mysql-client-5.0.96-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572379" comment="mysql-tools-5.0.96-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39239" version="1" class="patch">
	<metadata>
		<title>Security update for libnl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1020123" ref_url="https://bugzilla.suse.com/1020123" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386/" source="CVE"/>
		<description>
This update for libnl fixes the following issues:

Security issue fixed:

- CVE-2017-0386: Fixed a privilege escalation vulnerability which allowed a local user to execute code within a privileged process (bsc#1020123).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572380" comment="libnl-1.1-49.22.6.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572381" comment="libnl-32bit-1.1-49.22.6.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39240" version="1" class="patch">
	<metadata>
		<title>Security update for opensc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="660109" ref_url="https://bugzilla.suse.com/660109" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>

Specially crafted smart cards could cause a buffer overflow in opensc 
(CVE-2010-4523).

Security Issue reference:

    * CVE-2010-4523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-12-22"/>
	<updated date="2010-12-22"/>
	<bugzilla href="https://bugzilla.suse.com/660109">SUSE bug 660109</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572382" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572383" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572384" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572385" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572386" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572387" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572382" comment="libopensc2-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572383" comment="libopensc2-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572384" comment="libopensc2-x86-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572385" comment="opensc-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572386" comment="opensc-32bit-0.11.6-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572387" comment="opensc-x86-0.11.6-5.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39241" version="1" class="patch">
	<metadata>
		<title>Security update for libopenssl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="767256" ref_url="https://bugzilla.suse.com/767256" source="BUGZILLA"/>
		<reference ref_id="768097" ref_url="https://bugzilla.suse.com/768097" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5095" ref_url="https://www.suse.com/security/cve/CVE-2011-5095/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<description>

This update adds libopenssl0_9_8-hmac packages, that, when installed, will 
enforce FIPS 140-2 self-test being run upon first use of the library.

If FIPS mode is enforced, these new packages are required in order to 
enable FIPS mode successfully.

The update also imposes limits on the parameters of a Diffie-Hellman key 
exchange to prevent man-in-the-middle (MITM) attacks in FIPS mode 
(CVE-2011-5095).

Security reference:

    * CVE-2011-5095
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5095&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/767256">SUSE bug 767256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768097">SUSE bug 768097</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5095/">CVE-2011-5095</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572389" comment="libopenssl0_9_8-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572390" comment="libopenssl0_9_8-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572391" comment="libopenssl0_9_8-hmac-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572392" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572393" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572394" comment="libopenssl0_9_8-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572395" comment="openssl-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572396" comment="openssl-doc-0.9.8j-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572389" comment="libopenssl0_9_8-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572390" comment="libopenssl0_9_8-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572391" comment="libopenssl0_9_8-hmac-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572392" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572393" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572394" comment="libopenssl0_9_8-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572395" comment="openssl-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572396" comment="openssl-doc-0.9.8j-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572389" comment="libopenssl0_9_8-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572390" comment="libopenssl0_9_8-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572391" comment="libopenssl0_9_8-hmac-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572392" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572393" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572394" comment="libopenssl0_9_8-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572395" comment="openssl-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572396" comment="openssl-doc-0.9.8j-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572389" comment="libopenssl0_9_8-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572390" comment="libopenssl0_9_8-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572391" comment="libopenssl0_9_8-hmac-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572392" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572393" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572394" comment="libopenssl0_9_8-x86-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572395" comment="openssl-0.9.8j-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572396" comment="openssl-doc-0.9.8j-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39242" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572397" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39243" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572398" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39244" version="1" class="patch">
	<metadata>
		<title>Security update for Xorg X11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="709851" ref_url="https://bugzilla.suse.com/709851" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>

Specially crafted font files could cause a buffer overflow in applications 
that use libXfont to load such files (CVE-2011-2895).

Security Issue reference:

    * CVE-2011-2895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-05"/>
	<updated date="2011-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/709851">SUSE bug 709851</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572399" comment="libpciaccess0-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572400" comment="libpciaccess0-32bit-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572401" comment="libpciaccess0-x86-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572402" comment="xorg-x11-libs-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572403" comment="xorg-x11-libs-32bit-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572404" comment="xorg-x11-libs-x86-7.4-8.26.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572399" comment="libpciaccess0-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572400" comment="libpciaccess0-32bit-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572401" comment="libpciaccess0-x86-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572402" comment="xorg-x11-libs-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572403" comment="xorg-x11-libs-32bit-7.4-8.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572404" comment="xorg-x11-libs-x86-7.4-8.26.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39245" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572405" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566118" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39246" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="772760" ref_url="https://bugzilla.suse.com/772760" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3425" ref_url="https://www.suse.com/security/cve/CVE-2012-3425/" source="CVE"/>
		<description>

An integer overflow has been fixed in libpng.

Security Issue reference:

    * CVE-2012-3425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-26"/>
	<updated date="2012-07-26"/>
	<bugzilla href="https://bugzilla.suse.com/772760">SUSE bug 772760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3425/">CVE-2012-3425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572406" comment="libpng12-0-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572407" comment="libpng12-0-32bit-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572408" comment="libpng12-0-x86-1.2.31-5.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572406" comment="libpng12-0-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572407" comment="libpng12-0-32bit-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572408" comment="libpng12-0-x86-1.2.31-5.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572406" comment="libpng12-0-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572407" comment="libpng12-0-32bit-1.2.31-5.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572408" comment="libpng12-0-x86-1.2.31-5.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39247" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="580484" ref_url="https://bugzilla.suse.com/580484" source="BUGZILLA"/>
		<description>

Denial of service while decompressing a highly compressed huge ancillary 
chunk has been fixed in libpng (CVE-2010-0205).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-03-19"/>
	<updated date="2010-03-19"/>
	<bugzilla href="https://bugzilla.suse.com/580484">SUSE bug 580484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572409" comment="libpng12-0-1.2.31-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572410" comment="libpng12-0-32bit-1.2.31-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572411" comment="libpng12-0-x86-1.2.31-5.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572409" comment="libpng12-0-1.2.31-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572410" comment="libpng12-0-32bit-1.2.31-5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572411" comment="libpng12-0-x86-1.2.31-5.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39248" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572412" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39249" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572413" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39250" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572414" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572415" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39251" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This update for libpng12-0 fixes the following issues:

Security issue fixed:

- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572416" comment="libpng12-0-1.2.31-5.44.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572417" comment="libpng12-0-32bit-1.2.31-5.44.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39252" version="1" class="patch">
	<metadata>
		<title>Security update for libpoppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="642785" ref_url="https://bugzilla.suse.com/642785" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>

Specially crafted PDF files could crash poppler or potentially even cause 
execution of arbitrary code (CVE-2010-3702, CVE-2010-3703, CVE-2010-3704). 
This has been fixed.

Security Issue references:

    * CVE-2010-3702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702&gt;
    * CVE-2010-3703
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703&gt;
    * CVE-2010-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-18"/>
	<updated date="2010-10-18"/>
	<bugzilla href="https://bugzilla.suse.com/642785">SUSE bug 642785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572418" comment="libpoppler-glib4-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572419" comment="libpoppler-qt4-3-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572420" comment="libpoppler5-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572421" comment="poppler-tools-0.12.3-1.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572418" comment="libpoppler-glib4-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572419" comment="libpoppler-qt4-3-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572420" comment="libpoppler5-0.12.3-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572421" comment="poppler-tools-0.12.3-1.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39253" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could 
allow remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572422" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566124" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572423" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572424" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572425" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39254" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

This update for pulseaudio provides the following security fix:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv. (bnc#881524)

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572426" comment="libpulse-browse0-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572427" comment="libpulse-mainloop-glib0-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572428" comment="libpulse0-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572429" comment="libpulse0-32bit-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572430" comment="pulseaudio-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572431" comment="pulseaudio-esound-compat-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572432" comment="pulseaudio-gdm-hooks-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572433" comment="pulseaudio-lang-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572434" comment="pulseaudio-module-x11-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572435" comment="pulseaudio-module-zeroconf-0.9.21-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572436" comment="pulseaudio-utils-0.9.21-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39255" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="1118599" ref_url="https://bugzilla.suse.com/1118599" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2020-17507: Fix buffer over-read in read_xbm_body (bsc#1176315):
- CVE-2018-15518: Fix 'double free or corruption' in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fix QBmpHandler segfault on malformed BMP file (bsc#1118596)
- CVE-2018-19869: Fix crash when parsing malformed url reference (bsc#1118599)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572437" comment="libQtWebKit4-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572438" comment="libQtWebKit4-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572439" comment="libqt4-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572440" comment="libqt4-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572441" comment="libqt4-qt3support-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572442" comment="libqt4-qt3support-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572443" comment="libqt4-sql-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572444" comment="libqt4-sql-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572445" comment="libqt4-sql-mysql-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572446" comment="libqt4-sql-sqlite-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572447" comment="libqt4-x11-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572448" comment="libqt4-x11-32bit-4.6.3-5.20.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572449" comment="qt4-x11-tools-4.6.3-5.20.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39256" version="1" class="patch">
	<metadata>
		<title>Security update for libraptor</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="745298" ref_url="https://bugzilla.suse.com/745298" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>

Specially crafted XML files could have allowed XML External Entity (XXE) 
attacks resulting in file theft and a loss of user privacy. This has been 
fixed.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-17"/>
	<updated date="2012-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/745298">SUSE bug 745298</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572450" comment="libraptor1-1.4.18-28.23.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572450" comment="libraptor1-1.4.18-28.23.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572450" comment="libraptor1-1.4.18-28.23.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39257" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="653519" ref_url="https://bugzilla.suse.com/653519" source="BUGZILLA"/>
		<reference ref_id="653662" ref_url="https://bugzilla.suse.com/653662" source="BUGZILLA"/>
		<reference ref_id="663622" ref_url="https://bugzilla.suse.com/663622" source="BUGZILLA"/>
		<reference ref_id="675868" ref_url="https://bugzilla.suse.com/675868" source="BUGZILLA"/>
		<reference ref_id="675961" ref_url="https://bugzilla.suse.com/675961" source="BUGZILLA"/>
		<reference ref_id="676858" ref_url="https://bugzilla.suse.com/676858" source="BUGZILLA"/>
		<reference ref_id="678998" ref_url="https://bugzilla.suse.com/678998" source="BUGZILLA"/>
		<reference ref_id="680272" ref_url="https://bugzilla.suse.com/680272" source="BUGZILLA"/>
		<reference ref_id="681738" ref_url="https://bugzilla.suse.com/681738" source="BUGZILLA"/>
		<reference ref_id="683578" ref_url="https://bugzilla.suse.com/683578" source="BUGZILLA"/>
		<reference ref_id="684784" ref_url="https://bugzilla.suse.com/684784" source="BUGZILLA"/>
		<reference ref_id="693238" ref_url="https://bugzilla.suse.com/693238" source="BUGZILLA"/>
		<reference ref_id="693477" ref_url="https://bugzilla.suse.com/693477" source="BUGZILLA"/>
		<reference ref_id="694119" ref_url="https://bugzilla.suse.com/694119" source="BUGZILLA"/>
		<reference ref_id="694344" ref_url="https://bugzilla.suse.com/694344" source="BUGZILLA"/>
		<reference ref_id="695479" ref_url="https://bugzilla.suse.com/695479" source="BUGZILLA"/>
		<reference ref_id="696630" ref_url="https://bugzilla.suse.com/696630" source="BUGZILLA"/>
		<reference ref_id="699334" ref_url="https://bugzilla.suse.com/699334" source="BUGZILLA"/>
		<reference ref_id="702506" ref_url="https://bugzilla.suse.com/702506" source="BUGZILLA"/>
		<reference ref_id="704311" ref_url="https://bugzilla.suse.com/704311" source="BUGZILLA"/>
		<reference ref_id="704639" ref_url="https://bugzilla.suse.com/704639" source="BUGZILLA"/>
		<reference ref_id="704642" ref_url="https://bugzilla.suse.com/704642" source="BUGZILLA"/>
		<reference ref_id="705949" ref_url="https://bugzilla.suse.com/705949" source="BUGZILLA"/>
		<reference ref_id="706792" ref_url="https://bugzilla.suse.com/706792" source="BUGZILLA"/>
		<reference ref_id="707486" ref_url="https://bugzilla.suse.com/707486" source="BUGZILLA"/>
		<reference ref_id="707779" ref_url="https://bugzilla.suse.com/707779" source="BUGZILLA"/>
		<reference ref_id="708137" ref_url="https://bugzilla.suse.com/708137" source="BUGZILLA"/>
		<reference ref_id="708518" ref_url="https://bugzilla.suse.com/708518" source="BUGZILLA"/>
		<reference ref_id="710061" ref_url="https://bugzilla.suse.com/710061" source="BUGZILLA"/>
		<reference ref_id="710920" ref_url="https://bugzilla.suse.com/710920" source="BUGZILLA"/>
		<reference ref_id="711977" ref_url="https://bugzilla.suse.com/711977" source="BUGZILLA"/>
		<reference ref_id="712358" ref_url="https://bugzilla.suse.com/712358" source="BUGZILLA"/>
		<reference ref_id="715268" ref_url="https://bugzilla.suse.com/715268" source="BUGZILLA"/>
		<reference ref_id="715416" ref_url="https://bugzilla.suse.com/715416" source="BUGZILLA"/>
		<reference ref_id="715856" ref_url="https://bugzilla.suse.com/715856" source="BUGZILLA"/>
		<reference ref_id="715931" ref_url="https://bugzilla.suse.com/715931" source="BUGZILLA"/>
		<reference ref_id="717262" ref_url="https://bugzilla.suse.com/717262" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2685" ref_url="https://www.suse.com/security/cve/CVE-2011-2685/" source="CVE"/>
		<reference ref_id="CVE-2011-2713" ref_url="https://www.suse.com/security/cve/CVE-2011-2713/" source="CVE"/>
		<description>

LibreOffice 3.4 includes new interesting features and fixes, see 
http://www.libreoffice.org/download/3-4-new-features-and-fixes/
&lt;http://www.libreoffice.org/download/3-4-new-features-and-fixes/&gt;

The update fixes the following security issue:

    * 704311: libreoffice Lotus Word Pro filter multiple vulnerabilities
      (CVE-2011-2685)
    * 722075: LibreOffice: Out-of-bounds read in DOC sprm (CVE-2011-2713)

This update also fixes the following non-security issues:

    * 653519: Welcome screen missing.
    * 653662: libreoffice build calls mkbundle2 (deprecated) instead of
      mkbundle
    * 663622: Writer crash during document save
    * 675868: eliminate wording of ooconvert existed in loconvert --help
    * 675961: Libreoffice Copy paste of formula in Writer tables does not
      work as expected
    * 676858: Document with full page graphic in header will not allow
      click-drag or right-click.
    * 677354: The languagetool.rpm does not work as expected
    * 678998: Libre Office does not detect KDE3
    * 680272: Deleting multiple sheets results in run-time error/crash
    * 681738: DDE link is lost when .xls file is opened/saved in Calc.
    * 683578: Large xlsx file takes extremely long to open with Libreoffice
      calc
    * 684784: Microsoft Office spreadsheet does not display anything
    * 693238: Column format in docx file is not displayed correctly.
    * 693477: Format of Word .doc file from HP is bad.
    * 694119: Using File--&gt;Send--&gt;Document as E-mail will crash Impress
    * 694344: 3rd level bulleted items are not displayed properly.
    * 695479: RTF file is not displayed correctly by Writer.
    * 696630: DDE link from Calc to Excel needs Excel open to update link
      in Calc.
    * 699334: Presentation created in MS Office is missing text when opened
      in LibreOffice
    * 701317: xls spreadsheet macro fails with LibreOffice.
    * 702506: Writer crashes when opening docx files.
    * 704639: HTML document appearance changes when opened in open office
      vs LibreOffice
    * 704642: 16 digit numbers change in LibreOffice when opening a file
      created in MS Excel
    * 705949: Information missing from MS Word document when opened in
      LibreOffice (w:sdt)
    * 706792: crash when opening a pptx presentation.
    * 707486: Macro from excel fails on Selection.Copy when run in Calc.
    * 707779: Disappearing text
    * 708137: xls spreadsheet is extremely slow to open and check boxes are
      broken.
    * 708518: Bullet symbol is not rendered correctly in a specific slide.
    * 710061: ODP export to PDF produces broken images
    * 710920: RPM installation ending with redundant error.
    * 711977: File association for fod* files are missing.
    * 712358: Some extensions broken after upgrading.
    * 715268: Command libreoffice --help does not work when LibreOffice is
      already started
    * 715416: Impress crashes starting Slide show in the context of dual
      monitors extension mode.
    * 715931: failed to save an odp file.
    * 717262: libtool adds /usr/lib64 into rpath
    * 715856: LibreOffice:Stable/libreoffice-converter: Bug
    * 677354: The languagetool.rpm does not work as expected.
    * 693200: Documents created in MS Office cause LibreOffice to crash
    * 693386: Documents created in MS Office bring up the filter selection
      dialog when opened with LibreOffice
    * 693427: When using QT dialogs and not LibreOffice dialogs causes
      LibreOffice to hang when attempting to save a document
    * 706731: VBA Macros from MS Office Spreadsheet do not work correct
      with LibreOffice 3.3.1

Security Issue references:

    * CVE-2011-2685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2685&gt;
    * CVE-2011-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-12"/>
	<updated date="2011-10-12"/>
	<bugzilla href="https://bugzilla.suse.com/653519">SUSE bug 653519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653662">SUSE bug 653662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663622">SUSE bug 663622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675868">SUSE bug 675868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675961">SUSE bug 675961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676858">SUSE bug 676858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678998">SUSE bug 678998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680272">SUSE bug 680272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681738">SUSE bug 681738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/683578">SUSE bug 683578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684784">SUSE bug 684784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693238">SUSE bug 693238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693477">SUSE bug 693477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694119">SUSE bug 694119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694344">SUSE bug 694344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/695479">SUSE bug 695479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/696630">SUSE bug 696630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/699334">SUSE bug 699334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702506">SUSE bug 702506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704311">SUSE bug 704311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704639">SUSE bug 704639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704642">SUSE bug 704642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705949">SUSE bug 705949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706792">SUSE bug 706792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707486">SUSE bug 707486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707779">SUSE bug 707779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708137">SUSE bug 708137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708518">SUSE bug 708518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710061">SUSE bug 710061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710920">SUSE bug 710920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711977">SUSE bug 711977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/712358">SUSE bug 712358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715268">SUSE bug 715268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715416">SUSE bug 715416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715856">SUSE bug 715856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715931">SUSE bug 715931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/717262">SUSE bug 717262</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2685/">CVE-2011-2685</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2713/">CVE-2011-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572451" comment="libneon27-0.29.6-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572452" comment="libneon27-32bit-0.29.6-6.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572451" comment="libneon27-0.29.6-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572452" comment="libneon27-32bit-0.29.6-6.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39258" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="714980" ref_url="https://bugzilla.suse.com/714980" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<description>

Specially crafted SVG files could make librsvg dereference a function 
pointer which potentially allows to execute arbitrary code (CVE-2011-3146).

Security Issue reference:

    * CVE-2011-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-21"/>
	<updated date="2011-09-21"/>
	<bugzilla href="https://bugzilla.suse.com/714980">SUSE bug 714980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572453" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572454" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572455" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572456" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572453" comment="librsvg-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572454" comment="librsvg-32bit-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572455" comment="librsvg-x86-2.26.0-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572456" comment="rsvg-view-2.26.0-2.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39259" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572457" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572458" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39260" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083232" ref_url="https://bugzilla.suse.com/1083232" source="BUGZILLA"/>
		<reference ref_id="1094213" ref_url="https://bugzilla.suse.com/1094213" source="BUGZILLA"/>
		<reference ref_id="1162501" ref_url="https://bugzilla.suse.com/1162501" source="BUGZILLA"/>
		<reference ref_id="977985" ref_url="https://bugzilla.suse.com/977985" source="BUGZILLA"/>
		<reference ref_id="977986" ref_url="https://bugzilla.suse.com/977986" source="BUGZILLA"/>
		<reference ref_id="987877" ref_url="https://bugzilla.suse.com/987877" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7558" ref_url="https://www.suse.com/security/cve/CVE-2015-7558/" source="CVE"/>
		<reference ref_id="CVE-2016-4348" ref_url="https://www.suse.com/security/cve/CVE-2016-4348/" source="CVE"/>
		<reference ref_id="CVE-2016-6163" ref_url="https://www.suse.com/security/cve/CVE-2016-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>

This update for librsvg fixes the following issues:

- CVE-2019-20446: Fixed an issue where a crafted SVG file with nested
  patterns can cause denial of service (bsc#1162501).
  NOTE: Librsvg now has limits on the number of loaded XML elements,
  and the number of referenced elements within an SVG document.    
- CVE-2015-7558: librsvg allowed context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document (bsc#977985).
- CVE-2016-6163: svg pattern linking to non-pattern fallback leads to invalid memory access, allowing to cause DoS (bsc#987877).
- CVE-2018-1000041: Fixed leaking credentials via SVG files that reference UNC paths (bsc#1083232)
- CVE-2016-4348: Fixed a denial of service parsing SVGs with circular definitions _rsvg_css_normalize_font_size() function (bsc#977986)
- Fixed a stack exhaustion with circular references in &lt;use&gt;
  elements.
- Fixed a denial-of-service condition from exponential explosion
  of rendered elements, through nested use of SVG 'use' elements in
  malicious SVGs.

This updated also removes the the Mozilla plugin package. Firefox can render SVG on its own and
the plugin interface is obsolete.
    
This update for libcroco fixes the following issue:

- Fixed an issue where librsvg was throwing a segmentation fault (bsc#1094213).    
    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-17"/>
	<updated date="2020-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094213">SUSE bug 1094213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977985">SUSE bug 977985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977986">SUSE bug 977986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987877">SUSE bug 987877</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7558/">CVE-2015-7558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4348/">CVE-2016-4348</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6163/">CVE-2016-6163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572459" comment="libcroco-0_6-3-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572460" comment="libcroco-0_6-3-32bit-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572461" comment="librsvg-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572462" comment="librsvg-32bit-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572463" comment="rsvg-view-2.26.0-2.6.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39261" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572464" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572465" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39262" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="631379" ref_url="https://bugzilla.suse.com/631379" source="BUGZILLA"/>
		<reference ref_id="705681" ref_url="https://bugzilla.suse.com/705681" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-4835" ref_url="https://www.suse.com/security/cve/CVE-2009-4835/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<description>

An integer overflow in libsndfile while processing certain PAF files has 
been fixed. CVE-2011-2696 has been assigned to this issue. Additionally a 
divide by zero error (CVE-2009-4835) has been fixed.

Security Issue references:

    * CVE-2011-2696
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696&gt;
    * CVE-2009-4835
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4835&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-07-19"/>
	<updated date="2011-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/631379">SUSE bug 631379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/705681">SUSE bug 705681</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4835/">CVE-2009-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572466" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572467" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572468" comment="libsndfile-x86-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572466" comment="libsndfile-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572467" comment="libsndfile-32bit-1.0.20-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572468" comment="libsndfile-x86-1.0.20-2.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39263" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572469" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39264" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572470" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572471" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39265" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572472" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572473" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39266" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572474" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572475" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39267" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572476" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572477" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39268" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626760" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626761" comment="libsndfile-32bit-1.0.20-2.19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39269" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662523" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662524" comment="libsndfile-32bit-1.0.20-2.19.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39270" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="670789" ref_url="https://bugzilla.suse.com/670789" source="BUGZILLA"/>
		<reference ref_id="759352" ref_url="https://bugzilla.suse.com/759352" source="BUGZILLA"/>
		<reference ref_id="762433" ref_url="https://bugzilla.suse.com/762433" source="BUGZILLA"/>
		<reference ref_id="762887" ref_url="https://bugzilla.suse.com/762887" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<description>

This update to net-snmp resolves the following issues:

    * Specially crafted SNMP GET requests could cause a denial of service
      (application crash) via a heap-based out-out-bounds read flaw which
      could be exploited remotely (CVE-2012-2141).
    * The snmpd agent should read shared memory information from
      /proc/meminfo when running on Linux Kernel 2.6 or newer (bnc#762887).
    * The snmpd agent could crash when an AgentX sub-agent disconnects in
      the middle of a request (bnc#670789).
    * After rotating the net-snmp log file, use 'try-restart' to restart
      the daemon. Reloading with a SIGHUP signal may trigger crashes when
      dynamic modules (dlmod) are in use (bnc#762433).

Security Issue reference:

    * CVE-2012-2141
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-09"/>
	<updated date="2012-07-09"/>
	<bugzilla href="https://bugzilla.suse.com/670789">SUSE bug 670789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759352">SUSE bug 759352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762433">SUSE bug 762433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762887">SUSE bug 762887</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572478" comment="libsnmp15-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572479" comment="libsnmp15-32bit-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572480" comment="libsnmp15-x86-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572481" comment="net-snmp-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572482" comment="perl-SNMP-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572483" comment="snmp-mibs-5.4.2.1-8.12.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572478" comment="libsnmp15-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572479" comment="libsnmp15-32bit-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572480" comment="libsnmp15-x86-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572481" comment="net-snmp-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572482" comment="perl-SNMP-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572483" comment="snmp-mibs-5.4.2.1-8.12.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572478" comment="libsnmp15-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572479" comment="libsnmp15-32bit-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572480" comment="libsnmp15-x86-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572481" comment="net-snmp-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572482" comment="perl-SNMP-5.4.2.1-8.12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572483" comment="snmp-mibs-5.4.2.1-8.12.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39271" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="706630" ref_url="https://bugzilla.suse.com/706630" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2524" ref_url="https://www.suse.com/security/cve/CVE-2011-2524/" source="CVE"/>
		<description>

This update of libsoup fixes a directory traversal attack that affect 
application using the library. CVE-2011-2524: CVSS v2 Base Score: 5.0 
(AV:N/AC:L/Au:N/C:P/I:N/A:N)

Security Issue reference:

    * CVE-2011-2524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2524&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-01"/>
	<updated date="2011-08-01"/>
	<bugzilla href="https://bugzilla.suse.com/706630">SUSE bug 706630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2524/">CVE-2011-2524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572484" comment="libsoup-2_4-1-2.28.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572485" comment="libsoup-2_4-1-32bit-2.28.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572486" comment="libsoup-2_4-1-x86-2.28.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572484" comment="libsoup-2_4-1-2.28.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572485" comment="libsoup-2_4-1-32bit-2.28.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572486" comment="libsoup-2_4-1-x86-2.28.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39272" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fixed a denial of service which was caused handling empty hostnames in get_cookies() (bsc#1100097).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-16"/>
	<updated date="2020-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572487" comment="libsoup-2_4-1-2.28.2-0.3.3.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572488" comment="libsoup-2_4-1-32bit-2.28.2-0.3.3.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39273" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572489" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39274" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed:   

- Fixed an issue where libssh2 stops parsing known_hosts (bsc#1091236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572490" comment="libssh2-1-1.2.9-4.2.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39275" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572491" comment="libssh2-1-1.2.9-4.2.12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39276" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572492" comment="libssh2-1-1.2.9-4.2.12.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39277" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572493" comment="libssh2-1-1.2.9-4.2.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39278" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572494" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572495" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39279" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572496" comment="libtasn1-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572497" comment="libtasn1-3-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572498" comment="libtasn1-3-32bit-1.5-1.35.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39280" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="844689" ref_url="https://bugzilla.suse.com/844689" source="BUGZILLA"/>
		<reference ref_id="865746" ref_url="https://bugzilla.suse.com/865746" source="BUGZILLA"/>
		<reference ref_id="880346" ref_url="https://bugzilla.suse.com/880346" source="BUGZILLA"/>
		<reference ref_id="880347" ref_url="https://bugzilla.suse.com/880347" source="BUGZILLA"/>
		<reference ref_id="880348" ref_url="https://bugzilla.suse.com/880348" source="BUGZILLA"/>
		<reference ref_id="881700" ref_url="https://bugzilla.suse.com/881700" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>

Tomcat has been updated to version 6.0.41, which brings security and bug 
fixes.

The following security fixes have been fixed:

    * CVE-2014-0096: A XXE vulnerability via user supplied XSLTs.
    * CVE-2014-0099: Request smuggling via malicious content length header.
    * CVE-2014-0119: A XML parser hijack by malicious web application.

Bugs fixed:

    * Socket bind fails on tomcat startup when using apr (IPV6)
      (bnc#881700)
    * classpath for org/apache/juli/logging/LogFactory (bnc#844689)

Security Issues:

    * CVE-2014-0099
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099&gt;
    * CVE-2014-0096
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096&gt;
    * CVE-2014-0119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/844689">SUSE bug 844689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880346">SUSE bug 880346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880347">SUSE bug 880347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880348">SUSE bug 880348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881700">SUSE bug 881700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572499" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39281" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938945" ref_url="https://bugzilla.suse.com/938945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- CVE-2015-4000: Disable 512-bit export-grade cryptography to prevent Logjam 
  vulnerability (bsc#938945) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572508" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39282" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572509" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39283" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="770816" ref_url="https://bugzilla.suse.com/770816" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<description>

This update of tiff fixes a heap-based buffer overflow that could have 
caused a crash or potentially allowed attackers to execute arbitrary code 
(CVE-2012-3401).

Security Issue reference:

    * CVE-2012-3401
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-20"/>
	<updated date="2012-07-20"/>
	<bugzilla href="https://bugzilla.suse.com/770816">SUSE bug 770816</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572510" comment="libtiff3-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572511" comment="libtiff3-32bit-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572512" comment="libtiff3-x86-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572513" comment="tiff-3.8.2-141.148.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572510" comment="libtiff3-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572511" comment="libtiff3-32bit-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572512" comment="libtiff3-x86-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572513" comment="tiff-3.8.2-141.148.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572510" comment="libtiff3-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572511" comment="libtiff3-32bit-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572512" comment="libtiff3-x86-3.8.2-141.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572513" comment="tiff-3.8.2-141.148.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39284" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572514" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572515" comment="rpcbind-0.1.6+git20080930-8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39285" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572516" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39286" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572517" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39287" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
This update for libunwind fixes the following issues:

- CVE-2015-3239: Fixed an off-by-one in dwarf_to_unw_regnum() (bsc#936786).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572518" comment="libunwind-0.98.6-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572519" comment="libunwind-devel-0.98.6-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39288" version="1" class="patch">
	<metadata>
		<title>Security update for nuts</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="764699" ref_url="https://bugzilla.suse.com/764699" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>

This update of nuts fixes a denial of service flaw that could have been 
exploited by remote attackers to cause an application crash of upsd.

Security Issue reference:

    * CVE-2012-2944
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-04"/>
	<updated date="2012-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/764699">SUSE bug 764699</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572520" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572521" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572522" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572523" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572520" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572521" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572522" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572523" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572520" comment="libupsclient1-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572521" comment="nut-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572522" comment="nut-classic-2.6.2-0.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572523" comment="nut-drivers-net-2.6.2-0.2.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39289" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572524" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39290" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="747912" ref_url="https://bugzilla.suse.com/747912" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>

Specially crafted Ogg files could cause a heap-based buffer overflow in the 
vorbis audio compression library that could potentially be exploited by 
attackers to cause a crash or execute arbitrary code (CVE-2012-0444).

Security Issue reference:

    * CVE-2012-0444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-21"/>
	<updated date="2012-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572525" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572526" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572527" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572528" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572525" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572526" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572527" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572528" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39291" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572529" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572530" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572531" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39292" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572532" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572533" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572534" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39293" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572535" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572536" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572537" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39294" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572538" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572539" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572540" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39295" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572541" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572542" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572543" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39296" version="1" class="patch">
	<metadata>
		<title>Security update for libxcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="713727" ref_url="https://bugzilla.suse.com/713727" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>

The security update for CVE-2011-2483 broke changing blowfish passwords if 
compat mode was turned on (default). This update fixes the regression.

Security Issue reference:

    * CVE-2011-2483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-24"/>
	<updated date="2011-08-24"/>
	<bugzilla href="https://bugzilla.suse.com/713727">SUSE bug 713727</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572544" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572545" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572546" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572544" comment="libxcrypt-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572545" comment="libxcrypt-32bit-3.0.3-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572546" comment="libxcrypt-x86-3.0.3-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39297" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="769184" ref_url="https://bugzilla.suse.com/769184" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2807" ref_url="https://www.suse.com/security/cve/CVE-2012-2807/" source="CVE"/>
		<description>

This update fixes several libxml2 integer overflows which could have been 
used to crash libxml2 parsers or potentially execute code.

Security Issues:

    * CVE-2012-2807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2807&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-18"/>
	<updated date="2012-07-18"/>
	<bugzilla href="https://bugzilla.suse.com/769184">SUSE bug 769184</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2807/">CVE-2012-2807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572547" comment="libxml2-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572548" comment="libxml2-32bit-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572549" comment="libxml2-doc-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588203" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572551" comment="libxml2-x86-2.7.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572547" comment="libxml2-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572548" comment="libxml2-32bit-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572549" comment="libxml2-doc-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588203" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572551" comment="libxml2-x86-2.7.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572547" comment="libxml2-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572548" comment="libxml2-32bit-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572549" comment="libxml2-doc-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588203" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572551" comment="libxml2-x86-2.7.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572547" comment="libxml2-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572548" comment="libxml2-32bit-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572549" comment="libxml2-doc-2.7.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009588203" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572551" comment="libxml2-x86-2.7.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39298" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572552" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572553" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572554" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572555" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39299" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572556" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572557" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572558" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572559" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39300" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572560" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572561" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572562" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572563" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39301" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572564" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572565" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572566" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572567" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39302" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572568" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572569" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572570" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572571" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39303" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572572" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572573" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572574" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572575" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39304" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572576" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572577" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572578" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572579" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39305" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572580" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572581" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572582" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572583" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39306" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572584" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572585" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572586" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572587" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39307" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572588" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572589" comment="libxml2-32bit-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572590" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572591" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39308" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572592" comment="libxml2-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572593" comment="libxml2-32bit-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572594" comment="libxml2-doc-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572595" comment="libxml2-python-2.7.6-0.77.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39309" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-18"/>
	<updated date="2020-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572596" comment="libxml2-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572597" comment="libxml2-32bit-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572598" comment="libxml2-doc-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572599" comment="libxml2-python-2.7.6-0.77.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39310" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572600" comment="libxml2-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572601" comment="libxml2-32bit-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572602" comment="libxml2-doc-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572603" comment="libxml2-python-2.7.6-0.77.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39311" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572604" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572605" comment="libxml2-32bit-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572606" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572607" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39312" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack that could bypass all existing protection mechanisms (bsc#1186015).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572608" comment="libxml2-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572609" comment="libxml2-32bit-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572610" comment="libxml2-doc-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572611" comment="libxml2-python-2.7.6-0.77.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39313" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670908" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670909" comment="libxml2-32bit-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670910" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670911" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39314" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572612" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572613" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572614" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39315" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572615" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572616" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572617" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39316" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="769182" ref_url="https://bugzilla.suse.com/769182" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted XSL documents could have crashed libxslt
      (CVE-2012-2825)

Security Issue reference:

    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-29"/>
	<updated date="2012-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/769182">SUSE bug 769182</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572618" comment="libxslt-1.1.24-19.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572619" comment="libxslt-32bit-1.1.24-19.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572620" comment="libxslt-x86-1.1.24-19.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572618" comment="libxslt-1.1.24-19.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572619" comment="libxslt-32bit-1.1.24-19.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572620" comment="libxslt-x86-1.1.24-19.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572618" comment="libxslt-1.1.24-19.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572619" comment="libxslt-32bit-1.1.24-19.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572620" comment="libxslt-x86-1.1.24-19.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39317" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572621" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572622" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39318" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issue fixed:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572623" comment="libxslt-1.1.24-19.34.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572624" comment="libxslt-32bit-1.1.24-19.34.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39319" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140095" ref_url="https://bugzilla.suse.com/1140095" source="BUGZILLA"/>
		<reference ref_id="1140101" ref_url="https://bugzilla.suse.com/1140101" source="BUGZILLA"/>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issues fixed:

- CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
- CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572625" comment="libxslt-1.1.24-19.34.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572626" comment="libxslt-32bit-1.1.24-19.34.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39320" version="1" class="patch">
	<metadata>
		<title>Security update for libzip1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="681193" ref_url="https://bugzilla.suse.com/681193" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<description>

The following bug has been fixed:

    * empty zip archives could crash programs using libzip (CVE-2011-0421).

Security Issue reference:

    * CVE-2011-0421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-22"/>
	<updated date="2011-03-22"/>
	<bugzilla href="https://bugzilla.suse.com/681193">SUSE bug 681193</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572627" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572627" comment="libzip1-0.9-1.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39321" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39322" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39323" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39324" version="1" class="patch">
	<metadata>
		<title>Security update for LVM2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="622537" ref_url="https://bugzilla.suse.com/622537" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2526" ref_url="https://www.suse.com/security/cve/CVE-2010-2526/" source="CVE"/>
		<description>

clvmd, when running, allowed unprivileged local users to issue arbitrary 
lvm commands (CVE-2010-2526) via incorrect permissions. This has been 
fixed.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-08-20"/>
	<updated date="2010-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/622537">SUSE bug 622537</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2526/">CVE-2010-2526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572628" comment="lvm2-2.02.39-18.31.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572628" comment="lvm2-2.02.39-18.31.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39325" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman to version 2.1.15 fixes the following issues:

- CVE-2016-6893: Prevent cross-site request forgery (CSRF) vulnerability in the
  user options page that allowed remote attackers to hijack the authentication of
  arbitrary users for requests that modify an option (bsc#995352).
- Various other hardenings against CSFR attacks

For details please see https://launchpad.net/mailman/+milestone/2.1.15
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-11"/>
	<updated date="2018-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572629" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39326" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572630" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39327" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572631" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39328" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572632" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39329" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572633" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39330" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).

Non-security issue fixed:

- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572634" comment="mailman-2.1.15-9.6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39331" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572635" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39332" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026):

- CVE-2016-9079: Use-after-free in SVG Animation (bsc#1012964 MFSA 2016-92)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572636" comment="MozillaFirefox-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572637" comment="MozillaFirefox-translations-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572638" comment="libfreebl3-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572639" comment="libfreebl3-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572640" comment="mozilla-nss-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572641" comment="mozilla-nss-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572642" comment="mozilla-nss-tools-3.21.3-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39333" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572643" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572644" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39334" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1142770" ref_url="https://bugzilla.suse.com/1142770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2019-1010190: Fixed a denial of service which could be caused by a local attacker in putwhitespan() (bsc#1142770).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572645" comment="g3utils-1.1.36-28.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572646" comment="mgetty-1.1.36-28.6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39335" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

This new firmware disables branch prediction on AMD family 17h
processor.

Also the CPU microcode for Intel Haswell-X, Skylake-X and Broadwell-X chipsets
was updated to report both branch prediction control via CPUID flag and
ability to control branch prediction via an MSR register.

This update is part of a mitigation for a branch predictor based
information disclosure attack, and needs additional code in the Linux
Kernel to be active (bsc#1068032 CVE-2017-5715)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572647" comment="microcode_ctl-1.17-102.57.64.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39336" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>


Update to Intel CPU Microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572648" comment="microcode_ctl-1.17-102.57.64.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39337" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572649" comment="microcode_ctl-1.17-102.57.64.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39338" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following security issue:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572650" comment="microcode_ctl-1.17-102.57.64.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39339" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<description>


This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572651" comment="microcode_ctl-1.17-102.57.64.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39340" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and is also part of the mitigations for CVE-2018-3639 (Spectre v4)
and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572652" comment="microcode_ctl-1.17-102.57.64.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39341" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>

This update for minicom fixes the following issues:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code 
  execution (bsc#1033783)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572653" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39342" version="1" class="patch">
	<metadata>
		<title>Security update for mipv6d</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="424311" ref_url="https://bugzilla.suse.com/424311" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>

The following issues have been fixed:

    * the mipv6 daemon did not check the origin of netlink messages,
      therefore allowing local users to spoof messages (CVE-2010-2522).
    * remote attackers could cause buffer overflows in mipv6d
      (CVE-2010-2523).

Security Issues references:

    * CVE-2010-2522
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522&gt;
    * CVE-2010-2523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-09-01"/>
	<updated date="2010-09-01"/>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570305" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570305" comment="mipv6d-2.0.2-2.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39343" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572654" comment="mono-core-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572655" comment="mono-data-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572656" comment="mono-data-postgresql-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572657" comment="mono-data-sqlite-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572658" comment="mono-locale-extras-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572659" comment="mono-nunit-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572660" comment="mono-web-2.0.1-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572661" comment="mono-winforms-2.0.1-1.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39344" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, MozillaFirefox-branding-SLES-for-VMware, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: 

Firefox 38.6.1 ESR (bsc#967087)

The following vulnerabilities were fixed:

- CVE-2016-1523: Fixed denial of service in Graphite 2 library (MFSA 2016-14/bmo#1246093)

Firefox 38.6.0 ESR + Mozilla NSS 3.20.2. (bsc#963520)

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)
- CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-25"/>
	<updated date="2016-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572662" comment="MozillaFirefox-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572663" comment="MozillaFirefox-branding-SLED-38-15.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572664" comment="MozillaFirefox-translations-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572665" comment="libfreebl3-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572666" comment="libfreebl3-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572667" comment="mozilla-nss-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572668" comment="mozilla-nss-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572669" comment="mozilla-nss-tools-3.20.2-17.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39345" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

The following vulnerabilities were fixed in ESR31 and are also included here:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.

Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-25"/>
	<updated date="2015-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572670" comment="MozillaFirefox-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572671" comment="MozillaFirefox-branding-SLED-31.0-0.5.7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572672" comment="MozillaFirefox-translations-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572673" comment="firefox-libgcc_s1-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572674" comment="firefox-libstdc++6-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572675" comment="libfreebl3-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572676" comment="libfreebl3-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572677" comment="mozilla-nss-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572678" comment="mozilla-nss-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572679" comment="mozilla-nss-devel-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572680" comment="mozilla-nss-tools-3.19.2.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572670" comment="MozillaFirefox-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572671" comment="MozillaFirefox-branding-SLED-31.0-0.5.7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572672" comment="MozillaFirefox-translations-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572673" comment="firefox-libgcc_s1-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572674" comment="firefox-libstdc++6-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572675" comment="libfreebl3-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572676" comment="libfreebl3-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572677" comment="mozilla-nss-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572678" comment="mozilla-nss-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572679" comment="mozilla-nss-devel-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572680" comment="mozilla-nss-tools-3.19.2.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39346" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572681" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572682" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572683" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572681" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572682" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572683" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39347" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659163" comment="libfreebl3-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659164" comment="libfreebl3-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659165" comment="libsoftokn3-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659166" comment="libsoftokn3-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659167" comment="mozilla-nss-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659168" comment="mozilla-nss-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659169" comment="mozilla-nss-certs-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659170" comment="mozilla-nss-certs-32bit-3.68.1-38.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659171" comment="mozilla-nss-tools-3.68.1-38.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39348" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependend algorithms.

    * Support for AES-GCM cipher suites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1.
      AES GCM cipher suites are not yet supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Mozilla NSPR was updated to 4.10.1 bringing api additions and bugfixes.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572684" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572685" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572686" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572687" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572688" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572689" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572690" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572684" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572685" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572686" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572687" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572688" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572689" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572690" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39349" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572691" comment="libfreebl3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572692" comment="libfreebl3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572693" comment="libsoftokn3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572694" comment="libsoftokn3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572695" comment="mozilla-nspr-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572696" comment="mozilla-nspr-32bit-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572697" comment="mozilla-nss-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572698" comment="mozilla-nss-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572699" comment="mozilla-nss-certs-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572700" comment="mozilla-nss-certs-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572701" comment="mozilla-nss-tools-3.53.1-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39350" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla-XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="689281" ref_url="https://bugzilla.suse.com/689281" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0065" ref_url="https://www.suse.com/security/cve/CVE-2011-0065/" source="CVE"/>
		<reference ref_id="CVE-2011-0066" ref_url="https://www.suse.com/security/cve/CVE-2011-0066/" source="CVE"/>
		<reference ref_id="CVE-2011-0067" ref_url="https://www.suse.com/security/cve/CVE-2011-0067/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0072" ref_url="https://www.suse.com/security/cve/CVE-2011-0072/" source="CVE"/>
		<reference ref_id="CVE-2011-0073" ref_url="https://www.suse.com/security/cve/CVE-2011-0073/" source="CVE"/>
		<reference ref_id="CVE-2011-0074" ref_url="https://www.suse.com/security/cve/CVE-2011-0074/" source="CVE"/>
		<reference ref_id="CVE-2011-0075" ref_url="https://www.suse.com/security/cve/CVE-2011-0075/" source="CVE"/>
		<reference ref_id="CVE-2011-0077" ref_url="https://www.suse.com/security/cve/CVE-2011-0077/" source="CVE"/>
		<reference ref_id="CVE-2011-0078" ref_url="https://www.suse.com/security/cve/CVE-2011-0078/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<description>

Mozilla XULRunner 1.9.1 was updated to the 1.9.1.19 security release.

    * 

      MFSA 2011-12: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code. Credits

    * 

      Mozilla developer Scoobidiver reported a memory safety issue which
      affected Firefox 4 and Firefox 3.6 (CVE-2011-0081)

      The web development team of Alcidion reported a crash that affected
      Firefox 4, Firefox 3.6 and Firefox 3.5. (CVE-2011-0069)

      Ian Beer reported a crash that affected Firefox 4, Firefox 3.6 and
      Firefox 3.5. (CVE-2011-0070)

      Mozilla developers Bob Clary, Henri Sivonen, Marco Bonardo, Mats
      Palmgren and Jesse Ruderman reported memory safety issues which
      affected Firefox 3.6 and Firefox 3.5. (CVE-2011-0080)

      Aki Helin reported memory safety issues which affected Firefox 3.6
      and Firefox 3.5. (CVE-2011-0074 , CVE-2011-0075)

      Ian Beer reported memory safety issues which affected Firefox 3.6 and
      Firefox 3.5. (CVE-2011-0077 , CVE-2011-0078)

      Martin Barbella reported a memory safety issue which affected Firefox
      3.6 and Firefox 3.5. (CVE-2011-0072)

    * 

      MFSA 2011-13 / CVE-2011-0065 / CVE-2011-0066 / CVE-2011-0073:
      Security researcher regenrecht reported several dangling pointer
      vulnerabilities via TippingPoint's Zero Day Initiative.

    * 

      MFSA 2011-14 / CVE-2011-0067: Security researcher Paul Stone reported
      that a Java applet could be used to mimic interaction with form
      autocomplete controls and steal entries from the form history.

    * 

      MFSA 2011-18 / CVE-2011-1202: Chris Evans of the Chrome Security Team
      reported that the XSLT generate-id() function returned a string that
      revealed a specific valid address of an object on the memory heap. It
      is possible that in some cases this address would be valuable
      information that could be used by an attacker while exploiting a
      different memory corruption but, in order to make an exploit more
      reliable or work around mitigation features in the browser or
      operating system.

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-29"/>
	<updated date="2011-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0065/">CVE-2011-0065</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0066/">CVE-2011-0066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0067/">CVE-2011-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0072/">CVE-2011-0072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0073/">CVE-2011-0073</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0074/">CVE-2011-0074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0075/">CVE-2011-0075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0077/">CVE-2011-0077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0078/">CVE-2011-0078</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572702" comment="mozilla-xulrunner191-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572703" comment="mozilla-xulrunner191-32bit-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572704" comment="mozilla-xulrunner191-gnomevfs-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572705" comment="mozilla-xulrunner191-translations-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572706" comment="mozilla-xulrunner191-x86-1.9.1.19-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572702" comment="mozilla-xulrunner191-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572703" comment="mozilla-xulrunner191-32bit-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572704" comment="mozilla-xulrunner191-gnomevfs-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572705" comment="mozilla-xulrunner191-translations-1.9.1.19-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572706" comment="mozilla-xulrunner191-x86-1.9.1.19-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39351" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="747328" ref_url="https://bugzilla.suse.com/747328" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<description>

Mozilla XULRunner was updated to 1.9.2.27 to fix a security issue with the 
embedded libpng, where a integer overflow could allow remote attackers to 
crash the browser or potentially execute code (CVE-2011-3026),

Security Issue reference:

    * CVE-2011-3026
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-20"/>
	<updated date="2012-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572707" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572708" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572709" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572710" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572711" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572707" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572708" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572709" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572710" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572711" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39352" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868115" ref_url="https://bugzilla.suse.com/868115" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<description>

The mailreader mutt was updated to fix a security issue in displaying mail 
headers, where a crafted e-mail could cause a heap overflow, which in turn 
might be used by attackers to crash mutt or potentially even execute code.

Security Issues references:

    * CVE-2014-0467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-17"/>
	<updated date="2014-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572712" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39353" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572713" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39354" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572714" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39355" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572715" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39356" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181221" ref_url="https://bugzilla.suse.com/1181221" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<description>
This update for mutt fixes the following issue:

- CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572716" comment="mutt-1.5.17-42.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39357" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680095" comment="mutt-1.5.17-42.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39358" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572717" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572718" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572719" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572720" comment="mysql-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572721" comment="mysql-Max-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572722" comment="mysql-client-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572723" comment="mysql-tools-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39359" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572724" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572725" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39360" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This update for nagios-nrpe fixes one issue.

This security issue was fixed:

- CVE-2015-4000: Prevent Logjam. The TLS protocol 1.2 and earlier, when a
  DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not
  properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers
  to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE
  replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
  replaced by DHE (bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572726" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572727" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572728" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39361" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572729" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572730" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572731" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39362" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572732" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572733" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572734" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572735" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572736" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565005" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572737" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572738" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572739" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572740" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39363" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572741" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572742" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572743" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572744" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572745" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565008" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572746" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572747" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572748" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572749" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39364" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572750" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572751" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572752" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572753" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572754" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565011" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572755" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572756" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572757" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572758" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39365" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572759" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572760" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572761" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572762" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572763" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565014" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572764" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572765" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572766" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572767" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39366" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1131830" ref_url="https://bugzilla.suse.com/1131830" source="BUGZILLA"/>
		<reference ref_id="1154037" ref_url="https://bugzilla.suse.com/1154037" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fixed an infinite loop in the next_char function (bsc#1056136).
- CVE-2017-13729: Fixed an illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fixed an illegal address access in the function _nc_read_entry_source (bsc#1056131).
- CVE-2017-13731: Fixed an illegal address access in the function postprocess_termcap (bsc#1056129).
- CVE-2017-13732: Fixed an illegal address access in the function dump_uses (bsc#1056128).
- CVE-2017-13733: Fixed an illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13734: Fixed an illegal address access in the _nc_safe_strcat (bsc#1056126).
- CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830).
- CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572768" comment="libncurses5-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572769" comment="libncurses5-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572770" comment="libncurses6-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572771" comment="libncurses6-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572772" comment="ncurses-devel-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572773" comment="ncurses-devel-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572774" comment="ncurses-utils-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572775" comment="tack-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572776" comment="terminfo-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572777" comment="terminfo-base-5.6-93.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39367" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="1121450" ref_url="https://bugzilla.suse.com/1121450" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2018-19211: Fixed NULL pointer dereference at function _nc_parse_entry in parse_entry.c (bsc#1115929).

Bug fixes:

- Modify bsc#1115929 patch to fix change in form_driver() that breaks ncurses-5.9 and the variable move_after_insert of ncurses-6.1 (bsc#1121450).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121450">SUSE bug 1121450</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572778" comment="libncurses5-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572779" comment="libncurses5-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572780" comment="libncurses6-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572781" comment="libncurses6-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572782" comment="ncurses-devel-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572783" comment="ncurses-devel-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572784" comment="ncurses-utils-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572785" comment="tack-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572786" comment="terminfo-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572787" comment="terminfo-base-5.6-93.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39368" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652290" comment="libncurses5-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652291" comment="libncurses5-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652292" comment="libncurses6-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652293" comment="libncurses6-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652294" comment="ncurses-devel-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652295" comment="ncurses-devel-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652296" comment="ncurses-utils-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652297" comment="tack-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652298" comment="terminfo-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652299" comment="terminfo-base-5.6-93.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39369" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572788" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572789" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572790" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572791" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39370" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572792" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572793" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572794" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39371" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572795" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572796" comment="libnetpbm10-32bit-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572797" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39372" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104139" ref_url="https://bugzilla.suse.com/1104139" source="BUGZILLA"/>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2018-15173: Fixed a remote denial of service attack via a crafted TCP-based service (bsc#1104139).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572798" comment="nmap-4.75-1.30.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39373" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572799" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572800" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572801" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572802" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572803" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572804" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572805" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572799" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572800" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572801" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572802" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572803" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572804" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572805" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39374" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS was updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was used to create 
man-in-the-middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572806" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566163" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572807" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566165" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572808" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39375" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="714931" ref_url="https://bugzilla.suse.com/714931" source="BUGZILLA"/>
		<description>

This update updates Mozilla NSS to 3.12.11.

The update marks the compromised DigiNotar Certificate Authority as 
untrusted

For more information read:

MFSA 2011-34
&lt;http://www.mozilla.org/security/announce/2011/mfsa2011-34.html&gt;

    * update to 3.12.10
          o root CA changes
          o filter certain bogus certs (bmo#642815)
          o fix minor memory leaks
          o other bugfixes
    * update to 3.12.9
          o fix minor memory leaks (bmo#619268)
          o fix crash in nss_cms_decoder_work_data (bmo#607058)
          o fix crash in certutil (bmo#620908)
          o handle invalid argument in JPAKE (bmo#609068)
          o J-PAKE support (API requirement for Firefox &gt;= 4.0b8)
    * replaced expired PayPal test certificate (fixing testsuite)
    * removed DigiNotar root certifiate from trusted db (bmo#682927)

This update also brings the prerequired Mozilla NSPR to version 4.8.9.

    * update to 4.8.9
    * update to 4.8.8
          o support IPv6 on Android (bmo#626866)
          o use AI_ADDRCONFIG for loopback hostnames (bmo#614526)
          o support SDP sockets (bmo#518078)
          o support m32r architecture (bmo#635667)
          o use atomic functions on ARM (bmo#626309)
          o some other fixes not affecting the Linux platform

		</description>
<advisory from="security@suse.de">
	<issued date="2011-09-06"/>
	<updated date="2011-09-06"/>
	<bugzilla href="https://bugzilla.suse.com/714931">SUSE bug 714931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572809" comment="libfreebl3-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572810" comment="libfreebl3-32bit-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572811" comment="libfreebl3-x86-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572812" comment="mozilla-nspr-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572813" comment="mozilla-nspr-32bit-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572814" comment="mozilla-nspr-x86-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572815" comment="mozilla-nss-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572816" comment="mozilla-nss-32bit-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572817" comment="mozilla-nss-tools-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572818" comment="mozilla-nss-x86-3.12.11-3.2.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572809" comment="libfreebl3-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572810" comment="libfreebl3-32bit-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572811" comment="libfreebl3-x86-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572812" comment="mozilla-nspr-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572813" comment="mozilla-nspr-32bit-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572814" comment="mozilla-nspr-x86-4.8.9-1.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572815" comment="mozilla-nss-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572816" comment="mozilla-nss-32bit-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572817" comment="mozilla-nss-tools-3.12.11-3.2.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572818" comment="mozilla-nss-x86-3.12.11-3.2.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39376" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920183" ref_url="https://bugzilla.suse.com/920183" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="943218" ref_url="https://bugzilla.suse.com/943218" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951351" ref_url="https://bugzilla.suse.com/951351" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<description>

This network time protocol server ntp was updated to 4.2.8p6 to fix the following
issues:

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.


Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

These security issues were fixed:
- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
- bsc#784760: Remove local clock from default configuration.
- bsc#942441/fate#319496: Require perl-Socket6.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- bsc#920183: Allow -4 and -6 address qualifiers in 'server' directives.
- Use upstream ntp-wait, because our version is incompatible with
  the new ntpq command line syntax.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920183">SUSE bug 920183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951351">SUSE bug 951351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572819" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572820" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572821" comment="yast2-ntp-client-2.17.14.1-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39377" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<description>

This update for ntp fixes the following issues: 

- Separate the creation of ntp.keys and key #1 in it to avoid
  problems when upgrading installations that have the file, but
  no key #1, which is needed e.g. by 'rcntp addserver'.

- Update to 4.2.8p7 (bsc#977446):
  * CVE-2016-1547, bsc#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, bsc#977461: Interleave-pivot
  * CVE-2016-1549, bsc#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, bsc#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572822" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572823" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39378" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572824" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572825" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572826" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39379" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572827" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572828" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39380" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572829" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572830" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39381" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="1031085" ref_url="https://bugzilla.suse.com/1031085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>

This ntp update to version 4.2.8p10 fixes the following issues:

Security issues fixed (bsc#1030050):
- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:
- Remove spurious log messages (bsc#1014172).
- Fixing ppc and ppc64 linker issue (bsc#1031085).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031085">SUSE bug 1031085</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572831" comment="ntp-4.2.8p10-48.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572832" comment="ntp-doc-4.2.8p10-48.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39382" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572833" comment="ntp-4.2.8p11-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572834" comment="ntp-doc-4.2.8p11-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39383" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572835" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572836" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39384" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:
	  
Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572837" comment="ntp-4.2.8p13-48.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572838" comment="ntp-doc-4.2.8p13-48.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39385" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-01"/>
	<updated date="2020-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572839" comment="ntp-4.2.8p15-48.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572840" comment="ntp-doc-4.2.8p15-48.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39386" version="1" class="patch">
	<metadata>
		<title>Security update for OFED</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="693243" ref_url="https://bugzilla.suse.com/693243" source="BUGZILLA"/>
		<reference ref_id="703752" ref_url="https://bugzilla.suse.com/703752" source="BUGZILLA"/>
		<reference ref_id="704914" ref_url="https://bugzilla.suse.com/704914" source="BUGZILLA"/>
		<reference ref_id="706175" ref_url="https://bugzilla.suse.com/706175" source="BUGZILLA"/>
		<reference ref_id="722030" ref_url="https://bugzilla.suse.com/722030" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1023" ref_url="https://www.suse.com/security/cve/CVE-2011-1023/" source="CVE"/>
		<description>

This update fixes the following reports for OFED:

    * 704914: Fixed NFS client over TCP hangs due to packet loss.
    * 693243: Fixed issue with building lustre against ofed-devel.
    * 706175: Fix crash on accessing /proc/net/sdpstats
    * 722030: Cannot load ib_ipath
    * 703752: Prevent BUG_ON triggering on congestion

Security Issue reference:

    * CVE-2011-1023
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1023&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-06"/>
	<updated date="2011-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/693243">SUSE bug 693243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703752">SUSE bug 703752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704914">SUSE bug 704914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706175">SUSE bug 706175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722030">SUSE bug 722030</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1023/">CVE-2011-1023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572841" comment="cxgb3-firmware-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572842" comment="ofed-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572843" comment="ofed-doc-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572844" comment="ofed-kmp-default-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572845" comment="ofed-kmp-pae-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572846" comment="ofed-kmp-ppc64-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572841" comment="cxgb3-firmware-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572842" comment="ofed-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572843" comment="ofed-doc-1.5.2-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572844" comment="ofed-kmp-default-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572845" comment="ofed-kmp-pae-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572846" comment="ofed-kmp-ppc64-1.5.2_2.6.32.46_0.3-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39387" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
- CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194).
- CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-11"/>
	<updated date="2020-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572847" comment="compat-libldap-2_3-0-2.3.37-2.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572848" comment="libldap-2_4-2-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572849" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572850" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572851" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572852" comment="openldap2-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572853" comment="openldap2-back-meta-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572854" comment="openldap2-client-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572855" comment="openldap2-client-openssl1-2.4.26-0.17.31.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572856" comment="openldap2-openssl1-2.4.26-0.17.31.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39388" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a local privilege escalation from ldap to root (bsc#1172698).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-07"/>
	<updated date="2020-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572857" comment="compat-libldap-2_3-0-2.3.37-2.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572858" comment="libldap-2_4-2-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572859" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572860" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572861" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572862" comment="openldap2-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572863" comment="openldap2-back-meta-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572864" comment="openldap2-client-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572865" comment="openldap2-client-openssl1-2.4.26-0.17.31.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572866" comment="openldap2-openssl1-2.4.26-0.17.31.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39389" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following security issue:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572867" comment="compat-libldap-2_3-0-2.3.37-2.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572868" comment="libldap-2_4-2-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572869" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572870" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572871" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572872" comment="openldap2-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572873" comment="openldap2-back-meta-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572874" comment="openldap2-client-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572875" comment="openldap2-client-openssl1-2.4.26-0.17.31.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572876" comment="openldap2-openssl1-2.4.26-0.17.31.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39390" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572877" comment="compat-libldap-2_3-0-2.3.37-2.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572878" comment="libldap-2_4-2-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572879" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572880" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572881" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572882" comment="openldap2-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572883" comment="openldap2-back-meta-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572884" comment="openldap2-client-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572885" comment="openldap2-client-openssl1-2.4.26-0.17.31.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572886" comment="openldap2-openssl1-2.4.26-0.17.31.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39391" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572887" comment="compat-libldap-2_3-0-2.3.37-2.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572888" comment="libldap-2_4-2-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572889" comment="libldap-2_4-2-32bit-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572890" comment="libldap-openssl1-2_4-2-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572891" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572892" comment="openldap2-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572893" comment="openldap2-back-meta-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572894" comment="openldap2-client-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572895" comment="openldap2-client-openssl1-2.4.26-0.17.31.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572896" comment="openldap2-openssl1-2.4.26-0.17.31.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39392" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-22"/>
	<updated date="2015-04-22"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572897" comment="compat-libldap-2_3-0-2.3.37-2.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572898" comment="libldap-2_4-2-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572899" comment="libldap-2_4-2-32bit-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572900" comment="openldap2-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572901" comment="openldap2-back-meta-2.4.26-0.17.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572902" comment="openldap2-client-2.4.26-0.17.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39393" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<description>
This update fixes the following security issues:

- CVE-2015-6908: The ber_get_next function allowed remote attackers to cause a denial
  of service (reachable assertion and application crash) via crafted BER data, as
  demonstrated by an attack against slapd. (bsc#945582)
- CVE-2015-4000: Fix weak Diffie-Hellman size vulnerability. (bsc#937766)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572903" comment="compat-libldap-2_3-0-2.3.37-2.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572904" comment="libldap-2_4-2-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572905" comment="libldap-2_4-2-32bit-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572906" comment="openldap2-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572907" comment="openldap2-back-meta-2.4.26-0.17.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572908" comment="openldap2-client-2.4.26-0.17.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39394" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572909" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572910" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572911" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572912" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39395" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122756" ref_url="https://bugzilla.suse.com/1122756" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

Security issue fixed:

- CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572913" comment="libopensc2-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572914" comment="libopensc2-32bit-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572915" comment="opensc-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572916" comment="opensc-32bit-0.11.6-5.27.6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39396" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149746" ref_url="https://bugzilla.suse.com/1149746" source="BUGZILLA"/>
		<reference ref_id="1149747" ref_url="https://bugzilla.suse.com/1149747" source="BUGZILLA"/>
		<reference ref_id="1158256" ref_url="https://bugzilla.suse.com/1158256" source="BUGZILLA"/>
		<reference ref_id="1177378" ref_url="https://bugzilla.suse.com/1177378" source="BUGZILLA"/>
		<reference ref_id="1177380" ref_url="https://bugzilla.suse.com/1177380" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
- CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-15945: out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746)
- CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572917" comment="libopensc2-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572918" comment="libopensc2-32bit-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572919" comment="opensc-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572920" comment="opensc-32bit-0.11.6-5.27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39397" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653634" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653635" comment="libopensc2-32bit-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653636" comment="opensc-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653637" comment="opensc-32bit-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39398" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572921" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572922" comment="libslp1-openssl1-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572923" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572924" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572925" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39399" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="709782" ref_url="https://bugzilla.suse.com/709782" source="BUGZILLA"/>
		<reference ref_id="744643" ref_url="https://bugzilla.suse.com/744643" source="BUGZILLA"/>
		<reference ref_id="752354" ref_url="https://bugzilla.suse.com/752354" source="BUGZILLA"/>
		<reference ref_id="756370" ref_url="https://bugzilla.suse.com/756370" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5000" ref_url="https://www.suse.com/security/cve/CVE-2011-5000/" source="CVE"/>
		<reference ref_id="CVE-2012-0814" ref_url="https://www.suse.com/security/cve/CVE-2012-0814/" source="CVE"/>
		<description>

This collective security update of openssh fixes multiple security issues:

    * memory exhaustion in gssapi due to integer overflow (bnc#756370,
      CVE-2011-5000)
    * forced command option information leak (bnc#744643, CVE-2012-0814)

Additionally, the following bug has been fixed:

    * bnc#752354 server-side delay upon user exiting a ssh session, due to
      DNS queries from libaudit

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-13"/>
	<updated date="2012-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/709782">SUSE bug 709782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744643">SUSE bug 744643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752354">SUSE bug 752354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/756370">SUSE bug 756370</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-5000/">CVE-2011-5000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0814/">CVE-2012-0814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572926" comment="openssh-5.1p1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572927" comment="openssh-askpass-5.1p1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572928" comment="openssh-askpass-gnome-5.1p1-41.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572926" comment="openssh-5.1p1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572927" comment="openssh-askpass-5.1p1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572928" comment="openssh-askpass-gnome-5.1p1-41.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572926" comment="openssh-5.1p1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572927" comment="openssh-askpass-5.1p1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572928" comment="openssh-askpass-gnome-5.1p1-41.51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39400" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<description>
openssh was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).
- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).
- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).
- Hardening patch to fix sftp RCE (bsc#903649).

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-19"/>
	<updated date="2015-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572929" comment="openssh-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572930" comment="openssh-askpass-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572931" comment="openssh-askpass-gnome-5.1p1-41.69.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39401" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="959096" ref_url="https://bugzilla.suse.com/959096" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="962794" ref_url="https://bugzilla.suse.com/962794" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>
This update for openssh fixes security issues and bugs.

The following vulnerabilities were fixed:

- CVE-2016-6210: User enumeration through the timing of password (bsc#989363)
- CVE-2016-3115: Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding inject commands to xauth (bsc#970632)
- CVE-2016-1908: X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Malicious users may attach /bin/login via LD_PRELOAD or similar environment variables set via PAM if PAM is configured to read user-specified environment and UseLogin=yes is set is sshd_config (bsc#975865)
- CVE-2016-6515: Remote attackers could cause a denial of service by providing exceptionally long passwords (bsc#992533)

The following security related changes are included:

- bsc#932483, bsc#948902: Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
- bsc#948902: Allow lowering the DH groups parameter limit in server as well as when GSSAPI key exchange is used

The following tracked changes are included:

- bsc#981654: avoid complaining about unset DISPLAY variable
- bsc#959096: initialise msg_id to prevent disconnections
- bsc#962794: relax version requires for the openssh-askpass subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959096">SUSE bug 959096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962794">SUSE bug 962794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572932" comment="openssh-5.1p1-41.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572933" comment="openssh-askpass-5.1p1-41.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572934" comment="openssh-askpass-gnome-5.1p1-41.74.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39402" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480, CVE-2016-8858)
- Properly verify CIDR masks in configuration (bsc#1005893)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572935" comment="openssh-5.1p1-41.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572936" comment="openssh-askpass-5.1p1-41.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572937" comment="openssh-askpass-gnome-5.1p1-41.79.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39403" version="1" class="patch">
	<metadata>
		<title>Security update for openssh, openssh-askpass, openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034467" ref_url="https://bugzilla.suse.com/1034467" source="BUGZILLA"/>
		<reference ref_id="1077104" ref_url="https://bugzilla.suse.com/1077104" source="BUGZILLA"/>
		<reference ref_id="886235" ref_url="https://bugzilla.suse.com/886235" source="BUGZILLA"/>
		<description>


This update for openssh, openssh-askpass, openssh-openssl1 fixes the following issues:

Upgrade to OpenSSH version 6.6p1 (bsc#1077104, bsc#1034467)

This also adds another build using '-openssl1' suffix, which can be installed

- require openssh-askpass of the same version or newer.
- change the Supplements tag to combination of both openssh and X11
  to prevent accidental imports of the X11 packages into minimal
  installs (bsc#886235)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034467">SUSE bug 1034467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077104">SUSE bug 1077104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886235">SUSE bug 886235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572938" comment="openssh-5.1p1-41.80.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572939" comment="openssh-askpass-1.2.4.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572940" comment="openssh-openssl1-6.6p1-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572941" comment="openssh-openssl1-helpers-6.6p1-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39404" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<description>
This update for openssh version 6.6p1 fixes the following issues:

Security issues fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)

The regular openssh version was updated to openssh 6.6p1, the -openssl1 variant was at this version already.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572942" comment="openssh-6.6p1-80.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572943" comment="openssh-askpass-gnome-6.6p1-80.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572944" comment="openssh-openssl1-6.6p1-80.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572945" comment="openssh-openssl1-helpers-6.6p1-80.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39405" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572946" comment="openssh-6.6p1-80.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572947" comment="openssh-askpass-gnome-6.6p1-80.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572948" comment="openssh-openssl1-6.6p1-80.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572949" comment="openssh-openssl1-helpers-6.6p1-80.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39406" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="798362" ref_url="https://bugzilla.suse.com/798362" source="BUGZILLA"/>
		<reference ref_id="826427" ref_url="https://bugzilla.suse.com/826427" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="832628" ref_url="https://bugzilla.suse.com/832628" source="BUGZILLA"/>
		<reference ref_id="833605" ref_url="https://bugzilla.suse.com/833605" source="BUGZILLA"/>
		<reference ref_id="847710" ref_url="https://bugzilla.suse.com/847710" source="BUGZILLA"/>
		<reference ref_id="862875" ref_url="https://bugzilla.suse.com/862875" source="BUGZILLA"/>
		<reference ref_id="869101" ref_url="https://bugzilla.suse.com/869101" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<description>

This update for OpenSSH provides fixes for the following issues:

    * Exit sshd normally when port is already in use. (bnc#832628)
    * Use hardware crypto engines where available. (bnc#826427)
    * Use correct options for login when it is used. (bnc#833605)
    * Move FIPS messages to higher debug level. (bnc#862875)
    * Fix forwarding with IPv6 addresses in DISPLAY. (bnc#847710)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)
    * Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)
    * Properly terminate connections on server reboot/powerdown.
      (bnc#798362)

Security Issue reference:

    * CVE-2014-2532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-10"/>
	<updated date="2014-06-10"/>
	<bugzilla href="https://bugzilla.suse.com/798362">SUSE bug 798362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826427">SUSE bug 826427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832628">SUSE bug 832628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833605">SUSE bug 833605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847710">SUSE bug 847710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862875">SUSE bug 862875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572950" comment="openssh-5.1p1-41.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572951" comment="openssh-askpass-5.1p1-41.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572952" comment="openssh-askpass-gnome-5.1p1-41.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39407" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1115654" ref_url="https://bugzilla.suse.com/1115654" source="BUGZILLA"/>
		<reference ref_id="1116577" ref_url="https://bugzilla.suse.com/1116577" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>


This update for openssh-openssl1 fixes the following security issues:

- CVE-2016-10708: sshd allowed remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.  (bsc#1076957)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Non security bugfixes:

- Fix for sftp client because it returns wrong error code upon failure (bsc#1091396)
- Stop leaking File descriptors (bsc#964336)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115654">SUSE bug 1115654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116577">SUSE bug 1116577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572953" comment="openssh-openssl1-6.6p1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572954" comment="openssh-openssl1-helpers-6.6p1-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39408" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572955" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572956" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572957" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572958" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39409" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572959" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572960" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572961" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572962" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39410" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572963" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572964" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572965" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572966" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572967" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39411" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572968" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572969" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572970" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572971" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572972" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39412" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572973" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572974" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572975" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572976" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572977" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39413" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572978" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572979" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572980" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572981" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572982" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39414" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572983" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572984" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572985" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572986" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572987" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39415" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572988" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572989" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572990" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572991" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572992" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39416" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572993" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572994" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572995" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572996" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572997" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39417" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572998" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572999" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573000" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573001" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573002" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39418" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573003" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573004" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573005" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573006" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573007" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39419" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573008" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573009" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573010" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573011" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573012" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39420" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573013" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573014" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573015" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573016" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573017" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39421" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573018" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573019" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573020" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573021" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573022" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39422" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573023" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573024" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573025" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573026" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573027" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39423" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631740" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631741" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631742" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631743" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631744" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39424" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632461" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632462" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632463" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632464" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632465" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39425" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673400" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673401" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673402" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673403" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673404" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39426" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="971354" ref_url="https://bugzilla.suse.com/971354" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#971354: libopenssl1_0_0 now Recommends: openssl1 to get correct SSL Root
  Certificate hashes
- bsc#889013: Rename README.SuSE to the new spelling README.SUSE
- bsc#976943: Fixed a buffer overrun in ASN1_parse.
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971354">SUSE bug 971354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573028" comment="libopenssl1-devel-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573029" comment="libopenssl1_0_0-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573030" comment="libopenssl1_0_0-32bit-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573031" comment="openssl1-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573032" comment="openssl1-doc-1.0.1g-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39427" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

penSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573033" comment="libopenssl1-devel-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573034" comment="libopenssl1_0_0-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573035" comment="libopenssl1_0_0-32bit-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573036" comment="openssl1-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573037" comment="openssl1-doc-1.0.1g-0.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39428" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001707" ref_url="https://bugzilla.suse.com/1001707" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022644" ref_url="https://bugzilla.suse.com/1022644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001707">SUSE bug 1001707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022644">SUSE bug 1022644</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573038" comment="libopenssl1-devel-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573039" comment="libopenssl1-devel-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573040" comment="libopenssl1_0_0-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573041" comment="libopenssl1_0_0-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573042" comment="openssl1-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573043" comment="openssl1-doc-1.0.1g-0.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39429" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027908" ref_url="https://bugzilla.suse.com/1027908" source="BUGZILLA"/>
		<reference ref_id="1032261" ref_url="https://bugzilla.suse.com/1032261" source="BUGZILLA"/>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1057660" ref_url="https://bugzilla.suse.com/1057660" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="990592" ref_url="https://bugzilla.suse.com/990592" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
- Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

- support alternate root ca chains (bsc#1032261)
- Require openssl1, so c_rehash1 is available during %post to hash the certificates (bsc#1057660)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027908">SUSE bug 1027908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032261">SUSE bug 1032261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057660">SUSE bug 1057660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573044" comment="libopenssl1-devel-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573045" comment="libopenssl1-devel-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573046" comment="libopenssl1_0_0-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573047" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573048" comment="openssl1-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573049" comment="openssl1-doc-1.0.1g-0.58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39430" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573050" comment="libopenssl1-devel-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573051" comment="libopenssl1-devel-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573052" comment="libopenssl1_0_0-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573053" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573054" comment="openssl1-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573055" comment="openssl1-doc-1.0.1g-0.58.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39431" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573056" comment="libopenssl1-devel-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573057" comment="libopenssl1-devel-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573058" comment="libopenssl1_0_0-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573059" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573060" comment="openssl1-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573061" comment="openssl1-doc-1.0.1g-0.58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39432" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573062" comment="libopenssl1-devel-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573063" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573064" comment="libopenssl1_0_0-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573065" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573066" comment="openssl1-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573067" comment="openssl1-doc-1.0.1g-0.58.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39433" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573068" comment="libopenssl1-devel-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573069" comment="libopenssl1-devel-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573070" comment="libopenssl1_0_0-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573071" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573072" comment="openssl1-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573073" comment="openssl1-doc-1.0.1g-0.58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39434" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573074" comment="libopenssl1-devel-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573075" comment="libopenssl1-devel-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573076" comment="libopenssl1_0_0-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573077" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573078" comment="openssl1-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573079" comment="openssl1-doc-1.0.1g-0.58.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39435" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl1 fixes the following issues:

- Add missing commits fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory problem in 'BN_copy()'. (bsc#1160163)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573080" comment="libopenssl1-devel-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573081" comment="libopenssl1-devel-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573082" comment="libopenssl1_0_0-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573083" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573084" comment="openssl1-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573085" comment="openssl1-doc-1.0.1g-0.58.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39436" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573086" comment="libopenssl1-devel-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573087" comment="libopenssl1-devel-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573088" comment="libopenssl1_0_0-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573089" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573090" comment="openssl1-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573091" comment="openssl1-doc-1.0.1g-0.58.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39437" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573092" comment="libopenssl1-devel-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573093" comment="libopenssl1-devel-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573094" comment="libopenssl1_0_0-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573095" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573096" comment="openssl1-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573097" comment="openssl1-doc-1.0.1g-0.58.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39438" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573098" comment="libopenssl1-devel-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573099" comment="libopenssl1-devel-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573100" comment="libopenssl1_0_0-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573101" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573102" comment="openssl1-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573103" comment="openssl1-doc-1.0.1g-0.58.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39439" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631745" comment="libopenssl1-devel-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631746" comment="libopenssl1-devel-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631747" comment="libopenssl1_0_0-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631748" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631749" comment="openssl1-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631750" comment="openssl1-doc-1.0.1g-0.58.36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39440" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.                                                                                                                   
  Read buffer overruns processing ASN.1 strings (bsc#1189521).                                                                                                                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632543" comment="libopenssl1-devel-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632544" comment="libopenssl1-devel-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632545" comment="libopenssl1_0_0-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632546" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632547" comment="openssl1-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632548" comment="openssl1-doc-1.0.1g-0.58.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39441" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-0778: Fixed an infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673405" comment="libopenssl1-devel-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673406" comment="libopenssl1-devel-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673407" comment="libopenssl1_0_0-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673408" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673409" comment="openssl1-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673410" comment="openssl1-doc-1.0.1g-0.58.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39442" version="1" class="patch">
	<metadata>
		<title>Security update for openswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="713986" ref_url="https://bugzilla.suse.com/713986" source="BUGZILLA"/>
		<reference ref_id="727002" ref_url="https://bugzilla.suse.com/727002" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4073" ref_url="https://www.suse.com/security/cve/CVE-2011-4073/" source="CVE"/>
		<description>

openswan's crypto helper was prone to an use-after-free flaw which could 
potentially allow remote attackers to cause a Denial of Service 
(CVE-2011-4073, bnc#727002). Additionally, the following issues have been 
fixed:

    * AH handshake problems (bnc#713986),
    * potential dereference of no longer valid pointers,
    * mode handling issues

Security Issue reference:

    * CVE-2011-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4073&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-14"/>
	<updated date="2011-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/713986">SUSE bug 713986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727002">SUSE bug 727002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4073/">CVE-2011-4073</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573104" comment="openswan-2.6.16-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573105" comment="openswan-doc-2.6.16-1.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573104" comment="openswan-2.6.16-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573105" comment="openswan-doc-2.6.16-1.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39443" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-31"/>
	<updated date="2013-10-31"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573106" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573107" comment="openvpn-auth-pam-plugin-2.0.9-143.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39444" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2017-7478: openvpn: Authenticated user can DoS server by using a big payload in P_CONTROL (bsc#1038709)
- CVE-2017-7479: openvpn: Denial of Service due to Exhaustion of Packet-ID counter (bsc#1038711)
- Hardening measures found by internal audit (bsc#1038713)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573108" comment="openvpn-2.0.9-143.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573109" comment="openvpn-auth-pam-plugin-2.0.9-143.35.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39445" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-22"/>
	<updated date="2017-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573110" comment="openvpn-2.0.9-143.35.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573111" comment="openvpn-auth-pam-plugin-2.0.9-143.35.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39446" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<description>
This update for openvpn fixes the following security issue:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573112" comment="openvpn-2.0.9-143.35.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573113" comment="openvpn-auth-pam-plugin-2.0.9-143.35.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39447" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2016-6329: OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a \'Sweet32\' attack. (bsc#995374)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-12"/>
	<updated date="2018-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573114" comment="openvpn-2.0.9-143.35.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573115" comment="openvpn-auth-pam-plugin-2.0.9-143.35.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39448" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573116" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573117" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573118" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39449" version="1" class="patch">
	<metadata>
		<title>Security update for opie</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="698772" ref_url="https://bugzilla.suse.com/698772" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>

This update fixes off-by-one errors in opiesu (CVE-2011-2489) and missing 
setuid() return value checks in opielogin (CVE-2011-2490).

This update also removes the setuid bit from opiesu program. If you rely on 
the setuid bit on opiesu, add the following line to /etc/permissions.local:

/usr/bin/opiesu                root:root         4755

Security Issue references:

    * CVE-2011-2489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489&gt;
    * CVE-2011-2490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-06-29"/>
	<updated date="2011-06-29"/>
	<bugzilla href="https://bugzilla.suse.com/698772">SUSE bug 698772</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573119" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573120" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573121" comment="opie-x86-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573122" comment="permissions-2011.6.28-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573119" comment="opie-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573120" comment="opie-32bit-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573121" comment="opie-x86-2.4-662.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573122" comment="permissions-2011.6.28-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39450" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573123" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573124" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39451" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
This update for pam fixes the following issues:

Security issues fixed:

- CVE-2015-3238: Fixed a denial of service and information leak which could be caused by very long passwords (bsc#934920).
- CVE-2013-7041: Fixed a potential authentication bypass where password hashes weren't compared case-sensitively (bsc#854480).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573125" comment="pam-1.0.4-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573126" comment="pam-32bit-1.0.4-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573127" comment="pam-doc-1.0.4-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39452" version="1" class="patch">
	<metadata>
		<title>Security update for pam-modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="707645" ref_url="https://bugzilla.suse.com/707645" source="BUGZILLA"/>
		<reference ref_id="839386" ref_url="https://bugzilla.suse.com/839386" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
This update for pam-modules fixes the following issue.

This security issue was fixed:

- CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage
  of locked accounts (bsc#707645, bsc#839386).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839386">SUSE bug 839386</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573128" comment="pam-modules-11-1.22.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573129" comment="pam-modules-32bit-11-1.22.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39453" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<description>
This update for pam_pkcs11 fixes the following security issues:

- It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012)
- Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012)
- Memory not cleaned properly before free() (bsc#1105012)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573130" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573131" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39454" version="1" class="patch">
	<metadata>
		<title>Security update for pango</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="666101" ref_url="https://bugzilla.suse.com/666101" source="BUGZILLA"/>
		<reference ref_id="672502" ref_url="https://bugzilla.suse.com/672502" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>

Specially crafted font files could cause a heap corruption in applications 
linked against pango (CVE-2011-0064, CVE-2011-0020).

Security Issue references:

    * CVE-2011-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064&gt;
    * CVE-2011-0020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-01"/>
	<updated date="2011-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672502">SUSE bug 672502</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573132" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573133" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573134" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573135" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573132" comment="pango-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573133" comment="pango-32bit-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573134" comment="pango-doc-1.26.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573135" comment="pango-x86-1.26.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39455" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573136" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39456" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="651759" ref_url="https://bugzilla.suse.com/651759" source="BUGZILLA"/>
		<reference ref_id="661000" ref_url="https://bugzilla.suse.com/661000" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>

An integer overflow in pcsc-ccid and a buffer overflow in pcsc-lite while 
handling smart card responses have been fixed.

CVE-2010-4530 and CVE-2010-4531 have been assigned to these issues. 
Additionally a new device ID for card readers was added.

Security Issue references:

    * CVE-2010-4531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531&gt;
    * CVE-2010-4530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-01-21"/>
	<updated date="2011-01-21"/>
	<bugzilla href="https://bugzilla.suse.com/651759">SUSE bug 651759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573137" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573138" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573139" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573140" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573137" comment="pcsc-ccid-1.3.8-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573138" comment="pcsc-lite-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573139" comment="pcsc-lite-32bit-1.4.102-1.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573140" comment="pcsc-lite-x86-1.4.102-1.37.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39457" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609317" ref_url="https://bugzilla.suse.com/609317" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<description>

This update of pcsc-lite fixes a local vulnerability (stack overflow) which 
allowed every user with write-access to '/var/run/pcscd/pcscd.comm' to gain 
root privileges. CVE-2010-0407 has been assigned to this issue.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-06"/>
	<updated date="2010-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573141" comment="pcsc-lite-1.4.102-1.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573142" comment="pcsc-lite-32bit-1.4.102-1.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573143" comment="pcsc-lite-x86-1.4.102-1.31.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573141" comment="pcsc-lite-1.4.102-1.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573142" comment="pcsc-lite-32bit-1.4.102-1.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573143" comment="pcsc-lite-x86-1.4.102-1.31.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39458" version="1" class="patch">
	<metadata>
		<title>Security update for perf</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="607339" ref_url="https://bugzilla.suse.com/607339" source="BUGZILLA"/>
		<reference ref_id="711414" ref_url="https://bugzilla.suse.com/711414" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2905" ref_url="https://www.suse.com/security/cve/CVE-2011-2905/" source="CVE"/>
		<description>

The following perf tool bugs have been fixed:

    * it was issuing excessive number of gettimeofday calls creating noise
      when trying to measure performance (bnc#607339).
    * it would consider a file named 'config' in the
      current-working-directory as containing perf configuration data, this
      fact could be exploited by a malicious user (bnc#711414,
      CVE-2011-2905) .

Security Issue reference:

    * CVE-2011-2905
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2905&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-11"/>
	<updated date="2011-11-11"/>
	<bugzilla href="https://bugzilla.suse.com/607339">SUSE bug 607339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711414">SUSE bug 711414</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2905/">CVE-2011-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573144" comment="perf-2.6.32.46-2.5.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573144" comment="perf-2.6.32.46-2.5.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39459" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="657625" ref_url="https://bugzilla.suse.com/657625" source="BUGZILLA"/>
		<reference ref_id="676086" ref_url="https://bugzilla.suse.com/676086" source="BUGZILLA"/>
		<reference ref_id="684799" ref_url="https://bugzilla.suse.com/684799" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<description>

This update fixes a bug in Perl that makes spamassassin crash and does not 
allow bypassing taint mode by using lc() or uc() anymore.

    * CVE-2010-4777: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
    * CVE-2011-1487: CVSS v2 Base Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N):
      Permissions, Privileges, and Access Control (CWE-264)

Security Issue reference:

    * CVE-2010-4777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-06"/>
	<updated date="2011-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/657625">SUSE bug 657625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676086">SUSE bug 676086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684799">SUSE bug 684799</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573145" comment="perl-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573146" comment="perl-32bit-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573147" comment="perl-base-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573148" comment="perl-doc-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573149" comment="perl-x86-5.10.0-64.55.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573145" comment="perl-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573146" comment="perl-32bit-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573147" comment="perl-base-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573148" comment="perl-doc-5.10.0-64.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573149" comment="perl-x86-5.10.0-64.55.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39460" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="900455" ref_url="https://bugzilla.suse.com/900455" source="BUGZILLA"/>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="976584" ref_url="https://bugzilla.suse.com/976584" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

These security issues were fixed: 

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)
- CVE-2018-6913: Prevent heap-based buffer overflow in the pack function that
  allowed context-dependent attackers to execute arbitrary code via a large item
  count (bsc#1082216).
- CVE-2018-6798: Matching a crafted locale dependent regular expression could
  have caused a heap-based buffer over-read and potentially information
  disclosure (bsc#1082233).
- CVE-2017-6512: Prevent race condition in the rmtree and remove_tree functions
  in the File-Path module that allowed attackers to set the mode on arbitrary
  files via vectors involving directory-permission loosening logic (bsc#1047178)
- CVE-2016-6185: The XSLoader::load method did not properly locate .so files
  when called in a string eval, which might have allowed local users to execute
  arbitrary code via a Trojan horse library under the current working directory
  (bsc#988311)
- CVE-2016-1238: (1) cpan/Archive-Tar/bin/ptar, (2)
  cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4)
  cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs,
  (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9)
  cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11)
  cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails,
  (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15)
  dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist,
  (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20)
  utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23)
  utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL did not
  properly remove . (period) characters from the end of the includes directory
  array, which might have allowed local users to gain privileges via a Trojan
  horse module under the current working directory (bsc#987887)
- CVE-2015-8853: The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3
  functions allowed context-dependent attackers to cause a denial of service
  (infinite loop) via crafted utf-8 data (bsc#976584)
- CVE-2016-2381: Perl might have allowed context-dependent attackers to bypass
  the taint protection mechanism in a child process via duplicate environment
  variables in envp (bsc#967082)

These non-security issues were fixed: 

- Fix perl panic with utf8_mg_pos_cache_update [bsc#929027]
- Fix sprintf calling sv_pos_u2b with a wrong offset, leading to a panic [bsc#900455]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900455">SUSE bug 900455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976584">SUSE bug 976584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573150" comment="perl-5.10.0-64.61.63.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573151" comment="perl-32bit-5.10.0-64.61.63.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573152" comment="perl-base-5.10.0-64.61.63.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573153" comment="perl-doc-5.10.0-64.61.63.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39461" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573154" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39462" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Config-General</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="697106" ref_url="https://bugzilla.suse.com/697106" source="BUGZILLA"/>
		<description>

This update adds the perl-Config-General to the SLES update channel, which 
is a new requirement after the last tgt security release.

    * 697106: tgt is not installable

		</description>
<advisory from="security@suse.de">
	<issued date="2009-02-21"/>
	<updated date="2009-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/697106">SUSE bug 697106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573155" comment="perl-Config-General-2.33-2.8 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573155" comment="perl-Config-General-2.33-2.8 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39463" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Convert-ASN1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168934" ref_url="https://bugzilla.suse.com/1168934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
This update for perl-Convert-ASN1 fixes the following issue:

- CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168934">SUSE bug 1168934</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573156" comment="perl-Convert-ASN1-0.22-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39464" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573157" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39465" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573158" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39466" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573159" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39467" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573160" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39468" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573161" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39469" version="1" class="patch">
	<metadata>
		<title>Security update for perl-PlRPC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="858243" ref_url="https://bugzilla.suse.com/858243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7284" ref_url="https://www.suse.com/security/cve/CVE-2013-7284/" source="CVE"/>
		<description>
This update for perl-PlRPC fixes the following issues:

- Security notice: [bsc#858243, CVE-2013-7284]
  * Document security vulnerability on Storable and reply attack
- Add perl-PlRPC-CVE-2013-7284.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-14"/>
	<updated date="2020-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/858243">SUSE bug 858243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7284/">CVE-2013-7284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573162" comment="perl-PlRPC-0.2019-32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39470" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573163" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39471" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<description>

The PHP5 script interpreter was updated to fix security issues:

* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573164" comment="apache2-mod_php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573165" comment="php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573166" comment="php5-bcmath-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573167" comment="php5-bz2-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573168" comment="php5-calendar-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573169" comment="php5-ctype-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573170" comment="php5-curl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573171" comment="php5-dba-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573172" comment="php5-dbase-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573173" comment="php5-dom-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573174" comment="php5-exif-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573175" comment="php5-fastcgi-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573176" comment="php5-ftp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573177" comment="php5-gd-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573178" comment="php5-gettext-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573179" comment="php5-gmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573180" comment="php5-hash-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573181" comment="php5-iconv-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573182" comment="php5-json-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573183" comment="php5-ldap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573184" comment="php5-mbstring-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573185" comment="php5-mcrypt-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573186" comment="php5-mysql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573187" comment="php5-odbc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573188" comment="php5-openssl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573189" comment="php5-pcntl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573190" comment="php5-pdo-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573191" comment="php5-pear-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573192" comment="php5-pgsql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573193" comment="php5-pspell-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573194" comment="php5-shmop-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573195" comment="php5-snmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573196" comment="php5-soap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573197" comment="php5-suhosin-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573198" comment="php5-sysvmsg-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573199" comment="php5-sysvsem-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573200" comment="php5-sysvshm-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573201" comment="php5-tokenizer-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573202" comment="php5-wddx-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573203" comment="php5-xmlreader-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573204" comment="php5-xmlrpc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573205" comment="php5-xmlwriter-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573206" comment="php5-xsl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573207" comment="php5-zip-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573208" comment="php5-zlib-5.2.14-0.7.30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39472" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
   execution. [bsc#969821]
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues [bsc#976997]
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() [bsc#976996]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-23"/>
	<updated date="2016-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573209" comment="apache2-mod_php5-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573210" comment="php5-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573211" comment="php5-bcmath-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573212" comment="php5-bz2-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573213" comment="php5-calendar-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573214" comment="php5-ctype-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573215" comment="php5-curl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573216" comment="php5-dba-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573217" comment="php5-dbase-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573218" comment="php5-dom-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573219" comment="php5-exif-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573220" comment="php5-fastcgi-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573221" comment="php5-ftp-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573222" comment="php5-gd-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573223" comment="php5-gettext-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573224" comment="php5-gmp-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573225" comment="php5-hash-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573226" comment="php5-iconv-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573227" comment="php5-json-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573228" comment="php5-ldap-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573229" comment="php5-mbstring-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573230" comment="php5-mcrypt-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573231" comment="php5-mysql-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573232" comment="php5-odbc-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573233" comment="php5-openssl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573234" comment="php5-pcntl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573235" comment="php5-pdo-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573236" comment="php5-pear-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573237" comment="php5-pgsql-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573238" comment="php5-pspell-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573239" comment="php5-shmop-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573240" comment="php5-snmp-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573241" comment="php5-soap-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573242" comment="php5-suhosin-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573243" comment="php5-sysvmsg-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573244" comment="php5-sysvsem-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573245" comment="php5-sysvshm-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573246" comment="php5-tokenizer-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573247" comment="php5-wddx-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573248" comment="php5-xmlreader-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573249" comment="php5-xmlrpc-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573250" comment="php5-xmlwriter-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573251" comment="php5-xsl-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573252" comment="php5-zip-5.2.14-0.7.30.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573253" comment="php5-zlib-5.2.14-0.7.30.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39473" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<description>
This update for php5 fixes the following issues: 

- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
- CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote attackers to cause a denial of service via a crafted imagefilltoborder call (bsc#980375).
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in PHP allowed remote attackers to cause a denial of service (segmentation fault) via recursive method calls (bsc#980373).
- CVE-2016-4346: Integer overflow in the str_pad function in ext/standard/string.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow (bsc#977994).
- CVE-2016-4542: The exif_process_IFD_TAG function in ext/exif/exif.c in PHP did not properly construct spprintf arguments, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830).
- CVE-2016-4543: The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP did not validate IFD sizes, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4544: The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP did not validate TIFF start data, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4537: The bcpowmod function in ext/bcmath/bcmath.c in PHP accepted a negative integer for the scale argument, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4538: The bcpowmod function in ext/bcmath/bcmath.c in PHP modified certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4539: The xml_parse_into_struct function in ext/xml/xml.c in PHP allowed remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero (bsc#978828).
- CVE-2016-5094: Don't create strings with lengths outside int range (bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside int range (bnc#982012).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573254" comment="apache2-mod_php5-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573255" comment="php5-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573256" comment="php5-bcmath-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573257" comment="php5-bz2-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573258" comment="php5-calendar-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573259" comment="php5-ctype-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573260" comment="php5-curl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573261" comment="php5-dba-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573262" comment="php5-dbase-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573263" comment="php5-dom-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573264" comment="php5-exif-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573265" comment="php5-fastcgi-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573266" comment="php5-ftp-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573267" comment="php5-gd-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573268" comment="php5-gettext-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573269" comment="php5-gmp-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573270" comment="php5-hash-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573271" comment="php5-iconv-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573272" comment="php5-json-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573273" comment="php5-ldap-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573274" comment="php5-mbstring-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573275" comment="php5-mcrypt-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573276" comment="php5-mysql-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573277" comment="php5-odbc-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573278" comment="php5-openssl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573279" comment="php5-pcntl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573280" comment="php5-pdo-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573281" comment="php5-pear-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573282" comment="php5-pgsql-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573283" comment="php5-pspell-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573284" comment="php5-shmop-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573285" comment="php5-snmp-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573286" comment="php5-soap-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573287" comment="php5-suhosin-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573288" comment="php5-sysvmsg-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573289" comment="php5-sysvsem-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573290" comment="php5-sysvshm-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573291" comment="php5-tokenizer-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573292" comment="php5-wddx-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573293" comment="php5-xmlreader-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573294" comment="php5-xmlrpc-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573295" comment="php5-xmlwriter-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573296" comment="php5-xsl-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573297" comment="php5-zip-5.2.14-0.7.30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573298" comment="php5-zlib-5.2.14-0.7.30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39474" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<description>

php5 was updated to fix the following security issues:

- CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener (bsc#991426).
- CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE (bsc#991427).
- CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex (bsc#991428).
- CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization (bsc#991429).
- CVE-2016-5399: Improper error handling in bzread() (bsc#991430).
- CVE-2016-6288: Buffer over-read in php_url_parse_ex (bsc#991433).
- CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c (bsc#991437).
- CVE-2016-5769: Mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double free corruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573299" comment="apache2-mod_php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573300" comment="php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573301" comment="php5-bcmath-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573302" comment="php5-bz2-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573303" comment="php5-calendar-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573304" comment="php5-ctype-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573305" comment="php5-curl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573306" comment="php5-dba-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573307" comment="php5-dbase-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573308" comment="php5-dom-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573309" comment="php5-exif-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573310" comment="php5-fastcgi-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573311" comment="php5-ftp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573312" comment="php5-gd-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573313" comment="php5-gettext-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573314" comment="php5-gmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573315" comment="php5-hash-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573316" comment="php5-iconv-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573317" comment="php5-json-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573318" comment="php5-ldap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573319" comment="php5-mbstring-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573320" comment="php5-mcrypt-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573321" comment="php5-mysql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573322" comment="php5-odbc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573323" comment="php5-openssl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573324" comment="php5-pcntl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573325" comment="php5-pdo-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573326" comment="php5-pear-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573327" comment="php5-pgsql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573328" comment="php5-pspell-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573329" comment="php5-shmop-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573330" comment="php5-snmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573331" comment="php5-soap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573332" comment="php5-suhosin-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573333" comment="php5-sysvmsg-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573334" comment="php5-sysvsem-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573335" comment="php5-sysvshm-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573336" comment="php5-tokenizer-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573337" comment="php5-wddx-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573338" comment="php5-xmlreader-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573339" comment="php5-xmlrpc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573340" comment="php5-xmlwriter-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573341" comment="php5-xsl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573342" comment="php5-zip-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573343" comment="php5-zlib-5.2.14-0.7.30.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39475" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allowed illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573344" comment="apache2-mod_php5-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573345" comment="php5-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573346" comment="php5-bcmath-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573347" comment="php5-bz2-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573348" comment="php5-calendar-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573349" comment="php5-ctype-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573350" comment="php5-curl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573351" comment="php5-dba-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573352" comment="php5-dbase-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573353" comment="php5-dom-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573354" comment="php5-exif-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573355" comment="php5-fastcgi-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573356" comment="php5-ftp-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573357" comment="php5-gd-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573358" comment="php5-gettext-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573359" comment="php5-gmp-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573360" comment="php5-hash-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573361" comment="php5-iconv-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573362" comment="php5-json-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573363" comment="php5-ldap-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573364" comment="php5-mbstring-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573365" comment="php5-mcrypt-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573366" comment="php5-mysql-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573367" comment="php5-odbc-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573368" comment="php5-openssl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573369" comment="php5-pcntl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573370" comment="php5-pdo-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573371" comment="php5-pear-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573372" comment="php5-pgsql-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573373" comment="php5-pspell-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573374" comment="php5-shmop-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573375" comment="php5-snmp-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573376" comment="php5-soap-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573377" comment="php5-suhosin-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573378" comment="php5-sysvmsg-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573379" comment="php5-sysvsem-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573380" comment="php5-sysvshm-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573381" comment="php5-tokenizer-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573382" comment="php5-wddx-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573383" comment="php5-xmlreader-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573384" comment="php5-xmlrpc-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573385" comment="php5-xmlwriter-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573386" comment="php5-xsl-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573387" comment="php5-zip-5.2.14-0.7.30.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573388" comment="php5-zlib-5.2.14-0.7.30.94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39476" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573389" comment="apache2-mod_php5-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573390" comment="php5-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573391" comment="php5-bcmath-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573392" comment="php5-bz2-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573393" comment="php5-calendar-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573394" comment="php5-ctype-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573395" comment="php5-curl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573396" comment="php5-dba-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573397" comment="php5-dbase-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573398" comment="php5-dom-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573399" comment="php5-exif-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573400" comment="php5-fastcgi-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573401" comment="php5-ftp-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573402" comment="php5-gd-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573403" comment="php5-gettext-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573404" comment="php5-gmp-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573405" comment="php5-hash-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573406" comment="php5-iconv-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573407" comment="php5-json-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573408" comment="php5-ldap-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573409" comment="php5-mbstring-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573410" comment="php5-mcrypt-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573411" comment="php5-mysql-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573412" comment="php5-odbc-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573413" comment="php5-openssl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573414" comment="php5-pcntl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573415" comment="php5-pdo-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573416" comment="php5-pear-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573417" comment="php5-pgsql-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573418" comment="php5-pspell-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573419" comment="php5-shmop-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573420" comment="php5-snmp-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573421" comment="php5-soap-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573422" comment="php5-suhosin-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573423" comment="php5-sysvmsg-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573424" comment="php5-sysvsem-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573425" comment="php5-sysvshm-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573426" comment="php5-tokenizer-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573427" comment="php5-wddx-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573428" comment="php5-xmlreader-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573429" comment="php5-xmlrpc-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573430" comment="php5-xmlwriter-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573431" comment="php5-xsl-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573432" comment="php5-zip-5.2.14-0.7.30.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573433" comment="php5-zlib-5.2.14-0.7.30.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39477" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

 * CVE-2016-9933 Possible stack overflow on truecolor images handling [bsc#1015187]
 * CVE-2016-9934 Dereference from NULL pointer could lead to crash [bsc#1015188]
 * CVE-2016-9935 Invalid read could lead to crash [bsc#1015189]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573434" comment="apache2-mod_php5-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573435" comment="php5-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573436" comment="php5-bcmath-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573437" comment="php5-bz2-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573438" comment="php5-calendar-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573439" comment="php5-ctype-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573440" comment="php5-curl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573441" comment="php5-dba-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573442" comment="php5-dbase-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573443" comment="php5-dom-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573444" comment="php5-exif-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573445" comment="php5-fastcgi-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573446" comment="php5-ftp-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573447" comment="php5-gd-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573448" comment="php5-gettext-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573449" comment="php5-gmp-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573450" comment="php5-hash-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573451" comment="php5-iconv-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573452" comment="php5-json-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573453" comment="php5-ldap-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573454" comment="php5-mbstring-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573455" comment="php5-mcrypt-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573456" comment="php5-mysql-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573457" comment="php5-odbc-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573458" comment="php5-openssl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573459" comment="php5-pcntl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573460" comment="php5-pdo-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573461" comment="php5-pear-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573462" comment="php5-pgsql-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573463" comment="php5-pspell-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573464" comment="php5-shmop-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573465" comment="php5-snmp-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573466" comment="php5-soap-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573467" comment="php5-suhosin-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573468" comment="php5-sysvmsg-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573469" comment="php5-sysvsem-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573470" comment="php5-sysvshm-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573471" comment="php5-tokenizer-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573472" comment="php5-wddx-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573473" comment="php5-xmlreader-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573474" comment="php5-xmlrpc-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573475" comment="php5-xmlwriter-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573476" comment="php5-xsl-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573477" comment="php5-zip-5.2.14-0.7.30.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573478" comment="php5-zlib-5.2.14-0.7.30.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39478" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<description>

This update for php5 fixes the following issues:

- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-20"/>
	<updated date="2017-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573479" comment="apache2-mod_php5-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573480" comment="php5-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573481" comment="php5-bcmath-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573482" comment="php5-bz2-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573483" comment="php5-calendar-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573484" comment="php5-ctype-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573485" comment="php5-curl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573486" comment="php5-dba-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573487" comment="php5-dbase-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573488" comment="php5-dom-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573489" comment="php5-exif-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573490" comment="php5-fastcgi-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573491" comment="php5-ftp-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573492" comment="php5-gd-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573493" comment="php5-gettext-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573494" comment="php5-gmp-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573495" comment="php5-hash-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573496" comment="php5-iconv-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573497" comment="php5-json-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573498" comment="php5-ldap-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573499" comment="php5-mbstring-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573500" comment="php5-mcrypt-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573501" comment="php5-mysql-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573502" comment="php5-odbc-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573503" comment="php5-openssl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573504" comment="php5-pcntl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573505" comment="php5-pdo-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573506" comment="php5-pear-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573507" comment="php5-pgsql-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573508" comment="php5-pspell-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573509" comment="php5-shmop-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573510" comment="php5-snmp-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573511" comment="php5-soap-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573512" comment="php5-suhosin-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573513" comment="php5-sysvmsg-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573514" comment="php5-sysvsem-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573515" comment="php5-sysvshm-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573516" comment="php5-tokenizer-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573517" comment="php5-wddx-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573518" comment="php5-xmlreader-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573519" comment="php5-xmlrpc-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573520" comment="php5-xmlwriter-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573521" comment="php5-xsl-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573522" comment="php5-zip-5.2.14-0.7.30.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573523" comment="php5-zlib-5.2.14-0.7.30.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39479" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2017-9227: A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. (bsc#1040883)
- CVE-2017-9226: A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. (bsc#1040889)
- CVE-2017-9224: A stack out-of-bounds read occurs in match_at() during regular expression searching. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573524" comment="apache2-mod_php5-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573525" comment="php5-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573526" comment="php5-bcmath-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573527" comment="php5-bz2-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573528" comment="php5-calendar-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573529" comment="php5-ctype-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573530" comment="php5-curl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573531" comment="php5-dba-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573532" comment="php5-dbase-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573533" comment="php5-dom-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573534" comment="php5-exif-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573535" comment="php5-fastcgi-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573536" comment="php5-ftp-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573537" comment="php5-gd-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573538" comment="php5-gettext-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573539" comment="php5-gmp-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573540" comment="php5-hash-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573541" comment="php5-iconv-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573542" comment="php5-json-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573543" comment="php5-ldap-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573544" comment="php5-mbstring-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573545" comment="php5-mcrypt-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573546" comment="php5-mysql-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573547" comment="php5-odbc-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573548" comment="php5-openssl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573549" comment="php5-pcntl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573550" comment="php5-pdo-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573551" comment="php5-pear-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573552" comment="php5-pgsql-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573553" comment="php5-pspell-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573554" comment="php5-shmop-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573555" comment="php5-snmp-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573556" comment="php5-soap-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573557" comment="php5-suhosin-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573558" comment="php5-sysvmsg-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573559" comment="php5-sysvsem-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573560" comment="php5-sysvshm-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573561" comment="php5-tokenizer-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573562" comment="php5-wddx-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573563" comment="php5-xmlreader-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573564" comment="php5-xmlrpc-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573565" comment="php5-xmlwriter-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573566" comment="php5-xsl-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573567" comment="php5-zip-5.2.14-0.7.30.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573568" comment="php5-zlib-5.2.14-0.7.30.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39480" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2016-10397: parse_url() can be bypassed to return fake host. (bsc#1047454)
- CVE-2017-11144: The opensslextension PEM sealing code did not check the return value of the
  OpenSSL sealingfunction, which could lead to a crash. (bsc#1048096)
- CVE-2017-11145: Lack of bounds checks in timelib_meridian coud lead to information leak. (bsc#1048112)
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() could lead to heap overflow (bsc#986386)
- CVE-2017-11628: Stack-base dbuffer overflow in zend_ini_do_op() could lead to denial of service (bsc#1050726)
- CVE-2017-7890: Buffer over-read from unitialized data in gdImageCreateFromGifCtx could lead to denial of service (bsc#1050241)
    
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145</cve>
	<cve impact="low" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573569" comment="apache2-mod_php5-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573570" comment="php5-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573571" comment="php5-bcmath-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573572" comment="php5-bz2-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573573" comment="php5-calendar-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573574" comment="php5-ctype-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573575" comment="php5-curl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573576" comment="php5-dba-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573577" comment="php5-dbase-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573578" comment="php5-dom-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573579" comment="php5-exif-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573580" comment="php5-fastcgi-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573581" comment="php5-ftp-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573582" comment="php5-gd-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573583" comment="php5-gettext-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573584" comment="php5-gmp-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573585" comment="php5-hash-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573586" comment="php5-iconv-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573587" comment="php5-json-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573588" comment="php5-ldap-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573589" comment="php5-mbstring-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573590" comment="php5-mcrypt-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573591" comment="php5-mysql-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573592" comment="php5-odbc-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573593" comment="php5-openssl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573594" comment="php5-pcntl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573595" comment="php5-pdo-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573596" comment="php5-pear-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573597" comment="php5-pgsql-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573598" comment="php5-pspell-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573599" comment="php5-shmop-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573600" comment="php5-snmp-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573601" comment="php5-soap-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573602" comment="php5-suhosin-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573603" comment="php5-sysvmsg-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573604" comment="php5-sysvsem-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573605" comment="php5-sysvshm-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573606" comment="php5-tokenizer-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573607" comment="php5-wddx-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573608" comment="php5-xmlreader-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573609" comment="php5-xmlrpc-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573610" comment="php5-xmlwriter-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573611" comment="php5-xsl-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573612" comment="php5-zip-5.2.14-0.7.30.111.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573613" comment="php5-zlib-5.2.14-0.7.30.111.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39481" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<description>
This update for php5 fixes one issues.

This security issue was fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573614" comment="apache2-mod_php5-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573615" comment="php5-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573616" comment="php5-bcmath-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573617" comment="php5-bz2-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573618" comment="php5-calendar-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573619" comment="php5-ctype-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573620" comment="php5-curl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573621" comment="php5-dba-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573622" comment="php5-dbase-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573623" comment="php5-dom-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573624" comment="php5-exif-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573625" comment="php5-fastcgi-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573626" comment="php5-ftp-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573627" comment="php5-gd-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573628" comment="php5-gettext-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573629" comment="php5-gmp-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573630" comment="php5-hash-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573631" comment="php5-iconv-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573632" comment="php5-json-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573633" comment="php5-ldap-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573634" comment="php5-mbstring-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573635" comment="php5-mcrypt-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573636" comment="php5-mysql-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573637" comment="php5-odbc-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573638" comment="php5-openssl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573639" comment="php5-pcntl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573640" comment="php5-pdo-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573641" comment="php5-pear-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573642" comment="php5-pgsql-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573643" comment="php5-pspell-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573644" comment="php5-shmop-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573645" comment="php5-snmp-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573646" comment="php5-soap-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573647" comment="php5-suhosin-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573648" comment="php5-sysvmsg-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573649" comment="php5-sysvsem-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573650" comment="php5-sysvshm-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573651" comment="php5-tokenizer-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573652" comment="php5-wddx-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573653" comment="php5-xmlreader-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573654" comment="php5-xmlrpc-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573655" comment="php5-xmlwriter-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573656" comment="php5-xsl-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573657" comment="php5-zip-5.2.14-0.7.30.111.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573658" comment="php5-zlib-5.2.14-0.7.30.111.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39482" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573659" comment="apache2-mod_php5-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573660" comment="php5-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573661" comment="php5-bcmath-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573662" comment="php5-bz2-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573663" comment="php5-calendar-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573664" comment="php5-ctype-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573665" comment="php5-curl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573666" comment="php5-dba-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573667" comment="php5-dbase-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573668" comment="php5-dom-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573669" comment="php5-exif-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573670" comment="php5-fastcgi-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573671" comment="php5-ftp-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573672" comment="php5-gd-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573673" comment="php5-gettext-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573674" comment="php5-gmp-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573675" comment="php5-hash-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573676" comment="php5-iconv-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573677" comment="php5-json-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573678" comment="php5-ldap-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573679" comment="php5-mbstring-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573680" comment="php5-mcrypt-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573681" comment="php5-mysql-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573682" comment="php5-odbc-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573683" comment="php5-openssl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573684" comment="php5-pcntl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573685" comment="php5-pdo-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573686" comment="php5-pear-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573687" comment="php5-pgsql-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573688" comment="php5-pspell-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573689" comment="php5-shmop-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573690" comment="php5-snmp-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573691" comment="php5-soap-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573692" comment="php5-suhosin-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573693" comment="php5-sysvmsg-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573694" comment="php5-sysvsem-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573695" comment="php5-sysvshm-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573696" comment="php5-tokenizer-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573697" comment="php5-wddx-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573698" comment="php5-xmlreader-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573699" comment="php5-xmlrpc-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573700" comment="php5-xmlwriter-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573701" comment="php5-xsl-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573702" comment="php5-zip-5.2.14-0.7.30.111.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573703" comment="php5-zlib-5.2.14-0.7.30.111.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39483" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
This update for php5 fixes one issues.

This security issue was fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data could be controlled if the input can be controlled (e.g., during file uploads).  (bsc#1080234)
- CVE-2018-5711: Prevent integer signedness error that could have lead to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-22"/>
	<updated date="2018-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573704" comment="apache2-mod_php5-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573705" comment="php5-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573706" comment="php5-bcmath-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573707" comment="php5-bz2-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573708" comment="php5-calendar-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573709" comment="php5-ctype-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573710" comment="php5-curl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573711" comment="php5-dba-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573712" comment="php5-dbase-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573713" comment="php5-dom-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573714" comment="php5-exif-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573715" comment="php5-fastcgi-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573716" comment="php5-ftp-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573717" comment="php5-gd-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573718" comment="php5-gettext-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573719" comment="php5-gmp-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573720" comment="php5-hash-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573721" comment="php5-iconv-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573722" comment="php5-json-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573723" comment="php5-ldap-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573724" comment="php5-mbstring-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573725" comment="php5-mcrypt-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573726" comment="php5-mysql-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573727" comment="php5-odbc-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573728" comment="php5-openssl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573729" comment="php5-pcntl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573730" comment="php5-pdo-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573731" comment="php5-pear-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573732" comment="php5-pgsql-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573733" comment="php5-pspell-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573734" comment="php5-shmop-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573735" comment="php5-snmp-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573736" comment="php5-soap-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573737" comment="php5-suhosin-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573738" comment="php5-sysvmsg-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573739" comment="php5-sysvsem-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573740" comment="php5-sysvshm-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573741" comment="php5-tokenizer-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573742" comment="php5-wddx-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573743" comment="php5-xmlreader-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573744" comment="php5-xmlrpc-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573745" comment="php5-xmlwriter-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573746" comment="php5-xsl-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573747" comment="php5-zip-5.2.14-0.7.30.111.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573748" comment="php5-zlib-5.2.14-0.7.30.111.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39484" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an HTTPresponse in the php_stream_url_wrap_http_ex (bsc#1083639).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573749" comment="apache2-mod_php5-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573750" comment="php5-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573751" comment="php5-bcmath-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573752" comment="php5-bz2-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573753" comment="php5-calendar-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573754" comment="php5-ctype-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573755" comment="php5-curl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573756" comment="php5-dba-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573757" comment="php5-dbase-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573758" comment="php5-dom-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573759" comment="php5-exif-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573760" comment="php5-fastcgi-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573761" comment="php5-ftp-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573762" comment="php5-gd-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573763" comment="php5-gettext-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573764" comment="php5-gmp-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573765" comment="php5-hash-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573766" comment="php5-iconv-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573767" comment="php5-json-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573768" comment="php5-ldap-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573769" comment="php5-mbstring-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573770" comment="php5-mcrypt-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573771" comment="php5-mysql-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573772" comment="php5-odbc-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573773" comment="php5-openssl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573774" comment="php5-pcntl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573775" comment="php5-pdo-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573776" comment="php5-pear-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573777" comment="php5-pgsql-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573778" comment="php5-pspell-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573779" comment="php5-shmop-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573780" comment="php5-snmp-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573781" comment="php5-soap-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573782" comment="php5-suhosin-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573783" comment="php5-sysvmsg-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573784" comment="php5-sysvsem-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573785" comment="php5-sysvshm-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573786" comment="php5-tokenizer-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573787" comment="php5-wddx-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573788" comment="php5-xmlreader-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573789" comment="php5-xmlrpc-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573790" comment="php5-xmlwriter-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573791" comment="php5-xsl-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573792" comment="php5-zip-5.2.14-0.7.30.111.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573793" comment="php5-zlib-5.2.14-0.7.30.111.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39485" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-25"/>
	<updated date="2018-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573794" comment="apache2-mod_php5-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573795" comment="php5-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573796" comment="php5-bcmath-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573797" comment="php5-bz2-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573798" comment="php5-calendar-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573799" comment="php5-ctype-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573800" comment="php5-curl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573801" comment="php5-dba-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573802" comment="php5-dbase-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573803" comment="php5-dom-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573804" comment="php5-exif-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573805" comment="php5-fastcgi-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573806" comment="php5-ftp-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573807" comment="php5-gd-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573808" comment="php5-gettext-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573809" comment="php5-gmp-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573810" comment="php5-hash-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573811" comment="php5-iconv-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573812" comment="php5-json-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573813" comment="php5-ldap-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573814" comment="php5-mbstring-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573815" comment="php5-mcrypt-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573816" comment="php5-mysql-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573817" comment="php5-odbc-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573818" comment="php5-openssl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573819" comment="php5-pcntl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573820" comment="php5-pdo-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573821" comment="php5-pear-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573822" comment="php5-pgsql-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573823" comment="php5-pspell-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573824" comment="php5-shmop-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573825" comment="php5-snmp-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573826" comment="php5-soap-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573827" comment="php5-suhosin-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573828" comment="php5-sysvmsg-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573829" comment="php5-sysvsem-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573830" comment="php5-sysvshm-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573831" comment="php5-tokenizer-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573832" comment="php5-wddx-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573833" comment="php5-xmlreader-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573834" comment="php5-xmlrpc-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573835" comment="php5-xmlwriter-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573836" comment="php5-xsl-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573837" comment="php5-zip-5.2.14-0.7.30.111.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573838" comment="php5-zlib-5.2.14-0.7.30.111.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39486" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573839" comment="apache2-mod_php5-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573840" comment="php5-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573841" comment="php5-bcmath-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573842" comment="php5-bz2-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573843" comment="php5-calendar-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573844" comment="php5-ctype-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573845" comment="php5-curl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573846" comment="php5-dba-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573847" comment="php5-dbase-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573848" comment="php5-dom-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573849" comment="php5-exif-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573850" comment="php5-fastcgi-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573851" comment="php5-ftp-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573852" comment="php5-gd-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573853" comment="php5-gettext-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573854" comment="php5-gmp-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573855" comment="php5-hash-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573856" comment="php5-iconv-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573857" comment="php5-json-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573858" comment="php5-ldap-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573859" comment="php5-mbstring-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573860" comment="php5-mcrypt-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573861" comment="php5-mysql-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573862" comment="php5-odbc-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573863" comment="php5-openssl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573864" comment="php5-pcntl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573865" comment="php5-pdo-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573866" comment="php5-pear-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573867" comment="php5-pgsql-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573868" comment="php5-pspell-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573869" comment="php5-shmop-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573870" comment="php5-snmp-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573871" comment="php5-soap-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573872" comment="php5-suhosin-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573873" comment="php5-sysvmsg-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573874" comment="php5-sysvsem-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573875" comment="php5-sysvshm-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573876" comment="php5-tokenizer-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573877" comment="php5-wddx-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573878" comment="php5-xmlreader-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573879" comment="php5-xmlrpc-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573880" comment="php5-xmlwriter-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573881" comment="php5-xsl-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573882" comment="php5-zip-5.2.14-0.7.30.111.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573883" comment="php5-zlib-5.2.14-0.7.30.111.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39487" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

The following security vulnerabilities were fixed:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
- CVE-2018-14851: Fixed an out-of-bounds read and application crash in 
  exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c, which allowed remote
  attackers to cause a denial of service (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow that could lead to a heap-based
  buffer over-read in exif_thumbnail_extract of exif.c and allowed remote
  attackers to cause a denial of service (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573884" comment="apache2-mod_php5-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573885" comment="php5-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573886" comment="php5-bcmath-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573887" comment="php5-bz2-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573888" comment="php5-calendar-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573889" comment="php5-ctype-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573890" comment="php5-curl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573891" comment="php5-dba-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573892" comment="php5-dbase-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573893" comment="php5-dom-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573894" comment="php5-exif-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573895" comment="php5-fastcgi-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573896" comment="php5-ftp-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573897" comment="php5-gd-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573898" comment="php5-gettext-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573899" comment="php5-gmp-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573900" comment="php5-hash-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573901" comment="php5-iconv-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573902" comment="php5-json-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573903" comment="php5-ldap-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573904" comment="php5-mbstring-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573905" comment="php5-mcrypt-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573906" comment="php5-mysql-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573907" comment="php5-odbc-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573908" comment="php5-openssl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573909" comment="php5-pcntl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573910" comment="php5-pdo-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573911" comment="php5-pear-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573912" comment="php5-pgsql-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573913" comment="php5-pspell-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573914" comment="php5-shmop-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573915" comment="php5-snmp-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573916" comment="php5-soap-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573917" comment="php5-suhosin-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573918" comment="php5-sysvmsg-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573919" comment="php5-sysvsem-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573920" comment="php5-sysvshm-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573921" comment="php5-tokenizer-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573922" comment="php5-wddx-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573923" comment="php5-xmlreader-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573924" comment="php5-xmlrpc-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573925" comment="php5-xmlwriter-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573926" comment="php5-xsl-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573927" comment="php5-zip-5.2.14-0.7.30.111.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573928" comment="php5-zlib-5.2.14-0.7.30.111.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39488" version="1" class="patch">
	<metadata>
		<title>Recommended update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573929" comment="apache2-mod_php5-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573930" comment="php5-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573931" comment="php5-bcmath-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573932" comment="php5-bz2-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573933" comment="php5-calendar-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573934" comment="php5-ctype-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573935" comment="php5-curl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573936" comment="php5-dba-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573937" comment="php5-dbase-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573938" comment="php5-dom-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573939" comment="php5-exif-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573940" comment="php5-fastcgi-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573941" comment="php5-ftp-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573942" comment="php5-gd-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573943" comment="php5-gettext-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573944" comment="php5-gmp-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573945" comment="php5-hash-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573946" comment="php5-iconv-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573947" comment="php5-json-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573948" comment="php5-ldap-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573949" comment="php5-mbstring-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573950" comment="php5-mcrypt-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573951" comment="php5-mysql-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573952" comment="php5-odbc-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573953" comment="php5-openssl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573954" comment="php5-pcntl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573955" comment="php5-pdo-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573956" comment="php5-pear-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573957" comment="php5-pgsql-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573958" comment="php5-pspell-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573959" comment="php5-shmop-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573960" comment="php5-snmp-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573961" comment="php5-soap-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573962" comment="php5-suhosin-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573963" comment="php5-sysvmsg-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573964" comment="php5-sysvsem-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573965" comment="php5-sysvshm-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573966" comment="php5-tokenizer-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573967" comment="php5-wddx-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573968" comment="php5-xmlreader-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573969" comment="php5-xmlrpc-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573970" comment="php5-xmlwriter-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573971" comment="php5-xsl-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573972" comment="php5-zip-5.2.14-0.7.30.111.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573973" comment="php5-zlib-5.2.14-0.7.30.111.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39489" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6977: Fixed a heap-based buffer overflow in the GD graphics library (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the GD graphics library (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573974" comment="apache2-mod_php5-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573975" comment="php5-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573976" comment="php5-bcmath-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573977" comment="php5-bz2-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573978" comment="php5-calendar-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573979" comment="php5-ctype-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573980" comment="php5-curl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573981" comment="php5-dba-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573982" comment="php5-dbase-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573983" comment="php5-dom-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573984" comment="php5-exif-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573985" comment="php5-fastcgi-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573986" comment="php5-ftp-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573987" comment="php5-gd-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573988" comment="php5-gettext-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573989" comment="php5-gmp-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573990" comment="php5-hash-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573991" comment="php5-iconv-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573992" comment="php5-json-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573993" comment="php5-ldap-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573994" comment="php5-mbstring-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573995" comment="php5-mcrypt-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573996" comment="php5-mysql-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573997" comment="php5-odbc-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573998" comment="php5-openssl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573999" comment="php5-pcntl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574000" comment="php5-pdo-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574001" comment="php5-pear-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574002" comment="php5-pgsql-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574003" comment="php5-pspell-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574004" comment="php5-shmop-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574005" comment="php5-snmp-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574006" comment="php5-soap-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574007" comment="php5-suhosin-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574008" comment="php5-sysvmsg-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574009" comment="php5-sysvsem-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574010" comment="php5-sysvshm-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574011" comment="php5-tokenizer-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574012" comment="php5-wddx-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574013" comment="php5-xmlreader-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574014" comment="php5-xmlrpc-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574015" comment="php5-xmlwriter-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574016" comment="php5-xsl-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574017" comment="php5-zip-5.2.14-0.7.30.111.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574018" comment="php5-zlib-5.2.14-0.7.30.111.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39490" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574019" comment="apache2-mod_php5-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574020" comment="php5-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574021" comment="php5-bcmath-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574022" comment="php5-bz2-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574023" comment="php5-calendar-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574024" comment="php5-ctype-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574025" comment="php5-curl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574026" comment="php5-dba-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574027" comment="php5-dbase-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574028" comment="php5-dom-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574029" comment="php5-exif-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574030" comment="php5-fastcgi-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574031" comment="php5-ftp-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574032" comment="php5-gd-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574033" comment="php5-gettext-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574034" comment="php5-gmp-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574035" comment="php5-hash-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574036" comment="php5-iconv-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574037" comment="php5-json-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574038" comment="php5-ldap-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574039" comment="php5-mbstring-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574040" comment="php5-mcrypt-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574041" comment="php5-mysql-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574042" comment="php5-odbc-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574043" comment="php5-openssl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574044" comment="php5-pcntl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574045" comment="php5-pdo-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574046" comment="php5-pear-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574047" comment="php5-pgsql-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574048" comment="php5-pspell-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574049" comment="php5-shmop-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574050" comment="php5-snmp-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574051" comment="php5-soap-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574052" comment="php5-suhosin-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574053" comment="php5-sysvmsg-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574054" comment="php5-sysvsem-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574055" comment="php5-sysvshm-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574056" comment="php5-tokenizer-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574057" comment="php5-wddx-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574058" comment="php5-xmlreader-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574059" comment="php5-xmlrpc-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574060" comment="php5-xmlwriter-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574061" comment="php5-xsl-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574062" comment="php5-zip-5.2.14-111.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574063" comment="php5-zlib-5.2.14-111.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39491" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1132837" ref_url="https://bugzilla.suse.com/1132837" source="BUGZILLA"/>
		<reference ref_id="1132838" ref_url="https://bugzilla.suse.com/1132838" source="BUGZILLA"/>
		<reference ref_id="1134322" ref_url="https://bugzilla.suse.com/1134322" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2019-11034: Fixed a heap-buffer overflow in php_ifd_get32si() (bsc#1132838).
- CVE-2019-11035: Fixed a heap-buffer overflow in exif_iif_add_value() (bsc#1132837).
- CVE-2019-11036: Fixed buffer over-read in exif_process_IFD_TAG function leading to information disclosure (bsc#1134322).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132837">SUSE bug 1132837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132838">SUSE bug 1132838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134322">SUSE bug 1134322</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574064" comment="apache2-mod_php5-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574065" comment="php5-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574066" comment="php5-bcmath-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574067" comment="php5-bz2-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574068" comment="php5-calendar-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574069" comment="php5-ctype-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574070" comment="php5-curl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574071" comment="php5-dba-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574072" comment="php5-dbase-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574073" comment="php5-dom-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574074" comment="php5-exif-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574075" comment="php5-fastcgi-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574076" comment="php5-ftp-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574077" comment="php5-gd-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574078" comment="php5-gettext-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574079" comment="php5-gmp-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574080" comment="php5-hash-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574081" comment="php5-iconv-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574082" comment="php5-json-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574083" comment="php5-ldap-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574084" comment="php5-mbstring-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574085" comment="php5-mcrypt-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574086" comment="php5-mysql-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574087" comment="php5-odbc-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574088" comment="php5-openssl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574089" comment="php5-pcntl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574090" comment="php5-pdo-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574091" comment="php5-pear-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574092" comment="php5-pgsql-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574093" comment="php5-pspell-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574094" comment="php5-shmop-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574095" comment="php5-snmp-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574096" comment="php5-soap-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574097" comment="php5-suhosin-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574098" comment="php5-sysvmsg-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574099" comment="php5-sysvsem-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574100" comment="php5-sysvshm-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574101" comment="php5-tokenizer-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574102" comment="php5-wddx-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574103" comment="php5-xmlreader-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574104" comment="php5-xmlrpc-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574105" comment="php5-xmlwriter-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574106" comment="php5-xsl-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574107" comment="php5-zip-5.2.14-111.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574108" comment="php5-zlib-5.2.14-111.51.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39492" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138172" ref_url="https://bugzilla.suse.com/1138172" source="BUGZILLA"/>
		<reference ref_id="1138173" ref_url="https://bugzilla.suse.com/1138173" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:
	  
Security issues fixed:	  

- CVE-2019-11039: Fixed a heap-buffer-overflow on php_jpg_get16 (bsc#1138173).
- CVE-2019-11040: Fixed an out-of-bounds read due to an integer overflow in 
  iconv.c:_php_iconv_mime_decode() (bsc#1138172).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138172">SUSE bug 1138172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138173">SUSE bug 1138173</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574109" comment="apache2-mod_php5-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574110" comment="php5-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574111" comment="php5-bcmath-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574112" comment="php5-bz2-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574113" comment="php5-calendar-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574114" comment="php5-ctype-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574115" comment="php5-curl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574116" comment="php5-dba-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574117" comment="php5-dbase-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574118" comment="php5-dom-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574119" comment="php5-exif-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574120" comment="php5-fastcgi-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574121" comment="php5-ftp-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574122" comment="php5-gd-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574123" comment="php5-gettext-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574124" comment="php5-gmp-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574125" comment="php5-hash-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574126" comment="php5-iconv-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574127" comment="php5-json-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574128" comment="php5-ldap-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574129" comment="php5-mbstring-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574130" comment="php5-mcrypt-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574131" comment="php5-mysql-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574132" comment="php5-odbc-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574133" comment="php5-openssl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574134" comment="php5-pcntl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574135" comment="php5-pdo-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574136" comment="php5-pear-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574137" comment="php5-pgsql-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574138" comment="php5-pspell-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574139" comment="php5-shmop-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574140" comment="php5-snmp-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574141" comment="php5-soap-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574142" comment="php5-suhosin-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574143" comment="php5-sysvmsg-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574144" comment="php5-sysvsem-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574145" comment="php5-sysvshm-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574146" comment="php5-tokenizer-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574147" comment="php5-wddx-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574148" comment="php5-xmlreader-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574149" comment="php5-xmlrpc-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574150" comment="php5-xmlwriter-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574151" comment="php5-xsl-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574152" comment="php5-zip-5.2.14-111.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574153" comment="php5-zlib-5.2.14-111.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39493" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574154" comment="apache2-mod_php5-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574155" comment="php5-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574156" comment="php5-bcmath-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574157" comment="php5-bz2-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574158" comment="php5-calendar-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574159" comment="php5-ctype-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574160" comment="php5-curl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574161" comment="php5-dba-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574162" comment="php5-dbase-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574163" comment="php5-dom-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574164" comment="php5-exif-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574165" comment="php5-fastcgi-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574166" comment="php5-ftp-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574167" comment="php5-gd-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574168" comment="php5-gettext-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574169" comment="php5-gmp-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574170" comment="php5-hash-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574171" comment="php5-iconv-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574172" comment="php5-json-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574173" comment="php5-ldap-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574174" comment="php5-mbstring-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574175" comment="php5-mcrypt-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574176" comment="php5-mysql-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574177" comment="php5-odbc-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574178" comment="php5-openssl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574179" comment="php5-pcntl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574180" comment="php5-pdo-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574181" comment="php5-pear-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574182" comment="php5-pgsql-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574183" comment="php5-pspell-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574184" comment="php5-shmop-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574185" comment="php5-snmp-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574186" comment="php5-soap-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574187" comment="php5-suhosin-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574188" comment="php5-sysvmsg-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574189" comment="php5-sysvsem-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574190" comment="php5-sysvshm-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574191" comment="php5-tokenizer-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574192" comment="php5-wddx-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574193" comment="php5-xmlreader-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574194" comment="php5-xmlrpc-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574195" comment="php5-xmlwriter-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574196" comment="php5-xsl-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574197" comment="php5-zip-5.2.14-111.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574198" comment="php5-zlib-5.2.14-111.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39494" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-18"/>
	<updated date="2020-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574199" comment="apache2-mod_php5-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574200" comment="php5-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574201" comment="php5-bcmath-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574202" comment="php5-bz2-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574203" comment="php5-calendar-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574204" comment="php5-ctype-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574205" comment="php5-curl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574206" comment="php5-dba-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574207" comment="php5-dbase-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574208" comment="php5-dom-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574209" comment="php5-exif-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574210" comment="php5-fastcgi-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574211" comment="php5-ftp-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574212" comment="php5-gd-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574213" comment="php5-gettext-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574214" comment="php5-gmp-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574215" comment="php5-hash-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574216" comment="php5-iconv-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574217" comment="php5-json-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574218" comment="php5-ldap-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574219" comment="php5-mbstring-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574220" comment="php5-mcrypt-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574221" comment="php5-mysql-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574222" comment="php5-odbc-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574223" comment="php5-openssl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574224" comment="php5-pcntl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574225" comment="php5-pdo-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574226" comment="php5-pear-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574227" comment="php5-pgsql-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574228" comment="php5-pspell-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574229" comment="php5-shmop-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574230" comment="php5-snmp-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574231" comment="php5-soap-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574232" comment="php5-suhosin-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574233" comment="php5-sysvmsg-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574234" comment="php5-sysvsem-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574235" comment="php5-sysvshm-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574236" comment="php5-tokenizer-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574237" comment="php5-wddx-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574238" comment="php5-xmlreader-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574239" comment="php5-xmlrpc-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574240" comment="php5-xmlwriter-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574241" comment="php5-xsl-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574242" comment="php5-zip-5.2.14-111.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574243" comment="php5-zlib-5.2.14-111.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39495" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1168326" ref_url="https://bugzilla.suse.com/1168326" source="BUGZILLA"/>
		<reference ref_id="1168352" ref_url="https://bugzilla.suse.com/1168352" source="BUGZILLA"/>
		<reference ref_id="1171999" ref_url="https://bugzilla.suse.com/1171999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11048" ref_url="https://www.suse.com/security/cve/CVE-2019-11048/" source="CVE"/>
		<reference ref_id="CVE-2020-7064" ref_url="https://www.suse.com/security/cve/CVE-2020-7064/" source="CVE"/>
		<reference ref_id="CVE-2020-7066" ref_url="https://www.suse.com/security/cve/CVE-2020-7066/" source="CVE"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-7064: Fixed a one byte read of uninitialized memory in exif_read_data() (bsc#1168326).
- CVE-2020-7066: Fixed URL truncation get_headers() if the URL contains zero (\0) character (bsc#1168352).
- CVE-2019-11048: Improved the handling of overly long filenames or field names in HTTP file uploads (bsc#1171999).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-05"/>
	<updated date="2020-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168326">SUSE bug 1168326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168352">SUSE bug 1168352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171999">SUSE bug 1171999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11048/">CVE-2019-11048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7064/">CVE-2020-7064</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7066/">CVE-2020-7066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574244" comment="apache2-mod_php5-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574245" comment="php5-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574246" comment="php5-bcmath-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574247" comment="php5-bz2-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574248" comment="php5-calendar-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574249" comment="php5-ctype-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574250" comment="php5-curl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574251" comment="php5-dba-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574252" comment="php5-dbase-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574253" comment="php5-dom-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574254" comment="php5-exif-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574255" comment="php5-fastcgi-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574256" comment="php5-ftp-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574257" comment="php5-gd-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574258" comment="php5-gettext-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574259" comment="php5-gmp-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574260" comment="php5-hash-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574261" comment="php5-iconv-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574262" comment="php5-json-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574263" comment="php5-ldap-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574264" comment="php5-mbstring-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574265" comment="php5-mcrypt-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574266" comment="php5-mysql-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574267" comment="php5-odbc-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574268" comment="php5-openssl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574269" comment="php5-pcntl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574270" comment="php5-pdo-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574271" comment="php5-pear-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574272" comment="php5-pgsql-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574273" comment="php5-pspell-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574274" comment="php5-shmop-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574275" comment="php5-snmp-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574276" comment="php5-soap-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574277" comment="php5-suhosin-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574278" comment="php5-sysvmsg-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574279" comment="php5-sysvsem-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574280" comment="php5-sysvshm-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574281" comment="php5-tokenizer-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574282" comment="php5-wddx-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574283" comment="php5-xmlreader-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574284" comment="php5-xmlrpc-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574285" comment="php5-xmlwriter-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574286" comment="php5-xsl-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574287" comment="php5-zip-5.2.14-111.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574288" comment="php5-zlib-5.2.14-111.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39496" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574289" comment="apache2-mod_php5-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574290" comment="php5-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574291" comment="php5-bcmath-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574292" comment="php5-bz2-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574293" comment="php5-calendar-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574294" comment="php5-ctype-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574295" comment="php5-curl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574296" comment="php5-dba-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574297" comment="php5-dbase-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574298" comment="php5-dom-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574299" comment="php5-exif-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574300" comment="php5-fastcgi-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574301" comment="php5-ftp-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574302" comment="php5-gd-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574303" comment="php5-gettext-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574304" comment="php5-gmp-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574305" comment="php5-hash-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574306" comment="php5-iconv-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574307" comment="php5-json-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574308" comment="php5-ldap-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574309" comment="php5-mbstring-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574310" comment="php5-mcrypt-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574311" comment="php5-mysql-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574312" comment="php5-odbc-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574313" comment="php5-openssl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574314" comment="php5-pcntl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574315" comment="php5-pdo-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574316" comment="php5-pear-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574317" comment="php5-pgsql-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574318" comment="php5-pspell-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574319" comment="php5-shmop-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574320" comment="php5-snmp-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574321" comment="php5-soap-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574322" comment="php5-suhosin-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574323" comment="php5-sysvmsg-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574324" comment="php5-sysvsem-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574325" comment="php5-sysvshm-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574326" comment="php5-tokenizer-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574327" comment="php5-wddx-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574328" comment="php5-xmlreader-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574329" comment="php5-xmlrpc-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574330" comment="php5-xmlwriter-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574331" comment="php5-xsl-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574332" comment="php5-zip-5.2.14-111.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574333" comment="php5-zlib-5.2.14-111.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39497" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180706" ref_url="https://bugzilla.suse.com/1180706" source="BUGZILLA"/>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
This update for php5 fixes the following issue:

- CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706).
- CVE-2021-21702: NULL pointer dereference in SoapClient (bsc#1182049)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574334" comment="apache2-mod_php5-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574335" comment="php5-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574336" comment="php5-bcmath-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574337" comment="php5-bz2-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574338" comment="php5-calendar-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574339" comment="php5-ctype-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574340" comment="php5-curl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574341" comment="php5-dba-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574342" comment="php5-dbase-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574343" comment="php5-dom-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574344" comment="php5-exif-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574345" comment="php5-fastcgi-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574346" comment="php5-ftp-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574347" comment="php5-gd-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574348" comment="php5-gettext-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574349" comment="php5-gmp-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574350" comment="php5-hash-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574351" comment="php5-iconv-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574352" comment="php5-json-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574353" comment="php5-ldap-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574354" comment="php5-mbstring-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574355" comment="php5-mcrypt-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574356" comment="php5-mysql-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574357" comment="php5-odbc-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574358" comment="php5-openssl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574359" comment="php5-pcntl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574360" comment="php5-pdo-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574361" comment="php5-pear-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574362" comment="php5-pgsql-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574363" comment="php5-pspell-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574364" comment="php5-shmop-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574365" comment="php5-snmp-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574366" comment="php5-soap-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574367" comment="php5-suhosin-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574368" comment="php5-sysvmsg-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574369" comment="php5-sysvsem-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574370" comment="php5-sysvshm-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574371" comment="php5-tokenizer-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574372" comment="php5-wddx-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574373" comment="php5-xmlreader-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574374" comment="php5-xmlrpc-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574375" comment="php5-xmlwriter-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574376" comment="php5-xsl-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574377" comment="php5-zip-5.2.14-111.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574378" comment="php5-zlib-5.2.14-111.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39498" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<description>
This update for php5 fixes the following issues:

- CVE-2021-21705 [bsc#1188037]: SSRF bypass in FILTER_VALIDATE_URL
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627044" comment="apache2-mod_php5-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627045" comment="php5-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627046" comment="php5-bcmath-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627047" comment="php5-bz2-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627048" comment="php5-calendar-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627049" comment="php5-ctype-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627050" comment="php5-curl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627051" comment="php5-dba-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627052" comment="php5-dbase-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627053" comment="php5-dom-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627054" comment="php5-exif-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627055" comment="php5-fastcgi-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627056" comment="php5-ftp-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627057" comment="php5-gd-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627058" comment="php5-gettext-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627059" comment="php5-gmp-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627060" comment="php5-hash-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627061" comment="php5-iconv-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627062" comment="php5-json-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627063" comment="php5-ldap-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627064" comment="php5-mbstring-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627065" comment="php5-mcrypt-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627066" comment="php5-mysql-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627067" comment="php5-odbc-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627068" comment="php5-openssl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627069" comment="php5-pcntl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627070" comment="php5-pdo-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627071" comment="php5-pear-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627072" comment="php5-pgsql-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627073" comment="php5-pspell-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627074" comment="php5-shmop-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627075" comment="php5-snmp-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627076" comment="php5-soap-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627077" comment="php5-suhosin-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627078" comment="php5-sysvmsg-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627079" comment="php5-sysvsem-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627080" comment="php5-sysvshm-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627081" comment="php5-tokenizer-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627082" comment="php5-wddx-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627083" comment="php5-xmlreader-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627084" comment="php5-xmlrpc-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627085" comment="php5-xmlwriter-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627086" comment="php5-xsl-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627087" comment="php5-zip-5.2.14-111.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627088" comment="php5-zlib-5.2.14-111.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39499" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074701" ref_url="https://bugzilla.suse.com/1074701" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<description>
This update for pixman fixes the following issues:

- This issue is needed to fix security issue in qemu that is tracked by CVE-2017-2633.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574379" comment="libpixman-1-0-0.16.0-2.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574380" comment="libpixman-1-0-32bit-0.16.0-2.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39500" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574381" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39501" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Prevent chcon from following symlinks in /tmp, /var/tmp,
  /var/run and /var/lib/debug (bsc#1083624).  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574382" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39502" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574383" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574384" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574385" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574386" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39503" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574387" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574388" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574389" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574390" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39504" version="1" class="patch">
	<metadata>
		<title>Security update for RPM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="747225" ref_url="https://bugzilla.suse.com/747225" source="BUGZILLA"/>
		<reference ref_id="754281" ref_url="https://bugzilla.suse.com/754281" source="BUGZILLA"/>
		<reference ref_id="754284" ref_url="https://bugzilla.suse.com/754284" source="BUGZILLA"/>
		<reference ref_id="754285" ref_url="https://bugzilla.suse.com/754285" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0060" ref_url="https://www.suse.com/security/cve/CVE-2012-0060/" source="CVE"/>
		<reference ref_id="CVE-2012-0061" ref_url="https://www.suse.com/security/cve/CVE-2012-0061/" source="CVE"/>
		<reference ref_id="CVE-2012-0815" ref_url="https://www.suse.com/security/cve/CVE-2012-0815/" source="CVE"/>
		<description>

Multiple security vulnerabilities were reported in RPM which could be 
exploited via specially crafted RPM files to cause a denial of service 
(application crash) or potentially allow attackers to execute arbitrary 
code.

Additionally, a non-security issue was fixed that could cause a division by 
zero in cycles calculation under rare circumstances.

Security Issue references:

    * CVE-2012-0815
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815&gt;
    * CVE-2012-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060&gt;
    * CVE-2012-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-20"/>
	<updated date="2012-04-20"/>
	<bugzilla href="https://bugzilla.suse.com/747225">SUSE bug 747225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754281">SUSE bug 754281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754284">SUSE bug 754284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754285">SUSE bug 754285</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0060/">CVE-2012-0060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0061/">CVE-2012-0061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0815/">CVE-2012-0815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574391" comment="popt-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574392" comment="popt-32bit-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574393" comment="popt-x86-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574394" comment="rpm-4.4.2.3-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574395" comment="rpm-32bit-4.4.2.3-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574396" comment="rpm-python-4.4.2.3-37.29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574397" comment="rpm-x86-4.4.2.3-37.29.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574391" comment="popt-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574392" comment="popt-32bit-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574393" comment="popt-x86-1.7-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574394" comment="rpm-4.4.2.3-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574395" comment="rpm-32bit-4.4.2.3-37.29.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574396" comment="rpm-python-4.4.2.3-37.29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574397" comment="rpm-x86-4.4.2.3-37.29.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39505" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574398" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574399" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574400" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574401" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574402" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574403" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39506" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="760511" ref_url="https://bugzilla.suse.com/760511" source="BUGZILLA"/>
		<reference ref_id="765069" ref_url="https://bugzilla.suse.com/765069" source="BUGZILLA"/>
		<reference ref_id="766799" ref_url="https://bugzilla.suse.com/766799" source="BUGZILLA"/>
		<reference ref_id="767505" ref_url="https://bugzilla.suse.com/767505" source="BUGZILLA"/>
		<reference ref_id="770193" ref_url="https://bugzilla.suse.com/770193" source="BUGZILLA"/>
		<reference ref_id="773771" ref_url="https://bugzilla.suse.com/773771" source="BUGZILLA"/>
		<reference ref_id="774616" ref_url="https://bugzilla.suse.com/774616" source="BUGZILLA"/>
		<reference ref_id="774617" ref_url="https://bugzilla.suse.com/774617" source="BUGZILLA"/>
		<reference ref_id="775399" ref_url="https://bugzilla.suse.com/775399" source="BUGZILLA"/>
		<reference ref_id="775402" ref_url="https://bugzilla.suse.com/775402" source="BUGZILLA"/>
		<reference ref_id="776523" ref_url="https://bugzilla.suse.com/776523" source="BUGZILLA"/>
		<reference ref_id="776524" ref_url="https://bugzilla.suse.com/776524" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<description>

This update provides PostgreSQL 8.3.20. As part of this update, the 
packaging scheme has been changed to accomodate an optional parallel 
installation of newer PostgreSQL versions.

The changes in 8.3.20 are:

    * 

      Prevent access to external files/URLs via XML entity references.
      xml_parse() would attempt to fetch external files or URLs as needed
      to resolve DTD and entity references in an XML value, thus allowing
      unprivileged database users to attempt to fetch data with the
      privileges of the database server (CVE-2012-3489, bnc#776524).

    * 

      Prevent access to external files/URLs via 'contrib/xml2''s
      xslt_process(). libxslt offers the ability to read and write both
      files and URLs through stylesheet commands, thus allowing
      unprivileged database users to both read and write data with the
      privileges of the database server. Disable that through proper use of
      libxslt's security options. (CVE-2012-3488, bnc#776523). Also, remove
      xslt_process()'s ability to fetch documents and stylesheets from
      external files/URLs.

    * 

      Fix incorrect password transformation in contrib/pgcrypto's DES
      crypt() function. If a password string contained the byte value 0x80,
      the remainder of the password was ignored, causing the password to be
      much weaker than it appeared. With this fix, the rest of the string
      is properly included in the DES hash. Any stored password values that
      are affected by this bug will thus no longer match, so the stored
      values may need to be updated. (CVE-2012-2143)

    * 

      Ignore SECURITY DEFINER and SET attributes for a procedural
      language's call handler. Applying such attributes to a call handler
      could crash the server. (CVE-2012-2655)

    * 

      Allow numeric timezone offsets in timestamp input to be up to 16
      hours away from UTC. Some historical time zones have offsets larger
      than 15 hours, the previous limit. This could result in dumped data
      values being rejected during reload.

    * 

      Fix timestamp conversion to cope when the given time is exactly the
      last DST transition time for the current timezone. This oversight has
      been there a long time, but was not noticed previously because most
      DST-using zones are presumed to have an indefinite sequence of future
      DST transitions.

    * 

      Fix text to name and char to name casts to perform string truncation
      correctly in multibyte encodings.

    * 

      Fix memory copying bug in to_tsquery().

    * 

      Fix slow session startup when pg_attribute is very large. If
      pg_attribute exceeds one-fourth of shared_buffers, cache rebuilding
      code that is sometimes needed during session start would trigger the
      synchronized-scan logic, causing it to take many times longer than
      normal. The problem was particularly acute if many new sessions were
      starting at once.

    * 

      Ensure sequential scans check for query cancel reasonably often. A
      scan encountering many consecutive pages that contain no live tuples
      would not respond to interrupts meanwhile.

    * 

      Show whole-row variables safely when printing views or rules. Corner
      cases involving ambiguous names (that is, the name could be either a
      table or column name of the query) were printed in an ambiguous way,
      risking that the view or rule would be interpreted differently after
      dump and reload. Avoid the ambiguous case by attaching a no-op cast.

    * 

      Ensure autovacuum worker processes perform stack depth checking
      properly. Previously, infinite recursion in a function invoked by
      auto-ANALYZE could crash worker processes.

    * 

      Fix logging collector to not lose log coherency under high load. The
      collector previously could fail to reassemble large messages if it
      got too busy.

    * 

      Fix logging collector to ensure it will restart file rotation after
      receiving SIGHUP.

    * 

      Fix PL/pgSQL's GET DIAGNOSTICS command when the target is the
      function's first variable.

    * 

      Fix several performance problems in pg_dump when the database
      contains many objects. pg_dump could get very slow if the database
      contained many schemas, or if many objects are in dependency loops,
      or if there are many owned sequences.

    * 

      Fix contrib/dblink's dblink_exec() to not leak temporary database
      connections upon error.

Security Issue references:

    * CVE-2012-2143
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143&gt;
    * CVE-2012-2655
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655&gt;
    * CVE-2012-3489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489&gt;
    * CVE-2012-3488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-20"/>
	<updated date="2012-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/760511">SUSE bug 760511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765069">SUSE bug 765069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766799">SUSE bug 766799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767505">SUSE bug 767505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770193">SUSE bug 770193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773771">SUSE bug 773771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774616">SUSE bug 774616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774617">SUSE bug 774617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775399">SUSE bug 775399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775402">SUSE bug 775402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776523">SUSE bug 776523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776524">SUSE bug 776524</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574404" comment="postgresql-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574405" comment="postgresql-contrib-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574406" comment="postgresql-docs-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574407" comment="postgresql-init-9.1-0.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574408" comment="postgresql-libs-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574409" comment="postgresql-libs-32bit-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574410" comment="postgresql-libs-x86-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574411" comment="postgresql-server-8.3.20-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574404" comment="postgresql-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574405" comment="postgresql-contrib-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574406" comment="postgresql-docs-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574407" comment="postgresql-init-9.1-0.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574408" comment="postgresql-libs-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574409" comment="postgresql-libs-32bit-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574410" comment="postgresql-libs-x86-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574411" comment="postgresql-server-8.3.20-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574404" comment="postgresql-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574405" comment="postgresql-contrib-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574406" comment="postgresql-docs-8.3.20-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574407" comment="postgresql-init-9.1-0.6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574408" comment="postgresql-libs-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574409" comment="postgresql-libs-32bit-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574410" comment="postgresql-libs-x86-8.3.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574411" comment="postgresql-server-8.3.20-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39507" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062722" ref_url="https://bugzilla.suse.com/1062722" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
This update for postgresql-init fixes the following issues:

- CVE-2017-14798: A race condition in the init script could be used by attackers able to access the postgresql account to escalate their privileges to root (bsc#1062722)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39508" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<description>

This update for postgresql10 brings version 10.6 to SUSE Linux Enterprise 11.


This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574413" comment="libecpg6-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574414" comment="libpq5-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574415" comment="libpq5-32bit-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574416" comment="postgresql-init-10-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574417" comment="postgresql10-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574418" comment="postgresql10-contrib-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574419" comment="postgresql10-docs-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574420" comment="postgresql10-server-10.6-0.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39509" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574421" comment="libecpg6-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574422" comment="libpq5-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574423" comment="libpq5-32bit-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574424" comment="postgresql10-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574425" comment="postgresql10-contrib-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574426" comment="postgresql10-docs-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574427" comment="postgresql10-server-10.8-0.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39510" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issues:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574428" comment="libecpg6-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574429" comment="libpq5-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574430" comment="libpq5-32bit-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574431" comment="postgresql10-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574432" comment="postgresql10-contrib-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574433" comment="postgresql10-docs-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574434" comment="postgresql10-server-10.9-0.2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39511" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-17"/>
	<updated date="2019-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574435" comment="libecpg6-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574436" comment="libpq5-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574437" comment="libpq5-32bit-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574438" comment="postgresql10-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574439" comment="postgresql10-contrib-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574440" comment="postgresql10-devel-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574441" comment="postgresql10-docs-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574442" comment="postgresql10-server-10.10-0.2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39512" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-05"/>
	<updated date="2020-03-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574443" comment="libecpg6-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574444" comment="libpq5-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574445" comment="libpq5-32bit-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574446" comment="postgresql10-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574447" comment="postgresql10-contrib-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574448" comment="postgresql10-devel-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574449" comment="postgresql10-docs-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574450" comment="postgresql10-server-10.12-0.2.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39513" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- update to 10.14:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html
- update to 10.13 (bsc#1171924).
  https://www.postgresql.org/about/news/2038/
  https://www.postgresql.org/docs/10/release-10-13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574451" comment="libecpg6-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574452" comment="libpq5-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574453" comment="libpq5-32bit-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574454" comment="postgresql10-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574455" comment="postgresql10-contrib-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574456" comment="postgresql10-devel-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574457" comment="postgresql10-docs-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574458" comment="postgresql10-server-10.14-0.2.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39514" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574459" comment="libecpg6-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574460" comment="libpq5-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574461" comment="libpq5-32bit-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574462" comment="postgresql10-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574463" comment="postgresql10-contrib-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574464" comment="postgresql10-devel-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574465" comment="postgresql10-docs-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574466" comment="postgresql10-server-10.15-0.2.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39515" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574467" comment="libecpg6-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574468" comment="libpq5-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574469" comment="libpq5-32bit-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574470" comment="postgresql10-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574471" comment="postgresql10-contrib-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574472" comment="postgresql10-devel-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574473" comment="postgresql10-docs-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574474" comment="postgresql10-server-10.17-0.2.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39516" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656585" comment="libecpg6-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656586" comment="libpq5-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656587" comment="libpq5-32bit-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656588" comment="postgresql10-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656589" comment="postgresql10-contrib-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656590" comment="postgresql10-devel-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656591" comment="postgresql10-docs-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656592" comment="postgresql10-server-10.19-0.2.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39517" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574475" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574476" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574477" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574478" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574479" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574480" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39518" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574481" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574482" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574483" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574484" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39519" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574485" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574486" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574487" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574488" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39520" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574489" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574490" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574491" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574492" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574493" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574494" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39521" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574495" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574496" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574497" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574498" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574499" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574500" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574501" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39522" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574502" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574503" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574504" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574505" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574506" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574507" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574508" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39523" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574509" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574510" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574511" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574512" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574513" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574514" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574515" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39524" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574516" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574517" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574518" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574519" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574520" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574521" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574522" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39525" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574523" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574524" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574525" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574526" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574527" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574528" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574529" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39526" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574530" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574531" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574532" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574533" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574534" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574535" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574536" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39527" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574537" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574538" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574539" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574540" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574541" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574542" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574543" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39528" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574544" comment="postgresql94-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574545" comment="postgresql94-contrib-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574546" comment="postgresql94-devel-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574547" comment="postgresql94-docs-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574548" comment="postgresql94-server-9.4.24-0.23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39529" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574549" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39530" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574550" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39531" version="1" class="patch">
	<metadata>
		<title>Security update for procmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="894999" ref_url="https://bugzilla.suse.com/894999" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>

procmail was updated to fix a security issue in its formail helper.

    * When formail processed specially crafted e-mail headers a heap
      corruption could be triggered, which would lead to a crash of
      formail. (CVE-2014-3618)

Security Issues:

    * CVE-2014-3618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-04"/>
	<updated date="2014-09-04"/>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574551" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39532" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
This update for procmail fixes the following issues:

Security issue fixed:

- CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574552" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39533" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="770828" ref_url="https://bugzilla.suse.com/770828" source="BUGZILLA"/>
		<reference ref_id="770829" ref_url="https://bugzilla.suse.com/770829" source="BUGZILLA"/>
		<reference ref_id="770833" ref_url="https://bugzilla.suse.com/770833" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3864" ref_url="https://www.suse.com/security/cve/CVE-2012-3864/" source="CVE"/>
		<reference ref_id="CVE-2012-3865" ref_url="https://www.suse.com/security/cve/CVE-2012-3865/" source="CVE"/>
		<reference ref_id="CVE-2012-3867" ref_url="https://www.suse.com/security/cve/CVE-2012-3867/" source="CVE"/>
		<description>

The following bugs have been fixed in puppet:

    * bnc#770828, CVE-2012-3864: puppet: authenticated clients can read
      arbitrary files via a flaw in puppet master
    * bnc#770829, CVE-2012-3865: puppet: arbitrary file delete / Denial of
      Service on Puppet Master by authenticated clients
    * bnc#770833, CVE-2012-3867: puppet: insufficient input validation for
      agent certificate names

Security Issue references:

    * CVE-2012-3867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3867&gt;
    * CVE-2012-3864
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3864&gt;
    * CVE-2012-3865
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3865&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-16"/>
	<updated date="2012-07-16"/>
	<bugzilla href="https://bugzilla.suse.com/770828">SUSE bug 770828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770829">SUSE bug 770829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770833">SUSE bug 770833</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3864/">CVE-2012-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3865/">CVE-2012-3865</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3867/">CVE-2012-3867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574553" comment="puppet-2.6.17-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574554" comment="puppet-server-2.6.17-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574555" comment="pwdutils-3.2.8-0.2.35 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574553" comment="puppet-2.6.17-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574554" comment="puppet-server-2.6.17-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574555" comment="pwdutils-3.2.8-0.2.35 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574553" comment="puppet-2.6.17-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574554" comment="puppet-server-2.6.17-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574555" comment="pwdutils-3.2.8-0.2.35 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39534" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="1077767" ref_url="https://bugzilla.suse.com/1077767" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-2295: Fixed a security vulnerability where an attacker could
  force YAML deserialization in an unsafe manner, which would lead to
  remote code execution.

In default, this update would break a backwards compatibility
with Puppet agents older than 3.2.2 as the SLE11 master doesn't
support other fact formats than pson in default anymore.
In order to allow users to continue using their SLE11 agents
a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option
'dangerous_fact_formats' was added. When it's set to true it
enables using dangerous fact formats (e.g. YAML). When it's set
to false, only PSON fact format is accepted. (bsc#1040151),
(bsc#1077767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077767">SUSE bug 1077767</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574556" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574557" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39535" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1167645" ref_url="https://bugzilla.suse.com/1167645" source="BUGZILLA"/>
		<reference ref_id="935899" ref_url="https://bugzilla.suse.com/935899" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7942" ref_url="https://www.suse.com/security/cve/CVE-2020-7942/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

Security issue fixed:

- CVE-2020-7942: Added a warning for a vulnerable configuration option, which could allow
  for information disclosure in certain setups. Disabling it my break some setups. (bsc#1167645)

Non-security issue fixed:

- Fixed deletion of puppet master file /etc/puppet/manifests/site.pp during updates (bsc#935899).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167645">SUSE bug 1167645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935899">SUSE bug 935899</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7942/">CVE-2020-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574558" comment="puppet-2.7.26-0.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574559" comment="puppet-server-2.7.26-0.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39536" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574560" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574561" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574562" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565245" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574563" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574564" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574565" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574566" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574567" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574568" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574569" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574570" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39537" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574571" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574572" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574573" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565253" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574574" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574575" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574576" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574577" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574578" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574579" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574580" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574581" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39538" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574582" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574583" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574584" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565261" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574585" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574586" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574587" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574588" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574589" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574590" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574591" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574592" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39539" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574593" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574594" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574595" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565269" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574596" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574597" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574598" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574599" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574600" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574601" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574602" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574603" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39540" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574604" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574605" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574606" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565277" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574607" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574608" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574609" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574610" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574611" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574612" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574613" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574614" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39541" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574615" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574616" comment="libpython2_6-1_0-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574617" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574618" comment="python-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574619" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574620" comment="python-base-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574621" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574622" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574623" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574624" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574625" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574626" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39542" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574627" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574628" comment="libpython2_6-1_0-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574629" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574630" comment="python-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574631" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574632" comment="python-base-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574633" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574634" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574635" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574636" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574637" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574638" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39543" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574639" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574640" comment="libpython2_6-1_0-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574641" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574642" comment="python-32bit-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574643" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574644" comment="python-base-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574645" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574646" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574647" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574648" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574649" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574650" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39544" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574651" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574652" comment="libpython2_6-1_0-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574653" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574654" comment="python-32bit-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574655" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574656" comment="python-base-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574657" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574658" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574659" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574660" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574661" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574662" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39545" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen().
                  Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574663" comment="libpython2_6-1_0-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574664" comment="libpython2_6-1_0-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574665" comment="python-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574666" comment="python-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574667" comment="python-base-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574668" comment="python-base-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574669" comment="python-curses-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574670" comment="python-demo-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574671" comment="python-doc-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574672" comment="python-doc-pdf-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574673" comment="python-gdbm-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574674" comment="python-idle-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574675" comment="python-tk-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574676" comment="python-xml-2.6.9-40.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39546" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574677" comment="libpython2_6-1_0-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574678" comment="libpython2_6-1_0-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574679" comment="python-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574680" comment="python-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574681" comment="python-base-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574682" comment="python-base-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574683" comment="python-curses-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574684" comment="python-demo-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574685" comment="python-doc-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574686" comment="python-doc-pdf-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574687" comment="python-gdbm-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574688" comment="python-idle-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574689" comment="python-tk-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574690" comment="python-xml-2.6.9-40.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39547" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574691" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574692" comment="libpython2_6-1_0-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574693" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574694" comment="python-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574695" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574696" comment="python-base-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574697" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574698" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574699" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574700" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574701" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574702" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39548" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-23336: which forbids use of semicolon as a query string separator (bpo#42967, bsc#1182379, CVE-2021-23336).
- Switch off -O0 non-optimization.
- CVE-2021-3177: fixing bsc#1181126 (CVE-2021-3177) buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631986" comment="libpython2_6-1_0-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631987" comment="libpython2_6-1_0-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631988" comment="python-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631989" comment="python-32bit-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631990" comment="python-base-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631991" comment="python-base-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631992" comment="python-curses-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631993" comment="python-demo-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631994" comment="python-doc-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631995" comment="python-doc-pdf-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631996" comment="python-gdbm-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631997" comment="python-idle-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631998" comment="python-tk-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631999" comment="python-xml-2.6.9-40.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39549" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python fixes the following issues:


- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2019-9947: Fixed a CRLF injection that can occur if the attacker controls a url parameter. (bsc#1130840)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-25"/>
	<updated date="2021-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651289" comment="libpython2_6-1_0-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651290" comment="libpython2_6-1_0-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651291" comment="python-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651292" comment="python-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651293" comment="python-base-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651294" comment="python-base-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651295" comment="python-curses-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651296" comment="python-demo-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651297" comment="python-doc-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651298" comment="python-doc-pdf-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651299" comment="python-gdbm-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651300" comment="python-idle-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651301" comment="python-tk-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651302" comment="python-xml-2.6.9-40.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39550" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This Python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574717" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574718" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563122" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574719" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574720" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574721" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574722" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574723" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574724" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574725" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39551" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python has been updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 was disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574726" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567066" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574727" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563781" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574728" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567069" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574729" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574730" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574731" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574732" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574733" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574734" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39552" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574735" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567074" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574736" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563789" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574737" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567077" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574738" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574739" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574740" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574741" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574742" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574743" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39553" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574744" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567082" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574745" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563797" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574746" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567085" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574747" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574748" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574749" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574750" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574751" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574752" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39554" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The urlparse module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574753" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574754" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574755" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574756" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574757" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574758" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574759" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574760" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574761" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574762" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574763" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574764" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574765" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574753" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574754" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574755" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574756" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574757" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574758" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574759" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574760" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574761" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574762" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574763" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574764" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574765" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39555" version="1" class="patch">
	<metadata>
		<title>Security update for python-imaging</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="863541" ref_url="https://bugzilla.suse.com/863541" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>

This python-imaging update fixes the following two security issues:

    * bnc#863541: Fixed insecure temporary file creation and handling
      (CVE-2014-1932, CVE-2014-1933)

Security Issue references:

    * CVE-2014-1932
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932&gt;
    * CVE-2014-1933
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-23"/>
	<updated date="2014-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574766" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39556" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:
	  
Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574767" comment="python-numpy-1.3.0-1.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39557" version="1" class="patch">
	<metadata>
		<title>Security update for python-pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="751005" ref_url="https://bugzilla.suse.com/751005" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1502" ref_url="https://www.suse.com/security/cve/CVE-2012-1502/" source="CVE"/>
		<description>

python-pam was prone to a double-free issue which is fixed by this update. 
(CVE-2012-1502).

Security Issues:

    * CVE-2012-1502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1502&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-03-22"/>
	<updated date="2012-03-22"/>
	<bugzilla href="https://bugzilla.suse.com/751005">SUSE bug 751005</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1502/">CVE-2012-1502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574768" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574768" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574768" comment="python-pam-0.5.0-3.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39558" version="1" class="patch">
	<metadata>
		<title>Security update for libpython2_6-1_0, libpython2_6-1_0-32bit, libpython2_6-1_0-x86, python, python-32bit, python-base, python-base-32bit, python-base-debuginfo, python-base-debuginfo-32bit, python-base-debuginfo-x86, python-base-debugsource, python-base-x86, python-curses, python-debuginfo, python-debuginfo-32bit, python-debuginfo-x86, python-debugsource, python-demo, python-devel, python-doc, python-doc-pdf, python-gdbm, python-idle, python-tk, python-x86, python-xml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="744287" ref_url="https://bugzilla.suse.com/744287" source="BUGZILLA"/>
		<reference ref_id="747125" ref_url="https://bugzilla.suse.com/747125" source="BUGZILLA"/>
		<reference ref_id="748079" ref_url="https://bugzilla.suse.com/748079" source="BUGZILLA"/>
		<reference ref_id="751714" ref_url="https://bugzilla.suse.com/751714" source="BUGZILLA"/>
		<reference ref_id="751718" ref_url="https://bugzilla.suse.com/751718" source="BUGZILLA"/>
		<reference ref_id="752375" ref_url="https://bugzilla.suse.com/752375" source="BUGZILLA"/>
		<reference ref_id="754447" ref_url="https://bugzilla.suse.com/754447" source="BUGZILLA"/>
		<reference ref_id="754547" ref_url="https://bugzilla.suse.com/754547" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1015" ref_url="https://www.suse.com/security/cve/CVE-2011-1015/" source="CVE"/>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<description>

This update to python 2.6.8 fixes the following bugs, among others:

    * XMLRPC Server DoS (CVE-2012-0845, bnc#747125)
    * hash randomization issues (CVE-2012-1150, bnc#751718)
    * insecure creation of .pypirc (CVE-2011-4944, bnc#754447)
    * SimpleHTTPServer XSS (CVE-2011-1015, bnc#752375)
    * functions can accept unicode kwargs (bnc#744287)
    * python MainThread lacks ident (bnc#754547)
    * TypeError: waitpid() takes no keyword arguments (bnc#751714)
    * Source code exposure in CGIHTTPServer module (CVE-2011-1015,
      bnc#674646)
    * Insecure redirect processing in urllib2 (CVE-2011-1521, bnc#682554)

The hash randomization fix is by default disabled to keep compatibility 
with existing python code when it extracts hashes.

To enable the hash seed randomization you can use: - pass -R to the python 
interpreter commandline. - set the environment variable 
PYTHONHASHSEED=random to enable it for programs. You can also set this 
environment variable to a fixed hash seed by specifying a integer value 
between 0 and MAX_UINT.

In generally enabling this is only needed when malicious third parties can 
inject values into your hash tables.

The update to 2.6.8 also provides many compatibility fixes with OpenStack.

Security Issues:

    * CVE-2011-1015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015&gt;
    * CVE-2011-1521
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521&gt;
    * CVE-2011-4944
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944&gt;
    * CVE-2012-0845
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845&gt;
    * CVE-2012-1150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-16"/>
	<updated date="2012-05-16"/>
	<bugzilla href="https://bugzilla.suse.com/744287">SUSE bug 744287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748079">SUSE bug 748079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751714">SUSE bug 751714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752375">SUSE bug 752375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754547">SUSE bug 754547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1015/">CVE-2011-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574769" comment="libpython2_6-1_0-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574770" comment="libpython2_6-1_0-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574771" comment="libpython2_6-1_0-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574772" comment="python-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574773" comment="python-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574774" comment="python-base-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574775" comment="python-base-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574776" comment="python-base-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574777" comment="python-curses-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574778" comment="python-demo-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574779" comment="python-doc-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574780" comment="python-doc-pdf-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574781" comment="python-gdbm-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574782" comment="python-idle-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574783" comment="python-tk-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574784" comment="python-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574785" comment="python-xml-2.6.8-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574769" comment="libpython2_6-1_0-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574770" comment="libpython2_6-1_0-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574771" comment="libpython2_6-1_0-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574772" comment="python-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574773" comment="python-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574774" comment="python-base-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574775" comment="python-base-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574776" comment="python-base-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574777" comment="python-curses-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574778" comment="python-demo-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574779" comment="python-doc-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574780" comment="python-doc-pdf-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574781" comment="python-gdbm-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574782" comment="python-idle-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574783" comment="python-tk-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574784" comment="python-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574785" comment="python-xml-2.6.8-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574769" comment="libpython2_6-1_0-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574770" comment="libpython2_6-1_0-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574771" comment="libpython2_6-1_0-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574772" comment="python-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574773" comment="python-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574774" comment="python-base-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574775" comment="python-base-32bit-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574776" comment="python-base-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574777" comment="python-curses-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574778" comment="python-demo-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574779" comment="python-doc-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574780" comment="python-doc-pdf-2.6-8.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574781" comment="python-gdbm-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574782" comment="python-idle-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574783" comment="python-tk-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574784" comment="python-x86-2.6.8-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574785" comment="python-xml-2.6.8-0.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39559" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1079300" ref_url="https://bugzilla.suse.com/1079300" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issues fixed:

- CVE-2017-1000158: Fixed integer overflows in PyString_DecodeEscape that could have resulted in
  heap-based buffer overflow attacks and possible arbitrary code execution (bsc#1068664).
- CVE-2018-1000030: Fixed crash inside the Python interpreter when multiple threads used the same
  I/O stream concurrently (bsc#1079300).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574786" comment="libpython2_7-1_0-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574787" comment="libpython2_7-1_0-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574788" comment="python27-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574789" comment="python27-32bit-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574790" comment="python27-base-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574791" comment="python27-base-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574792" comment="python27-curses-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574793" comment="python27-demo-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574794" comment="python27-devel-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574795" comment="python27-doc-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574796" comment="python27-doc-pdf-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574797" comment="python27-gdbm-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574798" comment="python27-idle-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574799" comment="python27-tk-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574800" comment="python27-xml-2.7.9-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39560" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574801" comment="libpython2_7-1_0-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574802" comment="libpython2_7-1_0-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574803" comment="python27-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574804" comment="python27-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574805" comment="python27-base-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574806" comment="python27-base-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574807" comment="python27-curses-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574808" comment="python27-demo-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574809" comment="python27-devel-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574810" comment="python27-doc-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574811" comment="python27-doc-pdf-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574812" comment="python27-gdbm-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574813" comment="python27-idle-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574814" comment="python27-tk-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574815" comment="python27-xml-2.7.9-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39561" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python27 fixes the following issue:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663)
- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574816" comment="libpython2_7-1_0-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574817" comment="libpython2_7-1_0-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574818" comment="python27-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574819" comment="python27-32bit-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574820" comment="python27-base-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574821" comment="python27-base-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574822" comment="python27-curses-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574823" comment="python27-demo-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574824" comment="python27-devel-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574825" comment="python27-doc-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574826" comment="python27-doc-pdf-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574827" comment="python27-gdbm-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574828" comment="python27-idle-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574829" comment="python27-tk-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574830" comment="python27-xml-2.7.9-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39562" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574831" comment="libpython2_7-1_0-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574832" comment="libpython2_7-1_0-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574833" comment="python27-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574834" comment="python27-32bit-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574835" comment="python27-base-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574836" comment="python27-base-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574837" comment="python27-curses-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574838" comment="python27-demo-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574839" comment="python27-devel-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574840" comment="python27-doc-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574841" comment="python27-doc-pdf-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574842" comment="python27-gdbm-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574843" comment="python27-idle-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574844" comment="python27-tk-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574845" comment="python27-xml-2.7.9-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39563" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:
Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574846" comment="libpython2_7-1_0-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574847" comment="libpython2_7-1_0-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574848" comment="python27-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574849" comment="python27-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574850" comment="python27-base-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574851" comment="python27-base-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574852" comment="python27-curses-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574853" comment="python27-demo-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574854" comment="python27-devel-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574855" comment="python27-doc-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574856" comment="python27-doc-pdf-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574857" comment="python27-gdbm-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574858" comment="python27-idle-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574859" comment="python27-tk-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574860" comment="python27-xml-2.7.9-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39564" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574861" comment="libpython2_7-1_0-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574862" comment="libpython2_7-1_0-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574863" comment="python27-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574864" comment="python27-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574865" comment="python27-base-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574866" comment="python27-base-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574867" comment="python27-curses-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574868" comment="python27-demo-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574869" comment="python27-devel-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574870" comment="python27-doc-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574871" comment="python27-doc-pdf-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574872" comment="python27-gdbm-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574873" comment="python27-idle-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574874" comment="python27-tk-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574875" comment="python27-xml-2.7.16-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39565" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

python27 was updated to version 2.7.17. 

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).	  
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Changed name of idle27 icons to idle27.png (bsc#1165894).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574876" comment="libpython2_7-1_0-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574877" comment="libpython2_7-1_0-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574878" comment="python-rpm-macros-20190408.32abece-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574879" comment="python27-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574880" comment="python27-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574881" comment="python27-base-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574882" comment="python27-base-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574883" comment="python27-curses-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574884" comment="python27-demo-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574885" comment="python27-devel-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574886" comment="python27-doc-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574887" comment="python27-doc-pdf-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574888" comment="python27-gdbm-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574889" comment="python27-idle-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574890" comment="python27-tk-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574891" comment="python27-xml-2.7.17-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39566" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in specifically crafted tarball.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574892" comment="libpython2_7-1_0-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574893" comment="libpython2_7-1_0-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574894" comment="python27-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574895" comment="python27-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574896" comment="python27-base-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574897" comment="python27-base-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574898" comment="python27-curses-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574899" comment="python27-demo-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574900" comment="python27-devel-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574901" comment="python27-doc-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574902" comment="python27-doc-pdf-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574903" comment="python27-gdbm-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574904" comment="python27-idle-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574905" comment="python27-tk-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574906" comment="python27-xml-2.7.17-6.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39567" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

 - Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574907" comment="libpython2_7-1_0-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574908" comment="libpython2_7-1_0-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574909" comment="python27-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574910" comment="python27-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574911" comment="python27-base-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574912" comment="python27-base-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574913" comment="python27-curses-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574914" comment="python27-demo-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574915" comment="python27-devel-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574916" comment="python27-doc-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574917" comment="python27-doc-pdf-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574918" comment="python27-gdbm-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574919" comment="python27-idle-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574920" comment="python27-tk-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574921" comment="python27-xml-2.7.17-6.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39568" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574922" comment="libpython2_7-1_0-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574923" comment="libpython2_7-1_0-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574924" comment="python27-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574925" comment="python27-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574926" comment="python27-base-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574927" comment="python27-base-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574928" comment="python27-curses-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574929" comment="python27-demo-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574930" comment="python27-devel-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574931" comment="python27-doc-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574932" comment="python27-doc-pdf-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574933" comment="python27-gdbm-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574934" comment="python27-idle-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574935" comment="python27-tk-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574936" comment="python27-xml-2.7.17-6.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39569" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- python27 was upgraded to 2.7.18 	  
- CVE-2021-23336: Fixed a potential web cache poisoning by using a 
  semicolon in query parameters use of semicolon as a query string 
  separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574937" comment="libpython2_7-1_0-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574938" comment="libpython2_7-1_0-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574939" comment="python27-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574940" comment="python27-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574941" comment="python27-base-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574942" comment="python27-base-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574943" comment="python27-curses-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574944" comment="python27-demo-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574945" comment="python27-devel-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574946" comment="python27-doc-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574947" comment="python27-doc-pdf-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574948" comment="python27-gdbm-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574949" comment="python27-idle-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574950" comment="python27-tk-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574951" comment="python27-xml-2.7.18-6.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39570" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2020-26116: Fixed a CRLF injection via HTTP request method in httplib/http.client. (bsc#1177211)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634733" comment="libpython2_7-1_0-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634734" comment="libpython2_7-1_0-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634735" comment="python27-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634736" comment="python27-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634737" comment="python27-base-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634738" comment="python27-base-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634739" comment="python27-curses-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634740" comment="python27-demo-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634741" comment="python27-devel-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634742" comment="python27-doc-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634743" comment="python27-doc-pdf-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634744" comment="python27-gdbm-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634745" comment="python27-idle-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634746" comment="python27-tk-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634747" comment="python27-xml-2.7.18-6.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39571" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2022-0391: Fixed newline and tabs sanitation in urllib.parse (bsc#1195396).
- CVE-2021-4189: Fixed incorrect trust of PASV response (bsc#1194146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668229" comment="libpython2_7-1_0-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668230" comment="libpython2_7-1_0-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668231" comment="python27-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668232" comment="python27-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668233" comment="python27-base-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668234" comment="python27-base-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668235" comment="python27-curses-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668236" comment="python27-demo-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668237" comment="python27-devel-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668238" comment="python27-doc-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668239" comment="python27-doc-pdf-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668240" comment="python27-gdbm-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668241" comment="python27-idle-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668242" comment="python27-tk-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668243" comment="python27-xml-2.7.18-6.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39572" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677044" comment="libpython2_7-1_0-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677045" comment="libpython2_7-1_0-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677046" comment="python27-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677047" comment="python27-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677048" comment="python27-base-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677049" comment="python27-base-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677050" comment="python27-curses-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677051" comment="python27-demo-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677052" comment="python27-devel-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677053" comment="python27-doc-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677054" comment="python27-doc-pdf-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677055" comment="python27-gdbm-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677056" comment="python27-idle-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677057" comment="python27-tk-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677058" comment="python27-xml-2.7.18-6.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39573" version="1" class="patch">
	<metadata>
		<title>Recommended update for python 2.7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007084" ref_url="https://bugzilla.suse.com/1007084" source="BUGZILLA"/>
		<reference ref_id="1014478" ref_url="https://bugzilla.suse.com/1014478" source="BUGZILLA"/>
		<reference ref_id="1015776" ref_url="https://bugzilla.suse.com/1015776" source="BUGZILLA"/>
		<reference ref_id="1054106" ref_url="https://bugzilla.suse.com/1054106" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1064755" ref_url="https://bugzilla.suse.com/1064755" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1097455" ref_url="https://bugzilla.suse.com/1097455" source="BUGZILLA"/>
		<reference ref_id="1098681" ref_url="https://bugzilla.suse.com/1098681" source="BUGZILLA"/>
		<reference ref_id="905354" ref_url="https://bugzilla.suse.com/905354" source="BUGZILLA"/>
		<reference ref_id="962170" ref_url="https://bugzilla.suse.com/962170" source="BUGZILLA"/>
		<reference ref_id="974705" ref_url="https://bugzilla.suse.com/974705" source="BUGZILLA"/>
		<reference ref_id="974993" ref_url="https://bugzilla.suse.com/974993" source="BUGZILLA"/>
		<reference ref_id="975949" ref_url="https://bugzilla.suse.com/975949" source="BUGZILLA"/>
		<reference ref_id="998103" ref_url="https://bugzilla.suse.com/998103" source="BUGZILLA"/>
		<reference ref_id="998378" ref_url="https://bugzilla.suse.com/998378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880/" source="CVE"/>
		<description>

This update provides various modules for Python 2.7.

It also updates python 2.7 to the 2.7.16 release, fixing security issues and bugs.

The following packages are included in the update:

- cloud-init
- growpart
- python27-argparse
- python27-blinker
- python27-boto3
- python27-botocore
- python27-cffi
- python27-Cheetah
- python27-configobj
- python27-cryptography
- python27-dateutil
- python27-docutils
- python27-ecdsa
- python27-enum34
- python27-futures
- python27-httplib2
- python27-idna
- python27-ipaddress
- python27-Jinja2
- python27-jmespath
- python27-jsonpatch
- python27-jsonpointer
- python27-jsonschema
- python27-lockfile
- python27-MarkupSafe
- python27-oauthlib
- python27-oauth
- python27-paramiko
- python27-ply
- python27-PrettyTable
- python27-pyasn1-modules
- python27-pyasn1
- python27-pycparser
- python27-pycrypto
- python27-PyJWT
- python27-pyserial
- python27-pytest
- python27-python-daemon
- python27-PyYAML
- python27-requests
- python27-s3transfer
- python27-setuptools
- python27-simplejson
- python27-six
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007084">SUSE bug 1007084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014478">SUSE bug 1014478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015776">SUSE bug 1015776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064755">SUSE bug 1064755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097455">SUSE bug 1097455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098681">SUSE bug 1098681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905354">SUSE bug 905354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962170">SUSE bug 962170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974705">SUSE bug 974705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974993">SUSE bug 974993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975949">SUSE bug 975949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998103">SUSE bug 998103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998378">SUSE bug 998378</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574952" comment="libpython2_7-1_0-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574953" comment="libpython2_7-1_0-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574954" comment="python27-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574955" comment="python27-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574956" comment="python27-base-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574957" comment="python27-base-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574958" comment="python27-curses-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574959" comment="python27-demo-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574960" comment="python27-devel-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574961" comment="python27-doc-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574962" comment="python27-doc-pdf-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574963" comment="python27-gdbm-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574964" comment="python27-idle-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574965" comment="python27-setuptools-18.0.1-4.2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574966" comment="python27-tk-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574967" comment="python27-xml-2.7.16-6.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39574" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="752204" ref_url="https://bugzilla.suse.com/752204" source="BUGZILLA"/>
		<reference ref_id="752205" ref_url="https://bugzilla.suse.com/752205" source="BUGZILLA"/>
		<reference ref_id="752206" ref_url="https://bugzilla.suse.com/752206" source="BUGZILLA"/>
		<reference ref_id="759081" ref_url="https://bugzilla.suse.com/759081" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0249" ref_url="https://www.suse.com/security/cve/CVE-2012-0249/" source="CVE"/>
		<reference ref_id="CVE-2012-0250" ref_url="https://www.suse.com/security/cve/CVE-2012-0250/" source="CVE"/>
		<reference ref_id="CVE-2012-0255" ref_url="https://www.suse.com/security/cve/CVE-2012-0255/" source="CVE"/>
		<reference ref_id="CVE-2012-1820" ref_url="https://www.suse.com/security/cve/CVE-2012-1820/" source="CVE"/>
		<description>

This update of quagga fixes multiple security flaws that could have caused 
a Denial of Service via specially crafted packets (CVE-2012-1820, 
CVE-2012-0249, CVE-2012-0250, CVE-2012-0255).

Additionally, issues with service owned directories in combination with 
logrotate were fixed.

Security Issue references:

    * CVE-2012-0249
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0249&gt;
    * CVE-2012-0250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0250&gt;
    * CVE-2012-0255
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0255&gt;
    * CVE-2012-1820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1820&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-30"/>
	<updated date="2012-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752204">SUSE bug 752204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752205">SUSE bug 752205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752206">SUSE bug 752206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759081">SUSE bug 759081</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0249/">CVE-2012-0249</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0250/">CVE-2012-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0255/">CVE-2012-0255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1820/">CVE-2012-1820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574968" comment="quagga-0.99.15-0.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574968" comment="quagga-0.99.15-0.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574968" comment="quagga-0.99.15-0.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574968" comment="quagga-0.99.15-0.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39575" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574969" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39576" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574970" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39577" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574971" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39578" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574972" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39579" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574973" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39580" version="1" class="patch">
	<metadata>
		<title>Security update for quota</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="772570" ref_url="https://bugzilla.suse.com/772570" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3417" ref_url="https://www.suse.com/security/cve/CVE-2012-3417/" source="CVE"/>
		<description>

The quota package was updated to fix an issue with tcp_wrappers, where 
hosts.allow/deny files would have not been correctly honored. 
(CVE-2012-3417)

Security Issue reference:

    * CVE-2012-3417
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3417&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-29"/>
	<updated date="2012-08-29"/>
	<bugzilla href="https://bugzilla.suse.com/772570">SUSE bug 772570</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3417/">CVE-2012-3417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574974" comment="quota-3.16-50.36.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574975" comment="quota-nfs-3.16-50.36.36.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574974" comment="quota-3.16-50.36.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574975" comment="quota-nfs-3.16-50.36.36.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39581" version="1" class="patch">
	<metadata>
		<title>Security update for radvd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="721968" ref_url="https://bugzilla.suse.com/721968" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3601" ref_url="https://www.suse.com/security/cve/CVE-2011-3601/" source="CVE"/>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<reference ref_id="CVE-2011-3603" ref_url="https://www.suse.com/security/cve/CVE-2011-3603/" source="CVE"/>
		<reference ref_id="CVE-2011-3604" ref_url="https://www.suse.com/security/cve/CVE-2011-3604/" source="CVE"/>
		<reference ref_id="CVE-2011-3605" ref_url="https://www.suse.com/security/cve/CVE-2011-3605/" source="CVE"/>
		<description>

This update of radvd fixes the following security flaws:

    * arbitrary file overwrite flaw through unsanitized interface names
      (CVE-2011-3602),
    * missing return value checks in privsep_init() which could cause radvd
      to keep running with root privileges (CVE-2011-3603),
    * buffer overread flaws in the process_ra() function (CVE-2011-3604),
    * temporary denial of service flaw triggered by a flood of
      ND_ROUTER_SOLICIT (CVE-2011-3605)

Security Issue references:

    * CVE-2011-3601
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3601&gt;
    * CVE-2011-3602
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602&gt;
    * CVE-2011-3603
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3603&gt;
    * CVE-2011-3604
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3604&gt;
    * CVE-2011-3605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-11-09"/>
	<updated date="2011-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3601/">CVE-2011-3601</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3603/">CVE-2011-3603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3604/">CVE-2011-3604</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3605/">CVE-2011-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574976" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574976" comment="radvd-1.1-1.24.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39582" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="881284" ref_url="https://bugzilla.suse.com/881284" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>

sendmail has been updated to properly close file descriptors before 
executing programs.

These security issues were fixed:

    * Not properly closing file descriptors before executing programs
      (CVE-2014-3956).

Security Issues:

    * CVE-2014-3956
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/881284">SUSE bug 881284</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574977" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39583" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-15"/>
	<updated date="2016-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574978" comment="rsync-3.0.4-2.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39584" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="791660" ref_url="https://bugzilla.suse.com/791660" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>

This update for rsync fixes the following issues:

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a
  symlink attack on a file in the synchronization path. (bsc#915410)
- The rsyncd daemon doesn't handle the HUP signal. Fix 'reload' action in the init
  script to restart the service. (bsc#791660)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/791660">SUSE bug 791660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574979" comment="rsync-3.0.4-2.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39585" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<description>
This update for rsync fixes several issues.

These security issues were fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574980" comment="rsync-3.0.4-2.48.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39586" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574981" comment="rsync-3.0.4-2.48.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39587" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574982" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574983" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574984" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39588" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="704409" ref_url="https://bugzilla.suse.com/704409" source="BUGZILLA"/>
		<reference ref_id="739122" ref_url="https://bugzilla.suse.com/739122" source="BUGZILLA"/>
		<reference ref_id="740796" ref_url="https://bugzilla.suse.com/740796" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2686" ref_url="https://www.suse.com/security/cve/CVE-2011-2686/" source="CVE"/>
		<reference ref_id="CVE-2011-2705" ref_url="https://www.suse.com/security/cve/CVE-2011-2705/" source="CVE"/>
		<reference ref_id="CVE-2011-3009" ref_url="https://www.suse.com/security/cve/CVE-2011-3009/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>

This update of ruby provides 1.8.7p357, which contains many stability fixes 
and bug fixes while maintaining full compatibility with the previous 
version. A detailailed list of changes is available from 
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_357/ChangeLog
&lt;http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_357/ChangeLog&gt; .

The most important fixes are:

    * Hash functions are now using a randomized seed to avoid algorithmic
      complexity attacks. If available, OpenSSL::Random.seed at the
      SecureRandom.random_bytes is used to achieve this. (CVE-2011-4815
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815&gt; )
    * mkconfig.rb: fix for continued lines.
    * Fix Infinity to be greater than any bignum number.
    * Initialize store-&gt;ex_data.sk.
    * Several IPv6 related fixes.
    * Fixes for zlib.
    * Reinitialize PRNG when forking children (CVE-2011-2686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2686&gt; , 
      CVE-2011-3009
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3009&gt; )
    * Fixes to securerandom. (CVE-2011-2705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2705&gt; )
    * Fix uri route_to
    * Fix race condition with variables and autoload.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-01-27"/>
	<updated date="2012-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/704409">SUSE bug 704409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739122">SUSE bug 739122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740796">SUSE bug 740796</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2686/">CVE-2011-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2705/">CVE-2011-2705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3009/">CVE-2011-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574985" comment="ruby-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574986" comment="ruby-doc-html-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574987" comment="ruby-tk-1.8.7.p357-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574985" comment="ruby-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574986" comment="ruby-doc-html-1.8.7.p357-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574987" comment="ruby-tk-1.8.7.p357-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39589" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="529899" ref_url="https://bugzilla.suse.com/529899" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
This update for rzsz fixes the following issues:

- L3: sz of rzsz segfaults in zsdata() (bsc#1086416)
- VUL-0: CVE-2018-10195: rzsz: sz can leak data to receiving side (bsc#1090051)
- rzsz-0.12.20-976.7: illegal use of freed variable (bsc#529899)
- /usr/bin/lsb segfaults [rzsz] (bsc#1076576)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529899">SUSE bug 529899</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574988" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39590" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<description>


This update for samba fixes the following security issues: 

- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bsc#958582).

- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client
  side (bsc#958584).

- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version
  (shadow_copy2) (bsc#958583).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-15"/>
	<updated date="2016-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574989" comment="cifs-mount-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574990" comment="ldapsmb-1.34b-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574991" comment="libsmbclient0-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574992" comment="libsmbclient0-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574993" comment="libtalloc1-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574994" comment="libtalloc1-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574995" comment="libtdb1-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574996" comment="libtdb1-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574997" comment="libwbclient0-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574998" comment="libwbclient0-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574999" comment="samba-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575000" comment="samba-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575001" comment="samba-client-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575002" comment="samba-client-32bit-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575003" comment="samba-krb-printing-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575004" comment="samba-winbind-3.4.3-56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575005" comment="samba-winbind-32bit-3.4.3-56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39591" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change
permissions on link target (bso#11648 bsc#968222).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-29"/>
	<updated date="2016-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575006" comment="cifs-mount-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575007" comment="ldapsmb-1.34b-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575008" comment="libsmbclient0-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575009" comment="libsmbclient0-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575010" comment="libtalloc1-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575011" comment="libtalloc1-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575012" comment="libtdb1-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575013" comment="libtdb1-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575014" comment="libwbclient0-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575015" comment="libwbclient0-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575016" comment="samba-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575017" comment="samba-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575018" comment="samba-client-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575019" comment="samba-client-32bit-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575020" comment="samba-krb-printing-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575021" comment="samba-winbind-3.4.3-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575022" comment="samba-winbind-32bit-3.4.3-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39592" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<description>

This update for samba fixes the following issues: 

Security issues fixed:
- CVE-2016-2110: A man-in-the-middle can downgrade NTLMSSP authentication. (bso#11688)(bsc#973031)
- CVE-2016-2111: Domain controller netlogon member computer can be spoofed. (bso#11749)(bsc#973032)
- CVE-2016-2112: LDAP conenctions vulnerable to downgrade and  MITM attack. (bso#11644)(bsc#973033)
- CVE-2016-2113: TLS certificate validation missing. (bso#11752)(bsc#973034)
- CVE-2016-2115: Named pipe IPC vulnerable to MITM attacks. (bso#11756)(bsc#973036)

Bugs fixed:
- Getting and setting Windows ACLs on symlinks can change permissions on link		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-23"/>
	<updated date="2016-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575023" comment="cifs-mount-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575024" comment="ldapsmb-1.34b-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575025" comment="libsmbclient0-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575026" comment="libsmbclient0-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575027" comment="libtalloc1-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575028" comment="libtalloc1-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575029" comment="libtdb1-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575030" comment="libtdb1-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575031" comment="libwbclient0-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575032" comment="libwbclient0-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575033" comment="samba-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575034" comment="samba-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575035" comment="samba-client-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575036" comment="samba-client-32bit-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575037" comment="samba-krb-printing-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575038" comment="samba-winbind-3.4.3-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575039" comment="samba-winbind-32bit-3.4.3-63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39593" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

- CVE-2015-5370: The DCERPC server and client were vulnerable to DOS and MITM attacks.
  (bsc#936862).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575040" comment="cifs-mount-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575041" comment="ldapsmb-1.34b-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575042" comment="libsmbclient0-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575043" comment="libsmbclient0-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575044" comment="libtalloc1-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575045" comment="libtalloc1-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575046" comment="libtdb1-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575047" comment="libtdb1-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575048" comment="libwbclient0-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575049" comment="libwbclient0-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575050" comment="samba-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575051" comment="samba-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575052" comment="samba-client-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575053" comment="samba-client-32bit-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575054" comment="samba-krb-printing-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575055" comment="samba-winbind-3.4.3-66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575056" comment="samba-winbind-32bit-3.4.3-66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39594" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

- CVE-2016-2125: Don't send delegated credentials to all servers (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd parent process (bsc#1014442).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575057" comment="cifs-mount-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575058" comment="ldapsmb-1.34b-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575059" comment="libsmbclient0-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575060" comment="libsmbclient0-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575061" comment="libtalloc1-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575062" comment="libtalloc1-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575063" comment="libtdb1-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575064" comment="libtdb1-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575065" comment="libwbclient0-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575066" comment="libwbclient0-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575067" comment="samba-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575068" comment="samba-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575069" comment="samba-client-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575070" comment="samba-client-32bit-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575071" comment="samba-krb-printing-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575072" comment="samba-winbind-3.4.3-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575073" comment="samba-winbind-32bit-3.4.3-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39595" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<description>
This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624).
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622).
- CVE-2017-2619: Symlink race permited opening files outside share directory (bsc#1027147).

These non-security issues were fixed:

- Allow SESSION KEY setup without signing (bsc#1009711).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-27"/>
	<updated date="2017-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575074" comment="cifs-mount-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575075" comment="ldapsmb-1.34b-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575076" comment="libsmbclient0-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575077" comment="libsmbclient0-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575078" comment="libtalloc1-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575079" comment="libtalloc1-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575080" comment="libtdb1-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575081" comment="libtdb1-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575082" comment="libwbclient0-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575083" comment="libwbclient0-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575084" comment="samba-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575085" comment="samba-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575086" comment="samba-client-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575087" comment="samba-client-32bit-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575088" comment="samba-krb-printing-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575089" comment="samba-winbind-3.4.3-70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575090" comment="samba-winbind-32bit-3.4.3-70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39596" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-16"/>
	<updated date="2017-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575091" comment="cifs-mount-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575092" comment="ldapsmb-1.34b-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575093" comment="libsmbclient0-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575094" comment="libsmbclient0-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575095" comment="libtalloc1-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575096" comment="libtalloc1-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575097" comment="libtdb1-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575098" comment="libtdb1-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575099" comment="libwbclient0-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575100" comment="libwbclient0-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575101" comment="samba-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575102" comment="samba-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575103" comment="samba-client-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575104" comment="samba-client-32bit-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575105" comment="samba-krb-printing-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575106" comment="samba-winbind-3.4.3-70.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575107" comment="samba-winbind-32bit-3.4.3-70.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39597" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The following security issue was fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575108" comment="cifs-mount-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575109" comment="ldapsmb-1.34b-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575110" comment="libsmbclient0-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575111" comment="libsmbclient0-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575112" comment="libtalloc1-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575113" comment="libtalloc1-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575114" comment="libtdb1-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575115" comment="libtdb1-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575116" comment="libwbclient0-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575117" comment="libwbclient0-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575118" comment="samba-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575119" comment="samba-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575120" comment="samba-client-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575121" comment="samba-client-32bit-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575122" comment="samba-krb-printing-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575123" comment="samba-winbind-3.4.3-70.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575124" comment="samba-winbind-32bit-3.4.3-70.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39598" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed 
  an unprivileged user to save registry files outside a share (bsc#1131060).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575125" comment="cifs-mount-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575126" comment="ldapsmb-1.34b-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575127" comment="libsmbclient0-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575128" comment="libsmbclient0-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575129" comment="libtalloc1-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575130" comment="libtalloc1-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575131" comment="libtdb1-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575132" comment="libtdb1-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575133" comment="libwbclient0-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575134" comment="libwbclient0-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575135" comment="samba-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575136" comment="samba-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575137" comment="samba-client-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575138" comment="samba-client-32bit-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575139" comment="samba-krb-printing-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575140" comment="samba-winbind-3.4.3-70.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575141" comment="samba-winbind-32bit-3.4.3-70.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39599" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575142" comment="cifs-mount-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575143" comment="ldapsmb-1.34b-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575144" comment="libsmbclient0-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575145" comment="libsmbclient0-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575146" comment="libtalloc1-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575147" comment="libtalloc1-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575148" comment="libtdb1-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575149" comment="libtdb1-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575150" comment="libwbclient0-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575151" comment="libwbclient0-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575152" comment="samba-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575153" comment="samba-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575154" comment="samba-client-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575155" comment="samba-client-32bit-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575156" comment="samba-krb-printing-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575157" comment="samba-winbind-3.4.3-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575158" comment="samba-winbind-32bit-3.4.3-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39600" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575159" comment="cifs-mount-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575160" comment="ldapsmb-1.34b-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575161" comment="libsmbclient0-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575162" comment="libsmbclient0-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575163" comment="libtalloc1-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575164" comment="libtalloc1-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575165" comment="libtdb1-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575166" comment="libtdb1-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575167" comment="libwbclient0-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575168" comment="libwbclient0-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575169" comment="samba-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575170" comment="samba-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575171" comment="samba-client-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575172" comment="samba-client-32bit-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575173" comment="samba-krb-printing-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575174" comment="samba-winbind-3.4.3-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575175" comment="samba-winbind-32bit-3.4.3-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39601" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="1196717" ref_url="https://bugzilla.suse.com/1196717" source="BUGZILLA"/>
		<reference ref_id="577868" ref_url="https://bugzilla.suse.com/577868" source="BUGZILLA"/>
		<reference ref_id="656867" ref_url="https://bugzilla.suse.com/656867" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-25717: A user in an AD Domain could become root on domain members (bsc#1192284).
- Added missing man page updates
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-17"/>
	<updated date="2022-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196717">SUSE bug 1196717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656867">SUSE bug 656867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672778" comment="cifs-mount-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672779" comment="ldapsmb-1.34b-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672780" comment="libsmbclient0-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672781" comment="libsmbclient0-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672782" comment="libtalloc1-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672783" comment="libtalloc1-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672784" comment="libtdb1-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672785" comment="libtdb1-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672786" comment="libwbclient0-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672787" comment="libwbclient0-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672788" comment="samba-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672789" comment="samba-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672790" comment="samba-client-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672791" comment="samba-client-32bit-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672792" comment="samba-krb-printing-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672793" comment="samba-winbind-3.4.3-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672794" comment="samba-winbind-32bit-3.4.3-70.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39602" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575176" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39603" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575177" comment="sblim-sfcb-1.3.7-0.21.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39604" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575178" comment="screen-4.0.2-162.19.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39605" version="1" class="patch">
	<metadata>
		<title>Security update for socat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="627475" ref_url="https://bugzilla.suse.com/627475" source="BUGZILLA"/>
		<reference ref_id="759859" ref_url="https://bugzilla.suse.com/759859" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2799" ref_url="https://www.suse.com/security/cve/CVE-2010-2799/" source="CVE"/>
		<reference ref_id="CVE-2012-0219" ref_url="https://www.suse.com/security/cve/CVE-2012-0219/" source="CVE"/>
		<description>

This update fixes two small security issues in socat:

    * Fixed a stack overflow in commandline parsing (bnc#627475 /
      CVE-2010-2799) Only exploitable if an attacker can control the
      commandline parameters.
    * Fixed heap overflow in READLINE output mode (bnc#759859 /
      CVE-2012-0219)

Security Issue references:

    * CVE-2012-0219
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0219&gt;
    * CVE-2010-2799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2799&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-11"/>
	<updated date="2012-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/627475">SUSE bug 627475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759859">SUSE bug 759859</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2799/">CVE-2010-2799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0219/">CVE-2012-0219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575179" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575179" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575179" comment="socat-1.7.0.0-1.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39606" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575180" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39607" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656593" comment="libspeex-1.1.99.91-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656594" comment="libspeex-32bit-1.1.99.91-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39608" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2019-8457: Fixed an heap out-of-bound read in the rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-10"/>
	<updated date="2019-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575181" comment="libsqlite3-0-3.6.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575182" comment="libsqlite3-0-32bit-3.6.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575183" comment="sqlite3-3.6.4-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39609" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).	  
- CVE-2018-8740: Fixed a null pointer dereference caused when CREATE
  TABLE AS statement is used (bsc#1085790).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575184" comment="libsqlite3-0-3.6.4-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575185" comment="libsqlite3-0-32bit-3.6.4-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575186" comment="sqlite3-3.6.4-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39610" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="587375" ref_url="https://bugzilla.suse.com/587375" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0639" ref_url="https://www.suse.com/security/cve/CVE-2010-0639/" source="CVE"/>
		<description>

This update fixes the following security issue:

    * 587375: squid NULL deref via HTCP request (CVE-2010-0639)

Security Issue reference:

    * CVE-2010-0639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0639&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-22"/>
	<updated date="2011-12-22"/>
	<bugzilla href="https://bugzilla.suse.com/587375">SUSE bug 587375</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0639/">CVE-2010-0639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575187" comment="squid-2.7.STABLE5-2.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575187" comment="squid-2.7.STABLE5-2.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39611" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<description>
squid was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-6270: Fixed an off by one in snmp subsystem (bsc#895773).
- CVE-2014-9749: Fixed a nonce replay vulnerability in Digest authentication (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-13"/>
	<updated date="2015-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575188" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39612" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-4051: backport fix buffer overflow in cachemgr.cgi (bsc#976553)
- CVE-2016-4554: backport fix for header smuggling issue in HTTP Request processing (bsc#979010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575189" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39613" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575190" comment="squid-2.7.STABLE5-2.12.30.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39614" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670261" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39615" version="1" class="patch">
	<metadata>
		<title>Security update for squid3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="727492" ref_url="https://bugzilla.suse.com/727492" source="BUGZILLA"/>
		<reference ref_id="737905" ref_url="https://bugzilla.suse.com/737905" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<description>

This update fixes the following security issue:

    * 727492: Invalid free by processing CNAME (CVE-2011-4096)

It also fixes the following non-security issue:

    * 737905: installation creates empty spurious file '/1'

Security Issue reference:

    * CVE-2011-4096
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4096&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-12-22"/>
	<updated date="2011-12-22"/>
	<bugzilla href="https://bugzilla.suse.com/727492">SUSE bug 727492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/737905">SUSE bug 737905</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575191" comment="squid3-3.1.12-8.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575191" comment="squid3-3.1.12-8.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39616" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="902197" ref_url="https://bugzilla.suse.com/902197" source="BUGZILLA"/>
		<reference ref_id="938715" ref_url="https://bugzilla.suse.com/938715" source="BUGZILLA"/>
		<reference ref_id="963539" ref_url="https://bugzilla.suse.com/963539" source="BUGZILLA"/>
		<reference ref_id="967011" ref_url="https://bugzilla.suse.com/967011" source="BUGZILLA"/>
		<reference ref_id="968392" ref_url="https://bugzilla.suse.com/968392" source="BUGZILLA"/>
		<reference ref_id="968393" ref_url="https://bugzilla.suse.com/968393" source="BUGZILLA"/>
		<reference ref_id="968394" ref_url="https://bugzilla.suse.com/968394" source="BUGZILLA"/>
		<reference ref_id="968395" ref_url="https://bugzilla.suse.com/968395" source="BUGZILLA"/>
		<reference ref_id="973782" ref_url="https://bugzilla.suse.com/973782" source="BUGZILLA"/>
		<reference ref_id="973783" ref_url="https://bugzilla.suse.com/973783" source="BUGZILLA"/>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="976556" ref_url="https://bugzilla.suse.com/976556" source="BUGZILLA"/>
		<reference ref_id="976708" ref_url="https://bugzilla.suse.com/976708" source="BUGZILLA"/>
		<reference ref_id="979008" ref_url="https://bugzilla.suse.com/979008" source="BUGZILLA"/>
		<reference ref_id="979009" ref_url="https://bugzilla.suse.com/979009" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="979011" ref_url="https://bugzilla.suse.com/979011" source="BUGZILLA"/>
		<reference ref_id="993299" ref_url="https://bugzilla.suse.com/993299" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>


This update for squid3 fixes the following issues:

- Multiple issues in pinger ICMP processing.  (CVE-2014-7141, CVE-2014-7142) 

- CVE-2016-3947: Buffer overrun issue in pinger
    ICMPv6 processing. (bsc#973782)

-  CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response processing.
    (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572,
     bsc#968392, bsc#968393, bsc#968394, bsc#968395)
- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
  * fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

- Memory leak in squid3 when using external_acl (bsc#976708)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902197">SUSE bug 902197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963539">SUSE bug 963539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976708">SUSE bug 976708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575192" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39617" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<description>

This update for squid3 fixes the following issues:

- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168)
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575193" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39618" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575194" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39619" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2018-1172: Fixed a DoS caused by incorrect handling of ESI responses. (bsc#1090089, SQUID-2018:3)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575195" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39620" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issue fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575196" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39621" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575197" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39622" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575198" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39623" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671855" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39624" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<description>
squidGuard was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575199" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575200" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39625" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="761325" ref_url="https://bugzilla.suse.com/761325" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<description>

This update fixed a security issue in strongswan's 'gmp' plugin which could 
be exploited by attackers to forge RSA signature/certificate to 
authenticate as any legitimate user (CVE-2012-2388
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2388&gt; ).

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-23"/>
	<updated date="2012-05-23"/>
	<bugzilla href="https://bugzilla.suse.com/761325">SUSE bug 761325</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575201" comment="strongswan-4.4.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575202" comment="strongswan-doc-4.4.0-6.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575201" comment="strongswan-4.4.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575202" comment="strongswan-doc-4.4.0-6.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575201" comment="strongswan-4.4.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575202" comment="strongswan-doc-4.4.0-6.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575201" comment="strongswan-4.4.0-6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575202" comment="strongswan-doc-4.4.0-6.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39626" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575203" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575204" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39627" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575205" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575206" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39628" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575207" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575208" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39629" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-30"/>
	<updated date="2019-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575209" comment="strongswan-4.4.0-6.36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575210" comment="strongswan-doc-4.4.0-6.36.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39630" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652840" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652841" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39631" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664947" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664948" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39632" version="1" class="patch">
	<metadata>
		<title>Security update for sudo, sudo-debuginfo, sudo-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="739214" ref_url="https://bugzilla.suse.com/739214" source="BUGZILLA"/>
		<reference ref_id="762327" ref_url="https://bugzilla.suse.com/762327" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<description>

This update fixes a security problem in sudo:

Multiple netmask values used in Host / Host_List configuration caused any 
host to be allowed access. (CVE-2012-2337)

Also a bug in wildcard matching could allow too relaxed matches within 
subdirectories of the specified path so /usr/bin/* would also match 
/usr/bin/X11/*, which is probably not intended. The behaviour was aligned 
to the one described in the sudoers manpage

Security Issues:

    * CVE-2012-2337
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-05-17"/>
	<updated date="2012-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/739214">SUSE bug 739214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762327">SUSE bug 762327</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575211" comment="sudo-1.7.6p2-0.2.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575211" comment="sudo-1.7.6p2-0.2.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575211" comment="sudo-1.7.6p2-0.2.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575211" comment="sudo-1.7.6p2-0.2.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39633" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="823292" ref_url="https://bugzilla.suse.com/823292" source="BUGZILLA"/>
		<reference ref_id="823796" ref_url="https://bugzilla.suse.com/823796" source="BUGZILLA"/>
		<reference ref_id="917806" ref_url="https://bugzilla.suse.com/917806" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<description>

This update for sudo fixes the following issues:

Security issues:
- CVE-2016-7032: noexec bypass via system() and popen(). (bsc#1007766)
- CVE-2016-7076: noexec bypass via wordexp(). (bsc#1007501)
- CVE-2014-9680: unsafe handling of TZ environment variable. (bsc#917806)

Bug fixes:
- bsc#823292: Fix the default flag settings in manual page to reflect changes caused
  by sudoers patch.
- bsc#823796: Escape the command args for 'sudo -i' and 'sudo -s'.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823292">SUSE bug 823292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823796">SUSE bug 823796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575212" comment="sudo-1.7.6p2-0.2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39634" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issue:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-21"/>
	<updated date="2019-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575213" comment="sudo-1.7.6p2-0.2.21.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39635" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575214" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39636" version="1" class="patch">
	<metadata>
		<title>Security update for system-config-printer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="783488" ref_url="https://bugzilla.suse.com/783488" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
This update for system-config-printer fixes the following issues:

Security issue fixed:

- CVE-2012-4510: Fixed an issue in the CUPS PolicyKit helper that allowed attackers, with user assistance, to overwrite specific files or upload sensitive data to a CUPS resource (bsc#783488).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/783488">SUSE bug 783488</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575215" comment="system-config-printer-1.0.8-9.18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575216" comment="system-config-printer-lang-1.0.8-9.18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39637" version="1" class="patch">
	<metadata>
		<title>Security update for t1lib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="684802" ref_url="https://bugzilla.suse.com/684802" source="BUGZILLA"/>
		<reference ref_id="757961" ref_url="https://bugzilla.suse.com/757961" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0433" ref_url="https://www.suse.com/security/cve/CVE-2011-0433/" source="CVE"/>
		<reference ref_id="CVE-2011-0764" ref_url="https://www.suse.com/security/cve/CVE-2011-0764/" source="CVE"/>
		<reference ref_id="CVE-2011-1552" ref_url="https://www.suse.com/security/cve/CVE-2011-1552/" source="CVE"/>
		<reference ref_id="CVE-2011-1553" ref_url="https://www.suse.com/security/cve/CVE-2011-1553/" source="CVE"/>
		<reference ref_id="CVE-2011-1554" ref_url="https://www.suse.com/security/cve/CVE-2011-1554/" source="CVE"/>
		<description>

This update of t1lib fixes memory corruptions and a heap-based overflow in 
the afm font parser.

Security Issue references:

    * CVE-2011-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764&gt;
    * CVE-2011-1552
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552&gt;
    * CVE-2011-1553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553&gt;
    * CVE-2011-1554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554&gt;
    * CVE-2011-0433
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-23"/>
	<updated date="2012-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/684802">SUSE bug 684802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757961">SUSE bug 757961</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0433/">CVE-2011-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0764/">CVE-2011-0764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1552/">CVE-2011-1552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1553/">CVE-2011-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1554/">CVE-2011-1554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575217" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575217" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575217" comment="t1lib-5.1.1-100.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39638" version="1" class="patch">
	<metadata>
		<title>Security update for taglib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="750690" ref_url="https://bugzilla.suse.com/750690" source="BUGZILLA"/>
		<reference ref_id="750691" ref_url="https://bugzilla.suse.com/750691" source="BUGZILLA"/>
		<reference ref_id="750693" ref_url="https://bugzilla.suse.com/750693" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1108" ref_url="https://www.suse.com/security/cve/CVE-2012-1108/" source="CVE"/>
		<reference ref_id="CVE-2012-1584" ref_url="https://www.suse.com/security/cve/CVE-2012-1584/" source="CVE"/>
		<description>

The following issue has been fixed:

    * specially crafted ogg files could have crashed taglib

Security Issue references:

    * CVE-2012-1108
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1108&gt;
    * CVE-2012-1584
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1584&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-17"/>
	<updated date="2012-04-17"/>
	<bugzilla href="https://bugzilla.suse.com/750690">SUSE bug 750690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750691">SUSE bug 750691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750693">SUSE bug 750693</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1108/">CVE-2012-1108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1584/">CVE-2012-1584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575218" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575219" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575220" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575218" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575219" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575220" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575218" comment="taglib-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575219" comment="taglib-32bit-1.5-19.23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575220" comment="taglib-x86-1.5-19.23.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39639" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked
  into extracting files and directories in the given destination, regardless
  of the path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575221" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39640" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575222" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39641" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575223" comment="tar-1.27.1-14.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39642" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<description>

When running tcpdump, a remote unauthenticated user could have crashed the 
application or, potentially, execute arbitrary code by injecting crafted 
packages into the network.

The following vulnerabilities in protocol printers have been fixed:

    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

    * CVE-2015-0261
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261&gt;
    * CVE-2015-2154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154&gt;
    * CVE-2014-9140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575224" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39643" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>

This update for tcpdump fixes the following issues:

Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). 
- CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575225" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39644" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
- CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
- CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
- CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
- CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575226" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39645" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575227" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39646" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1178466" ref_url="https://bugzilla.suse.com/1178466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575228" comment="tcpdump-3.9.8-1.30.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39647" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668244" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39648" version="1" class="patch">
	<metadata>
		<title>Security update for tftp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="699714" ref_url="https://bugzilla.suse.com/699714" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>

Malicious clients could overflow a buffer in tftpd by specifying a large 
value for the utimeout option (CVE-2011-2199).

Security Issue reference:

    * CVE-2011-2199
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-06-24"/>
	<updated date="2011-06-24"/>
	<bugzilla href="https://bugzilla.suse.com/699714">SUSE bug 699714</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575229" comment="tftp-0.48-101.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575229" comment="tftp-0.48-101.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39649" version="1" class="patch">
	<metadata>
		<title>Security update for tgt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="513934" ref_url="https://bugzilla.suse.com/513934" source="BUGZILLA"/>
		<reference ref_id="598927" ref_url="https://bugzilla.suse.com/598927" source="BUGZILLA"/>
		<reference ref_id="633111" ref_url="https://bugzilla.suse.com/633111" source="BUGZILLA"/>
		<reference ref_id="665415" ref_url="https://bugzilla.suse.com/665415" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0001" ref_url="https://www.suse.com/security/cve/CVE-2011-0001/" source="CVE"/>
		<description>

This update of tgt fixes multiple bugs:

    * tgtadm user unbind broken [bnc#633111]
    * iscsitarget package not supported [bnc#513934]
    * iscsitarget vs. tgt (and /etc/ietd.conf) [bnc#598927]
    * tgt fix double free() flaw [bnc#665415, CVE-2011-0001]

Security Issue reference:

    * CVE-2011-0001
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0001&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-04-18"/>
	<updated date="2011-04-18"/>
	<bugzilla href="https://bugzilla.suse.com/513934">SUSE bug 513934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/598927">SUSE bug 598927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633111">SUSE bug 633111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665415">SUSE bug 665415</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0001/">CVE-2011-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575230" comment="tgt-0.9.10-0.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575230" comment="tgt-0.9.10-0.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39650" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575231" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575232" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39651" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575233" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575234" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39652" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575235" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575236" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575237" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39653" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575238" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575239" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575240" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39654" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575241" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575242" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575243" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39655" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575244" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575245" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575246" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39656" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575247" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575248" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575249" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39657" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575250" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575251" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575252" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39658" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575253" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575254" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575255" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39659" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575256" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575257" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575258" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39660" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575259" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575260" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575261" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39661" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666461" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666462" comment="libtiff3-32bit-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666463" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39662" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575262" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39663" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issue:

- CVE-2016-5388 Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39664" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="735343" ref_url="https://bugzilla.suse.com/735343" source="BUGZILLA"/>
		<reference ref_id="742477" ref_url="https://bugzilla.suse.com/742477" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1184" ref_url="https://www.suse.com/security/cve/CVE-2011-1184/" source="CVE"/>
		<reference ref_id="CVE-2011-5062" ref_url="https://www.suse.com/security/cve/CVE-2011-5062/" source="CVE"/>
		<reference ref_id="CVE-2011-5063" ref_url="https://www.suse.com/security/cve/CVE-2011-5063/" source="CVE"/>
		<reference ref_id="CVE-2011-5064" ref_url="https://www.suse.com/security/cve/CVE-2011-5064/" source="CVE"/>
		<description>

This update fixes a regression in parameter passing (in urldecoding of 
parameters that contain spaces).

In addition, multiple weaknesses in HTTP DIGESTS have been fixed 
(CVE-2011-1184):

    * CVE-2011-5062: The HTTP Digest Access Authentication implementation
      in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33 and 7.x
      before 7.0.12 does not check qop values, which might allow remote
      attackers to bypass intended integrity-protection requirements via a
      qop=auth value, a different vulnerability than CVE-2011-1184.
    * CVE-2011-5063: The HTTP Digest Access Authentication implementation
      in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x
      before 7.0.12 does not check realm values, which might allow remote
      attackers to bypass intended access restrictions by leveraging the
      availability of a protection space with weaker authentication or
      authorization requirements, a different vulnerability than
      CVE-2011-1184.
    * CVE-2011-5064: DigestAuthenticator.java in the HTTP Digest Access
      Authentication implementation in Apache Tomcat 5.5.x before 5.5.34,
      6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the
      hard-coded server secret (aka private key), which makes it easier for
      remote attackers to bypass cryptographic protection mechanisms by
      leveraging knowledge of this string, a different vulnerability than
      CVE-2011-1184.

Security Issue references:

    * CVE-2011-1184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1184&gt;
    * CVE-2011-5062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5062&gt;
    * CVE-2011-5063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5063&gt;
    * CVE-2011-5064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-06"/>
	<updated date="2012-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/735343">SUSE bug 735343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742477">SUSE bug 742477</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1184/">CVE-2011-1184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5062/">CVE-2011-5062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5063/">CVE-2011-5063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5064/">CVE-2011-5064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575271" comment="tomcat6-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575272" comment="tomcat6-admin-webapps-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575273" comment="tomcat6-docs-webapp-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575274" comment="tomcat6-javadoc-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575275" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575276" comment="tomcat6-lib-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575277" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575278" comment="tomcat6-webapps-6.0.18-20.35.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575271" comment="tomcat6-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575272" comment="tomcat6-admin-webapps-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575273" comment="tomcat6-docs-webapp-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575274" comment="tomcat6-javadoc-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575275" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575276" comment="tomcat6-lib-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575277" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575278" comment="tomcat6-webapps-6.0.18-20.35.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39665" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="967815" ref_url="https://bugzilla.suse.com/967815" source="BUGZILLA"/>
		<reference ref_id="967964" ref_url="https://bugzilla.suse.com/967964" source="BUGZILLA"/>
		<reference ref_id="967965" ref_url="https://bugzilla.suse.com/967965" source="BUGZILLA"/>
		<reference ref_id="967967" ref_url="https://bugzilla.suse.com/967967" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39666" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39667" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following security issues:

- : The error page mechanism of the Java Servlet Specification
  requires that, when an error occurs and an error page is configured for the
  error that occurred, the original request and response are forwarded to the
  error page. This means that the request is presented to the error page with the
  original HTTP method. If the error page is a static file, expected behaviour is
  to serve content of the file as if processing a GET request, regardless of the
  actual HTTP method. The Default Servlet in Tomcat did not do this. Depending on
  the original request this could lead to unexpected and undesirable results for
  static error pages including, if the DefaultServlet is configured to permit
  writes, the replacement or removal of the custom error page (bsc#1042910).
- : The URL pattern of '' was not correctly handled when used as
  part of a security constraint definition. This caused the constraint to be
  ignored. It was possible for unauthorised users to gain access to web
  application resources that should have been protected. Only security
  constraints with a URL pattern of the empty string were affected (bsc#1082480).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39668" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issue:

Security issue fixed:

- CVE-2018-11784: Fixed problem with specially crafted URLs that could be used to cause a redirect to any URI of an attackers choise (bsc#1110850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39669" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39670" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39671" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39672" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575303" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39673" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106531" ref_url="https://bugzilla.suse.com/1106531" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2018-16140: Fixed a buffer underwrite vulnerability in get_line() in
  read.c, which allowed an attacker to write prior to the beginning of the
  buffer via specially crafted .fig file (bsc#1106531)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1106531">SUSE bug 1106531</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575304" comment="transfig-3.2.5-160.6.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39674" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651176" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39675" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653706" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39676" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575305" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39677" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="513804" ref_url="https://bugzilla.suse.com/513804" source="BUGZILLA"/>
		<reference ref_id="693890" ref_url="https://bugzilla.suse.com/693890" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions 
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Added libunrar* and libunrar*-devel subpackages (bsc#513804)
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513804">SUSE bug 513804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693890">SUSE bug 693890</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575306" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39678" version="1" class="patch">
	<metadata>
		<title>Security update for unzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * CVE-2014-8139: input sanitization errors (bnc#909214)
    * CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
      (bnc#914442)

Security Issues:

    * CVE-2014-9636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636&gt;
    * CVE-2014-8139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575307" comment="unzip-5.52-142.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39679" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575308" comment="unzip-5.52-142.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39680" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575309" comment="unzip-5.52-142.34.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39681" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed buffer overflow when listing archives (bsc#1110194)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575310" comment="unzip-5.52-142.34.8.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39682" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1196175" ref_url="https://bugzilla.suse.com/1196175" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4217" ref_url="https://www.suse.com/security/cve/CVE-2021-4217/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2021-4217: Fixed null pointer dereference in Unicode strings code (bsc#1196175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196175">SUSE bug 1196175</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4217/">CVE-2021-4217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669728" comment="unzip-5.52-142.34.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39683" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="635393" ref_url="https://bugzilla.suse.com/635393" source="BUGZILLA"/>
		<reference ref_id="651598" ref_url="https://bugzilla.suse.com/651598" source="BUGZILLA"/>
		<reference ref_id="663385" ref_url="https://bugzilla.suse.com/663385" source="BUGZILLA"/>
		<reference ref_id="666893" ref_url="https://bugzilla.suse.com/666893" source="BUGZILLA"/>
		<reference ref_id="667215" ref_url="https://bugzilla.suse.com/667215" source="BUGZILLA"/>
		<reference ref_id="668820" ref_url="https://bugzilla.suse.com/668820" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3879" ref_url="https://www.suse.com/security/cve/CVE-2010-3879/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-0543" ref_url="https://www.suse.com/security/cve/CVE-2011-0543/" source="CVE"/>
		<description>

The following security issues were fixed:

    * CVE-2010-3879: FUSE allowed local users to create mtab entries with
      arbitrary pathnames, and consequently unmount any filesystem, via a
      symlink attack on the parent directory of the mountpoint of a FUSE
      filesystem.
    * CVE-2011-0541: Avoid mounting a directory including evaluation of
      symlinks, which might have allowed local attackers to mount
      filesystems anywhere in the system.
    * CVE-2011-0543: Avoid symlink attacks on the mount point written in
      the mtab file.

Four bugs were fixed:

    * fixed retrying nfs mounts on rpc timeouts
    * allow seperate control of the internet protocol uses by rpc.mount
      seperately of the protocol used by nfs.
    * Fixed locking in libuuid/uuid to avoid duplicate uuids.
    * mkswap bad block check marked every block bad in O(n!) time on a good
      device

New features were implemented:

    * mount now has --fake and --no-canonicalize options, required for the
      symlink security fixes. These were backported from mainline.
    * mount can now auto-detect and differentiate between squashfs3 and
      squashfs (v4) filesystems, allowing backward compatibility to the
      SUSE Linux Enterprise 11 GA codebase.

Security Issues:

    * CVE-2010-3879
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3879&gt;
    * CVE-2011-0541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541&gt;
    * CVE-2011-0543
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0543&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-03-03"/>
	<updated date="2011-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/635393">SUSE bug 635393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651598">SUSE bug 651598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663385">SUSE bug 663385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/666893">SUSE bug 666893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667215">SUSE bug 667215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668820">SUSE bug 668820</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3879/">CVE-2010-3879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0543/">CVE-2011-0543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575311" comment="fuse-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575312" comment="libblkid1-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575313" comment="libfuse2-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575314" comment="libuuid1-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575315" comment="libuuid1-32bit-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575316" comment="libuuid1-x86-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575317" comment="util-linux-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575318" comment="util-linux-lang-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575319" comment="uuid-runtime-2.16-6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575311" comment="fuse-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575312" comment="libblkid1-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575313" comment="libfuse2-2.7.2-61.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575314" comment="libuuid1-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575315" comment="libuuid1-32bit-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575316" comment="libuuid1-x86-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575317" comment="util-linux-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575318" comment="util-linux-lang-2.16-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575319" comment="uuid-runtime-2.16-6.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39684" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
  (bsc#1010685)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575320" comment="gvim-7.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575321" comment="vim-7.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575322" comment="vim-base-7.2-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575323" comment="vim-data-7.2-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39685" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<description>

This update for vim fixes the following issues:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-18"/>
	<updated date="2017-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575324" comment="gvim-7.2-13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575325" comment="vim-7.2-13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575326" comment="vim-base-7.2-13.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575327" comment="vim-data-7.2-13.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39686" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575328" comment="gvim-7.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575329" comment="vim-7.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575330" comment="vim-base-7.2-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575331" comment="vim-data-7.2-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39687" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-02"/>
	<updated date="2020-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575332" comment="gvim-7.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575333" comment="vim-7.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575334" comment="vim-base-7.2-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575335" comment="vim-data-7.2-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39688" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="691207" ref_url="https://bugzilla.suse.com/691207" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<description>

This security update fixes two out-of-bounds memory access vulnerabilities 
in vinos' libvncserver. (CVE-2011-0904
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904&gt; , 
CVE-2011-0905 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905&gt; 
)

Additionally, another possible server crash has been fixed. (bln440712)

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-18"/>
	<updated date="2011-05-18"/>
	<bugzilla href="https://bugzilla.suse.com/691207">SUSE bug 691207</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575336" comment="vino-2.28.1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575337" comment="vino-lang-2.28.1-2.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575336" comment="vino-2.28.1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575337" comment="vino-lang-2.28.1-2.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39689" version="1" class="patch">
	<metadata>
		<title>Security update for vino (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
This update for vino fixes the following issues:
	  
- CVE-2019-15681: Fixed a memory leak which could have allowed to a 
  remote attacker to read stack memory (bsc#1155419).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575338" comment="vino-2.28.1-2.5.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575339" comment="vino-lang-2.28.1-2.5.3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39690" version="1" class="patch">
	<metadata>
		<title>Security update for vte, vte-debuginfo, vte-debugsource, vte-devel, vte-doc, vte-lang</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="621097" ref_url="https://bugzilla.suse.com/621097" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2713" ref_url="https://www.suse.com/security/cve/CVE-2010-2713/" source="CVE"/>
		<description>

This update fixes a vulnerability of VTE to an old title set and query 
attack which could be used by remote attackers to execute arbitrary code (
CVE-2010-2713 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2713&gt; 
).

		</description>
<advisory from="security@suse.de">
	<issued date="2010-07-15"/>
	<updated date="2010-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/621097">SUSE bug 621097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2713/">CVE-2010-2713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575340" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575341" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575342" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575340" comment="vte-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575341" comment="vte-doc-0.22.5-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575342" comment="vte-lang-0.22.5-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39691" version="1" class="patch">
	<metadata>
		<title>Security update for w3m</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="609451" ref_url="https://bugzilla.suse.com/609451" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<description>

w3m does not handle embedded NUL characters in the common name and in 
subject alternative names of X.509 certificates (CVE-2010-2074
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074&gt; ). This 
update fixes the issue and also turns on verification of x509 certificates 
by default which was not the case before.

		</description>
<advisory from="security@suse.de">
	<issued date="2010-06-17"/>
	<updated date="2010-06-17"/>
	<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575343" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575343" comment="w3m-0.5.2-132.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39692" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1011269" ref_url="https://bugzilla.suse.com/1011269" source="BUGZILLA"/>
		<reference ref_id="1011270" ref_url="https://bugzilla.suse.com/1011270" source="BUGZILLA"/>
		<reference ref_id="1011271" ref_url="https://bugzilla.suse.com/1011271" source="BUGZILLA"/>
		<reference ref_id="1011272" ref_url="https://bugzilla.suse.com/1011272" source="BUGZILLA"/>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012020" ref_url="https://bugzilla.suse.com/1012020" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2016-9422" ref_url="https://www.suse.com/security/cve/CVE-2016-9422/" source="CVE"/>
		<reference ref_id="CVE-2016-9423" ref_url="https://www.suse.com/security/cve/CVE-2016-9423/" source="CVE"/>
		<reference ref_id="CVE-2016-9424" ref_url="https://www.suse.com/security/cve/CVE-2016-9424/" source="CVE"/>
		<reference ref_id="CVE-2016-9425" ref_url="https://www.suse.com/security/cve/CVE-2016-9425/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020)
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9422/">CVE-2016-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9423/">CVE-2016-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9424/">CVE-2016-9424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9425/">CVE-2016-9425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575344" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39693" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575345" comment="w3m-0.5.3.git20161120-5.3.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39694" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575346" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39695" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575347" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39696" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575348" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39697" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget has been updated to fix one security issue and two non-security 
issues.

This security issue has been fixed:

    * FTP symlink arbitrary filesystem access (CVE-2014-4877).

These non-security issues have been fixed:

    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575349" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575349" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39698" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575350" comment="wget-1.11.4-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575351" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39699" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575352" comment="wget-1.11.4-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575353" comment="wget-openssl1-1.11.4-1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39700" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575354" comment="wget-1.11.4-1.41.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575355" comment="wget-openssl1-1.11.4-1.41.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39701" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="763855" ref_url="https://bugzilla.suse.com/763855" source="BUGZILLA"/>
		<reference ref_id="763857" ref_url="https://bugzilla.suse.com/763857" source="BUGZILLA"/>
		<reference ref_id="763859" ref_url="https://bugzilla.suse.com/763859" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<description>

This version upgrade of wireshark fixes multiple denial of service flaws:

    * CVE-2012-2394: denial of service via memory alignment flaw
    * CVE-2012-2393: DIAMETER memory allocation flaw
    * CVE-2012-2392: denial of service in multiple dissectors / parsers

Additionally, various other non-security bug fixes were introduced.

Security Issue references:

    * CVE-2012-2392
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392&gt;
    * CVE-2012-2393
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393&gt;
    * CVE-2012-2394
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-04"/>
	<updated date="2012-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763857">SUSE bug 763857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763859">SUSE bug 763859</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575356" comment="wireshark-1.4.13-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575356" comment="wireshark-1.4.13-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575356" comment="wireshark-1.4.13-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39702" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575357" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39703" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575358" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39704" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575359" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39705" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575360" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39706" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575361" comment="libcares2-1.7.4-7.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575362" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575363" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39707" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575364" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575365" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39708" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575366" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575367" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39709" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575368" comment="libjack0-0.109.2-67.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575369" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575370" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575371" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575372" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575373" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575374" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575375" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575376" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39710" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575377" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575378" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575379" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575380" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575381" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575382" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39711" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575383" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575384" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575385" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575386" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575387" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575388" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39712" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575389" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575390" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575391" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575392" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575393" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575394" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39713" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575395" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575396" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575397" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575398" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575399" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575400" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39714" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575401" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575402" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575403" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575404" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575405" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575406" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39715" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="868937" ref_url="https://bugzilla.suse.com/868937" source="BUGZILLA"/>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>

This update fixes a remote code execution vulnerability in wpa_supplicant's 
wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this 
issue.

Additionally, password based authentication with PKCS#5v2 has been enabled.

Security Issues:

    * CVE-2014-3686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-15"/>
	<updated date="2014-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/868937">SUSE bug 868937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575407" comment="wpa_supplicant-0.6.9-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39716" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39717" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777628" ref_url="https://bugzilla.suse.com/777628" source="BUGZILLA"/>
		<reference ref_id="789944" ref_url="https://bugzilla.suse.com/789944" source="BUGZILLA"/>
		<reference ref_id="789945" ref_url="https://bugzilla.suse.com/789945" source="BUGZILLA"/>
		<reference ref_id="789948" ref_url="https://bugzilla.suse.com/789948" source="BUGZILLA"/>
		<reference ref_id="789950" ref_url="https://bugzilla.suse.com/789950" source="BUGZILLA"/>
		<reference ref_id="789951" ref_url="https://bugzilla.suse.com/789951" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00022.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues in Xen:

    * CVE-2012-5510: Grant table version switch list corruption
      vulnerability (XSA-26)
    * CVE-2012-5511: Several HVM operations do not validate the range of
      their inputs (XSA-27)
    * CVE-2012-5513: XENMEM_exchange may overwrite hypervisor memory
      (XSA-29)
    * CVE-2012-5514: Missing unlock in
      guest_physmap_mark_populate_on_demand() (XSA-30)
    * CVE-2012-5515: Several memory hypercall operations allow invalid
      extent order values (XSA-31)

Also the following fix has been applied:

    * bnc#777628 - guest 'disappears' after live migration
      Updated block-dmmd script

Security Issues references:

    * CVE-2012-5513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513&gt;
    * CVE-2012-5514
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514&gt;
    * CVE-2012-5511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511&gt;
    * CVE-2012-5510
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510&gt;
    * CVE-2012-5515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-22"/>
	<updated date="2012-11-22"/>
	<bugzilla href="https://bugzilla.suse.com/777628">SUSE bug 777628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590281" comment="xen-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590282" comment="xen-doc-html-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590283" comment="xen-doc-pdf-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590284" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575412" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590285" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590286" comment="xen-libs-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590287" comment="xen-tools-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590288" comment="xen-tools-domU-4.0.3_21548_12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009590281" comment="xen-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590282" comment="xen-doc-html-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590283" comment="xen-doc-pdf-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590284" comment="xen-kmp-default-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575412" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590285" comment="xen-kmp-trace-4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590286" comment="xen-libs-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590287" comment="xen-tools-4.0.3_21548_12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009590288" comment="xen-tools-domU-4.0.3_21548_12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39718" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix the following security issues:

* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (XSA-140, bsc#939712)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575417" comment="xen-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575418" comment="xen-doc-html-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575419" comment="xen-doc-pdf-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575420" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575421" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575422" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575423" comment="xen-libs-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575424" comment="xen-tools-4.0.3_21548_18-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575425" comment="xen-tools-domU-4.0.3_21548_18-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39719" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<description>

Xen was updated to fix the following security issues:

* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (XSA-140, bsc#939712)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575426" comment="xen-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575427" comment="xen-doc-html-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575428" comment="xen-doc-pdf-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575429" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575430" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575431" comment="xen-libs-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575432" comment="xen-tools-4.0.3_21548_18-27.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575433" comment="xen-tools-domU-4.0.3_21548_18-27.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39720" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<description>
xen was updated to fix eight security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575434" comment="xen-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575435" comment="xen-doc-html-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575436" comment="xen-doc-pdf-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575437" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575438" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575439" comment="xen-libs-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575440" comment="xen-tools-4.0.3_21548_18-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575441" comment="xen-tools-domU-4.0.3_21548_18-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39721" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="969351" ref_url="https://bugzilla.suse.com/969351" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<description>
xen was updated to fix 41 security issues.

These security issues were fixed:
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bnc#932267).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bnc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5307: The KVM subsystem allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-6815: e1000: infinite loop issue (bnc#944697).
- CVE-2015-7504: Heap buffer overflow vulnerability in pcnet emulator (XSA-162) (bnc#956411).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7835: The mod_l2_entry function in arch/x86/mm.c did not properly validate level 2 page table entries, which allowed local PV guest administrators to gain privileges via a crafted superpage mapping (bnc#950367).
- CVE-2015-7969: Multiple memory leaks allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bnc#950703).
- CVE-2015-7969: Multiple memory leaks allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bnc#950703).
- CVE-2015-7970: The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c was not preemptible, which allowed local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a 'time-consuming linear scan,' related to Populate-on-Demand (bnc#950704).
- CVE-2015-7971: There was no limit on the number of printk console messages when logging certain pmu and profiling hypercalls, which allowed local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c (bnc#950706).
- CVE-2015-7972: The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c did not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allowed local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to 'heavy memory pressure (bnc#951845).
- CVE-2015-8104: The KVM subsystem allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-8339: The memory_exchange function in common/memory.c did not properly hand back pages to a domain, which might allowed guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown (bnc#956408).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

This non-security issue was fixed:
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575442" comment="xen-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575443" comment="xen-doc-html-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575444" comment="xen-doc-pdf-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575445" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575446" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575447" comment="xen-libs-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575448" comment="xen-tools-4.0.3_21548_18-36.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575449" comment="xen-tools-domU-4.0.3_21548_18-36.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39722" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="969351" ref_url="https://bugzilla.suse.com/969351" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
- CVE-2016-2841: The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control (bsc#969351).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967101).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX in Xen, when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#965112).
- CVE-2015-5278: Infinite loop in ne2000_receive() function allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#964947).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#964644).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#964925).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#964452).
- CVE-2016-1981: A:infinite loop in start_xmit and e1000_receive_iov routines allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#963783).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#962758).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#962642).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#962627).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#962611).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#962335).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#962360).
- CVE-2016-1714: The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c when built with the Firmware Configuration device emulation support, allowed guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration (bsc#961692).
- CVE-2016-1571: The paging_invlpg function in include/asm-x86/paging.h in Xen when using shadow mode paging or nested virtualization is enabled, allowed local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check (bsc#960862).
- CVE-2015-8743: A OOB memory access in ioport r/w functions allowed a privileged (CAP_SYS_RAWIO) user/process to use this flaw to leak or corrupt Qemu memory bytes (bsc#960726).
- CVE-2015-8550: Xen, when used on a system providing PV backends, allowed local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability (bsc#957988).
- CVE-2015-8554: Buffer overflow in hw/pt-msi.c in Xen, when using the qemu-xen-traditional (aka qemu-dm) device model, allowed local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a 'write path.'  (bsc#958007).
- CVE-2015-8555: Xen did not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allowed local guest domains to obtain sensitive information from other domains via unspecified vectors (bsc#958009).
- CVE-2015-8339: The memory_exchange function in common/memory.c in Xen did not properly hand back pages to a domain, which might have allowed guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown (bsc#956408).
- CVE-2015-8104: The KVM subsystem might have allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bsc#954405).
- CVE-2015-5307: The KVM subsystem might allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bsc#953527).
- CVE-2015-7970: The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen was not preemptible, which allowed local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a 'time-consuming linear scan,' related to Populate-on-Demand (bsc#950704).
- CVE-2015-7972: The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen did not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allowed local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to 'heavy memory pressure.' (bsc#951845).
- CVE-2015-7969: Multiple memory leaks in Xen allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bsc#950703).
- CVE-2015-7969: Multiple memory leaks in Xen allowed local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of 'teardowns' of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall (bsc#950705).
- CVE-2015-7971: Xen did not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allowed local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c (bsc#950706).
- CVE-2015-4037: The slirp_smb function in net/slirp.c in created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: The mod_l2_entry function in arch/x86/mm.c did not properly validate level 2 page table entries, which allowed local PV guest administrators to gain privileges via a crafted superpage mapping (bsc#950367).
- CVE-2015-8504: The VNC display driver support was vulnerable to an arithmetic exception flaw that allowed a privileged remote client to crash the guest resulting in DoS (bsc#958493).
- CVE-2015-8345: The i8255x (PRO100) emulation support was vulnerable to an infinite loop issue that allowed a privileged (CAP_SYS_RAWIO) user inside guest to crash the Qemu instance resulting in DoS (bsc#956832).
- CVE-2015-7504: When using the AMD PC-Net II emulator(hw/net/pcnet.c) a heap buffer overflow could be triggered that could have allowed a guest to to take over the qemu process (bsc#956411).
- CVE-2015-5239: The VNC display driver was vulnerable to an infinite loop issue that allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#944463).
- CVE-2015-6815: The e1000 NIC emulation support was vulnerable to an infinite loop issue that allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#944697).

These non-security issues were fixed:

- bsc#1000893: virsh setmem won't allow to set current guest memory to max limit
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575450" comment="xen-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575451" comment="xen-doc-html-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575452" comment="xen-doc-pdf-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575453" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575454" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575455" comment="xen-libs-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575456" comment="xen-tools-4.0.3_21548_18-41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575457" comment="xen-tools-domU-4.0.3_21548_18-41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39723" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-10"/>
	<updated date="2017-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575458" comment="xen-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575459" comment="xen-doc-html-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575460" comment="xen-doc-pdf-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575461" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575462" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575463" comment="xen-libs-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575464" comment="xen-tools-4.0.3_21548_18-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575465" comment="xen-tools-domU-4.0.3_21548_18-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39724" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<description>

This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298).
- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575466" comment="xen-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575467" comment="xen-doc-html-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575468" comment="xen-doc-pdf-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575469" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575470" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575471" comment="xen-libs-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575472" comment="xen-tools-4.0.3_21548_18-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575473" comment="xen-tools-domU-4.0.3_21548_18-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39725" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<description>

This update for xen fixes the following security issues:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
- CVE-2017-7995: Incorrect address range validation potentially allowing PV guests to access MMIO memory with read side effects (bsc#1033948).
- Incorrect checks when handling exceptions allowed a malicious or buggy 64-bit PV guest to modify part of a physical memory page not belonging to it, potentially allowing for all of privilege escalation, host or other guest crashes, and information leaks (XSA-215, bsc#1034845)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575474" comment="xen-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575475" comment="xen-doc-html-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575476" comment="xen-doc-pdf-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575477" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575478" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575479" comment="xen-libs-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575480" comment="xen-tools-4.0.3_21548_18-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575481" comment="xen-tools-domU-4.0.3_21548_18-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39726" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10912" ref_url="https://www.suse.com/security/cve/CVE-2017-10912/" source="CVE"/>
		<reference ref_id="CVE-2017-10918" ref_url="https://www.suse.com/security/cve/CVE-2017-10918/" source="CVE"/>
		<reference ref_id="CVE-2017-10920" ref_url="https://www.suse.com/security/cve/CVE-2017-10920/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230 bsc#1052686).
- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-8905: Fixed a memory corruption via a failsafe callback, which might
  have allowed PV guest OS users to execute arbitrary code on the host OS
  (XSA-215, bsc#1034845).
- CVE-2017-10912: Xen mishandled page transfer, which allowed guest OS users to
  obtain privileged host OS access (XSA-217, bsc#1042882).
- CVE-2017-10918: Xen did not validate memory allocations during certain P2M
  operations, which allowed guest OS users to obtain privileged host OS access
  (XSA-222, bsc#1042931).
- CVE-2017-10920: The grant-table feature in Xen mishandled a GNTMAP_device_map
  and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping,
  which allowed guest OS users to cause a denial of service (count mismanagement
  and memory corruption) or obtain privileged host OS access (XSA-224,
  bsc#1042938).
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to
  cause a denial of service (infinite loop) by leveraging an incorrect return
  value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to
  cause a denial of service (memory consumption) by repeatedly starting and
  stopping audio capture (bsc#1037243)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10912/">CVE-2017-10912</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10918/">CVE-2017-10918</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10920/">CVE-2017-10920</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575482" comment="xen-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575483" comment="xen-doc-html-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575484" comment="xen-doc-pdf-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575485" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575486" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575487" comment="xen-libs-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575488" comment="xen-tools-4.0.3_21548_18-53.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575489" comment="xen-tools-domU-4.0.3_21548_18-53.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39727" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575490" comment="xen-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575491" comment="xen-doc-html-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575492" comment="xen-doc-pdf-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575493" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575494" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575495" comment="xen-libs-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575496" comment="xen-tools-4.0.3_21548_18-53.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575497" comment="xen-tools-domU-4.0.3_21548_18-53.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39728" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575498" comment="xen-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575499" comment="xen-doc-html-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575500" comment="xen-doc-pdf-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575501" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575502" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575503" comment="xen-libs-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575504" comment="xen-tools-4.0.3_21548_18-53.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575505" comment="xen-tools-domU-4.0.3_21548_18-53.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39729" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575506" comment="xen-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575507" comment="xen-doc-html-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575508" comment="xen-doc-pdf-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575509" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575510" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575511" comment="xen-libs-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575512" comment="xen-tools-4.0.3_21548_18-53.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575513" comment="xen-tools-domU-4.0.3_21548_18-53.14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39730" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116)
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158)
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160)
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163)
- CVE-2017-5715: Prevent side channel attacks aka Spectre and Meltdown (bsc#1068032)
- Prevent denial of service against xenstore via repeated updates (bsc#1030144, XSA-206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575514" comment="xen-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575515" comment="xen-doc-html-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575516" comment="xen-doc-pdf-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575517" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575518" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575519" comment="xen-libs-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575520" comment="xen-tools-4.0.3_21548_18-53.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575521" comment="xen-tools-domU-4.0.3_21548_18-53.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39731" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754
  xen: Information leak via side effects of speculative execution
  (XSA-254). Includes Spectre v2 mitigation.
- bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash
  Xen with XPTI (XSA-259)
- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
  Bypass aka 'Memory Disambiguation' (XSA-263)
- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore
  (XSA-267)
- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM
  (XSA-273)
- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen:
  insufficient TLB flushing / improper large page mappings with AMD
  IOMMUs (XSA-275)
- bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240
  conflicts with shadow paging (XSA-280)
- bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE
  constructs may lock up host (XSA-282)
- bsc#1126140 - VUL-0: CVE-2019-17340: xen: XSA-284: grant table
  transfer issues on large hosts
- bsc#1126141 - VUL-0: CVE-2019-17341: xen: XSA-285: race with
  pass-through device hotplug
- bsc#1177409 - VUL-0: CVE-2020-27674: xen: x86 PV guest
  INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1126192 - VUL-0: CVE-2019-17342: xen: XSA-287: x86:
  steal_page violates page_struct access discipline
- bsc#1126195 - VUL-0: CVE-2019-17343: xen: XSA-288: x86:
  Inconsistent PV IOMMU discipline
- bsc#1126196 - VUL-0: CVE-2019-17344: xen: XSA-290: missing
  preemption in x86 PV page table unvalidation
- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka 'Group 4'
  CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
- bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with
  restartable PV type change operations
- bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error
  Avoidance on Page Size Change (aka IFU issue)
- bsc#1158004 - VUL-0: CVE-2019-19583: xen: XSA-308 - VMX: VMentry
  failure with debug exceptions and blocked states
- bsc#1158005 - VUL-0: CVE-2019-19578: xen: XSA-309 - Linear
  pagetable use / entry miscounts
- bsc#1158006 - VUL-0: CVE-2019-19580: xen: XSA-310 - Further
  issues with restartable PV type change operations
- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer
  Data Sampling (SRBDS) aka 'CrossTalk' (XSA-320)
- bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic
  modification of live EPT PTE
- bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating
  timers between x86 HVM vCPU-s (XSA-336)
- bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code
  reading back hardware registers (XSA-337)
- bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel
  DoS via SYSENTER (XSA-339)
- bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen
  mapping code (XSA-345)
- bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page
  table updates (XSA-347)
- bsc#1179506 - VUL-0: CVE-2020-29566: xen: undue recursion in x86
  HVM context switch code (XSA-348)
- bsc#1178591 - VUL-0: CVE-2020-28368: xen: Intel RAPL sidechannel
- bsc#1179496 - VUL-0: CVE-2020-29480: xen: xenstore: watch
  notifications lacking permission checks (XSA-115)
- bsc#1179498 - VUL-0: CVE-2020-29481: xen: xenstore: new domains
  inheriting existing node permissions (XSA-322)
- bsc#1179501 - VUL-0: CVE-2020-29484: xen: xenstore: guests can
  crash xenstored via watchs (XSA-324)
- bsc#1179502 - VUL-0: CVE-2020-29483: xen: xenstore: guests can
  disturb domain cleanup (XSA-325)
- bsc#1179477 - VUL-0: CVE-2020-29130: xen: out-of-bounds access
  while processing ARP packets
- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation
  handling in GNTTABOP_copy (XSA-318)
- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313
  multiple xenoprof issues
- bsc#1161181 - VUL-0: CVE-2020-7211: xen: potential directory
  traversal using relative paths via tftp server on Windows host
- bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing
  descriptor table limit checking in x86 PV emulation
- bsc#1149813 - VUL-0: CVE-2019-15890: xen: use-after-free during
  packet reassembly
- bsc#1146874 - VUL-0: CVE-2019-12068: xen: infinite loop while
  executing script
- bsc#1143797 - VUL-0: CVE-2019-14378: xen: heap buffer overflow
  during packet reassembly in slirp networking implementation
- bsc#1130680 - VUL-0: CVE-2018-20815: xen: qemu: device_tree:
  heap buffer overflow while loading device tree blob
- bsc#1129623 - VUL-1: CVE-2019-9824: xen: information leakage in
  tcp_emu() due to uninitialized stack variables
- bsc#1123157 - VUL-0: CVE-2019-6778: xen: A heap buffer overflow
  in tcp_emu() found in slirp
- bsc#1117756 - VUL-0: CVE-2018-19665: xen: Integer overflow in
  Bluetooth routines allows memory corruption
- bsc#1114423 - VUL-0: CVE-2018-18849: xen: QEMU: lsi53c895a: OOB
  msg buffer access leads to DoS
- bsc#1111014 - VUL-0: CVE-2018-17963: xen: net: ignore packets with
  large size
- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks
  bypassed in x86 PV MM handling (XSA-264)
- bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception
  safety check can be triggered by a guest (XSA-265)
- bsc#1096224 - VUL-0: CVE-2018-11806: xen: slirp: heap buffer
  overflow while reassembling fragmented datagrams
- bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
  injection errors (XSA-261)
- bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
  unbounded loop (XSA-262)

Non-security issues fixed:

- Upstream prereq patches for XSA-273 (bsc#1091107)
- Additional upstream adjustments (bsc#1027519)
- bsc#1022555 - L3: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827 - Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-07"/>
	<updated date="2021-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575522" comment="xen-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575523" comment="xen-doc-html-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575524" comment="xen-doc-pdf-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575525" comment="xen-kmp-default-4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575526" comment="xen-kmp-trace-4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575527" comment="xen-libs-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575528" comment="xen-tools-4.0.3_21548_20-53.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575529" comment="xen-tools-domU-4.0.3_21548_20-53.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39732" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- L3: xenstored crashing with segfault after applying latest xen updates on SLES12 SP2 (LTSS) Server (bsc#1182155)
- CVE-2020-14364: out-of-bounds r/w access issue while processing usb packets (bsc#1175534)
- CVE-2020-8608: potential OOB access due to unsafe snprintf() usages (bsc#1163019)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575530" comment="xen-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575531" comment="xen-doc-html-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575532" comment="xen-doc-pdf-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575533" comment="xen-kmp-default-4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575534" comment="xen-kmp-trace-4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575535" comment="xen-libs-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575536" comment="xen-tools-4.0.3_21548_20-53.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575537" comment="xen-tools-domU-4.0.3_21548_20-53.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39733" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="623680" ref_url="https://bugzilla.suse.com/623680" source="BUGZILLA"/>
		<reference ref_id="665610" ref_url="https://bugzilla.suse.com/665610" source="BUGZILLA"/>
		<reference ref_id="672833" ref_url="https://bugzilla.suse.com/672833" source="BUGZILLA"/>
		<reference ref_id="674371" ref_url="https://bugzilla.suse.com/674371" source="BUGZILLA"/>
		<reference ref_id="675363" ref_url="https://bugzilla.suse.com/675363" source="BUGZILLA"/>
		<reference ref_id="675817" ref_url="https://bugzilla.suse.com/675817" source="BUGZILLA"/>
		<reference ref_id="675861" ref_url="https://bugzilla.suse.com/675861" source="BUGZILLA"/>
		<reference ref_id="678152" ref_url="https://bugzilla.suse.com/678152" source="BUGZILLA"/>
		<reference ref_id="678229" ref_url="https://bugzilla.suse.com/678229" source="BUGZILLA"/>
		<reference ref_id="678406" ref_url="https://bugzilla.suse.com/678406" source="BUGZILLA"/>
		<reference ref_id="678871" ref_url="https://bugzilla.suse.com/678871" source="BUGZILLA"/>
		<reference ref_id="679344" ref_url="https://bugzilla.suse.com/679344" source="BUGZILLA"/>
		<reference ref_id="680824" ref_url="https://bugzilla.suse.com/680824" source="BUGZILLA"/>
		<reference ref_id="681546" ref_url="https://bugzilla.suse.com/681546" source="BUGZILLA"/>
		<reference ref_id="684877" ref_url="https://bugzilla.suse.com/684877" source="BUGZILLA"/>
		<reference ref_id="686737" ref_url="https://bugzilla.suse.com/686737" source="BUGZILLA"/>
		<reference ref_id="687981" ref_url="https://bugzilla.suse.com/687981" source="BUGZILLA"/>
		<reference ref_id="688306" ref_url="https://bugzilla.suse.com/688306" source="BUGZILLA"/>
		<reference ref_id="688473" ref_url="https://bugzilla.suse.com/688473" source="BUGZILLA"/>
		<reference ref_id="688757" ref_url="https://bugzilla.suse.com/688757" source="BUGZILLA"/>
		<reference ref_id="691238" ref_url="https://bugzilla.suse.com/691238" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-1166" ref_url="https://www.suse.com/security/cve/CVE-2011-1166/" source="CVE"/>
		<reference ref_id="CVE-2011-1486" ref_url="https://www.suse.com/security/cve/CVE-2011-1486/" source="CVE"/>
		<reference ref_id="CVE-2011-1583" ref_url="https://www.suse.com/security/cve/CVE-2011-1583/" source="CVE"/>
		<description>

Collective May/2011 update for Xen

Xen:

    * 679344: Xen: multi-vCPU pv guest may crash host
    * 675817: Kernel panic when creating HVM guests on AMD platforms with
      XSAVE
    * 678871: dom0 hangs long time when starting hvm guests with memory &gt;=
      64GB
    * 675363: Random lockups with kernel-xen. Possibly graphics related
    * 678229: restore of sles HVM fails
    * 672833: xen-tools bug causing problems with Ubuntu 10.10 under Xen 4.
    * 665610: xm console &gt; 1 to same VM messes up both consoles
    * 687981: mistyping model type when defining VIF crashes VM
    * 688473: Fix potential buffer overflow in decode
    * 691238: revert accidental behaviour change in xm list
    * 680824: dom0 can't recognize boot disk when IOMMU is enabled
    * 623680: xen kernel freezes during boot when processor module is
      loaded

vm-install:

    * 678152: virt-manager: harmless block device admin actions on FV
      guests mess up network (VIF) device type ==&gt; network lost.
    * 688757: SLED10SP4 fully virtualized in SLES10SP4 XEN - kernel panic

libvirt:

    * 674371: qemu aio mode per disk
    * 675861: Force FLR on for buggy SR-IOV devices
    * 678406: libvirt: several API calls do not honour read-only
    * 684877: libvirt: error reporting in libvirtd is not thread safe
    * 686737: virsh: Add option 'model' to attach-interface
    * 681546: Fix xmdomain.cfg to libvirt XML format conversion
    * 688306: Handle support for recent KVM versions

Security Issue references:

    * CVE-2011-1146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146&gt;
    * CVE-2011-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1486&gt;
    * CVE-2011-1166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166&gt;
    * CVE-2011-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-05-05"/>
	<updated date="2011-05-05"/>
	<bugzilla href="https://bugzilla.suse.com/623680">SUSE bug 623680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/665610">SUSE bug 665610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672833">SUSE bug 672833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674371">SUSE bug 674371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675363">SUSE bug 675363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675817">SUSE bug 675817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/675861">SUSE bug 675861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678152">SUSE bug 678152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678229">SUSE bug 678229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678406">SUSE bug 678406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/678871">SUSE bug 678871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679344">SUSE bug 679344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680824">SUSE bug 680824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681546">SUSE bug 681546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684877">SUSE bug 684877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/686737">SUSE bug 686737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/687981">SUSE bug 687981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688306">SUSE bug 688306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688473">SUSE bug 688473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688757">SUSE bug 688757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691238">SUSE bug 691238</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1166/">CVE-2011-1166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1486/">CVE-2011-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1583/">CVE-2011-1583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575538" comment="libvirt-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575539" comment="libvirt-doc-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575540" comment="libvirt-python-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575541" comment="vm-install-0.4.30-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575542" comment="xen-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575543" comment="xen-doc-html-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575544" comment="xen-doc-pdf-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575545" comment="xen-kmp-default-4.0.1_21326_08_2.6.32.36_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575546" comment="xen-kmp-pae-4.0.1_21326_08_2.6.32.36_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575547" comment="xen-libs-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575548" comment="xen-tools-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575549" comment="xen-tools-domU-4.0.1_21326_08-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575538" comment="libvirt-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575539" comment="libvirt-doc-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575540" comment="libvirt-python-0.7.6-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575541" comment="vm-install-0.4.30-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575542" comment="xen-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575543" comment="xen-doc-html-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575544" comment="xen-doc-pdf-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575545" comment="xen-kmp-default-4.0.1_21326_08_2.6.32.36_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575546" comment="xen-kmp-pae-4.0.1_21326_08_2.6.32.36_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575547" comment="xen-libs-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575548" comment="xen-tools-4.0.1_21326_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575549" comment="xen-tools-domU-4.0.1_21326_08-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39734" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="582265" ref_url="https://bugzilla.suse.com/582265" source="BUGZILLA"/>
		<reference ref_id="670465" ref_url="https://bugzilla.suse.com/670465" source="BUGZILLA"/>
		<reference ref_id="684297" ref_url="https://bugzilla.suse.com/684297" source="BUGZILLA"/>
		<reference ref_id="684305" ref_url="https://bugzilla.suse.com/684305" source="BUGZILLA"/>
		<reference ref_id="689954" ref_url="https://bugzilla.suse.com/689954" source="BUGZILLA"/>
		<reference ref_id="692625" ref_url="https://bugzilla.suse.com/692625" source="BUGZILLA"/>
		<reference ref_id="693472" ref_url="https://bugzilla.suse.com/693472" source="BUGZILLA"/>
		<reference ref_id="702025" ref_url="https://bugzilla.suse.com/702025" source="BUGZILLA"/>
		<reference ref_id="703924" ref_url="https://bugzilla.suse.com/703924" source="BUGZILLA"/>
		<reference ref_id="704160" ref_url="https://bugzilla.suse.com/704160" source="BUGZILLA"/>
		<reference ref_id="706574" ref_url="https://bugzilla.suse.com/706574" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<description>

Security / Collective Update for Xen

Xen:

    * bnc#702025 - VUL-0: xen: VT-d (PCI passthrough) MSI trap injection
      (CVE-2011-1898)
    * bnc#703924 - update block-npiv scripts to support BFA HBA
    * bnc#689954 - L3: Live migrations fail when guest crashes:
      domain_crash_sync called from entry.S
    * bnc#693472 - Bridge hangs cause redundant ring failures in SLE 11 SP1
      HAE + XEN
    * bnc#582265 - xen-scsi.ko not supported
    * bnc#670465 - When connecting to Xen guest through vncviewer mouse
      tracking is off.
    * bnc#684305 - on_crash is being ignored with kdump now working in HVM
    * bnc#684297 - HVM taking too long to dump vmcore
    * bnc#704160 - crm resource migrate fails with xen machines
    * bnc#706574 - xm console DomUName hang after 'xm save/restore' of PVM
      on the latest Xen

vm-install:

    * bnc#692625 - virt-manager has problems to install guest from multiple
      CD

Security Issue reference:

    * CVE-2011-1898
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-08-08"/>
	<updated date="2011-08-08"/>
	<bugzilla href="https://bugzilla.suse.com/582265">SUSE bug 582265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670465">SUSE bug 670465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684297">SUSE bug 684297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/684305">SUSE bug 684305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689954">SUSE bug 689954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692625">SUSE bug 692625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693472">SUSE bug 693472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703924">SUSE bug 703924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704160">SUSE bug 704160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706574">SUSE bug 706574</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575550" comment="vm-install-0.4.31-0.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575551" comment="xen-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575552" comment="xen-doc-html-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575553" comment="xen-doc-pdf-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575554" comment="xen-kmp-default-4.0.2_21511_02_2.6.32.43_0.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575555" comment="xen-kmp-pae-4.0.2_21511_02_2.6.32.43_0.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575556" comment="xen-libs-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575557" comment="xen-tools-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575558" comment="xen-tools-domU-4.0.2_21511_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575550" comment="vm-install-0.4.31-0.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575551" comment="xen-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575552" comment="xen-doc-html-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575553" comment="xen-doc-pdf-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575554" comment="xen-kmp-default-4.0.2_21511_02_2.6.32.43_0.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575555" comment="xen-kmp-pae-4.0.2_21511_02_2.6.32.43_0.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575556" comment="xen-libs-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575557" comment="xen-tools-4.0.2_21511_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575558" comment="xen-tools-domU-4.0.2_21511_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39735" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="649209" ref_url="https://bugzilla.suse.com/649209" source="BUGZILLA"/>
		<reference ref_id="694863" ref_url="https://bugzilla.suse.com/694863" source="BUGZILLA"/>
		<reference ref_id="725169" ref_url="https://bugzilla.suse.com/725169" source="BUGZILLA"/>
		<reference ref_id="726332" ref_url="https://bugzilla.suse.com/726332" source="BUGZILLA"/>
		<reference ref_id="727515" ref_url="https://bugzilla.suse.com/727515" source="BUGZILLA"/>
		<reference ref_id="732782" ref_url="https://bugzilla.suse.com/732782" source="BUGZILLA"/>
		<reference ref_id="734826" ref_url="https://bugzilla.suse.com/734826" source="BUGZILLA"/>
		<reference ref_id="735403" ref_url="https://bugzilla.suse.com/735403" source="BUGZILLA"/>
		<reference ref_id="736824" ref_url="https://bugzilla.suse.com/736824" source="BUGZILLA"/>
		<reference ref_id="739585" ref_url="https://bugzilla.suse.com/739585" source="BUGZILLA"/>
		<reference ref_id="740165" ref_url="https://bugzilla.suse.com/740165" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<description>

This collective update 2012/02 for Xen provides fixes for the following 
reports:

Xen:

    * 740165: Fix heap overflow in e1000 device emulation (applicable to
      Xen qemu - CVE-2012-0029)
    * 739585: Xen block-attach fails after repeated attach/detach
    * 727515: Fragmented packets hang network boot of HVM guest
    * 736824: Microcode patches for AMD's 15h processors panic the system
    * 732782: xm create hangs when maxmen value is enclosed in 'quotes'
    * 734826: xm rename doesn't work anymore
    * 694863: kexec fails in xen
    * 726332: Fix considerable performance hit by previous changeset
    * 649209: Fix slow Xen live migrations

libvirt

    * 735403: Fix connection with virt-manager as normal user

virt-utils

    * Add Support for creating images that can be run on Microsoft Hyper-V
      host (Fix vpc file format. Add support for fixed disks)

Security Issue references:

    * CVE-2012-0029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-10"/>
	<updated date="2012-02-10"/>
	<bugzilla href="https://bugzilla.suse.com/649209">SUSE bug 649209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694863">SUSE bug 694863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725169">SUSE bug 725169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726332">SUSE bug 726332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/727515">SUSE bug 727515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732782">SUSE bug 732782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734826">SUSE bug 734826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735403">SUSE bug 735403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736824">SUSE bug 736824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739585">SUSE bug 739585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575559" comment="libvirt-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575560" comment="libvirt-doc-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575561" comment="libvirt-python-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575562" comment="virt-utils-1.1.3-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575563" comment="xen-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575564" comment="xen-doc-html-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575565" comment="xen-doc-pdf-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575566" comment="xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575567" comment="xen-kmp-pae-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575568" comment="xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575569" comment="xen-libs-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575570" comment="xen-tools-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575571" comment="xen-tools-domU-4.0.3_21548_02-0.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575559" comment="libvirt-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575560" comment="libvirt-doc-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575561" comment="libvirt-python-0.7.6-1.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575562" comment="virt-utils-1.1.3-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575563" comment="xen-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575564" comment="xen-doc-html-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575565" comment="xen-doc-pdf-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575566" comment="xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575567" comment="xen-kmp-pae-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575568" comment="xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575569" comment="xen-libs-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575570" comment="xen-tools-4.0.3_21548_02-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575571" comment="xen-tools-domU-4.0.3_21548_02-0.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39736" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="757537" ref_url="https://bugzilla.suse.com/757537" source="BUGZILLA"/>
		<reference ref_id="757970" ref_url="https://bugzilla.suse.com/757970" source="BUGZILLA"/>
		<reference ref_id="764077" ref_url="https://bugzilla.suse.com/764077" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-0218" ref_url="https://www.suse.com/security/cve/CVE-2012-0218/" source="CVE"/>
		<reference ref_id="CVE-2012-2934" ref_url="https://www.suse.com/security/cve/CVE-2012-2934/" source="CVE"/>
		<description>

Three security issues were found in XEN.

Two security issues are fixed by this update:

    * 

      CVE-2012-0217: Due to incorrect fault handling in the XEN hypervisor
      it was possible for a XEN guest domain administrator to execute code
      in the XEN host environment.

    * 

      CVE-2012-0218: Also a guest user could crash the guest XEN kernel due
      to a protection fault bounce.

The third fix is changing the Xen behaviour on certain hardware:

    * 

      CVE-2012-2934: The issue is a denial of service issue on older
      pre-SVM AMD CPUs (AMD Erratum 121).

      AMD Erratum #121 is described in 'Revision Guide for AMD Athlon 64
      and AMD Opteron Processors':
      http://support.amd.com/us/Processor_TechDocs/25759.pdf
      &lt;http://support.amd.com/us/Processor_TechDocs/25759.pdf&gt;

      The following 130nm and 90nm (DDR1-only) AMD processors are subject
      to this erratum:

          o 

            First-generation AMD-Opteron(tm) single and dual core
            processors in either 939 or 940 packages:

                + AMD Opteron(tm) 100-Series Processors
                + AMD Opteron(tm) 200-Series Processors
                + AMD Opteron(tm) 800-Series Processors
                + AMD Athlon(tm) processors in either 754, 939 or 940
                  packages
                + AMD Sempron(tm) processor in either 754 or 939 packages
                + AMD Turion(tm) Mobile Technology in 754 package

      This issue does not effect Intel processors.

      The impact of this flaw is that a malicious PV guest user can halt
      the host system.

      As this is a hardware flaw, it is not fixable except by upgrading
      your hardware to a newer revision, or not allowing untrusted 64bit
      guestsystems.

      The patch changes the behaviour of the host system booting, which
      makes it unable to create guest machines until a specific boot option
      is set.

      There is a new XEN boot option 'allow_unsafe' for GRUB which allows
      the host to start guests again.

      This is added to /boot/grub/menu.lst in the line looking like this:

      kernel /boot/xen.gz .... allow_unsafe

      Note: .... in this example represents the existing boot options for
      the host.

Security Issue references:

    * CVE-2012-0217
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217&gt;
    * CVE-2012-0218
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218&gt;
    * CVE-2012-2934
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-07"/>
	<updated date="2012-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757970">SUSE bug 757970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0218/">CVE-2012-0218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2934/">CVE-2012-2934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575572" comment="xen-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575573" comment="xen-doc-html-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575574" comment="xen-doc-pdf-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575575" comment="xen-kmp-default-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575576" comment="xen-kmp-pae-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575577" comment="xen-kmp-trace-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575578" comment="xen-libs-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575579" comment="xen-tools-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575580" comment="xen-tools-domU-4.0.3_21548_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575572" comment="xen-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575573" comment="xen-doc-html-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575574" comment="xen-doc-pdf-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575575" comment="xen-kmp-default-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575576" comment="xen-kmp-pae-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575577" comment="xen-kmp-trace-4.0.3_21548_04_2.6.32.59_0.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575578" comment="xen-libs-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575579" comment="xen-tools-4.0.3_21548_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575580" comment="xen-tools-domU-4.0.3_21548_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39737" version="1" class="patch">
	<metadata>
		<title>Security update for Xen </title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="744771" ref_url="https://bugzilla.suse.com/744771" source="BUGZILLA"/>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN was fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

Security Issue references:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;
    * CVE-2012-3433
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433&gt;
    * CVE-2012-2625
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-03"/>
	<updated date="2012-08-03"/>
	<bugzilla href="https://bugzilla.suse.com/744771">SUSE bug 744771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575581" comment="vm-install-0.4.34-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575582" comment="xen-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575583" comment="xen-doc-html-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575584" comment="xen-doc-pdf-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575585" comment="xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575586" comment="xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575587" comment="xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575588" comment="xen-libs-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575589" comment="xen-tools-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575590" comment="xen-tools-domU-4.0.3_21548_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575581" comment="vm-install-0.4.34-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575582" comment="xen-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575583" comment="xen-doc-html-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575584" comment="xen-doc-pdf-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575585" comment="xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575586" comment="xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575587" comment="xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575588" comment="xen-libs-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575589" comment="xen-tools-4.0.3_21548_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575590" comment="xen-tools-domU-4.0.3_21548_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39738" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2012-3516" ref_url="https://www.suse.com/security/cve/CVE-2012-3516/" source="CVE"/>
		<description>

XEN was updated to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3516
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3516&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3516/">CVE-2012-3516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575591" comment="xen-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575592" comment="xen-doc-html-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575593" comment="xen-doc-pdf-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575594" comment="xen-kmp-default-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575595" comment="xen-kmp-pae-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575596" comment="xen-kmp-trace-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575597" comment="xen-libs-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575598" comment="xen-tools-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575599" comment="xen-tools-domU-4.0.3_21548_10-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575591" comment="xen-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575592" comment="xen-doc-html-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575593" comment="xen-doc-pdf-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575594" comment="xen-kmp-default-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575595" comment="xen-kmp-pae-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575596" comment="xen-kmp-trace-4.0.3_21548_10_2.6.32.59_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575597" comment="xen-libs-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575598" comment="xen-tools-4.0.3_21548_10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575599" comment="xen-tools-domU-4.0.3_21548_10-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39739" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN received various security fixes:

    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA-20)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA-22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA-23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA-24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-05"/>
	<updated date="2012-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575600" comment="xen-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575601" comment="xen-doc-html-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575602" comment="xen-doc-pdf-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575603" comment="xen-kmp-default-4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575604" comment="xen-kmp-trace-4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575605" comment="xen-libs-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575606" comment="xen-tools-4.0.3_21548_11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575607" comment="xen-tools-domU-4.0.3_21548_11-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39740" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-0154" ref_url="https://www.suse.com/security/cve/CVE-2013-0154/" source="CVE"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<description>

XEN has been updated to fix various security issues:

    * CVE-2013-1917: Xen PV DoS vulnerability with SYSENTER
    * CVE-2013-1918: XSA-45: Several long latency operations are not
      preemptible
    * CVE-2013-1919: Several access permission issues with IRQs for
      unprivileged guests
    * CVE-2013-1920: XSA-47: Potential use of freed memory in event channel
      operations
    * CVE-2013-1952: XSA-49: VT-d interrupt remapping source validation
      flaw for bridges
    * CVE-2013-1964: XSA-50: grant table hypercall acquire/release
      imbalance
    * CVE-2013-2076: XSA-52: Information leak on XSAVE/XRSTOR capable AMD
      CPUs
    * CVE-2013-2077: XSA-53: Hypervisor crash due to missing exception
      recovery on XRSTOR
    * CVE-2013-2194: XSA-55: Multiple vulnerabilities in libelf PV kernel
      handling (also CVE-2013-2195 and CVE-2013-2196)
    * CVE-2013-2072: XSA-56: Buffer overflow in xencontrol Python bindings
      affecting xend
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4355: XSA-63: Information leaks through I/O instruction
      emulation
    * CVE-2013-4361: XSA-66: Information leak through fbld instruction
      emulation
    * CVE-2013-4368: XSA-67: Information leak through outs instruction
      emulation
    * CVE-2012-4544: XSA-25: Domain builder Out-of-memory due to malicious
      kernel/ramdisk
    * CVE-2013-0153: interrupt remap entries shared and old ones not
      cleared on AMD IOMMUs
    * CVE-2013-0154: XSA-37: Hypervisor crash due to incorrect ASSERT
      (debug build only)
    * CVE-2012-6075: qemu / kvm-qemu: e1000 overflows under some conditions
    * CVE-2012-5634: XSA-33: VT-d interrupt remapping source validation
      flaw.

Security Issue references:

    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2013-0154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0154&gt;
    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-30"/>
	<updated date="2013-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0154/">CVE-2013-0154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575608" comment="xen-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575609" comment="xen-doc-html-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575610" comment="xen-doc-pdf-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575611" comment="xen-kmp-default-4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575612" comment="xen-kmp-trace-4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575613" comment="xen-libs-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575614" comment="xen-tools-4.0.3_21548_14-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575615" comment="xen-tools-domU-4.0.3_21548_14-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39741" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 1 Xen hypervisor and 
toolset have been updated to fix various security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-73: CVE-2013-4494: Xen before 4.1.x, 4.2.x, and 4.3.x does not
      take the page_alloc_lock and grant_table.lock in the same order,
      which allows local guest administrators with access to multiple vcpus
      to cause a denial of service (host deadlock) via unspecified vectors.
      (bnc#848657)

    * 

      XSA-74: CVE-2013-4553: The XEN_DOMCTL_getmemlist hypercall in Xen
      3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the
      page_alloc_lock and mm_rwlock in the same order, which allows local
      guest administrators to cause a denial of service (host deadlock).
      (bnc#849667)

    * 

      XSA-76: CVE-2013-4554: Xen 3.0.3 through 4.1.x (possibly 4.1.6.1),
      4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly
      prevent access to hypercalls, which allows local guest users to gain
      privileges via a crafted application running in ring 1 or 2.
      (bnc#849668)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

Security Issues references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-01"/>
	<updated date="2014-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591430" comment="xen-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591431" comment="xen-doc-html-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591432" comment="xen-doc-pdf-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591433" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575620" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.9-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591434" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591435" comment="xen-libs-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591436" comment="xen-tools-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591437" comment="xen-tools-domU-4.0.3_21548_16-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591430" comment="xen-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591431" comment="xen-doc-html-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591432" comment="xen-doc-pdf-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591433" comment="xen-kmp-default-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575620" comment="xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.9-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591434" comment="xen-kmp-trace-4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591435" comment="xen-libs-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591436" comment="xen-tools-4.0.3_21548_16-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591437" comment="xen-tools-domU-4.0.3_21548_16-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39742" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 1 Xen package was updated to fix 
the following security issues:

    * XSA-106: Missing privilege level checks in x86 emulation of software
      interrupts (bnc#895802)
    * XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and
      LMSW emulation (bnc#895799)
    * XSA-104: Race condition in HVMOP_track_dirty_vram (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)

Security Issues:

    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-22"/>
	<updated date="2014-09-22"/>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575625" comment="xen-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575626" comment="xen-doc-html-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575627" comment="xen-doc-pdf-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575628" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575629" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575630" comment="xen-libs-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575631" comment="xen-tools-4.0.3_21548_18-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575632" comment="xen-tools-domU-4.0.3_21548_18-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39743" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are - passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593940" comment="xen-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593941" comment="xen-doc-html-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593942" comment="xen-doc-pdf-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593943" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575637" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593944" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593945" comment="xen-libs-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593946" comment="xen-tools-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593947" comment="xen-tools-domU-4.0.3_21548_18-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009593940" comment="xen-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593941" comment="xen-doc-html-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593942" comment="xen-doc-pdf-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593943" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575637" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593944" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593945" comment="xen-libs-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593946" comment="xen-tools-4.0.3_21548_18-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009593947" comment="xen-tools-domU-4.0.3_21548_18-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39744" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix six security issues:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bsc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bsc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bsc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bsc#931628)
    * CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bsc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bsc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594039" comment="xen-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594040" comment="xen-doc-html-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594041" comment="xen-doc-pdf-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594042" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575646" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594043" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594044" comment="xen-libs-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594045" comment="xen-tools-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594046" comment="xen-tools-domU-4.0.3_21548_18-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594039" comment="xen-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594040" comment="xen-doc-html-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594041" comment="xen-doc-pdf-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594042" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575646" comment="xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594043" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594044" comment="xen-libs-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594045" comment="xen-tools-4.0.3_21548_18-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594046" comment="xen-tools-domU-4.0.3_21548_18-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39745" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<description>


This update fixes the following security issues:

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)
- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#953527 -  CVE-2015-5307: kernel: kvm/xen: x86: avoid
  guest-&gt;host DOS by intercepting #AC (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575651" comment="xen-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575652" comment="xen-doc-html-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575653" comment="xen-doc-pdf-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575654" comment="xen-kmp-default-4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575655" comment="xen-kmp-trace-4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575656" comment="xen-libs-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575657" comment="xen-tools-4.0.3_21548_18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575658" comment="xen-tools-domU-4.0.3_21548_18-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39746" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39747" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39748" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592637" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592638" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009592637" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009592638" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39749" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575662" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575663" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39750" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575664" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575665" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575664" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575665" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39751" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575666" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575667" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39752" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575668" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575669" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39753" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575670" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575671" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39754" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575672" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575673" comment="xorg-x11-libX11-32bit-7.4-5.11.72.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39755" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575674" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575675" comment="xorg-x11-libX11-32bit-7.4-5.11.72.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39756" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575676" comment="xorg-x11-libX11-7.4-5.11.72.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575677" comment="xorg-x11-libX11-32bit-7.4-5.11.72.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39757" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182506" ref_url="https://bugzilla.suse.com/1182506" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575678" comment="xorg-x11-libX11-7.4-5.11.72.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575679" comment="xorg-x11-libX11-32bit-7.4-5.11.72.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39758" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575680" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575681" comment="xorg-x11-libX11-32bit-7.4-5.11.72.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39759" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575682" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565566" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39760" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982).

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591187" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591188" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591187" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591188" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39761" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591189" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591190" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591189" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591190" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39762" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575687" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575688" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39763" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591220" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591221" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591220" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591221" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39764" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575691" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575692" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39765" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591206" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591207" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591206" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591207" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39766" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575695" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575696" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39767" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591214" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591215" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591214" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591215" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39768" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591208" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591209" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591208" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591209" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39769" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575701" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575702" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39770" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575703" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575704" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39771" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575705" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575706" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39772" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575707" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575708" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39773" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issue reference:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591222" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591223" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009591222" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009591223" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39774" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029)

Non security issues:

- Remove unused function with use-after-free issue. (bsc#1025035)
- Use arc4random to generate cookies. (bsc#1025084)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575711" comment="xorg-x11-Xvnc-7.4-27.40.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575712" comment="xorg-x11-server-7.4-27.40.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575713" comment="xorg-x11-server-extra-7.4-27.40.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39775" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<description>
This update for xorg-x11-server provides the following fixes:

Security issues fixed:

- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575714" comment="xorg-x11-Xvnc-7.4-27.40.79.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575715" comment="xorg-x11-server-7.4-27.40.79.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575716" comment="xorg-x11-server-extra-7.4-27.40.79.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39776" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575717" comment="xorg-x11-Xvnc-7.4-27.40.79.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575718" comment="xorg-x11-server-7.4-27.40.79.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575719" comment="xorg-x11-server-extra-7.4-27.40.79.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39777" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575720" comment="xorg-x11-Xvnc-7.4-27.40.79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575721" comment="xorg-x11-server-7.4-27.40.79.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575722" comment="xorg-x11-server-extra-7.4-27.40.79.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39778" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575723" comment="xorg-x11-Xvnc-7.4-27.40.79.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575724" comment="xorg-x11-server-7.4-27.40.79.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575725" comment="xorg-x11-server-extra-7.4-27.40.79.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39779" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575726" comment="xorg-x11-Xvnc-7.4-27.40.79.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575727" comment="xorg-x11-server-7.4-27.40.79.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575728" comment="xorg-x11-server-extra-7.4-27.40.79.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39780" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575729" comment="xorg-x11-Xvnc-7.4-27.40.79.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575730" comment="xorg-x11-server-7.4-27.40.79.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575731" comment="xorg-x11-server-extra-7.4-27.40.79.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39781" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659909" comment="xorg-x11-Xvnc-7.4-27.40.79.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659910" comment="xorg-x11-server-7.4-27.40.79.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659911" comment="xorg-x11-server-extra-7.4-27.40.79.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39782" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-16"/>
	<updated date="2021-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660156" comment="xorg-x11-Xvnc-7.4-27.40.79.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660157" comment="xorg-x11-server-7.4-27.40.79.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660158" comment="xorg-x11-server-extra-7.4-27.40.79.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39783" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server-dmx, xorg-x11-server-dmx-debuginfo, xorg-x11-server-dmx-debugsource</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="746949" ref_url="https://bugzilla.suse.com/746949" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028/" source="CVE"/>
		<reference ref_id="CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029/" source="CVE"/>
		<description>

This update of xorg-x11-server-dmx fixed the following security issues:

CVE-2010-2240 - memory exhaustion flaw CVE-2011-4028 / CVE-2011-4029 - race 
condition flaw

Security Issues:

    * CVE-2010-2240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240&gt;
    * CVE-2011-4028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028&gt;
    * CVE-2011-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-10"/>
	<updated date="2012-04-10"/>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575732" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575732" comment="xorg-x11-server-dmx-7.3.99-17.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39784" version="1" class="patch">
	<metadata>
		<title>Security update for Xorg</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="648287" ref_url="https://bugzilla.suse.com/648287" source="BUGZILLA"/>
		<reference ref_id="648290" ref_url="https://bugzilla.suse.com/648290" source="BUGZILLA"/>
		<reference ref_id="698281" ref_url="https://bugzilla.suse.com/698281" source="BUGZILLA"/>
		<reference ref_id="704467" ref_url="https://bugzilla.suse.com/704467" source="BUGZILLA"/>
		<reference ref_id="709943" ref_url="https://bugzilla.suse.com/709943" source="BUGZILLA"/>
		<reference ref_id="709987" ref_url="https://bugzilla.suse.com/709987" source="BUGZILLA"/>
		<reference ref_id="714677" ref_url="https://bugzilla.suse.com/714677" source="BUGZILLA"/>
		<reference ref_id="716355" ref_url="https://bugzilla.suse.com/716355" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4818" ref_url="https://www.suse.com/security/cve/CVE-2010-4818/" source="CVE"/>
		<reference ref_id="CVE-2010-4819" ref_url="https://www.suse.com/security/cve/CVE-2010-4819/" source="CVE"/>
		<description>

This update for xorg-x11-server and xorg-x11-libs brings improved 
compatibility fixes and enhancements for X.org. The main feature is support 
for Multi monitor configurations with independent heads, which used to be 
supported with SUSE Linux Enterprise 10 (VGA Arbitration Support).

During update to Service Pack 1, the support for AppGroup Extension was 
removed from the X11 Server. This update fixes this regression and adds 
back the support (bnc#709943).

Additionally this update fixes bugs in the AppGroup Extensions, which 
resulted in Xserver crashes (bnc #716355).

It also fixes an issue with changing the mouse mode to absolute 
(bnc#704467).

It also fixes an issue with button release on non-core pointing devices 
(bnc#698281).

In addition to that, multiple missing or incorrect bounds checking flaws 
were fixed in in GLX (CVE-2010-4818) and in the X Render Extension 
(CVE-2010-4819) were fixed, which could be used to crash the X server.

A regression in handling TWM was fixed as well (bnc#709987).

Security Issue references:

    * CVE-2010-4818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818&gt;
    * CVE-2010-4819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-10-10"/>
	<updated date="2011-10-10"/>
	<bugzilla href="https://bugzilla.suse.com/648287">SUSE bug 648287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648290">SUSE bug 648290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698281">SUSE bug 698281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704467">SUSE bug 704467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709943">SUSE bug 709943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709987">SUSE bug 709987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714677">SUSE bug 714677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716355">SUSE bug 716355</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4818/">CVE-2010-4818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4819/">CVE-2010-4819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575733" comment="libpciaccess0-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575734" comment="libpciaccess0-32bit-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575735" comment="libpciaccess0-x86-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575736" comment="xorg-x11-Xvnc-7.4-27.40.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575737" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575738" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575739" comment="xorg-x11-libs-x86-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575740" comment="xorg-x11-server-7.4-27.40.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575741" comment="xorg-x11-server-extra-7.4-27.40.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575733" comment="libpciaccess0-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575734" comment="libpciaccess0-32bit-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575735" comment="libpciaccess0-x86-7.4_0.11.0-0.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575736" comment="xorg-x11-Xvnc-7.4-27.40.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575737" comment="xorg-x11-libs-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575738" comment="xorg-x11-libs-32bit-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575739" comment="xorg-x11-libs-x86-7.4-8.26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575740" comment="xorg-x11-server-7.4-27.40.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575741" comment="xorg-x11-server-extra-7.4-27.40.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39785" version="1" class="patch">
	<metadata>
		<title>Security update for xpdf</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="644112" ref_url="https://bugzilla.suse.com/644112" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-3702" ref_url="https://www.suse.com/security/cve/CVE-2010-3702/" source="CVE"/>
		<reference ref_id="CVE-2010-3703" ref_url="https://www.suse.com/security/cve/CVE-2010-3703/" source="CVE"/>
		<reference ref_id="CVE-2010-3704" ref_url="https://www.suse.com/security/cve/CVE-2010-3704/" source="CVE"/>
		<description>

A specially crafted PDF files could crash xpdf or potentially even cause 
execution of arbitrary code (CVE-2010-3702, CVE-2010-3703, CVE-2010-3704)

Security Issue references:

    * CVE-2010-3702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702&gt;
    * CVE-2010-3703
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703&gt;
    * CVE-2010-3704
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2010-10-15"/>
	<updated date="2010-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/644112">SUSE bug 644112</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3702/">CVE-2010-3702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3703/">CVE-2010-3703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3704/">CVE-2010-3704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575742" comment="xpdf-tools-3.02-138.29.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575742" comment="xpdf-tools-3.02-138.29.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39786" version="1" class="patch">
	<metadata>
		<title>Security update for xpdf-tools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="661018" ref_url="https://bugzilla.suse.com/661018" source="BUGZILLA"/>
		<reference ref_id="664484" ref_url="https://bugzilla.suse.com/664484" source="BUGZILLA"/>
		<description>

This update of xpdf fixes an out-of-bounds write in CharCodeToUnicode.cc 
and a bad instruction pointer while parsing malformed PDF files.

Security Issue references:

    * CVE-2010-2642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642&gt;
    * CVE-2010-4653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4653&gt;
    * CVE-2010-4654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2011-01-26"/>
	<updated date="2011-01-26"/>
	<bugzilla href="https://bugzilla.suse.com/661018">SUSE bug 661018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664484">SUSE bug 664484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575743" comment="xpdf-tools-3.02-138.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575743" comment="xpdf-tools-3.02-138.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39787" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575744" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39788" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575745" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39789" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679343" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679344" comment="liblzma5-32bit-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679345" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679346" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39790" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<description>

This update for yast2-storage fixes the following issue:

- Use stdin, not tmp files for passwords (bsc#986971, CVE-2016-5746)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575746" comment="yast2-storage-2.17.99.5-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575747" comment="yast2-storage-lib-2.17.99.5-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39791" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="912771" ref_url="https://bugzilla.suse.com/912771" source="BUGZILLA"/>
		<reference ref_id="920442" ref_url="https://bugzilla.suse.com/920442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>

This update for zlib fixes the following issues:

CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)

Incompatible declarations for external linkage function deflate (bsc#1003577)

Empty text files compressed with gzip result in empty .gz file which cannot be uncompressed (bsc#920442)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912771">SUSE bug 912771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920442">SUSE bug 920442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575748" comment="zlib-1.2.7-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575749" comment="zlib-32bit-1.2.7-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575750" comment="zlib-devel-1.2.7-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575751" comment="zlib-devel-32bit-1.2.7-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39792" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677059" comment="zlib-1.2.7-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677060" comment="zlib-32bit-1.2.7-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677061" comment="zlib-devel-1.2.7-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677062" comment="zlib-devel-32bit-1.2.7-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39793" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-1100: Fixed a buffer overflow in
  utils.c:checkmailpath() that could lead to local arbitrary code
  execution ( bsc#1089030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575752" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39794" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671293" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39795" version="1" class="patch">
	<metadata>
		<title>Security update for zypper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP1</platform>
			<platform>SUSE Linux Enterprise Server 11 SP1-TERADATA</platform>
		</affected>
		<reference ref_id="770630" ref_url="https://bugzilla.suse.com/770630" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420/" source="CVE"/>
		<description>

The zypper setuid wrapper links against libzypp. This is not needed and 
adds unnecessary attack vectors. CVE-2012-0420 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-0420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp1:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575753" comment="zypper-1.3.21-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060800" comment="SUSE Linux Enterprise Server 11 SP1-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575753" comment="zypper-1.3.21-0.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39796" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="747320" ref_url="https://bugzilla.suse.com/747320" source="BUGZILLA"/>
		<reference ref_id="747328" ref_url="https://bugzilla.suse.com/747328" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 10.0.2 to fix a security issue with the 
embedded libpng, where a integer overflow could allow remote attackers to 
crash the browser or potentially execute code (CVE-2011-3026),

Security Issue reference:

    * CVE-2011-3026
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-20"/>
	<updated date="2012-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/747320">SUSE bug 747320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575754" comment="MozillaFirefox-10.0.2-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575755" comment="MozillaFirefox-translations-10.0.2-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39797" version="1" class="patch">
	<metadata>
		<title>Security update for ark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="708268" ref_url="https://bugzilla.suse.com/708268" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2725" ref_url="https://www.suse.com/security/cve/CVE-2011-2725/" source="CVE"/>
		<description>

Ark was prone to a path traversal vulnerability allowing a 
maliciously-crafted zip file to allow for an arbitrary file to be displayed 
and, if the user has appropriate credentials, removed (CVE-2011-2725).

Security Issue reference:

    * CVE-2011-2725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2725&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-29"/>
	<updated date="2012-02-29"/>
	<bugzilla href="https://bugzilla.suse.com/708268">SUSE bug 708268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2725/">CVE-2011-2725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570833" comment="ark-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570834" comment="kcalc-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570835" comment="kcharselect-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570836" comment="kdessh-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570837" comment="kdf-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570838" comment="kfloppy-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570839" comment="kgpg-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570840" comment="ktimer-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570841" comment="kwalletmanager-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570842" comment="kwikdisk-4.3.5-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570843" comment="okteta-4.3.5-0.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39798" version="1" class="patch">
	<metadata>
		<title>Security update for CVS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="744059" ref_url="https://bugzilla.suse.com/744059" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>

A heap-based buffer overflow flaw was found in the way CVS read proxy 
connection HTTP responses. An attacker could exploit this to cause the 
application to crash or, potentially, execute arbitrary code in the context 
of the user running the application (CVE-2012-0804).

Security Issue reference:

    * CVE-2012-0804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-22"/>
	<updated date="2012-02-22"/>
	<bugzilla href="https://bugzilla.suse.com/744059">SUSE bug 744059</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571182" comment="cvs-1.12.12-144.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571183" comment="cvs-doc-1.12.12-144.23.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39799" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 1.6.0</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="739248" ref_url="https://bugzilla.suse.com/739248" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3516" ref_url="https://www.suse.com/security/cve/CVE-2011-3516/" source="CVE"/>
		<reference ref_id="CVE-2011-3521" ref_url="https://www.suse.com/security/cve/CVE-2011-3521/" source="CVE"/>
		<reference ref_id="CVE-2011-3544" ref_url="https://www.suse.com/security/cve/CVE-2011-3544/" source="CVE"/>
		<reference ref_id="CVE-2011-3545" ref_url="https://www.suse.com/security/cve/CVE-2011-3545/" source="CVE"/>
		<reference ref_id="CVE-2011-3546" ref_url="https://www.suse.com/security/cve/CVE-2011-3546/" source="CVE"/>
		<reference ref_id="CVE-2011-3547" ref_url="https://www.suse.com/security/cve/CVE-2011-3547/" source="CVE"/>
		<reference ref_id="CVE-2011-3548" ref_url="https://www.suse.com/security/cve/CVE-2011-3548/" source="CVE"/>
		<reference ref_id="CVE-2011-3549" ref_url="https://www.suse.com/security/cve/CVE-2011-3549/" source="CVE"/>
		<reference ref_id="CVE-2011-3550" ref_url="https://www.suse.com/security/cve/CVE-2011-3550/" source="CVE"/>
		<reference ref_id="CVE-2011-3551" ref_url="https://www.suse.com/security/cve/CVE-2011-3551/" source="CVE"/>
		<reference ref_id="CVE-2011-3552" ref_url="https://www.suse.com/security/cve/CVE-2011-3552/" source="CVE"/>
		<reference ref_id="CVE-2011-3553" ref_url="https://www.suse.com/security/cve/CVE-2011-3553/" source="CVE"/>
		<reference ref_id="CVE-2011-3554" ref_url="https://www.suse.com/security/cve/CVE-2011-3554/" source="CVE"/>
		<reference ref_id="CVE-2011-3556" ref_url="https://www.suse.com/security/cve/CVE-2011-3556/" source="CVE"/>
		<reference ref_id="CVE-2011-3557" ref_url="https://www.suse.com/security/cve/CVE-2011-3557/" source="CVE"/>
		<reference ref_id="CVE-2011-3560" ref_url="https://www.suse.com/security/cve/CVE-2011-3560/" source="CVE"/>
		<reference ref_id="CVE-2011-3561" ref_url="https://www.suse.com/security/cve/CVE-2011-3561/" source="CVE"/>
		<description>

IBM Java 1.6.0 SR10 has been released fixing the following CVE's/security 
Issues:

    * CVE-2011-3389
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389&gt;
    * CVE-2011-3516
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3516&gt;
    * CVE-2011-3521
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3521&gt;
    * CVE-2011-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544&gt;
    * CVE-2011-3545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545&gt;
    * CVE-2011-3546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3546&gt;
    * CVE-2011-3547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547&gt;
    * CVE-2011-3548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548&gt;
    * CVE-2011-3549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549&gt;
    * CVE-2011-3550
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3550&gt;
    * CVE-2011-3551
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3551&gt;
    * CVE-2011-3552
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552&gt;
    * CVE-2011-3553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3553&gt;
    * CVE-2011-3554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3554&gt;
    * CVE-2011-3556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556&gt;
    * CVE-2011-3557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557&gt;
    * CVE-2011-3560
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560&gt;
    * CVE-2011-3561
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3561&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-23"/>
	<updated date="2012-02-23"/>
	<bugzilla href="https://bugzilla.suse.com/739248">SUSE bug 739248</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3516/">CVE-2011-3516</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3521/">CVE-2011-3521</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3544/">CVE-2011-3544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3545/">CVE-2011-3545</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3546/">CVE-2011-3546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3547/">CVE-2011-3547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3548/">CVE-2011-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3549/">CVE-2011-3549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3550/">CVE-2011-3550</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3551/">CVE-2011-3551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3552/">CVE-2011-3552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3553/">CVE-2011-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3554/">CVE-2011-3554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3556/">CVE-2011-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3557/">CVE-2011-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3560/">CVE-2011-3560</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3561/">CVE-2011-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575756" comment="java-1_6_0-ibm-1.6.0_sr10.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575757" comment="java-1_6_0-ibm-alsa-1.6.0_sr10.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575758" comment="java-1_6_0-ibm-fonts-1.6.0_sr10.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575759" comment="java-1_6_0-ibm-jdbc-1.6.0_sr10.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575760" comment="java-1_6_0-ibm-plugin-1.6.0_sr10.0-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39800" version="1" class="patch">
	<metadata>
		<title>Security update for libopenssl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="742821" ref_url="https://bugzilla.suse.com/742821" source="BUGZILLA"/>
		<reference ref_id="743344" ref_url="https://bugzilla.suse.com/743344" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<description>

This update of OpenSSL fixes a Denial of Services issue that could be 
triggered via unspecified vectors (CVE-2012-0050).

Also, the SHA256 and SHA512 algorithms are now enabled by default.

Security Issue reference:

    * CVE-2012-0050
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-09"/>
	<updated date="2012-02-09"/>
	<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743344">SUSE bug 743344</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575761" comment="libopenssl0_9_8-0.9.8j-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575762" comment="libopenssl0_9_8-32bit-0.9.8j-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575763" comment="libopenssl0_9_8-x86-0.9.8j-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575764" comment="openssl-0.9.8j-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575765" comment="openssl-doc-0.9.8j-0.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39801" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="747311" ref_url="https://bugzilla.suse.com/747311" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<description>

A heap-based buffer overflow in libpng was fixed that could potentially be 
exploited by attackers to execute arbitrary code or cause an application to 
crash (CVE-2011-3026).

Security Issue reference:

    * CVE-2011-3026
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-21"/>
	<updated date="2012-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/747311">SUSE bug 747311</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575766" comment="libpng12-0-1.2.31-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575767" comment="libpng12-0-32bit-1.2.31-5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575768" comment="libpng12-0-x86-1.2.31-5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39802" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="747912" ref_url="https://bugzilla.suse.com/747912" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>

Specially crafted Ogg files could cause a heap-based buffer overflow in the 
vorbis audio compression library that could potentially be exploited by 
attackers to cause a crash or execute arbitrary code (CVE-2012-0444).

Security Issue reference:

    * CVE-2012-0444
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-21"/>
	<updated date="2012-02-21"/>
	<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572525" comment="libvorbis-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572526" comment="libvorbis-32bit-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572527" comment="libvorbis-doc-1.2.0-79.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572528" comment="libvorbis-x86-1.2.0-79.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39803" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla XULrunner</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="747328" ref_url="https://bugzilla.suse.com/747328" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<description>

Mozilla XULRunner was updated to 1.9.2.27 to fix a security issue with the 
embedded libpng, where a integer overflow could allow remote attackers to 
crash the browser or potentially execute code (CVE-2011-3026),

Security Issue reference:

    * CVE-2011-3026
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-20"/>
	<updated date="2012-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572707" comment="mozilla-xulrunner192-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572708" comment="mozilla-xulrunner192-32bit-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572709" comment="mozilla-xulrunner192-gnome-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572710" comment="mozilla-xulrunner192-translations-1.9.2.27-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572711" comment="mozilla-xulrunner192-x86-1.9.2.27-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39804" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
		</affected>
		<reference ref_id="747657" ref_url="https://bugzilla.suse.com/747657" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1053" ref_url="https://www.suse.com/security/cve/CVE-2012-1053/" source="CVE"/>
		<reference ref_id="CVE-2012-1054" ref_url="https://www.suse.com/security/cve/CVE-2012-1054/" source="CVE"/>
		<description>

This update of puppet fixes two vulnerabilities that could potentially be 
exploited by local attackers to escalate privileges due to improper 
privilege dropping and file handling issues (symlink flaws) in puppet 
(CVE-2012-1053, CVE-2012-1054).

Security Issue references:

    * CVE-2012-1053
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1053&gt;
    * CVE-2012-1054
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1054&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-24"/>
	<updated date="2012-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/747657">SUSE bug 747657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1053/">CVE-2012-1053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1054/">CVE-2012-1054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575769" comment="puppet-2.6.12-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575770" comment="puppet-server-2.6.12-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39805" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570404" comment="MozillaFirefox-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570405" comment="MozillaFirefox-branding-SLED-24-0.4.10.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570406" comment="MozillaFirefox-translations-24.6.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570407" comment="libfreebl3-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570408" comment="libfreebl3-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570409" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570410" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575771" comment="mozilla-nspr-devel-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570411" comment="mozilla-nss-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570412" comment="mozilla-nss-32bit-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575772" comment="mozilla-nss-devel-3.16.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570413" comment="mozilla-nss-tools-3.16.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39806" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="754481" ref_url="https://bugzilla.suse.com/754481" source="BUGZILLA"/>
		<reference ref_id="773612" ref_url="https://bugzilla.suse.com/773612" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>

ImageMagick has been updated to fix an integer overflow (CVE-2012-3438).

Also a slowness in 'convert' when resizing JPEG images has been addressed 
(bnc#754481).

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-20"/>
	<updated date="2013-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/754481">SUSE bug 754481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575773" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575774" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575773" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575774" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39807" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575775" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575776" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39808" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575777" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575778" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39809" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575779" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575780" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39810" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821855" ref_url="https://bugzilla.suse.com/821855" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>

This update of Mesa fixes multiple integer overflows.

Security Issue reference:

    * CVE-2013-1993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575781" comment="Mesa-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575782" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575783" comment="Mesa-x86-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575781" comment="Mesa-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575782" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575783" comment="Mesa-x86-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39811" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575784" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575785" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575784" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575785" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575784" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575785" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39812" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 ESR.

It fixes the following security issues:

* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575786" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575787" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39813" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575788" comment="MozillaFirefox-38.8.0esr-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575789" comment="MozillaFirefox-translations-38.8.0esr-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39814" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated to version 3.21.1, mozilla-nspr to version 4.12.

These security issues were fixed in 45.3.0ESR:
- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)
- CVE-2016-2830: Favicon network connection can persist when page is closed (MFSA 2016-63)
- CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)
- CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 (MFSA 2016-65)
- CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA 2016-67)
- CVE-2016-5254: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)
- CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)
- CVE-2016-5259: Use-after-free in service workers with nested sync events (MFSA 2016-73)
- CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)
- CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)
- CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)
- CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)
- CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
- CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Security issues fixed in 45.2.0.ESR:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-12"/>
	<updated date="2016-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575790" comment="MozillaFirefox-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575791" comment="MozillaFirefox-branding-SLED-45.0-20.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575792" comment="MozillaFirefox-translations-45.3.0esr-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575793" comment="firefox-fontconfig-2.11.0-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575794" comment="libfreebl3-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575795" comment="libfreebl3-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575796" comment="mozilla-nspr-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575797" comment="mozilla-nspr-32bit-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575798" comment="mozilla-nspr-devel-4.12-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575799" comment="mozilla-nss-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575800" comment="mozilla-nss-32bit-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575801" comment="mozilla-nss-devel-3.21.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575802" comment="mozilla-nss-tools-3.21.1-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39815" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575803" comment="MozillaFirefox-45.4.0esr-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575804" comment="MozillaFirefox-translations-45.4.0esr-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39816" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575805" comment="MozillaFirefox-45.6.0esr-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575806" comment="MozillaFirefox-translations-45.6.0esr-66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39817" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This MozillaFirefox and mozilla-nss update fixes several security and 
non-security issues.

MozillaFirefox has been updated to version 24.5.0esr which fixes the 
following issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to version 3.16

    * required for Firefox 29
    * CVE-2014-1492_ In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570648" comment="MozillaFirefox-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570649" comment="MozillaFirefox-branding-SLED-24-0.4.10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570650" comment="MozillaFirefox-translations-24.5.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570651" comment="libfreebl3-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570652" comment="libfreebl3-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570653" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570654" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575807" comment="mozilla-nspr-devel-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570655" comment="mozilla-nss-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570656" comment="mozilla-nss-32bit-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575808" comment="mozilla-nss-devel-3.16-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570657" comment="mozilla-nss-tools-3.16-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39818" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<description>

This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#938344: qemu,kvm,xen: host code
  execution via IDE subsystem CD-ROM (CVE-2015-5154) 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575809" comment="xen-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575810" comment="xen-devel-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575811" comment="xen-doc-html-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575812" comment="xen-doc-pdf-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575813" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.29-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575814" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575815" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575816" comment="xen-libs-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575817" comment="xen-libs-32bit-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575818" comment="xen-tools-4.1.6_08-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575819" comment="xen-tools-domU-4.1.6_08-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39819" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="853039" ref_url="https://bugzilla.suse.com/853039" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<description>

This update fixes the following security issues with apache2-mod_nss:

    * bnc#853039: client certificate verification problematic
      (CVE-2013-4566)

Security Issue reference:

    * CVE-2013-4566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-03"/>
	<updated date="2013-12-03"/>
	<bugzilla href="https://bugzilla.suse.com/853039">SUSE bug 853039</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575820" comment="apache2-mod_nss-1.0.8-0.4.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575820" comment="apache2-mod_nss-1.0.8-0.4.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39820" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575821" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39821" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="837746" ref_url="https://bugzilla.suse.com/837746" source="BUGZILLA"/>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<description>

This update fixes the following issues:

    * memory corruption in openssl_parse_x509 (CVE-2013-6420)
    * man-in-the-middle attacks by specially crafting certificates
      (CVE-2013-4248)

Security Issue references:

    * CVE-2013-6420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420&gt;
    * CVE-2013-4248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/837746">SUSE bug 837746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575822" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575823" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575824" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575825" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575826" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575827" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575828" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575829" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575830" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575831" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575832" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575833" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575834" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575835" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575836" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575837" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575838" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575839" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575840" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575841" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575842" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575843" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575844" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575845" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575846" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575847" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575848" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575849" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575850" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575851" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575852" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575853" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575854" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575855" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575856" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575857" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575858" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575859" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575860" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575861" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575862" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575863" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575864" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575865" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575866" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575822" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575823" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575824" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575825" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575826" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575827" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575828" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575829" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575830" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575831" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575832" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575833" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575834" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575835" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575836" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575837" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575838" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575839" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575840" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575841" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575842" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575843" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575844" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575845" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575846" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575847" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575848" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575849" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575850" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575851" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575852" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575853" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575854" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575855" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575856" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575857" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575858" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575859" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575860" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575861" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575862" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575863" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575864" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575865" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575866" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575822" comment="apache2-mod_php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575823" comment="php5-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575824" comment="php5-bcmath-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575825" comment="php5-bz2-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575826" comment="php5-calendar-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575827" comment="php5-ctype-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575828" comment="php5-curl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575829" comment="php5-dba-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575830" comment="php5-dbase-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575831" comment="php5-dom-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575832" comment="php5-exif-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575833" comment="php5-fastcgi-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575834" comment="php5-ftp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575835" comment="php5-gd-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575836" comment="php5-gettext-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575837" comment="php5-gmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575838" comment="php5-hash-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575839" comment="php5-iconv-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575840" comment="php5-json-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575841" comment="php5-ldap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575842" comment="php5-mbstring-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575843" comment="php5-mcrypt-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575844" comment="php5-mysql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575845" comment="php5-odbc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575846" comment="php5-openssl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575847" comment="php5-pcntl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575848" comment="php5-pdo-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575849" comment="php5-pear-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575850" comment="php5-pgsql-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575851" comment="php5-pspell-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575852" comment="php5-shmop-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575853" comment="php5-snmp-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575854" comment="php5-soap-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575855" comment="php5-suhosin-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575856" comment="php5-sysvmsg-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575857" comment="php5-sysvsem-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575858" comment="php5-sysvshm-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575859" comment="php5-tokenizer-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575860" comment="php5-wddx-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575861" comment="php5-xmlreader-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575862" comment="php5-xmlrpc-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575863" comment="php5-xmlwriter-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575864" comment="php5-xsl-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575865" comment="php5-zip-5.2.14-0.7.30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575866" comment="php5-zlib-5.2.14-0.7.30.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39822" version="1" class="patch">
	<metadata>
		<title>Security update for PHP5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="854880" ref_url="https://bugzilla.suse.com/854880" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4248" ref_url="https://www.suse.com/security/cve/CVE-2013-4248/" source="CVE"/>
		<reference ref_id="CVE-2013-6420" ref_url="https://www.suse.com/security/cve/CVE-2013-6420/" source="CVE"/>
		<reference ref_id="CVE-2013-6712" ref_url="https://www.suse.com/security/cve/CVE-2013-6712/" source="CVE"/>
		<description>

This update fixes the following issues:

    * memory corruption in openssl_parse_x509 (CVE-2013-6420)
    * Heap buffer over-read in DateInterval (CVE-2013-6712)
    * man-in-the-middle attacks by specially crafting certificates
      (CVE-2013-4248)

Security Issue references:

    * CVE-2013-6420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420&gt;
    * CVE-2013-6712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712&gt;
    * CVE-2013-4248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/854880">SUSE bug 854880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4248/">CVE-2013-4248</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6420/">CVE-2013-6420</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6712/">CVE-2013-6712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575867" comment="apache2-mod_php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575868" comment="php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575869" comment="php53-bcmath-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575870" comment="php53-bz2-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575871" comment="php53-calendar-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575872" comment="php53-ctype-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575873" comment="php53-curl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575874" comment="php53-dba-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575875" comment="php53-dom-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575876" comment="php53-exif-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575877" comment="php53-fastcgi-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575878" comment="php53-fileinfo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575879" comment="php53-ftp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575880" comment="php53-gd-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575881" comment="php53-gettext-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575882" comment="php53-gmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575883" comment="php53-iconv-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575884" comment="php53-intl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575885" comment="php53-json-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575886" comment="php53-ldap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575887" comment="php53-mbstring-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575888" comment="php53-mcrypt-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575889" comment="php53-mysql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575890" comment="php53-odbc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575891" comment="php53-openssl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575892" comment="php53-pcntl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575893" comment="php53-pdo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575894" comment="php53-pear-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575895" comment="php53-pgsql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575896" comment="php53-pspell-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575897" comment="php53-shmop-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575898" comment="php53-snmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575899" comment="php53-soap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575900" comment="php53-suhosin-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575901" comment="php53-sysvmsg-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575902" comment="php53-sysvsem-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575903" comment="php53-sysvshm-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575904" comment="php53-tokenizer-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575905" comment="php53-wddx-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575906" comment="php53-xmlreader-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575907" comment="php53-xmlrpc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575908" comment="php53-xmlwriter-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575909" comment="php53-xsl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575910" comment="php53-zip-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575911" comment="php53-zlib-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575867" comment="apache2-mod_php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575868" comment="php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575869" comment="php53-bcmath-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575870" comment="php53-bz2-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575871" comment="php53-calendar-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575872" comment="php53-ctype-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575873" comment="php53-curl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575874" comment="php53-dba-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575875" comment="php53-dom-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575876" comment="php53-exif-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575877" comment="php53-fastcgi-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575878" comment="php53-fileinfo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575879" comment="php53-ftp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575880" comment="php53-gd-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575881" comment="php53-gettext-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575882" comment="php53-gmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575883" comment="php53-iconv-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575884" comment="php53-intl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575885" comment="php53-json-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575886" comment="php53-ldap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575887" comment="php53-mbstring-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575888" comment="php53-mcrypt-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575889" comment="php53-mysql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575890" comment="php53-odbc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575891" comment="php53-openssl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575892" comment="php53-pcntl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575893" comment="php53-pdo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575894" comment="php53-pear-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575895" comment="php53-pgsql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575896" comment="php53-pspell-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575897" comment="php53-shmop-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575898" comment="php53-snmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575899" comment="php53-soap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575900" comment="php53-suhosin-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575901" comment="php53-sysvmsg-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575902" comment="php53-sysvsem-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575903" comment="php53-sysvshm-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575904" comment="php53-tokenizer-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575905" comment="php53-wddx-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575906" comment="php53-xmlreader-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575907" comment="php53-xmlrpc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575908" comment="php53-xmlwriter-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575909" comment="php53-xsl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575910" comment="php53-zip-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575911" comment="php53-zlib-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575867" comment="apache2-mod_php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575868" comment="php53-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575869" comment="php53-bcmath-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575870" comment="php53-bz2-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575871" comment="php53-calendar-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575872" comment="php53-ctype-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575873" comment="php53-curl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575874" comment="php53-dba-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575875" comment="php53-dom-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575876" comment="php53-exif-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575877" comment="php53-fastcgi-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575878" comment="php53-fileinfo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575879" comment="php53-ftp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575880" comment="php53-gd-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575881" comment="php53-gettext-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575882" comment="php53-gmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575883" comment="php53-iconv-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575884" comment="php53-intl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575885" comment="php53-json-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575886" comment="php53-ldap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575887" comment="php53-mbstring-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575888" comment="php53-mcrypt-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575889" comment="php53-mysql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575890" comment="php53-odbc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575891" comment="php53-openssl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575892" comment="php53-pcntl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575893" comment="php53-pdo-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575894" comment="php53-pear-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575895" comment="php53-pgsql-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575896" comment="php53-pspell-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575897" comment="php53-shmop-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575898" comment="php53-snmp-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575899" comment="php53-soap-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575900" comment="php53-suhosin-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575901" comment="php53-sysvmsg-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575902" comment="php53-sysvsem-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575903" comment="php53-sysvshm-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575904" comment="php53-tokenizer-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575905" comment="php53-wddx-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575906" comment="php53-xmlreader-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575907" comment="php53-xmlrpc-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575908" comment="php53-xmlwriter-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575909" comment="php53-xsl-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575910" comment="php53-zip-5.3.8-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575911" comment="php53-zlib-5.3.8-0.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39823" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck' 
(CVE-2012-3386).

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue reference:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39824" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0011-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00018.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575915" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575915" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575915" comment="bind-devel-9.9.6P1-0.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39825" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575921" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575922" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575923" comment="bind-devel-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575924" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575925" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575926" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575927" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39826" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575928" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575929" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575930" comment="bind-devel-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575931" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575932" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575933" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575934" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39827" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575935" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575936" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575937" comment="bind-devel-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575938" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575939" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575940" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575941" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39828" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575942" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575943" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575944" comment="bind-devel-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575945" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575946" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575947" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575948" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39829" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575949" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575950" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575951" comment="bind-devel-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575952" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575953" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575954" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575955" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39830" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575956" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575957" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575958" comment="bind-devel-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575959" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575960" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575961" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575962" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39831" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575963" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575964" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575965" comment="bind-devel-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575966" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575967" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575968" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575969" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39832" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575970" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575971" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575972" comment="bind-devel-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575973" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575974" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575975" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575976" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39833" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575977" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39834" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="769799" ref_url="https://bugzilla.suse.com/769799" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>

Mono was updated to fix a cross site scripting attack in the System.Web 
class 'forbidden extensions' filtering has been fixed. (CVE-2012-3382)

Security Issue reference:

    * CVE-2012-3382
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-13"/>
	<updated date="2012-07-13"/>
	<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575978" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575979" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575980" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575981" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575982" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575983" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575984" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575985" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575978" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575979" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575980" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575981" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575982" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575983" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575984" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575985" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39835" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="817880" ref_url="https://bugzilla.suse.com/817880" source="BUGZILLA"/>
		<reference ref_id="838472" ref_url="https://bugzilla.suse.com/838472" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849226" ref_url="https://bugzilla.suse.com/849226" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="854520" ref_url="https://bugzilla.suse.com/854520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues with Samba:

    * bnc#844720: DCERPC frag_len not checked (CVE-2013-4408)
    * bnc#853347: winbind pam security problem (CVE-2012-6150)
    * bnc#848101: No access check verification on stream files
      (CVE-2013-4475)

And fixes the following non-security issues:

    * bnc#853021: libsmbclient0 package description contains comments
    * bnc#817880: rpcclient adddriver and setdrive do not set all needed
      registry entries
    * bnc#838472: Client trying to delete print job fails: Samba returns:
      WERR_INVALID_PRINTER_NAME
    * bnc#854520 and bnc#849226: various upstream fixes

Security Issue references:

    * CVE-2012-6150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150&gt;
    * CVE-2013-4408
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408&gt;
    * CVE-2013-4475
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/817880">SUSE bug 817880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838472">SUSE bug 838472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849226">SUSE bug 849226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854520">SUSE bug 854520</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575986" comment="ldapsmb-1.34b-12.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575987" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575988" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575989" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575990" comment="libsmbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575991" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575992" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575993" comment="libtalloc1-x86-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575994" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575995" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575996" comment="libtalloc2-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575997" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575998" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575999" comment="libtdb1-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576000" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576001" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576002" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576003" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576004" comment="libwbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576005" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576006" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576007" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576008" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576009" comment="samba-client-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576010" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576011" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576012" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576013" comment="samba-winbind-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576014" comment="samba-x86-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575986" comment="ldapsmb-1.34b-12.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575987" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575988" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575989" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575990" comment="libsmbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575991" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575992" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575993" comment="libtalloc1-x86-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575994" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575995" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575996" comment="libtalloc2-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575997" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575998" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575999" comment="libtdb1-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576000" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576001" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576002" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576003" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576004" comment="libwbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576005" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576006" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576007" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576008" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576009" comment="samba-client-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576010" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576011" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576012" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576013" comment="samba-winbind-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576014" comment="samba-x86-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575986" comment="ldapsmb-1.34b-12.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575987" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575988" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575989" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575990" comment="libsmbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575991" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575992" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575993" comment="libtalloc1-x86-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575994" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575995" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575996" comment="libtalloc2-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575997" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575998" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575999" comment="libtdb1-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576000" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576001" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576002" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576003" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576004" comment="libwbclient0-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576005" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576006" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576007" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576008" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576009" comment="samba-client-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576010" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576011" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576012" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576013" comment="samba-winbind-x86-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576014" comment="samba-x86-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39836" version="1" class="patch">
	<metadata>
		<title>Security update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="816865" ref_url="https://bugzilla.suse.com/816865" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<description>

This update contains clamav 0.97.8 which fixes security issues 
(bnc#816865):

    * CVE-2013-2020: Fix heap corruption
    * CVE-2013-2021: Fix overflow due to PDF key length computation.

Security Issue references:

    * CVE-2013-2020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020&gt;
    * CVE-2013-2021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576015" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576015" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576015" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39837" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="796243" ref_url="https://bugzilla.suse.com/796243" source="BUGZILLA"/>
		<reference ref_id="798538" ref_url="https://bugzilla.suse.com/798538" source="BUGZILLA"/>
		<reference ref_id="798541" ref_url="https://bugzilla.suse.com/798541" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>

This coreutils update fixes three minor security issues.

    * #798538 - VUL-1: CVE-2013-0221: segmentation fault in 'sort -d' and
      'sort -M' with long line input
    * #796243 - VUL-1: CVE-2013-0222: segmentation fault in 'uniq' with
      long line input
    * #798541 - VUL-1: CVE-2013-0223: segmentation fault in 'join -i' with
      long line input

Security Issue references:

    * CVE-2013-0221
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221&gt;
    * CVE-2013-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222&gt;
    * CVE-2013-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-17"/>
	<updated date="2013-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576016" comment="coreutils-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576017" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576018" comment="coreutils-x86-8.12-6.25.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576016" comment="coreutils-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576017" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576018" comment="coreutils-x86-8.12-6.25.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39838" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<description>

The following security issue has been fixed in the CUPS print daemon 
CVE-2012-5519:

The patch adds better default protection against misuse of privileges by 
normal users who have been specifically allowed by root to do cupsd 
configuration changes

The new ConfigurationChangeRestriction cupsd.conf directive specifies the 
level of restriction for cupsd.conf changes that happen via HTTP/IPP 
requests to the running cupsd (e.g. via CUPS web interface or via the 
cupsctl command).

By default certain cupsd.conf directives that deal with filenames, paths, 
and users can no longer be changed via requests to the running cupsd but 
only by manual editing the cupsd.conf file and its default file permissions 
permit only root to write the cupsd.conf file.

Those directives are: ConfigurationChangeRestriction, AccessLog, 
BrowseLDAPCACertFile, CacheDir, ConfigFilePerm, DataDir, DocumentRoot, 
ErrorLog, FileDevice, FontPath, Group, LogFilePerm, PageLog, Printcap, 
PrintcapFormat, PrintcapGUI, RemoteRoot, RequestRoot, ServerBin, 
ServerCertificate, ServerKey, ServerRoot, StateDir, SystemGroup, 
SystemGroupAuthKey, TempDir, User.

The default group of users who are allowed to do cupsd configuration 
changes
via requests to the running cupsd (i.e. the SystemGroup directive in 
cupsd.conf) is set to 'root' only.

Additionally the following bug has been fixed:

    * strip trailing '@REALM' from username for Kerberos authentication
      (CUPS STR#3972 bnc#827109)

Security Issue reference:

    * CVE-2012-5519
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576019" comment="cups-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576020" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576021" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576022" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576023" comment="cups-libs-x86-1.3.9-8.46.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576019" comment="cups-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576020" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576021" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576022" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576023" comment="cups-libs-x86-1.3.9-8.46.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39839" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<description>

This update fixes the re-use of wrong HTTP NTLM connections in libcurl. 
(CVE-2014-0015)

Security Issue reference:

    * CVE-2014-0015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-18"/>
	<updated date="2014-01-18"/>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576024" comment="curl-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576025" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576026" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576027" comment="libcurl4-x86-7.19.7-1.20.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576024" comment="curl-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576025" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576026" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576027" comment="libcurl4-x86-7.19.7-1.20.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39840" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="783002" ref_url="https://bugzilla.suse.com/783002" source="BUGZILLA"/>
		<reference ref_id="811934" ref_url="https://bugzilla.suse.com/811934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>

The ISC DHCP server had a denial of service issue in handling specific DDNS 
requests which could cause a out of memory usage situation. (CVE-2013-2266)

This update also adds a dhcp6-server service template for SuSEfirewall2 
(bnc#783002)

Security Issues:

    * CVE-2013-2266
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-27"/>
	<updated date="2013-03-27"/>
	<bugzilla href="https://bugzilla.suse.com/783002">SUSE bug 783002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576028" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576029" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576030" comment="dhcp-relay-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576031" comment="dhcp-server-4.2.4.P2-0.11.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576028" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576029" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576030" comment="dhcp-relay-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576031" comment="dhcp-server-4.2.4.P2-0.11.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39841" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002148.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-05"/>
	<updated date="2016-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576032" comment="dhcp-4.2.4.P2-0.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576033" comment="dhcp-client-4.2.4.P2-0.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576034" comment="dhcp-relay-4.2.4.P2-0.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576035" comment="dhcp-server-4.2.4.P2-0.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39842" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576036" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39843" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39844" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576038" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576039" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576040" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576041" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576042" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576043" comment="libfreebl3-x86-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576044" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576045" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576046" comment="mozilla-nspr-x86-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576047" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576048" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576049" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576050" comment="mozilla-nss-x86-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576038" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576039" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576040" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576041" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576042" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576043" comment="libfreebl3-x86-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576044" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576045" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576046" comment="mozilla-nspr-x86-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576047" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576048" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576049" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576050" comment="mozilla-nss-x86-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39845" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="783533" ref_url="https://bugzilla.suse.com/783533" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.9ESR security release which fixes 
bugs and security issues:

    * 

      MFSA 2012-73 / CVE-2012-3977: Security researchers Thai Duong and
      Juliano Rizzo reported that SPDY's request header compression leads
      to information leakage, which can allow the extraction of private
      data such as session cookies, even over an encrypted SSL connection.
      (This does not affect Firefox 10 as it does not feature the SPDY
      extension. It was silently fixed for Firefox 15.)

    * 

      MFSA 2012-74: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-3983: Henrik Skupin, Jesse Ruderman and moz_bug_r_a4
      reported memory safety problems and crashes that affect Firefox 15.

    * 

      CVE-2012-3982: Christian Holler and Jesse Ruderman reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      15.

    * 

      MFSA 2012-75 / CVE-2012-3984: Security researcher David Bloom of Cue
      discovered that 'select' elements are always-on-top chromeless
      windows and that navigation away from a page with an active 'select'
      menu does not remove this window.When another menu is opened
      programmatically on a new page, the original 'select' menu can be
      retained and arbitrary HTML content within it rendered, allowing an
      attacker to cover arbitrary portions of the new page through absolute
      positioning/scrolling, leading to spoofing attacks. Security
      researcher Jordi Chancel found a variation that would allow for
      click-jacking attacks was well.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Navigation away from a page with an active 'select' dropdown menu can
      be used for URL spoofing, other evil

      Firefox 10.0.1 : Navigation away from a page with multiple active
      'select' dropdown menu can be used for Spoofing And ClickJacking with
      XPI using window.open and geolocalisation

    * 

      MFSA 2012-76 / CVE-2012-3985: Security researcher Collin Jackson
      reported a violation of the HTML5 specifications for document.domain
      behavior. Specified behavior requires pages to only have access to
      windows in a new document.domain but the observed violation allowed
      pages to retain access to windows from the page's initial origin in
      addition to the new document.domain. This could potentially lead to
      cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-77 / CVE-2012-3986: Mozilla developer Johnny Stenback
      discovered that several methods of a feature used for testing
      (DOMWindowUtils) are not protected by existing security checks,
      allowing these methods to be called through script by web pages. This
      was addressed by adding the existing security checks to these
      methods.

    * 

      MFSA 2012-78 / CVE-2012-3987: Security researcher Warren He reported
      that when a page is transitioned into Reader Mode in Firefox for
      Android, the resulting page has chrome privileges and its content is
      not thoroughly sanitized. A successful attack requires user enabling
      of reader mode for a malicious page, which could then perform an
      attack similar to cross-site scripting (XSS) to gain the privileges
      allowed to Firefox on an Android device. This has been fixed by
      changing the Reader Mode page into an unprivileged page.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-79 / CVE-2012-3988: Security researcher Soroush Dalili
      reported that a combination of invoking full screen mode and
      navigating backwards in history could, in some circumstances, cause a
      hang or crash due to a timing dependent use-after-free pointer
      reference. This crash may be potentially exploitable.

    * 

      MFSA 2012-80 / CVE-2012-3989: Mozilla community member Ms2ger
      reported a crash due to an invalid cast when using the instanceof
      operator on certain types of JavaScript objects. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-81 / CVE-2012-3991: Mozilla community member Alice White
      reported that when the GetProperty function is invoked through JSAPI,
      security checking can be bypassed when getting cross-origin
      properties. This potentially allowed for arbitrary code execution.

    * 

      MFSA 2012-82 / CVE-2012-3994: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location and top can be shadowed by Object.defineProperty
      as well. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

    * 

      MFSA 2012-83: Security researcher Mariusz Mlynski reported that when
      InstallTrigger fails, it throws an error wrapped in a Chrome Object
      Wrapper (COW) that fails to specify exposed properties. These can
      then be added to the resulting object by an attacker, allowing access
      to chrome privileged functions through script.

      While investigating this issue, Mozilla security researcher
      moz_bug_r_a4 found that COW did not disallow accessing of properties
      from a standard prototype in some situations, even when the original
      issue had been fixed.

      These issues could allow for a cross-site scripting (XSS) attack or
      arbitrary code execution.

    * 

      CVE-2012-3993: XrayWrapper pollution via unsafe COW

    * 

      CVE-2012-4184: ChromeObjectWrapper is not implemented as intended

    * 

      MFSA 2012-84 / CVE-2012-3992: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, writes to location.hash can be used in concert with scripted
      history navigation to cause a specific website to be loaded into the
      history object. The baseURI can then be changed to this stored site,
      allowing an attacker to inject a script or intercept posted data
      posted to a location specified with a relative path.

    * 

      MFSA 2012-85: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series of use-after-free,
      buffer overflow, and out of bounds read issues using the Address
      Sanitizer tool in shipped software. These issues are potentially
      exploitable, allowing for remote code execution. We would also like
      to thank Abhishek for reporting two additional use-after-free flaws
      introduced during Firefox 16 development and fixed before general
      release.

    * 

      CVE-2012-3995: Out of bounds read in IsCSSWordSpacingSpace

    * 

      CVE-2012-4179: Heap-use-after-free in
      nsHTMLCSSUtils::CreateCSSPropertyTxn

    * 

      CVE-2012-4180: Heap-buffer-overflow in
      nsHTMLEditor::IsPrevCharInNodeWhitespace

    * 

      CVE-2012-4181: Heap-use-after-free in
      nsSMILAnimationController::DoSample

    * 

      CVE-2012-4182: Heap-use-after-free in nsTextEditRules::WillInsert

    * 

      CVE-2012-4183: Heap-use-after-free in
      DOMSVGTests::GetRequiredFeatures

    * 

      MFSA 2012-86: Security researcher Atte Kettunen from OUSPG reported
      several heap memory corruption issues found using the Address
      Sanitizer tool. These issues are potentially exploitable, allowing
      for remote code execution.

    * 

      CVE-2012-4185: Global-buffer-overflow in nsCharTraits::length

    * 

      CVE-2012-4186: Heap-buffer-overflow in nsWaveReader::DecodeAudioData

    * 

      CVE-2012-4187: Crash with ASSERTION: insPos too small

    * 

      CVE-2012-4188: Heap-buffer-overflow in Convolve3x3

    * 

      MFSA 2012-87 / CVE-2012-3990: Security researcher miaubiz used the
      Address Sanitizer tool to discover a use-after-free in the IME State
      Manager code. This could lead to a potentially exploitable crash.

    * 

      MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla security
      researcher moz_bug_r_a4 reported a regression where security wrappers
      are unwrapped without doing a security check in defaultValue(). This
      can allow for improper access access to the Location object. In
      versions 15 and earlier of affected products, there was also the
      potential for arbitrary code execution.

Security Issue reference:

    * CVE-2012-3977
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977&gt;
    * CVE-2012-3982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982&gt;
    * CVE-2012-3983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983&gt;
    * CVE-2012-3984
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984&gt;
    * CVE-2012-3985
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985&gt;
    * CVE-2012-3986
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986&gt;
    * CVE-2012-3987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987&gt;
    * CVE-2012-3988
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988&gt;
    * CVE-2012-3989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989&gt;
    * CVE-2012-3990
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990&gt;
    * CVE-2012-3991
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991&gt;
    * CVE-2012-3992
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992&gt;
    * CVE-2012-3993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993&gt;
    * CVE-2012-3994
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994&gt;
    * CVE-2012-3995
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995&gt;
    * CVE-2012-4179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179&gt;
    * CVE-2012-4180
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180&gt;
    * CVE-2012-4181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181&gt;
    * CVE-2012-4182
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182&gt;
    * CVE-2012-4183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183&gt;
    * CVE-2012-4184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184&gt;
    * CVE-2012-4185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185&gt;
    * CVE-2012-4186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186&gt;
    * CVE-2012-4187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187&gt;
    * CVE-2012-4188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188&gt;
    * CVE-2012-4192
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192&gt;
    * CVE-2012-4193
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576051" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576052" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576053" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576051" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576052" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576053" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39846" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issue has been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576054" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576055" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576056" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576057" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576058" comment="mozilla-nspr-x86-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576054" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576055" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576056" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576057" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576058" comment="mozilla-nspr-x86-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39847" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576059" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576060" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576061" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576062" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576063" comment="libfreebl3-x86-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576064" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576065" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576066" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576067" comment="mozilla-nss-x86-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576059" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576060" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576061" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576062" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576063" comment="libfreebl3-x86-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576064" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576065" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576066" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576067" comment="mozilla-nss-x86-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39848" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576068" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576069" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576070" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576071" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576072" comment="libfreebl3-x86-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576073" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576074" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576075" comment="mozilla-nspr-x86-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576076" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576077" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576078" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576079" comment="mozilla-nss-x86-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576068" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576069" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576070" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576071" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576072" comment="libfreebl3-x86-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576073" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576074" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576075" comment="mozilla-nspr-x86-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576076" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576077" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576078" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576079" comment="mozilla-nss-x86-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39849" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="808243" ref_url="https://bugzilla.suse.com/808243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.4ESR release which fixes one 
important security issue:

    * MFSA 2013-29 / CVE-2013-0787: VUPEN Security, via TippingPoint's Zero
      Day Initiative, reported a use-after-free within the HTML editor when
      content script is run by the document.execCommand() function while
      internal editor operations are occurring. This could allow for
      arbitrary code execution.

Security Issue reference:

    * CVE-2013-0787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-11"/>
	<updated date="2013-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576080" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576081" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576082" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576083" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576084" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576085" comment="libfreebl3-x86-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576086" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576087" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576088" comment="mozilla-nspr-x86-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576089" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576090" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576091" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576092" comment="mozilla-nss-x86-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576080" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576081" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576082" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576083" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576084" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576085" comment="libfreebl3-x86-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576086" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576087" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576088" comment="mozilla-nspr-x86-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576089" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576090" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576091" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576092" comment="mozilla-nss-x86-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39850" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android

    * 

      (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576093" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576094" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576095" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576096" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576097" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576098" comment="libfreebl3-x86-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576099" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576100" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576101" comment="mozilla-nspr-x86-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576102" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576103" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576104" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576105" comment="mozilla-nss-x86-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576093" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576094" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576095" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576096" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576097" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576098" comment="libfreebl3-x86-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576099" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576100" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576101" comment="mozilla-nspr-x86-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576102" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576103" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576104" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576105" comment="mozilla-nss-x86-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39851" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the17.0.6ESR security release.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-17"/>
	<updated date="2013-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576106" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576107" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576106" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576107" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39852" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, fixing bugs and 
security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

Security Issue references:

    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-28"/>
	<updated date="2013-06-28"/>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576108" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576109" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576110" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576108" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576109" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576110" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39853" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 17.0.10ESR release, fixing various bugs 
and security issues:

MFSA 2013-93: Mozilla developers identified and fixed several memory safety 
bugs in the browser engine used in Firefox and other Mozilla-based 
products. Some of these bugs showed evidence of memory corruption under 
certain circumstances, and we presume that with enough effort at least some 
of these could be exploited to run arbitrary code.

Jesse Ruderman and Christoph Diehl reported memory safety problems and 
crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox 24. 
(CVE-2013-5590)

Carsten Book reported a crash fixed in the NSS library used by 
Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and Firefox 
ESR 17.0.10.(CVE-2013-1739)

MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya (Inferno) 
of the Google Chrome Security Team used the Address Sanitizer tool to 
discover an access violation due to uninitialized data during Extensible 
Stylesheet Language Transformation (XSLT) processing. This leads to a 
potentially exploitable crash.

MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google 
discovered a flaw in the JavaScript engine where memory was being 
incorrectly allocated for some functions and the calls for allocations were 
not always properly checked for overflow, leading to potential buffer 
overflows. When combined with other vulnerabilities, these flaws could be 
potentially exploitable.

MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of 
Georgia Tech Information Security Center (GTISC) used the Address Sanitizer 
tool to discover a use-after-free during state change events while updating 
the offline cache. This leads to a potentially exploitable crash.

MFSA 2013-100: Security researcher Nils used the Address Sanitizer tool 
while fuzzing to discover missing strong references in browsing engine 
leading to use-after-frees. This can lead to a potentially exploitable 
crash.

    * ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
      canvas, onresize and mozTextStyle (CVE-2013-5599)
    * ASAN use-after-free in nsIOService::NewChannelFromURIWithProxyFlags
      with Blob URL (CVE-2013-5600)
    * ASAN use-after free in GC allocation in
      nsEventListenerManager::SetEventHandler (CVE-2013-5601)

MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the Address 
Sanitizer tool while fuzzing to discover a memory corruption issue with the 
JavaScript engine when using workers with direct proxies. This results in a 
potentially exploitable crash.

Security Issues:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-09"/>
	<updated date="2013-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576111" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576112" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576113" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576111" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576112" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576113" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39854" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.3.0ESR security release.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Also Mozilla NSS was updated to 3.15.4 release.

    * required for Firefox 27
    * regular CA root store update (1.96)
    * some OSCP improvments
    * other bugfixes

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571388" comment="MozillaFirefox-24.3.0esr-0.4.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571389" comment="MozillaFirefox-branding-SLED-24-0.4.10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571390" comment="MozillaFirefox-translations-24.3.0esr-0.4.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571391" comment="firefox-libgcc_s1-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571392" comment="firefox-libstdc++6-4.7.2_20130108-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571393" comment="libfreebl3-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571394" comment="libfreebl3-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571395" comment="mozilla-nspr-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571396" comment="mozilla-nspr-32bit-4.10.2-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571397" comment="mozilla-nss-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571398" comment="mozilla-nss-32bit-3.15.4-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571399" comment="mozilla-nss-tools-3.15.4-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39855" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571404" comment="MozillaFirefox-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571405" comment="MozillaFirefox-translations-24.7.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571406" comment="libfreebl3-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571407" comment="libfreebl3-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571408" comment="mozilla-nss-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571409" comment="mozilla-nss-32bit-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576114" comment="mozilla-nss-devel-3.16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571410" comment="mozilla-nss-tools-3.16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39856" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571411" comment="MozillaFirefox-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571412" comment="MozillaFirefox-translations-24.8.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571413" comment="libfreebl3-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571414" comment="libfreebl3-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571415" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571416" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576115" comment="mozilla-nspr-devel-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571417" comment="mozilla-nss-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571418" comment="mozilla-nss-32bit-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576116" comment="mozilla-nss-devel-3.16.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571419" comment="mozilla-nss-tools-3.16.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39857" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571420" comment="MozillaFirefox-31.3.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571421" comment="MozillaFirefox-translations-31.3.0esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39858" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="906111" ref_url="https://bugzilla.suse.com/906111" source="BUGZILLA"/>
		<reference ref_id="909563" ref_url="https://bugzilla.suse.com/909563" source="BUGZILLA"/>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-15"/>
	<updated date="2015-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/906111">SUSE bug 906111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909563">SUSE bug 909563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571422" comment="MozillaFirefox-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571423" comment="MozillaFirefox-translations-31.4.0esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571424" comment="libfreebl3-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571425" comment="libfreebl3-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571426" comment="mozilla-nss-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571427" comment="mozilla-nss-32bit-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576117" comment="mozilla-nss-devel-3.17.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571428" comment="mozilla-nss-tools-3.17.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39859" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitrary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571429" comment="MozillaFirefox-31.5.3esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571430" comment="MozillaFirefox-translations-31.5.3esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39860" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="943557" ref_url="https://bugzilla.suse.com/943557" source="BUGZILLA"/>
		<reference ref_id="943558" ref_url="https://bugzilla.suse.com/943558" source="BUGZILLA"/>
		<reference ref_id="943608" ref_url="https://bugzilla.suse.com/943608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 38.2.1 ESR, fixing two severe security bugs. (bsc#943608)

* MFSA 2015-94/CVE-2015-4497 (bsc#943557): Use-after-free when resizing canvas element during restyling
* MFSA 2015-95/CVE-2015-4498 (bsc#943558): Add-on notification bypass through data URLs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-04"/>
	<updated date="2015-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571433" comment="MozillaFirefox-38.2.1esr-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571434" comment="MozillaFirefox-translations-38.2.1esr-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39861" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576118" comment="MozillaFirefox-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576119" comment="MozillaFirefox-translations-38.3.0esr-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576120" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576121" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576122" comment="mozilla-nspr-devel-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39862" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576123" comment="MozillaFirefox-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576124" comment="MozillaFirefox-branding-SLED-38-12.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576125" comment="MozillaFirefox-translations-38.4.0esr-25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576126" comment="libfreebl3-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576127" comment="libfreebl3-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576128" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576129" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576130" comment="mozilla-nspr-devel-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576131" comment="mozilla-nss-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576132" comment="mozilla-nss-32bit-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576133" comment="mozilla-nss-devel-3.19.2.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576134" comment="mozilla-nss-tools-3.19.2.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39863" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894), fixing
following security issues:
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  Memory leak in libstagefright when deleting an array during
  MP4 processing
* MFSA 2016-21/CVE-2016-1958
  Displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  Use-after-free in HTML5 string parser
* MFSA 2016-24/CVE-2016-1961
  Use-after-free in SetBody
* MFSA 2016-25/CVE-2016-1962
  Use-after-free when using multiple WebRTC data channels
* MFSA 2016-27/CVE-2016-1964
  Use-after-free during XML transformations
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin
* MFSA 2016-34/CVE-2016-1974
  Out-of-bounds read in HTML parser following a failed
  allocation
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Font vulnerabilities in the Graphite 2 library

Mozilla NSPR was updated to version 4.12 (bsc#969894), fixing following bugs:
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes

Mozilla NSS was updated to fix security issues (bsc#969894):
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576135" comment="MozillaFirefox-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576136" comment="MozillaFirefox-translations-38.7.0esr-36.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576137" comment="libfreebl3-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576138" comment="libfreebl3-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576139" comment="mozilla-nspr-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576140" comment="mozilla-nspr-32bit-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576141" comment="mozilla-nspr-devel-4.12-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576142" comment="mozilla-nss-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576143" comment="mozilla-nss-32bit-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576144" comment="mozilla-nss-devel-3.20.2-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576145" comment="mozilla-nss-tools-3.20.2-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39864" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571585" comment="MozillaFirefox-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571586" comment="MozillaFirefox-branding-SLED-31.0-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571587" comment="MozillaFirefox-translations-31.2.0esr-0.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571588" comment="libfreebl3-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571589" comment="libfreebl3-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571590" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571591" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576146" comment="mozilla-nspr-devel-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571592" comment="mozilla-nss-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571593" comment="mozilla-nss-32bit-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576147" comment="mozilla-nss-devel-3.17.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571594" comment="mozilla-nss-tools-3.17.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39865" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="791666" ref_url="https://bugzilla.suse.com/791666" source="BUGZILLA"/>
		<reference ref_id="797313" ref_url="https://bugzilla.suse.com/797313" source="BUGZILLA"/>
		<reference ref_id="797515" ref_url="https://bugzilla.suse.com/797515" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4966" ref_url="https://www.suse.com/security/cve/CVE-2011-4966/" source="CVE"/>
		<description>

This update for freeradius-server provides the following fixes and 
improvements:

    * Increase the vendor IDs limit from 32767 to 65535 (bnc#791666)
    * Fix issues with escaping special characters in password (bnc#797515)
    * Respect expired passwords and accounts when using the unix module
      (bnc#797313, CVE-2011-4966).

Security Issue reference:

    * CVE-2011-4966
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4966&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-23"/>
	<updated date="2013-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/791666">SUSE bug 791666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797313">SUSE bug 797313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797515">SUSE bug 797515</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4966/">CVE-2011-4966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576148" comment="freeradius-server-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576149" comment="freeradius-server-dialupadmin-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576150" comment="freeradius-server-doc-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576151" comment="freeradius-server-libs-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576152" comment="freeradius-server-utils-2.1.1-7.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576148" comment="freeradius-server-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576149" comment="freeradius-server-dialupadmin-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576150" comment="freeradius-server-doc-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576151" comment="freeradius-server-libs-2.1.1-7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576152" comment="freeradius-server-utils-2.1.1-7.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39866" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="795826" ref_url="https://bugzilla.suse.com/795826" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<description>

This update fixes:

    * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668
      and CVE-2012-5669)

As well as the following non-security bugs:

    * [bdf] Savannah bug #37905.
          o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero
            in case of allocation error; this value gets used in a loop in
    * [bdf] Fix Savannah bug #37906.
          o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size
            for checking `glyph_enc'.

Security Issue references:

    * CVE-2012-5668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668&gt;
    * CVE-2012-5669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-15"/>
	<updated date="2013-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576153" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576154" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576155" comment="freetype2-x86-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576156" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576153" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576154" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576155" comment="freetype2-x86-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576156" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39867" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="779700" ref_url="https://bugzilla.suse.com/779700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>

This update fixes an array index error leading to a heap-based buffer 
overflow in ghostscript-library. CVE-2012-4405 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-4405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-12"/>
	<updated date="2012-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576157" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576158" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576159" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576160" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576161" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576162" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576163" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576157" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576158" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576159" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576160" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576161" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576162" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576163" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39868" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576164" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576165" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576166" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576167" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576168" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576169" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576170" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39869" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="791928" ref_url="https://bugzilla.suse.com/791928" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="811979" ref_url="https://bugzilla.suse.com/811979" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="818628" ref_url="https://bugzilla.suse.com/818628" source="BUGZILLA"/>
		<reference ref_id="819347" ref_url="https://bugzilla.suse.com/819347" source="BUGZILLA"/>
		<reference ref_id="822210" ref_url="https://bugzilla.suse.com/822210" source="BUGZILLA"/>
		<reference ref_id="827811" ref_url="https://bugzilla.suse.com/827811" source="BUGZILLA"/>
		<reference ref_id="828235" ref_url="https://bugzilla.suse.com/828235" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<description>

This update for glibc contains the following fixes:

    * Fix integer overflows in malloc (CVE-2013-4332, bnc#839870)
    * Fix buffer overflow in glob (bnc#691365)
    * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320)
    * Update mount flags in &lt;sys/mount.h&gt; (bnc#791928)
    * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246)
    * Fix memory leaks in dlopen (bnc#811979)
    * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914,
      bnc#813121)
    * Fix check for XEN build in glibc_post_upgrade that causes missing
      init re-exec (bnc#818628)
    * Don't raise UNDERFLOW in tan/tanf for small but normal argument
      (bnc#819347)
    * Properly cross page boundary in SSE4.2 implementation of strcmp
      (bnc#822210)
    * Fix robust mutex handling after fork (bnc#827811)
    * Fix missing character in IBM-943 charset (bnc#828235)
    * Fix use of alloca in gaih_inet (bnc#828637)
    * Initialize pointer guard also in static executables (CVE-2013-4788,
      bnc#830268)
    * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).

Security Issues:

    * CVE-2012-4412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412&gt;
    * CVE-2013-0242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242&gt;
    * CVE-2013-1914
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914&gt;
    * CVE-2013-4237
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237&gt;
    * CVE-2013-4332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332&gt;
    * CVE-2013-4788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-13"/>
	<updated date="2013-09-13"/>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791928">SUSE bug 791928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811979">SUSE bug 811979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818628">SUSE bug 818628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819347">SUSE bug 819347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822210">SUSE bug 822210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827811">SUSE bug 827811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828235">SUSE bug 828235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576171" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576172" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576173" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576174" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576175" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576176" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576177" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576178" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576179" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576180" comment="glibc-locale-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576181" comment="glibc-profile-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576182" comment="glibc-profile-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576183" comment="glibc-profile-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576184" comment="glibc-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576185" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576171" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576172" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576173" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576174" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576175" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576176" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576177" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576178" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576179" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576180" comment="glibc-locale-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576181" comment="glibc-profile-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576182" comment="glibc-profile-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576183" comment="glibc-profile-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576184" comment="glibc-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576185" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576171" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576172" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576173" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576174" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576175" comment="glibc-html-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576176" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576177" comment="glibc-info-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576178" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576179" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576180" comment="glibc-locale-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576181" comment="glibc-profile-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576182" comment="glibc-profile-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576183" comment="glibc-profile-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576184" comment="glibc-x86-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576185" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39870" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="847227" ref_url="https://bugzilla.suse.com/847227" source="BUGZILLA"/>
		<reference ref_id="863499" ref_url="https://bugzilla.suse.com/863499" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="945779" ref_url="https://bugzilla.suse.com/945779" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)
- CVE-2013-2207: pt_chown tricked into granting access to another users pseudo-terminal (bsc#830257)
- CVE-2013-4458: Stack (frame) overflow in getaddrinfo() when called with AF_INET6 (bsc#847227)
- CVE-2014-8121: denial of service issue in the NSS backends (bsc#918187)
- bsc#920338: Read past end of pattern in fnmatch
- CVE-2015-1781: buffer overflow in nss_dns (bsc#927080)

The following non-security bugs were fixed:

- bnc#892065: SIGSEV tst-setlocale3 in glibc-2.11.3-17.68.1
- bnc#863499: Memory leak in getaddrinfo when many RRs are returned 
- bsc#892065: Avoid unbound alloca in setenv
- bsc#945779: Properly reread entry after failure in nss_files getent function
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863499">SUSE bug 863499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576186" comment="glibc-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576187" comment="glibc-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576188" comment="glibc-devel-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576189" comment="glibc-devel-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576190" comment="glibc-html-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576191" comment="glibc-i18ndata-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576192" comment="glibc-info-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576193" comment="glibc-locale-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576194" comment="glibc-locale-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576195" comment="glibc-profile-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576196" comment="glibc-profile-32bit-2.11.3-17.45.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576197" comment="nscd-2.11.3-17.45.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39871" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<description>

This update of GnuTLS fixes a regression introduced by the previous update 
that could have resulted in a Denial of Service (application crash).

Security Issue reference:

    * CVE-2013-2116
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-28"/>
	<updated date="2013-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576198" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576199" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576200" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576201" comment="libgnutls26-x86-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576198" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576199" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576200" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576201" comment="libgnutls26-x86-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576198" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562931" comment="libgnutls-extra26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576199" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576200" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576201" comment="libgnutls26-x86-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39872" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="840510" ref_url="https://bugzilla.suse.com/840510" source="BUGZILLA"/>
		<reference ref_id="844175" ref_url="https://bugzilla.suse.com/844175" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<description>

This GnuPG update fixes two security issues:

    * CVE-2013-4351: GnuPG treated no-usage-permitted keys as
      all-usages-permitted.
    * CVE-2013-4402: An infinite recursion in the compressed packet parser
      was fixed.

Security Issue reference:

    * CVE-2013-4351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351&gt;
    * CVE-2013-4402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576202" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576203" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576202" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576203" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39873" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576204" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576205" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576206" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576207" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576208" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576204" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576205" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576206" comment="gtk2-doc-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576207" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576208" comment="gtk2-x86-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39874" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log)

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39875" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<description>

This update is rereleased because some architectures were missed on the 
first try. It fixes the following security issues:

    * Specially crafted strings could cause a buffer overflow in icu (
      CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt; )
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-19"/>
	<updated date="2012-12-19"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576211" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576212" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576213" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576214" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576211" comment="libicu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576212" comment="libicu-32bit-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576213" comment="libicu-doc-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576214" comment="libicu-x86-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39876" version="1" class="patch">
	<metadata>
		<title>Security update for inn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="776967" ref_url="https://bugzilla.suse.com/776967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3523" ref_url="https://www.suse.com/security/cve/CVE-2012-3523/" source="CVE"/>
		<description>

A STARTTLS injection issue has been fixed in inn. CVE-2012-3523 was 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3523&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-05"/>
	<updated date="2012-09-05"/>
	<bugzilla href="https://bugzilla.suse.com/776967">SUSE bug 776967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3523/">CVE-2012-3523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576215" comment="inn-2.4.2-170.21.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576215" comment="inn-2.4.2-170.21.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39877" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="846174" ref_url="https://bugzilla.suse.com/846174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<description>

jakarta-commons-fileupload received a security fix:

    * A poison null byte flaw was found in the implementation of the
      DiskFileItem class. A remote attacker could able to supply a
      serialized instance of the DiskFileItem class, which would be
      deserialized on a server, could use this flaw to write arbitrary
      content to any location on the server that is permitted by the user
      running the application server process. (CVE-2013-2186)

Security Issue reference:

    * CVE-2013-2186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571998" comment="jakarta-commons-fileupload-1.1.1-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571999" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571998" comment="jakarta-commons-fileupload-1.1.1-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571999" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39878" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="803332" ref_url="https://bugzilla.suse.com/803332" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>

The following issue has been fixed:

    * SSL certificate hostname verification was not done and is fixed by
      this update. (CVE-2012-5783)

Security Issue reference:

    * CVE-2012-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-28"/>
	<updated date="2013-03-28"/>
	<bugzilla href="https://bugzilla.suse.com/803332">SUSE bug 803332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572000" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572000" comment="jakarta-commons-httpclient3-3.0.1-253.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39879" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_4_2-ibm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="823034" ref_url="https://bugzilla.suse.com/823034" source="BUGZILLA"/>
		<reference ref_id="829212" ref_url="https://bugzilla.suse.com/829212" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2464" ref_url="https://www.suse.com/security/cve/CVE-2013-2464/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3009" ref_url="https://www.suse.com/security/cve/CVE-2013-3009/" source="CVE"/>
		<reference ref_id="CVE-2013-3011" ref_url="https://www.suse.com/security/cve/CVE-2013-3011/" source="CVE"/>
		<reference ref_id="CVE-2013-3012" ref_url="https://www.suse.com/security/cve/CVE-2013-3012/" source="CVE"/>
		<description>

IBM Java 1.4.2 was updated to SR13-FP18 to fix bugs and security issues.

Please see also
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Also the following bug has been fixed:

    * mark files in jre/bin and bin/ as executable (bnc#823034)

Security Issue references:

    * CVE-2013-3009
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009&gt;
    * CVE-2013-3011
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011&gt;
    * CVE-2013-3012
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012&gt;
    * CVE-2013-2469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469&gt;
    * CVE-2013-2465
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465&gt;
    * CVE-2013-2464
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464&gt;
    * CVE-2013-2463
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463&gt;
    * CVE-2013-2473
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473&gt;
    * CVE-2013-2472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472&gt;
    * CVE-2013-2471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471&gt;
    * CVE-2013-2470
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470&gt;
    * CVE-2013-2459
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459&gt;
    * CVE-2013-2456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456&gt;
    * CVE-2013-2447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447&gt;
    * CVE-2013-2452
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452&gt;
    * CVE-2013-2446
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446&gt;
    * CVE-2013-2450
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450&gt;
    * CVE-2013-1500
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-23"/>
	<updated date="2013-07-23"/>
	<bugzilla href="https://bugzilla.suse.com/823034">SUSE bug 823034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2464/">CVE-2013-2464</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3009/">CVE-2013-3009</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3011/">CVE-2013-3011</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3012/">CVE-2013-3012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576216" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576217" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576218" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576216" comment="java-1_4_2-ibm-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576217" comment="java-1_4_2-ibm-jdbc-1.4.2_sr13.18-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576218" comment="java-1_4_2-ibm-plugin-1.4.2_sr13.18-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39880" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html" source="SUSE-SU"/>
		<description>

IBM Java 6 SR15 has been released and fixes lots of bugs and security 
issues.

More information can be found on: 
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2013-5458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458&gt;
    * CVE-2013-5456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456&gt;
    * CVE-2013-5457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457&gt;
    * CVE-2013-4041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041&gt;
    * CVE-2013-5375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375&gt;
    * CVE-2013-5372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372&gt;
    * CVE-2013-5843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843&gt;
    * CVE-2013-5789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787&gt;
    * CVE-2013-5788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788&gt;
    * CVE-2013-5824
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5832
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;
    * CVE-2013-5831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819&gt;
    * CVE-2013-5818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818&gt;
    * CVE-2013-5848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848&gt;
    * CVE-2013-5776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-15"/>
	<updated date="2013-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576219" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576220" comment="java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576221" comment="java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576222" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576223" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576224" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576219" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576220" comment="java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576221" comment="java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576222" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576223" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576224" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576219" comment="java-1_6_0-ibm-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576220" comment="java-1_6_0-ibm-alsa-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576221" comment="java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576222" comment="java-1_6_0-ibm-fonts-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576223" comment="java-1_6_0-ibm-jdbc-1.6.0_sr15.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576224" comment="java-1_6_0-ibm-plugin-1.6.0_sr15.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39881" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572026" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576225" comment="java-1_6_0-ibm-devel-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572028" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572029" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39882" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576226" comment="java-1_6_0-ibm-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576227" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576228" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576229" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576230" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576231" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39883" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576232" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576233" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576234" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576235" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576236" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576237" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39884" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00018.html" source="SUSE-SU"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576238" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576239" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576240" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576241" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576242" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39885" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576243" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576244" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576245" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576246" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576247" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39886" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576248" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576250" comment="java-1_6_0-ibm-devel-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576251" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576252" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39887" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java 7</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="849212" ref_url="https://bugzilla.suse.com/849212" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4041" ref_url="https://www.suse.com/security/cve/CVE-2013-4041/" source="CVE"/>
		<reference ref_id="CVE-2013-5372" ref_url="https://www.suse.com/security/cve/CVE-2013-5372/" source="CVE"/>
		<reference ref_id="CVE-2013-5375" ref_url="https://www.suse.com/security/cve/CVE-2013-5375/" source="CVE"/>
		<reference ref_id="CVE-2013-5456" ref_url="https://www.suse.com/security/cve/CVE-2013-5456/" source="CVE"/>
		<reference ref_id="CVE-2013-5457" ref_url="https://www.suse.com/security/cve/CVE-2013-5457/" source="CVE"/>
		<reference ref_id="CVE-2013-5458" ref_url="https://www.suse.com/security/cve/CVE-2013-5458/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5776" ref_url="https://www.suse.com/security/cve/CVE-2013-5776/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5787" ref_url="https://www.suse.com/security/cve/CVE-2013-5787/" source="CVE"/>
		<reference ref_id="CVE-2013-5788" ref_url="https://www.suse.com/security/cve/CVE-2013-5788/" source="CVE"/>
		<reference ref_id="CVE-2013-5789" ref_url="https://www.suse.com/security/cve/CVE-2013-5789/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5801" ref_url="https://www.suse.com/security/cve/CVE-2013-5801/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5812" ref_url="https://www.suse.com/security/cve/CVE-2013-5812/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5818" ref_url="https://www.suse.com/security/cve/CVE-2013-5818/" source="CVE"/>
		<reference ref_id="CVE-2013-5819" ref_url="https://www.suse.com/security/cve/CVE-2013-5819/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5824" ref_url="https://www.suse.com/security/cve/CVE-2013-5824/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5831" ref_url="https://www.suse.com/security/cve/CVE-2013-5831/" source="CVE"/>
		<reference ref_id="CVE-2013-5832" ref_url="https://www.suse.com/security/cve/CVE-2013-5832/" source="CVE"/>
		<reference ref_id="CVE-2013-5838" ref_url="https://www.suse.com/security/cve/CVE-2013-5838/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5843" ref_url="https://www.suse.com/security/cve/CVE-2013-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-5848" ref_url="https://www.suse.com/security/cve/CVE-2013-5848/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html" source="SUSE-SU"/>
		<description>

IBM Java 7 SR6 has been released and fixes lots of bugs and security 
issues.

More information can be found on: 
http://www.ibm.com/developerworks/java/jdk/alerts/
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/&gt;

Security Issue references:

    * CVE-2013-5458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458&gt;
    * CVE-2013-5456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456&gt;
    * CVE-2013-5457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457&gt;
    * CVE-2013-4041
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041&gt;
    * CVE-2013-5375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375&gt;
    * CVE-2013-5372
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372&gt;
    * CVE-2013-5843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843&gt;
    * CVE-2013-5789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787&gt;
    * CVE-2013-5788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788&gt;
    * CVE-2013-5824
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5832
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5812
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;
    * CVE-2013-5831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5819
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819&gt;
    * CVE-2013-5818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818&gt;
    * CVE-2013-5848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848&gt;
    * CVE-2013-5776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-19"/>
	<updated date="2013-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4041/">CVE-2013-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5372/">CVE-2013-5372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5375/">CVE-2013-5375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5456/">CVE-2013-5456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5457/">CVE-2013-5457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5458/">CVE-2013-5458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5776/">CVE-2013-5776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5787/">CVE-2013-5787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5788/">CVE-2013-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5789/">CVE-2013-5789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5801/">CVE-2013-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5812/">CVE-2013-5812</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5818/">CVE-2013-5818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5819/">CVE-2013-5819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5824/">CVE-2013-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5831/">CVE-2013-5831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5832/">CVE-2013-5832</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5838/">CVE-2013-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5843/">CVE-2013-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5848/">CVE-2013-5848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576254" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576255" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576256" comment="java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576257" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576258" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576254" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576255" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576256" comment="java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576257" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576258" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576254" comment="java-1_7_0-ibm-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576255" comment="java-1_7_0-ibm-alsa-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576256" comment="java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576257" comment="java-1_7_0-ibm-jdbc-1.7.0_sr6.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576258" comment="java-1_7_0-ibm-plugin-1.7.0_sr6.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39888" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<description>
java-1_7_0-ibm was updated to fix 21 security issues.

These security issues were fixed:
- CVE-2015-4729: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-4748: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security (bsc#938895).
- CVE-2015-2664: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allowed remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine (bsc#938895).
- CVE-2015-2613: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-4731: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX (bsc#938895).
- CVE-2015-2637: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4733: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bsc#938895).
- CVE-2015-4732: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590 (bsc#938895).
- CVE-2015-2621: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allowed remote attackers to affect confidentiality via vectors related to JMX (bsc#938895).
- CVE-2015-2619: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2590: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732 (bsc#938895).
- CVE-2015-2638: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2625: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JSSE (bsc#938895).
- CVE-2015-2632: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-1931: Unspecified vulnerability (bsc#938895).
- CVE-2015-4760: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue (bsc#935540).
- CVE-2015-2601: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, did not properly combine state data with key data during the initialization phase, which made it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the 'Bar Mitzvah' issue (bsc#938895).
- CVE-2015-4749: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect availability via vectors related to JNDI (bsc#938895).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576259" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576261" comment="java-1_7_0-ibm-devel-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576262" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39889" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<description>
The java-1_7_0-ibm package was updated to version 7.0-9.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.0-9.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576264" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576266" comment="java-1_7_0-ibm-devel-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576267" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39890" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576269" comment="java-1_7_0-ibm-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576270" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576271" comment="java-1_7_0-ibm-devel-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576272" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576273" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39891" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.0 SR9 FP40 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576274" comment="java-1_7_0-ibm-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576275" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576276" comment="java-1_7_0-ibm-devel-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576277" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576278" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39892" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<description>

IBM Java 7 was updated to 7.1-9.50, fixing bugs and security issues (bsc#992537).

Security issues fixed:
  CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-10"/>
	<updated date="2016-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576279" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576280" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576281" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576282" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576283" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39893" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

- Version update to 7.0-9.60 (bsc#1009280, bsc#992537) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576284" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576285" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576286" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576287" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576288" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39894" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This kdelibs4 update fixes several security issues related to 
khtml/konqueror.

    * Fix security issues and null pointer references in khtml/konqueror
      (bnc#787520) (CVE-2012-4512, CVE-2012-4513, CVE-2012-4515)

Security Issue references:

    * CVE-2012-4512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512&gt;
    * CVE-2012-4513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513&gt;
    * CVE-2012-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-01"/>
	<updated date="2013-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576289" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576290" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562952" comment="kdelibs4-doc-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576291" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576292" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576293" comment="libkde4-x86-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576294" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576295" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576296" comment="libkdecore4-x86-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576289" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576290" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562952" comment="kdelibs4-doc-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576291" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576292" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576293" comment="libkde4-x86-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576294" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576295" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576296" comment="libkdecore4-x86-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39895" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="858831" ref_url="https://bugzilla.suse.com/858831" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 2 kernel was updated to fix a 
regression introduced by the previous update:

    * scsi_dh_alua: Incorrect reference counting in the SCSI ALUA
      initialization code lead to system crashes on boot (bnc#858831).

As the update introducing the regression was marked security, this is also 
marked security even though this bug is not security relevant.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-05"/>
	<updated date="2014-02-05"/>
	<bugzilla href="https://bugzilla.suse.com/858831">SUSE bug 858831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576297" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576298" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576299" comment="kernel-default-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576300" comment="kernel-default-man-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576301" comment="kernel-ec2-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576302" comment="kernel-ec2-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576303" comment="kernel-ec2-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576304" comment="kernel-ppc64-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576305" comment="kernel-ppc64-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576306" comment="kernel-ppc64-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576307" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576308" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576309" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576310" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576311" comment="kernel-trace-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566050" comment="kernel-xen-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576297" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576298" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576299" comment="kernel-default-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576300" comment="kernel-default-man-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576301" comment="kernel-ec2-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576302" comment="kernel-ec2-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576303" comment="kernel-ec2-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576304" comment="kernel-ppc64-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576305" comment="kernel-ppc64-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576306" comment="kernel-ppc64-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576307" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576308" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576309" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576310" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576311" comment="kernel-trace-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566050" comment="kernel-xen-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576297" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576298" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576299" comment="kernel-default-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576300" comment="kernel-default-man-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576301" comment="kernel-ec2-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576302" comment="kernel-ec2-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576303" comment="kernel-ec2-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576304" comment="kernel-ppc64-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576305" comment="kernel-ppc64-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576306" comment="kernel-ppc64-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576307" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576308" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576309" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576310" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576311" comment="kernel-trace-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566050" comment="kernel-xen-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39896" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP 2 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576312" comment="kernel-default-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576313" comment="kernel-default-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576314" comment="kernel-default-devel-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576315" comment="kernel-default-man-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576316" comment="kernel-ec2-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576317" comment="kernel-ec2-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576318" comment="kernel-ec2-devel-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576319" comment="kernel-pae-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576320" comment="kernel-pae-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576321" comment="kernel-pae-devel-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576322" comment="kernel-source-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576323" comment="kernel-syms-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576324" comment="kernel-trace-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576325" comment="kernel-trace-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576326" comment="kernel-trace-devel-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576327" comment="kernel-xen-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576328" comment="kernel-xen-base-3.0.101-0.7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576329" comment="kernel-xen-devel-3.0.101-0.7.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39897" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1009443" ref_url="https://bugzilla.suse.com/1009443" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011482" ref_url="https://bugzilla.suse.com/1011482" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="835175" ref_url="https://bugzilla.suse.com/835175" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="874145" ref_url="https://bugzilla.suse.com/874145" source="BUGZILLA"/>
		<reference ref_id="896484" ref_url="https://bugzilla.suse.com/896484" source="BUGZILLA"/>
		<reference ref_id="908069" ref_url="https://bugzilla.suse.com/908069" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="922947" ref_url="https://bugzilla.suse.com/922947" source="BUGZILLA"/>
		<reference ref_id="927287" ref_url="https://bugzilla.suse.com/927287" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="963053" ref_url="https://bugzilla.suse.com/963053" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="968500" ref_url="https://bugzilla.suse.com/968500" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="979915" ref_url="https://bugzilla.suse.com/979915" source="BUGZILLA"/>
		<reference ref_id="980363" ref_url="https://bugzilla.suse.com/980363" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994436" ref_url="https://bugzilla.suse.com/994436" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-2189" ref_url="https://www.suse.com/security/cve/CVE-2016-2189/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.

This is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.

The following security bugs were fixed:

- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).


The following non-security bugs were fixed:

- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).
- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).
- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).
- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).
- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS &amp; cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils &lt; 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).
- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- Revert 's390/mm: fix asce_bits handling with dynamic pagetable levels' This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.
- rpm/config.sh: Set the release string to 0.7.&lt;RELEASE&gt; (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: 	series.conf
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-30"/>
	<updated date="2017-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009443">SUSE bug 1009443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011482">SUSE bug 1011482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835175">SUSE bug 835175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874145">SUSE bug 874145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896484">SUSE bug 896484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908069">SUSE bug 908069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927287">SUSE bug 927287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963053">SUSE bug 963053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968500">SUSE bug 968500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979915">SUSE bug 979915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994436">SUSE bug 994436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2189/">CVE-2016-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576330" comment="kernel-default-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576331" comment="kernel-default-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576332" comment="kernel-default-devel-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576333" comment="kernel-default-man-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576334" comment="kernel-ec2-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576335" comment="kernel-ec2-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576336" comment="kernel-ec2-devel-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576337" comment="kernel-pae-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576338" comment="kernel-pae-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576339" comment="kernel-pae-devel-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576340" comment="kernel-source-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576341" comment="kernel-syms-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576342" comment="kernel-trace-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576343" comment="kernel-trace-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576344" comment="kernel-trace-devel-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576345" comment="kernel-xen-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576346" comment="kernel-xen-base-3.0.101-0.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576347" comment="kernel-xen-devel-3.0.101-0.7.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39898" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="798406" ref_url="https://bugzilla.suse.com/798406" source="BUGZILLA"/>
		<reference ref_id="821931" ref_url="https://bugzilla.suse.com/821931" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="879878" ref_url="https://bugzilla.suse.com/879878" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="897995" ref_url="https://bugzilla.suse.com/897995" source="BUGZILLA"/>
		<reference ref_id="898693" ref_url="https://bugzilla.suse.com/898693" source="BUGZILLA"/>
		<reference ref_id="900881" ref_url="https://bugzilla.suse.com/900881" source="BUGZILLA"/>
		<reference ref_id="904671" ref_url="https://bugzilla.suse.com/904671" source="BUGZILLA"/>
		<reference ref_id="908870" ref_url="https://bugzilla.suse.com/908870" source="BUGZILLA"/>
		<reference ref_id="909477" ref_url="https://bugzilla.suse.com/909477" source="BUGZILLA"/>
		<reference ref_id="912916" ref_url="https://bugzilla.suse.com/912916" source="BUGZILLA"/>
		<reference ref_id="914742" ref_url="https://bugzilla.suse.com/914742" source="BUGZILLA"/>
		<reference ref_id="915200" ref_url="https://bugzilla.suse.com/915200" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="915577" ref_url="https://bugzilla.suse.com/915577" source="BUGZILLA"/>
		<reference ref_id="916010" ref_url="https://bugzilla.suse.com/916010" source="BUGZILLA"/>
		<reference ref_id="917093" ref_url="https://bugzilla.suse.com/917093" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="918333" ref_url="https://bugzilla.suse.com/918333" source="BUGZILLA"/>
		<reference ref_id="919007" ref_url="https://bugzilla.suse.com/919007" source="BUGZILLA"/>
		<reference ref_id="919018" ref_url="https://bugzilla.suse.com/919018" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="921769" ref_url="https://bugzilla.suse.com/921769" source="BUGZILLA"/>
		<reference ref_id="922583" ref_url="https://bugzilla.suse.com/922583" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="927257" ref_url="https://bugzilla.suse.com/927257" source="BUGZILLA"/>
		<reference ref_id="928801" ref_url="https://bugzilla.suse.com/928801" source="BUGZILLA"/>
		<reference ref_id="929148" ref_url="https://bugzilla.suse.com/929148" source="BUGZILLA"/>
		<reference ref_id="929283" ref_url="https://bugzilla.suse.com/929283" source="BUGZILLA"/>
		<reference ref_id="929360" ref_url="https://bugzilla.suse.com/929360" source="BUGZILLA"/>
		<reference ref_id="929525" ref_url="https://bugzilla.suse.com/929525" source="BUGZILLA"/>
		<reference ref_id="930284" ref_url="https://bugzilla.suse.com/930284" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931474" ref_url="https://bugzilla.suse.com/931474" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937986" ref_url="https://bugzilla.suse.com/937986" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041/" source="CVE"/>
		<reference ref_id="CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise Server 11 SP2 LTSS kernel was updated to
receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code.
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-0777: drivers/xen/usbback/usbback.c in the Linux kernel
  allowed guest OS users to obtain sensitive information from uninitialized
  locations in host OS kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access
  to PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bnc#919463).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: CVE-2015-1420: Race condition in the handle_to_path
  function in fs/fhandle.c in the Linux kernel allowed local users to bypass
  intended size restrictions and trigger read operations on additional
  memory locations by changing the handle_bytes value of a file handle
  during the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel did not properly consider the side effects
  of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls,
  which allowed local users to cause a denial of service (system crash)
  or possibly gain privileges via a crafted application, aka an 'I/O vector
  array overrun' (bnc#933429).
- CVE-2015-3331: The __driver_rfc4106_decrypt function in
  arch/x86/crypto/aesni-intel_glue.c in the Linux kernel did not properly
  determine the memory locations used for encrypted data, which allowed
  context-dependent attackers to cause a denial of service (buffer overflow
  and system crash) or possibly execute arbitrary code by triggering a
  crypto API call, as demonstrated by use of a libkcapi test program with
  an AF_ALG(aead) socket (bnc#927257).
- CVE-2015-2922: The ndisc_router_discovery function in net/ipv6/ndisc.c
  in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack
  in the Linux kernel allowed remote attackers to reconfigure a hop-limit
  setting via a small hop_limit value in a Router Advertisement (RA)
  message (bnc#922583).
- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel used an
  incorrect data type in a sysctl table, which allowed local users to
  obtain potentially sensitive information from kernel memory or possibly
  have unspecified other impact by accessing a sysctl entry (bnc#919007).
- CVE-2015-3636: The ping_unhash function in net/ipv4/ping.c in the
  Linux kernel did not initialize a certain list data structure during an
  unhash operation, which allowed local users to gain privileges or cause
  a denial of service (use-after-free and system crash) by leveraging the
  ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or
  IPPROTO_ICMPV6 protocol, and then making a connect system call after a
  disconnect (bnc#929525).
- CVE-2014-8086: Race condition in the ext4_file_write_iter function
  in fs/ext4/file.c in the Linux kernel allowed local users to cause a
  denial of service (file unavailability) via a combination of a write
  action and an F_SETFL fcntl operation for the O_DIRECT flag (bnc#900881).
- CVE-2014-8159: The InfiniBand (IB) implementation in the Linux kernel
  did not properly restrict use of User Verbs for registration of memory
  regions, which allowed local users to access arbitrary physical memory
  locations, and consequently cause a denial of service (system crash)
  or gain privileges, by leveraging permissions on a uverbs device under
  /dev/infiniband/ (bnc#914742).
- CVE-2014-9683: Off-by-one error in the ecryptfs_decode_from_filename
  function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux
  kernel allowed local users to cause a denial of service (buffer overflow
  and system crash) or possibly gain privileges via a crafted filename
  (bnc#918333).
- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel used an incorrect
  data type in a sysctl table, which allowed local users to obtain
  potentially sensitive information from kernel memory or possibly have
  unspecified other impact by accessing a sysctl entry (bnc#919018).
- CVE-2015-1421: Use-after-free vulnerability in the sctp_assoc_update
  function in net/sctp/associola.c in the Linux kernel allowed remote
  attackers to cause a denial of service (slab corruption and panic) or
  possibly have unspecified other impact by triggering an INIT collision
  that leads to improper handling of shared-key data (bnc#915577).

The following non-security bugs were fixed:
- HID: add ALWAYS_POLL quirk for a Logitech 0xc007 (bnc#931474).
- HID: add HP OEM mouse to quirk ALWAYS_POLL (bnc#931474).
- HID: add quirk for PIXART OEM mouse used by HP (bnc#931474).
- HID: usbhid: add always-poll quirk (bnc#931474).
- HID: usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 009b (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 0103 (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 016f (bnc#931474).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen.
- HID: usbhid: fix PIXART optical mouse (bnc#931474).
- HID: usbhid: more mice with ALWAYS_POLL (bnc#931474).
- HID: usbhid: yet another mouse with ALWAYS_POLL (bnc#931474).
- bnx2x: Fix kdump when iommu=on (bug#921769).
- cifs: fix use-after-free bug in find_writable_file (bnc#909477).
- coredump: ensure the fpu state is flushed for proper multi-threaded core dump (bsc#904671, bsc#929360).
- dm: fixed that LVM merge snapshot of root logical volume were not working (bsc#928801)
- deal with deadlock in d_walk fix (bnc#929148, bnc#929283).
- e1000: do not enable dma receives until after dma address has been setup (bsc#821931).
- fsnotify: Fix handling of renames in audit (bnc#915200).
- inet: add a redirect generation id in inetpeer (bnc#860593).
- inetpeer: initialize -&amp;gt;redirect_genid in inet_getpeer() (bnc#860593).
- kabi: hide bnc#860593 changes of struct inetpeer_addr_base (bnc#860593).
- kernel: fix data corruption when reading /proc/sysinfo (bsc#891087, bsc#937986, LTC#114480).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- time, ntp: Do not update time_state in middle of leap second (bsc#912916).
- s390-3215-tty-close-crash.patch: kernel: 3215 tty close crash (bsc#916010, LTC#120873).
- s390-3215-tty-close-race.patch: kernel: 3215 console crash (bsc#916010, LTC#94302).
- s390-3215-tty-hang.patch: Renamed from patches.arch/s390-tty-hang.patch.
- s390-3215-tty-hang.patch: Update references (bnc#898693, bnc#897995, LTC#114562).
- s390-dasd-retry-partition-detection.patch: s390/dasd: retry partition detection (bsc#916010, LTC#94302).
- s390-dasd-retry-partition-detection.patch: Update references (bsc#916010, LTC#120565).
- s390-sclp-tty-refcount.patch: kernel: sclp console tty reference counting (bsc#916010, LTC#115466).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi/sg: sg_start_req(): make sure that there is not too many elements in iovec (bsc#940338).
- x86, xsave: remove thread_has_fpu() bug check in __sanitize_i387_state() (bsc#904671, bsc#929360).
- x86-mm-send-tlb-flush-ipis-to-online-cpus-only.patch: x86, mm: Send tlb flush IPIs to online cpus only (bnc#798406).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/reboot: Fix a warning message triggered by stop_other_cpus() (bnc#930284).
- xen: Correctly re-enable interrupts in xen_spin_wait() (bsc#879878, bsc#908870).
- xfs: prevent deadlock trying to cover an active log (bsc#917093).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-20"/>
	<updated date="2015-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/798406">SUSE bug 798406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821931">SUSE bug 821931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897995">SUSE bug 897995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898693">SUSE bug 898693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904671">SUSE bug 904671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908870">SUSE bug 908870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909477">SUSE bug 909477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912916">SUSE bug 912916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915200">SUSE bug 915200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916010">SUSE bug 916010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917093">SUSE bug 917093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921769">SUSE bug 921769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928801">SUSE bug 928801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929148">SUSE bug 929148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929283">SUSE bug 929283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929360">SUSE bug 929360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930284">SUSE bug 930284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931474">SUSE bug 931474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937986">SUSE bug 937986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576348" comment="kernel-default-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576349" comment="kernel-default-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576350" comment="kernel-default-devel-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576351" comment="kernel-default-man-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576352" comment="kernel-ec2-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576353" comment="kernel-ec2-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576354" comment="kernel-ec2-devel-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576355" comment="kernel-pae-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576356" comment="kernel-pae-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576357" comment="kernel-pae-devel-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576358" comment="kernel-source-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576359" comment="kernel-syms-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576360" comment="kernel-trace-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576361" comment="kernel-trace-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576362" comment="kernel-trace-devel-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576363" comment="kernel-xen-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576364" comment="kernel-xen-base-3.0.101-0.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576365" comment="kernel-xen-devel-3.0.101-0.7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39899" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="816446" ref_url="https://bugzilla.suse.com/816446" source="BUGZILLA"/>
		<reference ref_id="861093" ref_url="https://bugzilla.suse.com/861093" source="BUGZILLA"/>
		<reference ref_id="928130" ref_url="https://bugzilla.suse.com/928130" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="946117" ref_url="https://bugzilla.suse.com/946117" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966460" ref_url="https://bugzilla.suse.com/966460" source="BUGZILLA"/>
		<reference ref_id="966662" ref_url="https://bugzilla.suse.com/966662" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="972510" ref_url="https://bugzilla.suse.com/972510" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="977847" ref_url="https://bugzilla.suse.com/977847" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015/" source="CVE"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.

The following security bugs were fixed:
- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).
- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).
- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).
- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).
- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).
- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).
- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).
- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).
- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).
- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).
- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).

The following non-security bugs were fixed:
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- Fix lpfc_send_rscn_event allocation size claims bnc#935757
- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).
- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).
- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).
- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).
- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).
- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).
- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/816446">SUSE bug 816446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861093">SUSE bug 861093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946117">SUSE bug 946117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966460">SUSE bug 966460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966662">SUSE bug 966662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972510">SUSE bug 972510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977847">SUSE bug 977847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576366" comment="kernel-default-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576367" comment="kernel-default-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576368" comment="kernel-default-devel-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576369" comment="kernel-default-man-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576370" comment="kernel-ec2-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576371" comment="kernel-ec2-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576372" comment="kernel-ec2-devel-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576373" comment="kernel-pae-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576374" comment="kernel-pae-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576375" comment="kernel-pae-devel-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576376" comment="kernel-source-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576377" comment="kernel-syms-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576378" comment="kernel-trace-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576379" comment="kernel-trace-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576380" comment="kernel-trace-devel-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576381" comment="kernel-xen-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576382" comment="kernel-xen-base-3.0.101-0.7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576383" comment="kernel-xen-devel-3.0.101-0.7.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39900" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576384" comment="kernel-default-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576385" comment="kernel-default-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576386" comment="kernel-default-devel-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576387" comment="kernel-default-man-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576388" comment="kernel-ec2-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576389" comment="kernel-ec2-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576390" comment="kernel-ec2-devel-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576391" comment="kernel-pae-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576392" comment="kernel-pae-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576393" comment="kernel-pae-devel-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576394" comment="kernel-source-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576395" comment="kernel-syms-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576396" comment="kernel-trace-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576397" comment="kernel-trace-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576398" comment="kernel-trace-devel-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576399" comment="kernel-xen-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576400" comment="kernel-xen-base-3.0.101-0.7.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576401" comment="kernel-xen-devel-3.0.101-0.7.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39901" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

    * If a KDC serves multiple realms, certain requests could cause
      setup_server_realm() to dereference a null pointer, crashing the KDC.
      (CVE-2013-1418)

Security Issues:

    * CVE-2013-1418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-08"/>
	<updated date="2013-11-08"/>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576402" comment="krb5-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576403" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576404" comment="krb5-apps-clients-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576405" comment="krb5-apps-servers-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576406" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576407" comment="krb5-doc-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576408" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576409" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576410" comment="krb5-server-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576411" comment="krb5-x86-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576402" comment="krb5-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576403" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576404" comment="krb5-apps-clients-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576405" comment="krb5-apps-servers-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576406" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576407" comment="krb5-doc-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576408" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576409" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576410" comment="krb5-server-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576411" comment="krb5-x86-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39902" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="712137" ref_url="https://bugzilla.suse.com/712137" source="BUGZILLA"/>
		<reference ref_id="725008" ref_url="https://bugzilla.suse.com/725008" source="BUGZILLA"/>
		<reference ref_id="786813" ref_url="https://bugzilla.suse.com/786813" source="BUGZILLA"/>
		<reference ref_id="818182" ref_url="https://bugzilla.suse.com/818182" source="BUGZILLA"/>
		<reference ref_id="824340" ref_url="https://bugzilla.suse.com/824340" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00024.html" source="SUSE-SU"/>
		<description>

This update fixes a file permission issue with qga (the QEMU Guest Agent) 
from the qemu/kvm package and includes several bug-fixes.

(bnc#818182) (CVE-2013-2007) (bnc#786813) (bnc#725008) (bnc#712137) 
(bnc#824340)

Security Issues:

    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-24"/>
	<updated date="2013-06-24"/>
	<bugzilla href="https://bugzilla.suse.com/712137">SUSE bug 712137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725008">SUSE bug 725008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786813">SUSE bug 786813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824340">SUSE bug 824340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39903" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix two security issues.

The following vulnerabilities were fixed:

- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
- CVE-2015-3209: Fix buffer overflow in pcnet emulation (bsc#932770).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-07"/>
	<updated date="2015-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576412" comment="kvm-0.15.1-0.32.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39904" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39905" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="757576" ref_url="https://bugzilla.suse.com/757576" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<description>

This update of Samba fixes one security issue and several bugs.

The security fix is:

    * Ensure that users cannot hand out their own privileges to everyone,
      only administrators are allowed to do that. (CVE-2012-2111
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111&gt; )

The non-security bug fixes merged from upstream Samba are:

    * Fix default name resolve order. (docs-xml, bso#7564).
    * Fix a segfault in vfs_aio_fork. (s3-aio-fork, bso#8836).
    * Remove whitespace in example samba.ldif. (docs, bso#8789)
    * Move print_backend_init() behind init_system_info(). (s3-smbd,
      bso#8845)
    * Prepend '/' to filename argument. (s3-docs, bso#8826)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576417" comment="ldapsmb-1.34b-12.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576418" comment="libldb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576419" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576420" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576421" comment="libsmbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576422" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576423" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576424" comment="libtalloc2-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576425" comment="libtdb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576426" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576427" comment="libtdb1-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576428" comment="libtevent0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576429" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576430" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576431" comment="libwbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576432" comment="samba-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576433" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576434" comment="samba-client-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576435" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576436" comment="samba-client-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576437" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576438" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576439" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576440" comment="samba-winbind-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576441" comment="samba-x86-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576417" comment="ldapsmb-1.34b-12.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576418" comment="libldb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576419" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576420" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576421" comment="libsmbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576422" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576423" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576424" comment="libtalloc2-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576425" comment="libtdb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576426" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576427" comment="libtdb1-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576428" comment="libtevent0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576429" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576430" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576431" comment="libwbclient0-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576432" comment="samba-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576433" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576434" comment="samba-client-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576435" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576436" comment="samba-client-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576437" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576438" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576439" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576440" comment="samba-winbind-x86-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576441" comment="samba-x86-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39906" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="784197" ref_url="https://bugzilla.suse.com/784197" source="BUGZILLA"/>
		<reference ref_id="797006" ref_url="https://bugzilla.suse.com/797006" source="BUGZILLA"/>
		<reference ref_id="802634" ref_url="https://bugzilla.suse.com/802634" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>

libqt4 has been updated to fix several security issues.

    * An information disclosure via QSharedMemory was fixed which allowed
      local attackers to read information (e.g. bitmap content) from the
      attacked user (CVE-2013-0254).
    * openssl-incompatibility-fix.diff: Fix wrong error reporting when
      using a binary incompatible version of openSSL (bnc#797006,
      CVE-2012-6093)
    * Various compromised SSL root certificates were blacklisted.

Also a non-security bugfix has been applied:

    * Add fix for qdbusviewer not matching args (bnc#784197)

Security Issue reference:

    * CVE-2013-0254
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/784197">SUSE bug 784197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576442" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562975" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562976" comment="libQtWebKit4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576443" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576444" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576445" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576446" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576447" comment="libqt4-qt3support-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576448" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576449" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576450" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576451" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576452" comment="libqt4-sql-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576453" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576454" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576455" comment="libqt4-x11-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576456" comment="libqt4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576457" comment="qt4-x11-tools-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576442" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562975" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562976" comment="libQtWebKit4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576443" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576444" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576445" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576446" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576447" comment="libqt4-qt3support-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576448" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576449" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576450" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576451" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576452" comment="libqt4-sql-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576453" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576454" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576455" comment="libqt4-x11-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576456" comment="libqt4-x86-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576457" comment="qt4-x11-tools-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39907" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="812525" ref_url="https://bugzilla.suse.com/812525" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>

This update to version 9.1.9 fixes:

    * CVE-2013-1899: Fix insecure parsing of server command-line switches.
    * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster
      child process.
    * CVE-2013-1901: Make REPLICATION privilege checks test current user
      not authenticated user.

Security Issue references:

    * CVE-2013-1899
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899&gt;
    * CVE-2013-1900
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900&gt;
    * CVE-2013-1901
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-02"/>
	<updated date="2013-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576458" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576459" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576460" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576461" comment="libpq5-x86-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576462" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576463" comment="postgresql91-contrib-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576464" comment="postgresql91-docs-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576465" comment="postgresql91-server-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576458" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576459" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576460" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576461" comment="libpq5-x86-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576462" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576463" comment="postgresql91-contrib-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576464" comment="postgresql91-docs-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576465" comment="postgresql91-server-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39908" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to 3.16.5 to fix a RSA certificate forgery issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576466" comment="libfreebl3-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576467" comment="libfreebl3-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576468" comment="mozilla-nss-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576469" comment="mozilla-nss-32bit-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576470" comment="mozilla-nss-devel-3.16.5-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576471" comment="mozilla-nss-tools-3.16.5-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39909" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39910" version="1" class="patch">
	<metadata>
		<title>Security update for liblzo2-2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo has been updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issues:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572365" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572366" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39911" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="792444" ref_url="https://bugzilla.suse.com/792444" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00024.html" source="SUSE-SU"/>
		<description>

A stack-based buffer overflow in MySQL has been fixed that could have 
caused a Denial of Service or potentially allowed the execution of 
arbitrary code (CVE-2012-5611).

Security Issue references:

    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613&gt;
    * CVE-2012-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612&gt;
    * CVE-2012-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-27"/>
	<updated date="2012-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576475" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576476" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576477" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576478" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576479" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576480" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576481" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576482" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576475" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576476" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576477" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576478" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576479" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576480" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576481" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576482" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576475" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576476" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576477" comment="libmysqlclient15-x86-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576478" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576479" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576480" comment="mysql-Max-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576481" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576482" comment="mysql-tools-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39912" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="802648" ref_url="https://bugzilla.suse.com/802648" source="BUGZILLA"/>
		<reference ref_id="802746" ref_url="https://bugzilla.suse.com/802746" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<description>

OpenSSL has been updated to fix several security issues:

    * CVE-2012-4929: Avoid the openssl CRIME attack by disabling SSL
      compression by default. Setting the environment variable
      'OPENSSL_NO_DEFAULT_ZLIB' to 'no' enables compression again.
    * CVE-2013-0169: Timing attacks against TLS could be used by physically
      local attackers to gain access to transmitted plain text or private
      keymaterial. This issue is also known as the 'Lucky-13' issue.
    * CVE-2013-0166: A OCSP invalid key denial of service issue was fixed.

Security Issue references:

    * CVE-2013-0169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169&gt;
    * CVE-2013-0166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-25"/>
	<updated date="2013-03-25"/>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576483" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576484" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576485" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576486" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576487" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576488" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576489" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576490" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576483" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576484" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576485" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576486" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576487" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576488" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576489" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576490" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572388" comment="libopenssl-devel-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576483" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576484" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576485" comment="libopenssl0_9_8-hmac-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576486" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576487" comment="libopenssl0_9_8-hmac-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576488" comment="libopenssl0_9_8-x86-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576489" comment="openssl-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576490" comment="openssl-doc-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39913" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576491" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576491" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39914" version="1" class="patch">
	<metadata>
		<title>Security update for pcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="732763" ref_url="https://bugzilla.suse.com/732763" source="BUGZILLA"/>
		<reference ref_id="775009" ref_url="https://bugzilla.suse.com/775009" source="BUGZILLA"/>
		<reference ref_id="775010" ref_url="https://bugzilla.suse.com/775010" source="BUGZILLA"/>
		<reference ref_id="775011" ref_url="https://bugzilla.suse.com/775011" source="BUGZILLA"/>
		<reference ref_id="775013" ref_url="https://bugzilla.suse.com/775013" source="BUGZILLA"/>
		<reference ref_id="782967" ref_url="https://bugzilla.suse.com/782967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<description>

pcp was updated to version 3.6.10 which fixes security issues and also 
brings a lot of new features.

    * 

      Update to pcp-3.6.10.

          o Transition daemons to run under an unprivileged account.
          o Fixes for security advisory CVE-2012-5530: tmpfile flaws;
            (bnc#782967).
          o Fix pcp(1) command short-form pmlogger reporting.
          o Fix pmdalogger error handling for directory files.
          o Fix pmstat handling of odd corner case in CPU metrics.
          o Correct the python ctype used for pmAtomValue 32bit ints.
          o Add missing RPM spec dependency for python-ctypes.
          o Corrections to pmdamysql metrics units.
          o Add pmdamysql slave status metrics.
          o Improve pmcollectl error messages.
          o Parameterize pmcollectl CPU counts in interrupt subsys.
          o Fix generic RPM packaging for powerpc builds.
          o Fix python API use of reentrant libpcp string routines.
          o Python code backporting for RHEL5 in qa and pmcollectl.
          o Fix edge cases in capturing interrupt error counts.
    * 

      Update to pcp-3.6.9.

          o Python wrapper for the pmimport API
          o Make sar2pcp work with the sysstat versions from RHEL5, RHEL6,
            and all recent Fedora versions (which is almost all current
            versions of sysstat verified).
          o Added a number of additional metrics into the importer for
            people starting to use it to analyse sar data from real
            customer incidents.
          o Rework use of C99 'restrict' keyword in pmdalogger (Debian bug:
            689552)
          o Alot of work on the PCP QA suite, special thanks to Tomas
            Dohnalek for all his efforts there.
          o Win32 build updates
          o Add 'raw' disk active metrics so that existing tools like
            iostat can be emulated
          o Allow sar2pcp to accept XML input directly (.xml suffix),
            allowing it to not have to run on the same platform as the
            sadc/sadf that originally generated it.
          o Add PMI error codes into the PCP::LogImport perl module.
          o Fix a typo in pmiUnits man page synopsis section
          o Resolve pmdalinux ordering issue in NUMA/CPU indom setup
            (Redhat bug: 858384)
          o Remove unused pmcollectl imports (Redhat bug: 863210)
          o Allow event traces to be used in libpcp interpolate mode
    * 

      Update to pcp-3.6.8.

          o Corrects the disk/partition identification for the MMC driver,
            which makes disk indom handling correct on the Raspberry Pi
            (http://www.raspberrypi.org/)
          o Several minor/basic fixes for pmdaoracle.
          o Improve pmcollectl compatibility.
          o Make a few clarifications to pmcollectl.1.
          o Improve python API test coverage.
          o Numerous updates to the test suite in general.
          o Allow pmda Install scripts to specify own dso name again.
          o Reconcile spec file differences between PCP flavours.
          o Fix handling of multiple contexts with a remote namespace.
          o Core socket interface abstractions to support NSS (later).
          o Fix man page SYNOPSIS section for pmUnpackEventRecords.
          o Add --disable-shared build option for static builds.
    * 

      Update to pcp-3.6.6.

          o Added the python PMAPI bindings and an initial python client in
            pmcollectl. Separate, new package exists for python libs for
            those platforms that split out packages (rpm, deb).
          o Added a pcp-testsuite package for those platforms that might
            want this (rpm, deb again, mainly)
          o Re-introduced the pcp/qa subdirectory in pcp and deprecated the
            external pcpqa git tree.
          o Fix potential buffer overflow in pmlogger host name handling.
          o Reworked the configure --prefix handling to be more like the
            rest of the open source world.
          o Ensure the __pmDecodeText ident parameter is always set
            Resolves Red Hat bugzilla bug #841306.

Security Issue references:

    * CVE-2012-3418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418&gt;
    * CVE-2012-3419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419&gt;
    * CVE-2012-3420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420&gt;
    * CVE-2012-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-07"/>
	<updated date="2013-01-07"/>
	<bugzilla href="https://bugzilla.suse.com/732763">SUSE bug 732763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775010">SUSE bug 775010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775011">SUSE bug 775011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775013">SUSE bug 775013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782967">SUSE bug 782967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576492" comment="permissions-2013.1.7-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576492" comment="permissions-2013.1.7-0.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39915" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576493" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576494" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576495" comment="libpixman-1-0-x86-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576493" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576494" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576495" comment="libpixman-1-0-x86-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39916" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="806793" ref_url="https://bugzilla.suse.com/806793" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>

This update of poppler fixes the following vulnerabilities:

    * CVE-2013-1788: Various invalid memory issues could be used by
      attackers supplying PDFs to crash the PDF viewer or potentially
      execute code.
    * CVE-2013-1789: A crash in poppler could be used by attackers
      providing PDFs to crash the PDF viewer.
    * CVE-2013-1790: An uninitialized memory read could be used by
      attackers providing PDFs to crash the PDF viewer.

Security Issue references:

    * CVE-2013-1788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788&gt;
    * CVE-2013-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789&gt;
    * CVE-2013-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-26"/>
	<updated date="2013-03-26"/>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576496" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576497" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576498" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576499" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576496" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576497" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576498" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576499" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39917" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could have 
allowed remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

Security Issue reference:

    * CVE-2012-4505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576500" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576501" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576502" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576503" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576504" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576505" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576500" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576501" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576502" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576503" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576504" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576505" comment="libproxy0-x86-0.3.1-2.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39918" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39919" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="817008" ref_url="https://bugzilla.suse.com/817008" source="BUGZILLA"/>
		<reference ref_id="838638" ref_url="https://bugzilla.suse.com/838638" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<description>

This libvirt update fixes a security issue.

    * bnc#838638: CVE-2013-4296: EMBARGOED: libvirt: Fix crash in
      remoteDispatchDomainMemoryStats
    * bnc#817008: Regression: vm-install fails to display on SLES 11 SP2
      UV2000

Security Issue reference:

    * CVE-2013-4296
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-23"/>
	<updated date="2013-09-23"/>
	<bugzilla href="https://bugzilla.suse.com/817008">SUSE bug 817008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576510" comment="libvirt-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576511" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576512" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576513" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576514" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576510" comment="libvirt-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576511" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576512" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576513" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576514" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39920" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="772586" ref_url="https://bugzilla.suse.com/772586" source="BUGZILLA"/>
		<reference ref_id="773621" ref_url="https://bugzilla.suse.com/773621" source="BUGZILLA"/>
		<reference ref_id="773626" ref_url="https://bugzilla.suse.com/773626" source="BUGZILLA"/>
		<reference ref_id="780432" ref_url="https://bugzilla.suse.com/780432" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

libvirt received security and bugfixes:

    * CVE-2012-4423: Fixed a libvirt remote denial of service (crash)
      problem.

The following bugs have been fixed:

    * qemu: Fix probing for guest capabilities
    * xen-xm: Generate UUID if not specified
    * xenParseXM: don't dereference NULL pointer when script is empty

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/772586">SUSE bug 772586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773621">SUSE bug 773621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773626">SUSE bug 773626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780432">SUSE bug 780432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39921" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in libxml2. CVE-2013-2877 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-2877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-06"/>
	<updated date="2014-01-06"/>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576515" comment="libxml2-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576516" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576517" comment="libxml2-doc-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576518" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576519" comment="libxml2-x86-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576515" comment="libxml2-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576516" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576517" comment="libxml2-doc-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576518" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576519" comment="libxml2-x86-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39922" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576520" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576521" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576522" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576523" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39923" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39924" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026):

- CVE-2016-9079: Use-after-free in SVG Animation (bsc#1012964 MFSA 2016-92)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576527" comment="MozillaFirefox-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576528" comment="MozillaFirefox-translations-45.5.1esr-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576529" comment="libfreebl3-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576530" comment="libfreebl3-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576531" comment="mozilla-nss-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576532" comment="mozilla-nss-32bit-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576533" comment="mozilla-nss-devel-3.21.3-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576534" comment="mozilla-nss-tools-3.21.3-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39925" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, MozillaFirefox-branding-SLES-for-VMware, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: 

Firefox 38.6.1 ESR (bsc#967087)

The following vulnerabilities were fixed:

- CVE-2016-1523: Fixed denial of service in Graphite 2 library (MFSA 2016-14/bmo#1246093)

Firefox 38.6.0 ESR + Mozilla NSS 3.20.2. (bsc#963520)

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)
- CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-25"/>
	<updated date="2016-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576535" comment="MozillaFirefox-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576536" comment="MozillaFirefox-branding-SLED-38-15.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576537" comment="MozillaFirefox-translations-38.6.1esr-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576538" comment="libfreebl3-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576539" comment="libfreebl3-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576540" comment="mozilla-nss-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576541" comment="mozilla-nss-32bit-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576542" comment="mozilla-nss-devel-3.20.2-17.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576543" comment="mozilla-nss-tools-3.20.2-17.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39926" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

The following vulnerabilities were fixed in ESR31 and are also included here:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.

Mozilla Firefox and mozilla-nss were updated to fix 17 security issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-25"/>
	<updated date="2015-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572670" comment="MozillaFirefox-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572671" comment="MozillaFirefox-branding-SLED-31.0-0.5.7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572672" comment="MozillaFirefox-translations-38.2.0esr-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572673" comment="firefox-libgcc_s1-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572674" comment="firefox-libstdc++6-4.7.2_20130108-0.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572675" comment="libfreebl3-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572676" comment="libfreebl3-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572677" comment="mozilla-nss-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572678" comment="mozilla-nss-32bit-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572679" comment="mozilla-nss-devel-3.19.2.0-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572680" comment="mozilla-nss-tools-3.19.2.0-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39927" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572681" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572682" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572683" comment="mozilla-nspr-devel-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39928" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576544" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576545" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576546" comment="libfreebl3-x86-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576550" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576551" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576552" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576553" comment="mozilla-nss-x86-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576544" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576545" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576546" comment="libfreebl3-x86-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576550" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576551" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576552" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576553" comment="mozilla-nss-x86-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39929" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="856837" ref_url="https://bugzilla.suse.com/856837" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7108" ref_url="https://www.suse.com/security/cve/CVE-2013-7108/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in process_cgivars() of the nagios 
package. CVE-2013-7108 has been assigned to this issue.

Security Issue reference:

    * CVE-2013-7108
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/856837">SUSE bug 856837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7108/">CVE-2013-7108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576554" comment="nagios-3.0.6-1.25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576555" comment="nagios-www-3.0.6-1.25.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576554" comment="nagios-3.0.6-1.25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576555" comment="nagios-www-3.0.6-1.25.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39930" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe, nagios-plugins-nrpe</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="807241" ref_url="https://bugzilla.suse.com/807241" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1362" ref_url="https://www.suse.com/security/cve/CVE-2013-1362/" source="CVE"/>
		<description>

Nagios NRPE was updated to add more blacklisting to avoid shell injection 
via nagios request packets (CVE-2013-1362).

Security Issues:

    * CVE-2013-1362
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1362&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-10"/>
	<updated date="2013-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/807241">SUSE bug 807241</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1362/">CVE-2013-1362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576556" comment="nagios-nrpe-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576557" comment="nagios-nrpe-doc-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576558" comment="nagios-plugins-nrpe-2.12-24.4.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576556" comment="nagios-nrpe-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576557" comment="nagios-nrpe-doc-2.12-24.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576558" comment="nagios-plugins-nrpe-2.12-24.4.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39931" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576559" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576560" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576561" comment="libfreebl3-x86-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576565" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576566" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576567" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576568" comment="mozilla-nss-x86-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576559" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576560" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576561" comment="libfreebl3-x86-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576565" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576566" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576567" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576568" comment="mozilla-nss-x86-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39932" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS has been updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was abused to create man in 
the middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576569" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576570" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576571" comment="libfreebl3-x86-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576572" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576573" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576574" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576575" comment="mozilla-nss-x86-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576569" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576570" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576571" comment="libfreebl3-x86-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576572" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576573" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576574" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576575" comment="mozilla-nss-x86-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39933" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920183" ref_url="https://bugzilla.suse.com/920183" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="943218" ref_url="https://bugzilla.suse.com/943218" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951351" ref_url="https://bugzilla.suse.com/951351" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<description>

This network time protocol server ntp was updated to 4.2.8p6 to fix the following
issues:

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.


Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

These security issues were fixed:
- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
- bsc#784760: Remove local clock from default configuration.
- bsc#942441/fate#319496: Require perl-Socket6.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- bsc#920183: Allow -4 and -6 address qualifiers in 'server' directives.
- Use upstream ntp-wait, because our version is incompatible with
  the new ntpq command line syntax.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920183">SUSE bug 920183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951351">SUSE bug 951351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576576" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576577" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572821" comment="yast2-ntp-client-2.17.14.1-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39934" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues: 

- Separate the creation of ntp.keys and key #1 in it to avoid
  problems when upgrading installations that have the file, but
  no key #1, which is needed e.g. by 'rcntp addserver'.

- Update to 4.2.8p7 (bsc#977446):
  * CVE-2016-1547, bsc#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, bsc#977461: Interleave-pivot
  * CVE-2016-1549, bsc#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, bsc#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576578" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576579" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39935" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576580" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576581" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39936" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576582" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576583" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39937" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSH</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="755505" ref_url="https://bugzilla.suse.com/755505" source="BUGZILLA"/>
		<reference ref_id="802639" ref_url="https://bugzilla.suse.com/802639" source="BUGZILLA"/>
		<reference ref_id="821039" ref_url="https://bugzilla.suse.com/821039" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<description>

This update for OpenSSH provides the following fixes:

    * Implement remote denial of service hardening. (bnc#802639,
      CVE-2010-5107)
    * Use only FIPS 140-2 approved algorithms when FIPS mode is detected.
      (bnc#755505, bnc#821039)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)

Security Issue reference:

    * CVE-2010-5107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-16"/>
	<updated date="2013-07-16"/>
	<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821039">SUSE bug 821039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576584" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576585" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576584" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576585" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39938" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).
- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).
- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).
- Hardening patch to fix sftp RCE (bsc#903649).

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-19"/>
	<updated date="2015-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576586" comment="openssh-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576587" comment="openssh-askpass-5.1p1-41.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576588" comment="openssh-askpass-gnome-5.1p1-41.69.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39939" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576589" comment="libopenssl-devel-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576590" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576591" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576592" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576593" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576594" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576595" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39940" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576596" comment="libopenssl-devel-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576597" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576598" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576599" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576600" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576601" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576602" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39941" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576603" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576604" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576605" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576606" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576607" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576608" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576609" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39942" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576610" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576611" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576612" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576613" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576614" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576615" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576616" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39943" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

openssl-certs was updated with the current certificate data available from 
mozilla.org.

Changes:

    * Updated certificates to revision 1.95
    * Distrust a sub-ca that issued google.com certificates. 'Distrusted AC
      DG Tresor SSL' (bnc#854367)

Many CA updates from Mozilla:

    * new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt server
      auth, code signing, email signing
    * new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt server
      auth, code signing, email signing
    * new:
      China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt
      server auth
    * changed:
      Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt removed
      code signing and server auth abilities
    * changed:
      Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt
      removed code signing and server auth abilities
    * new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt server auth
    * new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt server auth
    * removed:
      Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.185.102.crt
    * new: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.crt
    * removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt
    * new: PSCProcert:2.1.11.crt server auth, code signing, email signing
    * new:
      Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt
      server auth, code signing, email signing
    * new:
      Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt
      server auth, code signing
    * changed:
      TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt
      removed all abilities
    * new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt
      server auth, code signing
    * changed: TWCA_Root_Certification_Authority:2.1.1.crt added code
      signing ability
    * new 'EE Certification Centre Root CA'
    * new 'T-TeleSec GlobalRoot Class 3'
    * revoke mis-issued intermediate CAs from TURKTRUST.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39944" version="1" class="patch">
	<metadata>
		<title>Security update for openswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="859220" ref_url="https://bugzilla.suse.com/859220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7294" ref_url="https://www.suse.com/security/cve/CVE-2013-7294/" source="CVE"/>
		<description>

This update fixes a Denial of Service (DoS) vulnerability via IKEv2 I1 
notifications in openswan. CVE-2013-7294 has been assigned to this issue.

Security Issues:

    * CVE-2013-7294
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7294&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-21"/>
	<updated date="2014-01-21"/>
	<bugzilla href="https://bugzilla.suse.com/859220">SUSE bug 859220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7294/">CVE-2013-7294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576617" comment="openswan-2.6.16-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576618" comment="openswan-doc-2.6.16-1.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576617" comment="openswan-2.6.16-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576618" comment="openswan-doc-2.6.16-1.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39945" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-31"/>
	<updated date="2013-10-31"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576619" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576620" comment="openvpn-auth-pam-plugin-2.0.9-143.33.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576619" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576620" comment="openvpn-auth-pam-plugin-2.0.9-143.33.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39946" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="789994" ref_url="https://bugzilla.suse.com/789994" source="BUGZILLA"/>
		<reference ref_id="796014" ref_url="https://bugzilla.suse.com/796014" source="BUGZILLA"/>
		<reference ref_id="797060" ref_url="https://bugzilla.suse.com/797060" source="BUGZILLA"/>
		<reference ref_id="804415" ref_url="https://bugzilla.suse.com/804415" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>

This update of Perl 5 fixes the following security issues:

    * fix rehash DoS [bnc#804415] [CVE-2013-1667]
    * improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
    * fix glob denial of service [bnc#796014] [CVE-2011-2728]
    * sanitize input in Maketext.pm [bnc#797060] [CVE-2012-6329]

Security Issue references:

    * CVE-2013-1667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576621" comment="perl-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576622" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576623" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576624" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576625" comment="perl-x86-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576621" comment="perl-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576622" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576623" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576624" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576625" comment="perl-x86-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39947" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00006.html" source="SUSE-SU"/>
		<description>

The PHP5 script interpreter was updated to fix security issues:

* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576626" comment="apache2-mod_php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576627" comment="php5-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576628" comment="php5-bcmath-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576629" comment="php5-bz2-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576630" comment="php5-calendar-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576631" comment="php5-ctype-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576632" comment="php5-curl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576633" comment="php5-dba-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576634" comment="php5-dbase-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576635" comment="php5-dom-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576636" comment="php5-exif-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576637" comment="php5-fastcgi-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576638" comment="php5-ftp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576639" comment="php5-gd-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576640" comment="php5-gettext-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576641" comment="php5-gmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576642" comment="php5-hash-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576643" comment="php5-iconv-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576644" comment="php5-json-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576645" comment="php5-ldap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576646" comment="php5-mbstring-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576647" comment="php5-mcrypt-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576648" comment="php5-mysql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576649" comment="php5-odbc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576650" comment="php5-openssl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576651" comment="php5-pcntl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576652" comment="php5-pdo-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576653" comment="php5-pear-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576654" comment="php5-pgsql-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576655" comment="php5-pspell-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576656" comment="php5-shmop-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576657" comment="php5-snmp-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576658" comment="php5-soap-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576659" comment="php5-suhosin-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576660" comment="php5-sysvmsg-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576661" comment="php5-sysvsem-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576662" comment="php5-sysvshm-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576663" comment="php5-tokenizer-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576664" comment="php5-wddx-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576665" comment="php5-xmlreader-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576666" comment="php5-xmlrpc-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576667" comment="php5-xmlwriter-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576668" comment="php5-xsl-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576669" comment="php5-zip-5.2.14-0.7.30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576670" comment="php5-zlib-5.2.14-0.7.30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39948" version="1" class="patch">
	<metadata>
		<title>Security update for php5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00039.html" source="SUSE-SU"/>
		<description>

php5 was updated to fix the following security issues:

- CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener (bsc#991426).
- CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE (bsc#991427).
- CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex (bsc#991428).
- CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization (bsc#991429).
- CVE-2016-5399: Improper error handling in bzread() (bsc#991430).
- CVE-2016-6288: Buffer over-read in php_url_parse_ex (bsc#991433).
- CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c (bsc#991437).
- CVE-2016-5769: Mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double free corruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576671" comment="apache2-mod_php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576672" comment="php5-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576673" comment="php5-bcmath-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576674" comment="php5-bz2-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576675" comment="php5-calendar-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576676" comment="php5-ctype-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576677" comment="php5-curl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576678" comment="php5-dba-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576679" comment="php5-dbase-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576680" comment="php5-dom-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576681" comment="php5-exif-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576682" comment="php5-fastcgi-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576683" comment="php5-ftp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576684" comment="php5-gd-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576685" comment="php5-gettext-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576686" comment="php5-gmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576687" comment="php5-hash-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576688" comment="php5-iconv-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576689" comment="php5-json-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576690" comment="php5-ldap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576691" comment="php5-mbstring-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576692" comment="php5-mcrypt-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576693" comment="php5-mysql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576694" comment="php5-odbc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576695" comment="php5-openssl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576696" comment="php5-pcntl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576697" comment="php5-pdo-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576698" comment="php5-pear-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576699" comment="php5-pgsql-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576700" comment="php5-pspell-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576701" comment="php5-shmop-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576702" comment="php5-snmp-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576703" comment="php5-soap-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576704" comment="php5-suhosin-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576705" comment="php5-sysvmsg-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576706" comment="php5-sysvsem-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576707" comment="php5-sysvshm-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576708" comment="php5-tokenizer-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576709" comment="php5-wddx-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576710" comment="php5-xmlreader-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576711" comment="php5-xmlrpc-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576712" comment="php5-xmlwriter-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576713" comment="php5-xsl-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576714" comment="php5-zip-5.2.14-0.7.30.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576715" comment="php5-zlib-5.2.14-0.7.30.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39949" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="884986" ref_url="https://bugzilla.suse.com/884986" source="BUGZILLA"/>
		<reference ref_id="884987" ref_url="https://bugzilla.suse.com/884987" source="BUGZILLA"/>
		<reference ref_id="884989" ref_url="https://bugzilla.suse.com/884989" source="BUGZILLA"/>
		<reference ref_id="884990" ref_url="https://bugzilla.suse.com/884990" source="BUGZILLA"/>
		<reference ref_id="884991" ref_url="https://bugzilla.suse.com/884991" source="BUGZILLA"/>
		<reference ref_id="884992" ref_url="https://bugzilla.suse.com/884992" source="BUGZILLA"/>
		<reference ref_id="885961" ref_url="https://bugzilla.suse.com/885961" source="BUGZILLA"/>
		<reference ref_id="886059" ref_url="https://bugzilla.suse.com/886059" source="BUGZILLA"/>
		<reference ref_id="886060" ref_url="https://bugzilla.suse.com/886060" source="BUGZILLA"/>
		<reference ref_id="893849" ref_url="https://bugzilla.suse.com/893849" source="BUGZILLA"/>
		<reference ref_id="893853" ref_url="https://bugzilla.suse.com/893853" source="BUGZILLA"/>
		<reference ref_id="902357" ref_url="https://bugzilla.suse.com/902357" source="BUGZILLA"/>
		<reference ref_id="902360" ref_url="https://bugzilla.suse.com/902360" source="BUGZILLA"/>
		<reference ref_id="902368" ref_url="https://bugzilla.suse.com/902368" source="BUGZILLA"/>
		<reference ref_id="910659" ref_url="https://bugzilla.suse.com/910659" source="BUGZILLA"/>
		<reference ref_id="914690" ref_url="https://bugzilla.suse.com/914690" source="BUGZILLA"/>
		<reference ref_id="917150" ref_url="https://bugzilla.suse.com/917150" source="BUGZILLA"/>
		<reference ref_id="918768" ref_url="https://bugzilla.suse.com/918768" source="BUGZILLA"/>
		<reference ref_id="919080" ref_url="https://bugzilla.suse.com/919080" source="BUGZILLA"/>
		<reference ref_id="921950" ref_url="https://bugzilla.suse.com/921950" source="BUGZILLA"/>
		<reference ref_id="922451" ref_url="https://bugzilla.suse.com/922451" source="BUGZILLA"/>
		<reference ref_id="922452" ref_url="https://bugzilla.suse.com/922452" source="BUGZILLA"/>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="924972" ref_url="https://bugzilla.suse.com/924972" source="BUGZILLA"/>
		<reference ref_id="925109" ref_url="https://bugzilla.suse.com/925109" source="BUGZILLA"/>
		<reference ref_id="928506" ref_url="https://bugzilla.suse.com/928506" source="BUGZILLA"/>
		<reference ref_id="928511" ref_url="https://bugzilla.suse.com/928511" source="BUGZILLA"/>
		<reference ref_id="931421" ref_url="https://bugzilla.suse.com/931421" source="BUGZILLA"/>
		<reference ref_id="931769" ref_url="https://bugzilla.suse.com/931769" source="BUGZILLA"/>
		<reference ref_id="931772" ref_url="https://bugzilla.suse.com/931772" source="BUGZILLA"/>
		<reference ref_id="931776" ref_url="https://bugzilla.suse.com/931776" source="BUGZILLA"/>
		<reference ref_id="933227" ref_url="https://bugzilla.suse.com/933227" source="BUGZILLA"/>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="935224" ref_url="https://bugzilla.suse.com/935224" source="BUGZILLA"/>
		<reference ref_id="935226" ref_url="https://bugzilla.suse.com/935226" source="BUGZILLA"/>
		<reference ref_id="935227" ref_url="https://bugzilla.suse.com/935227" source="BUGZILLA"/>
		<reference ref_id="935229" ref_url="https://bugzilla.suse.com/935229" source="BUGZILLA"/>
		<reference ref_id="935232" ref_url="https://bugzilla.suse.com/935232" source="BUGZILLA"/>
		<reference ref_id="935234" ref_url="https://bugzilla.suse.com/935234" source="BUGZILLA"/>
		<reference ref_id="935274" ref_url="https://bugzilla.suse.com/935274" source="BUGZILLA"/>
		<reference ref_id="935275" ref_url="https://bugzilla.suse.com/935275" source="BUGZILLA"/>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-1019" ref_url="https://www.suse.com/security/cve/CVE-2004-1019/" source="CVE"/>
		<reference ref_id="CVE-2006-7243" ref_url="https://www.suse.com/security/cve/CVE-2006-7243/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<reference ref_id="CVE-2014-5459" ref_url="https://www.suse.com/security/cve/CVE-2014-5459/" source="CVE"/>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-3411" ref_url="https://www.suse.com/security/cve/CVE-2015-3411/" source="CVE"/>
		<reference ref_id="CVE-2015-3412" ref_url="https://www.suse.com/security/cve/CVE-2015-3412/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-4148" ref_url="https://www.suse.com/security/cve/CVE-2015-4148/" source="CVE"/>
		<reference ref_id="CVE-2015-4598" ref_url="https://www.suse.com/security/cve/CVE-2015-4598/" source="CVE"/>
		<reference ref_id="CVE-2015-4599" ref_url="https://www.suse.com/security/cve/CVE-2015-4599/" source="CVE"/>
		<reference ref_id="CVE-2015-4600" ref_url="https://www.suse.com/security/cve/CVE-2015-4600/" source="CVE"/>
		<reference ref_id="CVE-2015-4601" ref_url="https://www.suse.com/security/cve/CVE-2015-4601/" source="CVE"/>
		<reference ref_id="CVE-2015-4602" ref_url="https://www.suse.com/security/cve/CVE-2015-4602/" source="CVE"/>
		<reference ref_id="CVE-2015-4603" ref_url="https://www.suse.com/security/cve/CVE-2015-4603/" source="CVE"/>
		<reference ref_id="CVE-2015-4643" ref_url="https://www.suse.com/security/cve/CVE-2015-4643/" source="CVE"/>
		<reference ref_id="CVE-2015-4644" ref_url="https://www.suse.com/security/cve/CVE-2015-4644/" source="CVE"/>
		<reference ref_id="CVE-2015-5161" ref_url="https://www.suse.com/security/cve/CVE-2015-5161/" source="CVE"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<description>
This update for php53 to version 5.3.17 fixes the following issues:

These security issues were fixed:
- CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
- CVE-2016-5094: Don't create strings with lengths outside int range (bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside int range (bnc#982012).
- CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
- CVE-2016-5114: fpm_log.c memory leak and buffer overflow (bnc#982162).
- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandles driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table (bsc#981050).
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP allowed remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation (bsc#980366).
- CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote attackers to cause a denial of service via a crafted imagefilltoborder call (bsc#980375).
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in PHP allowed remote attackers to cause a denial of service (segmentation fault) via recursive method calls (bsc#980373).
- CVE-2016-4540: The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset (bsc#978829).
- CVE-2016-4541: The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset (bsc#978829.
- CVE-2016-4542: The exif_process_IFD_TAG function in ext/exif/exif.c in PHP did not properly construct spprintf arguments, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830).
- CVE-2016-4543: The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP did not validate IFD sizes, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4544: The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP did not validate TIFF start data, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data (bsc#978830.
- CVE-2016-4537: The bcpowmod function in ext/bcmath/bcmath.c in PHP accepted a negative integer for the scale argument, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4538: The bcpowmod function in ext/bcmath/bcmath.c in PHP modified certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call (bsc#978827).
- CVE-2016-4539: The xml_parse_into_struct function in ext/xml/xml.c in PHP allowed remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero (bsc#978828).
- CVE-2016-4342: ext/phar/phar_object.c in PHP mishandles zero-length uncompressed data, which allowed remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive (bsc#977991).
- CVE-2016-4346: Integer overflow in the str_pad function in ext/standard/string.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow (bsc#977994).
- CVE-2016-4073: Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call (bsc#977003).
- CVE-2015-8867: The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP incorrectly relied on the deprecated RAND_pseudo_bytes function, which made it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors (bsc#977005).
- CVE-2016-4070: Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP allowed remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function (bsc#976997).
- CVE-2015-8866: ext/libxml/libxml.c in PHP when PHP-FPM is used, did not isolate each thread from libxml_disable_entity_loader changes in other threads, which allowed remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161 (bsc#976996).
- CVE-2015-8838: ext/mysqlnd/mysqlnd.c in PHP used a client SSL option to mean that SSL is optional, which allowed man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152 (bsc#973792).
- CVE-2015-8835: The make_http_soap_request function in ext/soap/php_http.c in PHP did not properly retrieve keys, which allowed remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c (bsc#973351).
- CVE-2016-3141: Use-after-free vulnerability in wddx.c in the WDDX extension in PHP allowed remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element (bsc#969821).
- CVE-2016-3142: The phar_parse_zipfile function in zip.c in the PHAR extension in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location (bsc#971912).
- CVE-2014-9767: Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP ext/zip/ext_zip.cpp in HHVM allowed remote attackers to create arbitrary empty directories via a crafted ZIP archive (bsc#971612).
- CVE-2016-3185: The make_http_soap_request function in ext/soap/php_http.c in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c (bsc#971611).
- CVE-2016-2554: Stack-based buffer overflow in ext/phar/tar.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive (bsc#968284).
- CVE-2015-7803: The phar_get_entry_data function in ext/phar/util.c in PHP allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that did not exist (bsc#949961).
- CVE-2015-6831: Multiple use-after-free vulnerabilities in SPL in PHP allowed remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization (bsc#942291).
- CVE-2015-6833: Directory traversal vulnerability in the PharData class in PHP allowed remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call (bsc#942296.
- CVE-2015-6836: The SoapClient __call method in ext/soap/soap.c in PHP did not properly manage headers, which allowed remote attackers to execute arbitrary code via crafted serialized data that triggers a 'type confusion' in the serialize_function_call function (bsc#945428).
- CVE-2015-6837: The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider the possibility of a NULL valuePop return value proceeding with a free operation during initial error checking, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838 (bsc#945412).
- CVE-2015-6838: The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider the possibility of a NULL valuePop return value proceeding with a free operation after the principal argument loop, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837 (bsc#945412).
- CVE-2015-5590: Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension (bsc#938719).
- CVE-2015-5589: The phar_convert_to_other function in ext/phar/phar_object.c in PHP did not validate a file pointer a close operation, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call (bsc#938721).
- CVE-2015-4602: The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935224).
- CVE-2015-4599: The SoapFault::__toString method in ext/soap/soap.c in PHP allowed remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935226).
- CVE-2015-4600: The SoapClient implementation in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to 'type confusion' issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods (bsc#935226).
- CVE-2015-4601: PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to 'type confusion' issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600 (bsc#935226.
- CVE-2015-4603: The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP allowed remote attackers to execute arbitrary code via an unexpected data type, related to a 'type confusion' issue (bsc#935234).
- CVE-2015-4644: The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP did not validate token extraction for table names, which might allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352 (bsc#935274).
- CVE-2015-4643: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022 (bsc#935275).
- CVE-2015-3411: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files (bsc#935227).
- CVE-2015-3412: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension (bsc#935229).
- CVE-2015-4598: PHP did not ensure that pathnames lack %00 sequences, which might have allowed remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files (bsc#935232).
- CVE-2015-4148: The do_soap_call function in ext/soap/soap.c in PHP did not verify that the uri property is a string, which allowed remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a 'type confusion' issue (bsc#933227).
- CVE-2015-4024: Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP allowed remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome (bsc#931421).
- CVE-2015-4026: The pcntl_exec implementation in PHP truncates a pathname upon encountering a \x00 character, which might allowed remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243 (bsc#931776).
- CVE-2015-4022: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow (bsc#931772).
- CVE-2015-4021: The phar_parse_tarfile function in ext/phar/tar.c in PHP did not verify that the first character of a filename is different from the \0 character, which allowed remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive (bsc#931769).
- CVE-2015-3329: Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP allowed remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive (bsc#928506).
- CVE-2015-2783: ext/phar/phar.c in PHP allowed remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions (bsc#928511).
- CVE-2015-2787: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231 (bsc#924972).
- CVE-2014-9709: The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function (bsc#923945).
- CVE-2015-2301: Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP allowed remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file (bsc#922452).
- CVE-2015-2305: Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) 32-bit platforms might have allowed context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow (bsc#921950).
- CVE-2014-9705: Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP allowed remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries (bsc#922451).
- CVE-2015-0273: Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP allowed remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function (bsc#918768).
- CVE-2014-9652: The mconvert function in softmagic.c in file as used in the Fileinfo component in PHP did not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allowed remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file (bsc#917150).
- CVE-2014-8142: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019 (bsc#910659).
- CVE-2015-0231: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142 (bsc#910659).
- CVE-2014-8142: Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP allowed remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019 (bsc#910659).
- CVE-2015-0232: The exif_process_unicode function in ext/exif/exif.c in PHP allowed remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image (bsc#914690).
- CVE-2014-3670: The exif_ifd_make_value function in exif.c in the EXIF extension in PHP operates on floating-point arrays incorrectly, which allowed remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function (bsc#902357).
- CVE-2014-3669: Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP allowed remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value (bsc#902360).
- CVE-2014-3668: Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP allowed remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation (bsc#902368).
- CVE-2014-5459: The PEAR_REST class in REST.php in PEAR in PHP allowed local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions  (bsc#893849).
- CVE-2014-3597: Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP allowed remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049 (bsc#893853).
- CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments  (bsc#886059).
- CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments  (bsc#886060).
- CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP did not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allowed context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a 'type confusion' vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php (bsc#885961).
- CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file (bsc#884986).
- CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c in file as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion (bsc#884987).
- CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file as used in the Fileinfo component in PHP relies on incorrect sector-size data, which allowed remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file (bsc#884989).
- CVE-2014-3480: The cdf_count_chain function in cdf.c in file as used in the Fileinfo component in PHP did not properly validate sector-count data, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file (bsc#884990).
- CVE-2014-3487: The cdf_read_property_info function in file as used in the Fileinfo component in PHP did not properly validate a stream offset, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file (bsc#884991).
- CVE-2014-3515: The SPL component in PHP incorrectly anticipates that certain data structures will have the array data type after unserialization, which allowed remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to 'type confusion' issues in (1) ArrayObject and (2) SPLObjectStorage (bsc#884992).

These non-security issues were fixed:
- bnc#935074: compare with SQL_NULL_DATA correctly
- bnc#935074: fix segfault in odbc_fetch_array
- bnc#919080: fix timezone map
- bnc#925109: unserialize SoapClient type confusion
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884987">SUSE bug 884987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884989">SUSE bug 884989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884990">SUSE bug 884990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884991">SUSE bug 884991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884992">SUSE bug 884992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885961">SUSE bug 885961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886059">SUSE bug 886059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886060">SUSE bug 886060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893849">SUSE bug 893849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914690">SUSE bug 914690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917150">SUSE bug 917150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918768">SUSE bug 918768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919080">SUSE bug 919080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922451">SUSE bug 922451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922452">SUSE bug 922452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925109">SUSE bug 925109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931421">SUSE bug 931421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931772">SUSE bug 931772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931776">SUSE bug 931776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935224">SUSE bug 935224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935229">SUSE bug 935229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935274">SUSE bug 935274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2004-1019/">CVE-2004-1019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7243/">CVE-2006-7243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5459/">CVE-2014-5459</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3411/">CVE-2015-3411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3412/">CVE-2015-3412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4148/">CVE-2015-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4598/">CVE-2015-4598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4599/">CVE-2015-4599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4600/">CVE-2015-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4601/">CVE-2015-4601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4602/">CVE-2015-4602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4603/">CVE-2015-4603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4643/">CVE-2015-4643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4644/">CVE-2015-4644</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5161/">CVE-2015-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576716" comment="apache2-mod_php53-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576717" comment="php53-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576718" comment="php53-bcmath-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576719" comment="php53-bz2-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576720" comment="php53-calendar-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576721" comment="php53-ctype-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576722" comment="php53-curl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576723" comment="php53-dba-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576724" comment="php53-dom-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576725" comment="php53-exif-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576726" comment="php53-fastcgi-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576727" comment="php53-fileinfo-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576728" comment="php53-ftp-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576729" comment="php53-gd-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576730" comment="php53-gettext-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576731" comment="php53-gmp-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576732" comment="php53-iconv-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576733" comment="php53-intl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576734" comment="php53-json-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576735" comment="php53-ldap-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576736" comment="php53-mbstring-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576737" comment="php53-mcrypt-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576738" comment="php53-mysql-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576739" comment="php53-odbc-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576740" comment="php53-openssl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576741" comment="php53-pcntl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576742" comment="php53-pdo-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576743" comment="php53-pear-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576744" comment="php53-pgsql-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576745" comment="php53-pspell-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576746" comment="php53-shmop-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576747" comment="php53-snmp-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576748" comment="php53-soap-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576749" comment="php53-suhosin-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576750" comment="php53-sysvmsg-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576751" comment="php53-sysvsem-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576752" comment="php53-sysvshm-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576753" comment="php53-tokenizer-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576754" comment="php53-wddx-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576755" comment="php53-xmlreader-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576756" comment="php53-xmlrpc-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576757" comment="php53-xmlwriter-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576758" comment="php53-xsl-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576759" comment="php53-zip-5.3.17-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576760" comment="php53-zlib-5.3.17-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39950" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00014.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
* CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
* CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
* CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
* CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
* CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
* CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
* CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576761" comment="apache2-mod_php53-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576762" comment="php53-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576763" comment="php53-bcmath-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576764" comment="php53-bz2-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576765" comment="php53-calendar-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576766" comment="php53-ctype-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576767" comment="php53-curl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576768" comment="php53-dba-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576769" comment="php53-dom-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576770" comment="php53-exif-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576771" comment="php53-fastcgi-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576772" comment="php53-fileinfo-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576773" comment="php53-ftp-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576774" comment="php53-gd-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576775" comment="php53-gettext-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576776" comment="php53-gmp-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576777" comment="php53-iconv-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576778" comment="php53-intl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576779" comment="php53-json-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576780" comment="php53-ldap-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576781" comment="php53-mbstring-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576782" comment="php53-mcrypt-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576783" comment="php53-mysql-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576784" comment="php53-odbc-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576785" comment="php53-openssl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576786" comment="php53-pcntl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576787" comment="php53-pdo-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576788" comment="php53-pear-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576789" comment="php53-pgsql-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576790" comment="php53-pspell-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576791" comment="php53-shmop-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576792" comment="php53-snmp-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576793" comment="php53-soap-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576794" comment="php53-suhosin-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576795" comment="php53-sysvmsg-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576796" comment="php53-sysvsem-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576797" comment="php53-sysvshm-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576798" comment="php53-tokenizer-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576799" comment="php53-wddx-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576800" comment="php53-xmlreader-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576801" comment="php53-xmlrpc-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576802" comment="php53-xmlwriter-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576803" comment="php53-xsl-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576804" comment="php53-zip-5.3.17-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576805" comment="php53-zlib-5.3.17-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39951" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2461-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00008.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576806" comment="apache2-mod_php53-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576807" comment="php53-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576808" comment="php53-bcmath-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576809" comment="php53-bz2-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576810" comment="php53-calendar-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576811" comment="php53-ctype-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576812" comment="php53-curl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576813" comment="php53-dba-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576814" comment="php53-dom-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576815" comment="php53-exif-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576816" comment="php53-fastcgi-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576817" comment="php53-fileinfo-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576818" comment="php53-ftp-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576819" comment="php53-gd-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576820" comment="php53-gettext-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576821" comment="php53-gmp-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576822" comment="php53-iconv-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576823" comment="php53-intl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576824" comment="php53-json-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576825" comment="php53-ldap-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576826" comment="php53-mbstring-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576827" comment="php53-mcrypt-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576828" comment="php53-mysql-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576829" comment="php53-odbc-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576830" comment="php53-openssl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576831" comment="php53-pcntl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576832" comment="php53-pdo-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576833" comment="php53-pear-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576834" comment="php53-pgsql-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576835" comment="php53-pspell-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576836" comment="php53-shmop-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576837" comment="php53-snmp-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576838" comment="php53-soap-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576839" comment="php53-suhosin-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576840" comment="php53-sysvmsg-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576841" comment="php53-sysvsem-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576842" comment="php53-sysvshm-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576843" comment="php53-tokenizer-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576844" comment="php53-wddx-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576845" comment="php53-xmlreader-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576846" comment="php53-xmlrpc-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576847" comment="php53-xmlwriter-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576848" comment="php53-xsl-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576849" comment="php53-zip-5.3.17-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576850" comment="php53-zlib-5.3.17-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39952" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>

PostgreSQL has been updated to version 8.3.23 which fixes various bugs and 
one security issue.

The security issue fixed in this release, CVE-2013-0255, allowed a 
previously authenticated user to crash the server by calling an internal 
function with invalid arguments. This issue was discovered by independent 
security researcher Sumit Soni this week and reported via Secunia SVCRP, 
and we are grateful for their efforts in making PostgreSQL more secure.

More information can be found at

http://www.postgresql.org/about/news/1446/
&lt;http://www.postgresql.org/about/news/1446/&gt;

Security Issue reference:

    * CVE-2013-0255
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-13"/>
	<updated date="2013-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576851" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576852" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576853" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576854" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576851" comment="postgresql-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576852" comment="postgresql-contrib-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576853" comment="postgresql-docs-8.3.23-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576854" comment="postgresql-server-8.3.23-0.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39953" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="835122" ref_url="https://bugzilla.suse.com/835122" source="BUGZILLA"/>
		<reference ref_id="853982" ref_url="https://bugzilla.suse.com/853982" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<description>

This update for puppet fixes a remote code execution vulnerability in the 
'resource_type' service. (CVE-2013-4761)

Additionally, the update prevents puppet from executing initialization 
scripts that could trigger a system reboot when handling 'puppet resource 
service' calls.

Security Issue reference:

    * CVE-2013-4761
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-20"/>
	<updated date="2014-01-20"/>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853982">SUSE bug 853982</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576855" comment="puppet-2.6.18-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576856" comment="puppet-server-2.6.18-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576855" comment="puppet-2.6.18-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576856" comment="puppet-server-2.6.18-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576855" comment="puppet-2.6.18-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576856" comment="puppet-server-2.6.18-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39954" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39955" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="827982" ref_url="https://bugzilla.suse.com/827982" source="BUGZILLA"/>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

Python has been updated to version 2.6.9, which brings many fixes for bugs 
and security issues:

    * SSL Root Certificate validation is now enabled by default.
      (bnc#827982)
    * Fixed a overflow in socket.recvfrom_into where incorrect python
      programs could have been exploited remotely via a buffer overrun.
      (CVE-2014-1912)
    * Multiple unbound readline() DoS flaws in python stdlib have been
      fixed. (CVE-2013-1752)
    * Handling of embedded \0 in SSL certificate fields has been fixed.
      (CVE-2013-4238)
    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters has been fixed. (CVE-2014-4650)

Additionally, the following non-security issues have been fixed:

    * Turn off OpenSSL's aggressive optimizations that conflict with
      Python's GC. (bnc#859068)
    * Fix usage of MD5 in hmac module when the cipher is not available in
      FIPS mode. (bnc#847135)
    * Update 'urlparse' module to correctly parse IPv6 addresses.
      (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;
    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;
    * CVE-2013-1752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752&gt;
    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/827982">SUSE bug 827982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574753" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574754" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574755" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574756" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574757" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574758" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574759" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574760" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574761" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574762" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574763" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574764" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574765" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39956" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets could have caused the
      routing table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39957" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * CVE-2013-4164: heap overflow in float point parsing

Security Issue references:

    * CVE-2013-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164&gt;
    * CVE-2009-0689
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576873" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576873" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576873" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563135" comment="ruby-doc-html-1.8.7.p357-0.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563139" comment="ruby-tk-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39958" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="773464" ref_url="https://bugzilla.suse.com/773464" source="BUGZILLA"/>
		<reference ref_id="901813" ref_url="https://bugzilla.suse.com/901813" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="913304" ref_url="https://bugzilla.suse.com/913304" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586).
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582).
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584).
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583).

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null
  (bnc#949022).
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299).
- Take resource group sids into account when caching netsamlogon data (bnc#912457).
- Use domain name if search by domain SID fails to send SIDHistory lookups to correct
  idmap backend (bnc#773464).
- Remove deprecated base_rid example from idmap_rid manpage (bnc#913304).
- Purge printer name cache on spoolss SetPrinter change (bnc#901813).
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773464">SUSE bug 773464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901813">SUSE bug 901813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913304">SUSE bug 913304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576874" comment="ldapsmb-1.34b-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576875" comment="libldb1-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576876" comment="libsmbclient0-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576877" comment="libsmbclient0-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576878" comment="libtalloc2-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576879" comment="libtalloc2-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576880" comment="libtdb1-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576881" comment="libtdb1-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576882" comment="libtevent0-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576883" comment="libtevent0-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576884" comment="libwbclient0-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576885" comment="libwbclient0-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576886" comment="samba-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576887" comment="samba-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576888" comment="samba-client-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576889" comment="samba-client-32bit-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576890" comment="samba-doc-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576891" comment="samba-krb-printing-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576892" comment="samba-winbind-3.6.3-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576893" comment="samba-winbind-32bit-3.6.3-45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39959" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bugs fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
- Ensure samlogon fallback requests are rerouted after kerberos failure;
  (bsc#953382).
- Ensure attempt to ssh into locked account  triggers
  'Your account is disabled.....' to the console; (bsc#953382).
- Make the winbind package depend on the matching libwbclient version and
  vice versa; (bsc#936909).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-29"/>
	<updated date="2016-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576894" comment="ldapsmb-1.34b-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576895" comment="libldb1-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576896" comment="libsmbclient0-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576897" comment="libsmbclient0-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576898" comment="libtalloc2-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576899" comment="libtalloc2-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576900" comment="libtdb1-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576901" comment="libtdb1-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576902" comment="libtevent0-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576903" comment="libtevent0-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576904" comment="libwbclient0-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576905" comment="libwbclient0-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576906" comment="samba-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576907" comment="samba-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576908" comment="samba-client-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576909" comment="samba-client-32bit-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576910" comment="samba-doc-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576911" comment="samba-krb-printing-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576912" comment="samba-winbind-3.6.3-48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576913" comment="samba-winbind-32bit-3.6.3-48.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39960" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-13"/>
	<updated date="2016-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576914" comment="ldapsmb-1.34b-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576915" comment="libldb1-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576916" comment="libsmbclient0-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576917" comment="libsmbclient0-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576918" comment="libtalloc2-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576919" comment="libtalloc2-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576920" comment="libtdb1-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576921" comment="libtdb1-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576922" comment="libtevent0-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576923" comment="libtevent0-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576924" comment="libwbclient0-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576925" comment="libwbclient0-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576926" comment="samba-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576927" comment="samba-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576928" comment="samba-client-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576929" comment="samba-client-32bit-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576930" comment="samba-doc-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576931" comment="samba-krb-printing-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576932" comment="samba-winbind-3.6.3-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576933" comment="samba-winbind-32bit-3.6.3-52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39961" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="975131" ref_url="https://bugzilla.suse.com/975131" source="BUGZILLA"/>
		<reference ref_id="978898" ref_url="https://bugzilla.suse.com/978898" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
- Honor smb.conf socket options in winbind. (bsc#975131)
- Fix crash with net rpc join. (bsc#978898)
- Fix a regression verifying the security trailer. (bsc#978898)
- Fix updating netlogon credentials. (bsc#978898)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975131">SUSE bug 975131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978898">SUSE bug 978898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576934" comment="ldapsmb-1.34b-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576935" comment="libldb1-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576936" comment="libsmbclient0-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576937" comment="libsmbclient0-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576938" comment="libtalloc2-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576939" comment="libtalloc2-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576940" comment="libtdb1-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576941" comment="libtdb1-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576942" comment="libtevent0-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576943" comment="libtevent0-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576944" comment="libwbclient0-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576945" comment="libwbclient0-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576946" comment="samba-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576947" comment="samba-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576948" comment="samba-client-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576949" comment="samba-client-32bit-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576950" comment="samba-doc-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576951" comment="samba-krb-printing-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576952" comment="samba-winbind-3.6.3-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576953" comment="samba-winbind-32bit-3.6.3-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39962" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="829084" ref_url="https://bugzilla.suse.com/829084" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>

This squid update fixes a buffer overflow issue when squid attempts to 
resolve an overly long hostname. This can be triggered with specially 
crafted http requests. (bnc#829084, CVE-2013-4115)

This update also includes a correction to the last change for logrotate. 
(bnc#677335)

Security Issue reference:

    * CVE-2013-4115
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-09"/>
	<updated date="2013-09-09"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829084">SUSE bug 829084</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39963" version="1" class="patch">
	<metadata>
		<title>Security update for squid3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="794954" ref_url="https://bugzilla.suse.com/794954" source="BUGZILLA"/>
		<reference ref_id="796999" ref_url="https://bugzilla.suse.com/796999" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<description>

A denial of service problem in Squid3 initiated via invalid Content-Length 
headers and memory leaks has been fixed. (CVE-2012-5643,CVE-2013-0189, 
SQUID-2012:1)

Also a logrotate permission issue has been fixed.

Security Issue references:

    * CVE-2012-5643
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643&gt;
    * CVE-2013-0188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-12"/>
	<updated date="2013-02-12"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576955" comment="squid3-3.1.12-8.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576955" comment="squid3-3.1.12-8.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39964" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="833278" ref_url="https://bugzilla.suse.com/833278" source="BUGZILLA"/>
		<reference ref_id="840826" ref_url="https://bugzilla.suse.com/840826" source="BUGZILLA"/>
		<reference ref_id="847506" ref_url="https://bugzilla.suse.com/847506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<description>

This strongswan update fixes security issues and bugs:

    * CVE-2013-5018: Specially crafted XAuth usernames and EAP identities
      can cause a crash in strongswan.
    * CVE-2013-6075: A crafted ID packet can be used by remote attackers to
      crash the server or potentially gain authentication privileges under
      certain circumstances.

Also a bug with route recursion limits was fixed:

    * Charon SEGFAULT when left=%any / recursion limit. (bnc#840826)

Security Issues:

    * CVE-2013-5018
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840826">SUSE bug 840826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576956" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576957" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576956" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576957" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576956" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576957" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39965" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="807450" ref_url="https://bugzilla.suse.com/807450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<description>

This update for stunnel fixes a buffer overflow vulnerability caused by 
incorrect integer conversion in the NTLM authentication of the CONNECT 
protocol negotiation (CVE-2013-1762).

Security Issue reference:

    * CVE-2013-1762
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-05"/>
	<updated date="2013-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/807450">SUSE bug 807450</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576958" comment="stunnel-4.36-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576958" comment="stunnel-4.36-0.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39966" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="806919" ref_url="https://bugzilla.suse.com/806919" source="BUGZILLA"/>
		<reference ref_id="806921" ref_url="https://bugzilla.suse.com/806921" source="BUGZILLA"/>
		<reference ref_id="817349" ref_url="https://bugzilla.suse.com/817349" source="BUGZILLA"/>
		<reference ref_id="817350" ref_url="https://bugzilla.suse.com/817350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<description>

This update fixes the following security issues which allowed to bypass the 
sudo authentication: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776 and 
CVE-2013-2777.

Security Issue references:

    * CVE-2013-1775
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775&gt;
    * CVE-2013-1776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776&gt;
    * CVE-2013-2776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776&gt;
    * CVE-2013-2777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-30"/>
	<updated date="2013-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576959" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576959" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39967" version="1" class="patch">
	<metadata>
		<title>Security update for systemtap</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="748564" ref_url="https://bugzilla.suse.com/748564" source="BUGZILLA"/>
		<reference ref_id="796574" ref_url="https://bugzilla.suse.com/796574" source="BUGZILLA"/>
		<reference ref_id="800335" ref_url="https://bugzilla.suse.com/800335" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0875" ref_url="https://www.suse.com/security/cve/CVE-2012-0875/" source="CVE"/>
		<description>

This collective update for systemtap provides the following fixes:

    * Change how systemtap looks for tracepoint header files. (bnc#796574)
    * Systemtap manually loads libebl backends. Add libebl1 dependency.
      (bnc#800335)
    * Fix kernel panic when processing malformed DWARF unwind data.
      (bnc#748564, CVE-2012-0875)

Security Issue reference:

    * CVE-2012-0875
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0875&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-04"/>
	<updated date="2013-03-04"/>
	<bugzilla href="https://bugzilla.suse.com/748564">SUSE bug 748564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796574">SUSE bug 796574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800335">SUSE bug 800335</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0875/">CVE-2012-0875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576960" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576961" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576960" comment="systemtap-1.5-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576961" comment="systemtap-server-1.5-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39968" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="768772" ref_url="https://bugzilla.suse.com/768772" source="BUGZILLA"/>
		<reference ref_id="804992" ref_url="https://bugzilla.suse.com/804992" source="BUGZILLA"/>
		<reference ref_id="818948" ref_url="https://bugzilla.suse.com/818948" source="BUGZILLA"/>
		<reference ref_id="822177" ref_url="https://bugzilla.suse.com/822177" source="BUGZILLA"/>
		<reference ref_id="831119" ref_url="https://bugzilla.suse.com/831119" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<description>

This update of tomcat6 fixes:

    * apache-tomcat-CVE-2012-3544.patch (bnc#831119)
    * use chown --no-dereference to prevent symlink attacks on log
      (bnc#822177#c7/prevents CVE-2013-1976)
    * Fix tomcat init scripts generating malformed classpath (
      http://youtrack.jetbrains.com/issue/JT-18545
      &lt;http://youtrack.jetbrains.com/issue/JT-18545&gt; ) bnc#804992 (patch
      from m407)
    * fix a typo in initscript (bnc#768772 )
    * copy all shell scripts (bnc#818948)

Security Issue references:

    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2013-1976
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976&gt;
    * CVE-2012-0022
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-02"/>
	<updated date="2013-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/768772">SUSE bug 768772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804992">SUSE bug 804992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818948">SUSE bug 818948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831119">SUSE bug 831119</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39969" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39970" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget was updated to fix one security issue and two non-security issues:

    * FTP symbolic link arbitrary filesystem access (CVE-2014-4877).
    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575349" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39971" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<description>

wireshark was updated to security update version 1.8.12, fixing bugs and 
security issues.

    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html&gt;

Security Issue references:

    * CVE-2013-7112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112&gt;
    * CVE-2013-7113
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113&gt;
    * CVE-2013-7114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-27"/>
	<updated date="2013-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576972" comment="wireshark-1.8.12-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576972" comment="wireshark-1.8.12-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39972" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="793927" ref_url="https://bugzilla.suse.com/793927" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797014" ref_url="https://bugzilla.suse.com/797014" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="798188" ref_url="https://bugzilla.suse.com/798188" source="BUGZILLA"/>
		<reference ref_id="799694" ref_url="https://bugzilla.suse.com/799694" source="BUGZILLA"/>
		<reference ref_id="800156" ref_url="https://bugzilla.suse.com/800156" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="802690" ref_url="https://bugzilla.suse.com/802690" source="BUGZILLA"/>
		<reference ref_id="805094" ref_url="https://bugzilla.suse.com/805094" source="BUGZILLA"/>
		<reference ref_id="806736" ref_url="https://bugzilla.suse.com/806736" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html" source="SUSE-SU"/>
		<description>

XEN has been updated to fix various bugs and security issues:

    * 

      CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the
      Xen AMD IOMMU code by default choose to use a single interrupt
      remapping table for the whole system. This sharing implied that any
      guest with a passed through PCI device that is bus mastering capable
      can inject interrupts into other guests, including domain 0. This has
      been disabled for AMD chipsets not capable of it.

    * 

      CVE-2012-6075: qemu: The e1000 had overflows under some conditions,
      potentially corrupting memory.

    * 

      CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT
      (debug build only)

    * 

      CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation
      flaw was fixed.

Also the following bugs have been fixed:

    * bnc#805094 - xen hot plug attach/detach fails
    * bnc#802690 - domain locking can prevent a live migration from
      completing
    * bnc#797014 - no way to control live migrations
          o fix logic error in stdiostream_progress
          o restore logging in xc_save
          o add options to control migration tunables
    * bnc#806736: enabling xentrace crashes hypervisor
    * Upstream patches from Jan 26287-sched-credit-pick-idle.patch
      26501-VMX-simplify-CR0-update.patch
      26502-VMX-disable-SMEP-when-not-paging.patch
      26516-ACPI-parse-table-retval.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch
      (Replaces CVE-2013-0153-xsa36.patch)
      26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces
      CVE-2013-0153-xsa36.patch)
      26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
      26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
      CVE-2013-0153-xsa36.patch)
    * bnc#798188 - Add $network to xend initscript dependencies
    * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update
      Fixed with update to Xen version 4.1.4
    * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN
      kernel
    * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch
      26427-x86-AMD-enable-WC+.patch
    * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start
    * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch
      26333-x86-get_page_type-assert.patch (Replaces
      CVE-2013-0154-xsa37.patch)
      26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
      CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch
    * Update to Xen 4.1.4 c/s 23432
    * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid
      spurious build failures
    * Upstream patches from Jan 26179-PCI-find-next-cap.patch
      26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch
      26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch
      26229-gnttab-version-switch.patch (Replaces
      CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch
      (Replaces CVE-2012-5511-xsa27.patch)
      26231-memory-exchange-checks.patch (Replaces
      CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch
      (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
      (Replaces CVE-2012-5515-xsa31.patch)
      26235-IOMMU-ATS-max-queue-depth.patch
      26272-x86-EFI-makefile-cflags-filter.patch
      26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch
    * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI
      Makefile to do additional filtering.

Security Issue references:

    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-13"/>
	<updated date="2013-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/793927">SUSE bug 793927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797014">SUSE bug 797014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798188">SUSE bug 798188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799694">SUSE bug 799694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800156">SUSE bug 800156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802690">SUSE bug 802690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805094">SUSE bug 805094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806736">SUSE bug 806736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576973" comment="xen-devel-4.1.6_08-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576973" comment="xen-devel-4.1.6_08-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576973" comment="xen-devel-4.1.6_08-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39973" version="1" class="patch">
	<metadata>
		<title>Security update for xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="826717" ref_url="https://bugzilla.suse.com/826717" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="875668" ref_url="https://bugzilla.suse.com/875668" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

xen was updated to fix 14 security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW
      emulation (CVE-2014-7155).
    * Hypervisor heap contents leaked to guests (CVE-2014-4021).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).
    * Intel VT-d Interrupt Remapping engines can be evaded by native NMI
      interrupts (CVE-2013-3495).
    * Missing privilege level checks in x86 emulation of software
      interrupts (CVE-2014-7156).
    * Race condition in HVMOP_track_dirty_vram (CVE-2014-7154).
    * Improper MSR range used for x2APIC emulation (CVE-2014-7188).
    * HVMOP_set_mem_type allows invalid P2M entries to be created
      (CVE-2014-3124).
    * HVMOP_set_mem_access is not preemptible (CVE-2014-2599).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).

This non-security bug was fixed:

    * Increase limit domUloader to 32MB (bnc#901317).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;
    * CVE-2013-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;
    * CVE-2014-3124
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875668">SUSE bug 875668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576974" comment="xen-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576975" comment="xen-devel-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576976" comment="xen-doc-html-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576977" comment="xen-doc-pdf-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576978" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.23-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576979" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.23-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576980" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.23-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576981" comment="xen-libs-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576982" comment="xen-libs-32bit-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576983" comment="xen-tools-4.1.6_08-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576984" comment="xen-tools-domU-4.1.6_08-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39974" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<description>
xen was updated to fix eight security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576985" comment="xen-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576986" comment="xen-devel-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576987" comment="xen-doc-html-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576988" comment="xen-doc-pdf-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576989" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.37-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576990" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576991" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576992" comment="xen-libs-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576993" comment="xen-libs-32bit-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576994" comment="xen-tools-4.1.6_08-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576995" comment="xen-tools-domU-4.1.6_08-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39975" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 27 security issues.

These security issues were fixed:
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

This non-security issue was fixed:
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-26"/>
	<updated date="2016-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576996" comment="xen-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576997" comment="xen-devel-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576998" comment="xen-doc-html-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576999" comment="xen-doc-pdf-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577000" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.37-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577001" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577002" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577003" comment="xen-libs-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577004" comment="xen-libs-32bit-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577005" comment="xen-tools-4.1.6_08-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577006" comment="xen-tools-domU-4.1.6_08-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39976" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577007" comment="xen-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577008" comment="xen-devel-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577009" comment="xen-doc-html-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577010" comment="xen-doc-pdf-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577011" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577012" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577013" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577014" comment="xen-libs-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577015" comment="xen-libs-32bit-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577016" comment="xen-tools-4.1.6_08-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577017" comment="xen-tools-domU-4.1.6_08-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39977" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<description>

xen was updated to fix several security issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652).
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)

This non-security issue was fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577018" comment="xen-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577019" comment="xen-devel-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577020" comment="xen-doc-html-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577021" comment="xen-doc-pdf-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577022" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.44-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577023" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.44-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577024" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.44-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577025" comment="xen-libs-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577026" comment="xen-libs-32bit-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577027" comment="xen-tools-4.1.6_08-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577028" comment="xen-tools-domU-4.1.6_08-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39978" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
		</affected>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="764982" ref_url="https://bugzilla.suse.com/764982" source="BUGZILLA"/>
		<reference ref_id="766283" ref_url="https://bugzilla.suse.com/766283" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="773955" ref_url="https://bugzilla.suse.com/773955" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN has been fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * 

      vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

    * 

      virt-manager - SLE11-SP2 ONLY

    * bnc#764982 - virt-manager fails to start after upgrade to SLES11 SP2
      from SLES10

Security Issue reference:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-05"/>
	<updated date="2012-08-05"/>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764982">SUSE bug 764982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766283">SUSE bug 766283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39979" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="776300" ref_url="https://bugzilla.suse.com/776300" source="BUGZILLA"/>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777086" ref_url="https://bugzilla.suse.com/777086" source="BUGZILLA"/>
		<reference ref_id="777088" ref_url="https://bugzilla.suse.com/777088" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

XEN was updated 4.1.3 to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3495: xen: hypercall physdev_get_free_pirq vulnerability
      (XSA-13)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3498: xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

The following related bugs in vm-install 0.5.12 have been fixed:

    * bnc#776300 - vm-install does not pass --extra-args in --upgrade
    * Add for support Open Enterprise Server 11
    * Add support for Windows 8 and Windows Server 2012
    * Add support for Ubuntu 12 (Precise Pangolin)

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776300">SUSE bug 776300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566219" comment="vm-install-0.5.12-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566219" comment="vm-install-0.5.12-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39980" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="778105" ref_url="https://bugzilla.suse.com/778105" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="784087" ref_url="https://bugzilla.suse.com/784087" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786518" ref_url="https://bugzilla.suse.com/786518" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN was updated to fix various bugs and security issues:

The following security issues have been fixed:

    * CVE-2012-4544: xen: Domain builder Out-of-memory due to malicious
      kernel/ramdisk (XSA 25)
    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA 20)
    * CVE-2012-4536: xen: pirq range check DoS vulnerability (XSA 21)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA 22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA 23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA 24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Also the following bugs have been fixed and upstream patches have been 
applied:

    * 

      bnc#784087 - L3: Xen BUG at io_apic.c:129
      26102-x86-IOAPIC-legacy-not-first.patch

    * 

      Upstream patches merged:
      26054-x86-AMD-perf-ctr-init.patch
      26055-x86-oprof-hvm-mode.patch
      26056-page-alloc-flush-filter.patch
      26061-x86-oprof-counter-range.patch
      26062-ACPI-ERST-move-data.patch
      26063-x86-HPET-affinity-lock.patch
      26093-HVM-PoD-grant-mem-type.patch
      25931-x86-domctl-iomem-mapping-checks.patch
      25952-x86-MMIO-remap-permissions.patch
      25808-domain_create-return-value.patch
      25814-x86_64-set-debugreg-guest.patch
      25815-x86-PoD-no-bug-in-non-translated.patch
      25816-x86-hvm-map-pirq-range-check.patch
      25833-32on64-bogus-pt_base-adjust.patch
      25834-x86-S3-MSI-resume.patch
      25835-adjust-rcu-lock-domain.patch
      25836-VT-d-S3-MSI-resume.patch
      25850-tmem-xsa-15-1.patch
      25851-tmem-xsa-15-2.patch
      25852-tmem-xsa-15-3.patch
      25853-tmem-xsa-15-4.patch
      25854-tmem-xsa-15-5.patch
      25855-tmem-xsa-15-6.patch
      25856-tmem-xsa-15-7.patch
      25857-tmem-xsa-15-8.patch
      25858-tmem-xsa-15-9.patch
      25859-tmem-missing-break.patch
      25860-tmem-cleanup.patch
      25883-pt-MSI-cleanup.patch
      25927-x86-domctl-ioport-mapping-range.patch
      25929-tmem-restore-pool-version.patch

    * 

      bnc#778105 - first XEN-PV VM fails to spawn
      xend: Increase wait time for disk to appear in host bootloader
      Modified existing xen-domUloader.diff

      25752-ACPI-pm-op-valid-cpu.patch
      25754-x86-PoD-early-access.patch
      25755-x86-PoD-types.patch
      25756-x86-MMIO-max-mapped-pfn.patch

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778105">SUSE bug 778105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784087">SUSE bug 784087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39981" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="809662" ref_url="https://bugzilla.suse.com/809662" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="814709" ref_url="https://bugzilla.suse.com/814709" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<description>

XEN has been updated to 4.1.5 c/s 23509 to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2013-1918: Certain page table manipulation operations in Xen
      4.1.x, 4.2.x, and earlier were not preemptible, which allowed local
      PV kernels to cause a denial of service via vectors related to deep
      page table traversal.

    * 

      CVE-2013-1952: Xen 4.x, when using Intel VT-d for a bus mastering
      capable PCI device, did not properly check the source when accessing
      a bridge devices interrupt remapping table entries for MSI
      interrupts, which allowed local guest domains to cause a denial of
      service (interrupt injection) via unspecified vectors.

    * 

      CVE-2013-2076: A information leak in the XSAVE/XRSTOR instructions
      could be used to determine state of floating point operations in
      other domains.

    * 

      CVE-2013-2077: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XRSTOR, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2078: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XSETBV, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2072: Systems which allow untrusted administrators to
      configure guest vcpu affinity may be exploited to trigger a buffer
      overrun and corrupt memory.

    * 

      CVE-2013-1917: Xen 3.1 through 4.x, when running 64-bit hosts on
      Intel CPUs, did not clear the NT flag when using an IRET after a
      SYSENTER instruction, which allowed PV guest users to cause a denial
      of service (hypervisor crash) by triggering a #GP fault, which is not
      properly handled by another IRET instruction.

    * 

      CVE-2013-1919: Xen 4.2.x and 4.1.x did not properly restrict access
      to IRQs, which allowed local stub domain clients to gain access to
      IRQs and cause a denial of service via vectors related to
      'passed-through IRQs or PCI devices.'

    * 

      CVE-2013-1920: Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is
      running 'under memory pressure' and the Xen Security Module (XSM) is
      enabled, used the wrong ordering of operations when extending the
      per-domain event channel tracking table, which caused a
      use-after-free and allowed local guest kernels to inject arbitrary
      events and gain privileges via unspecified vectors.

    * 

      CVE-2013-1964: Xen 4.0.x and 4.1.x incorrectly released a grant
      reference when releasing a non-v1, non-transitive grant, which
      allowed local guest administrators to cause a denial of service (host
      crash), obtain sensitive information, or possible have other impacts
      via unspecified vectors.

Bugfixes:

    * 

      Upstream patches from Jan
      26956-x86-mm-preemptible-cleanup.patch
      27071-x86-IO-APIC-fix-guest-RTE-write-corner-cases.patch
      27072-x86-shadow-fix-off-by-one-in-MMIO-permission-check.patch
      27079-fix-XSA-46-regression-with-xend-xm.patch
      27083-AMD-iommu-SR56x0-Erratum-64-Reset-all-head-tail-pointers.patch

    * 

      Update to Xen 4.1.5 c/s 23509
      There were many xen.spec file patches dropped as now being included
      in the 4.1.5 tarball.

    * 

      bnc#809662 - can't use pv-grub to start domU (pygrub does work)
      xen.spec

    * 

      Upstream patches from Jan
      26702-powernow-add-fixups-for-AMD-P-state-figures.patch
      26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch
      26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch
      26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
      26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch
      26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
      26737-ACPI-APEI-Add-apei_exec_run_optional.patch
      26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch
      26743-VT-d-deal-with-5500-5520-X58-errata.patch
      26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch
      26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch
      26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
      26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch
      26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
      26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch
      26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch
      26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
      26851-iommu-crash-Interrupt-remapping-is-also-disabled-on-crash.patch

    * 

      bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on
      Kyoto
      xend-cpuinfo-model-name.patch

    * 

      Upstream patches from Jan
      26536-xenoprof-div-by-0.patch
      26578-AMD-IOMMU-replace-BUG_ON.patch
      26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch
      26659-AMD-IOMMU-erratum-746-workaround.patch
      26660-x86-fix-CMCI-injection.patch
      26672-vmx-fix-handling-of-NMI-VMEXIT.patch
      26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch
      26676-fix-compat-memory-exchange-op-splitting.patch
      26677-x86-make-certain-memory-sub-ops-return-valid-values.patch
      26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch
      26679-x86-defer-processing-events-on-the-NMI-exit-path.patch
      26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch
      26692-x86-MSI-fully-protect-MSI-X-table.patch

Security Issue references:

    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2078
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809662">SUSE bug 809662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814709">SUSE bug 814709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39982" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="803712" ref_url="https://bugzilla.suse.com/803712" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="823786" ref_url="https://bugzilla.suse.com/823786" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.1.6 which fixes various bugs and security 
issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies.
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling
      (CVE-2013-2194 CVE-2013-2195 CVE-2013-2196)

Various bugs have also been fixed:

    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage ,xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, xen
      hypervisor will panic on multiple blades nPar. (bnc#839600)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * migrate.py support of short options dropped by PTF (bnc#824676)
    * after live migration rcu_sched_state detected stalls add new option
      xm migrate --min_remaing (bnc#803712)
    * various upstream fixes have been included

Security Issue references:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/803712">SUSE bug 803712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823786">SUSE bug 823786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39983" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<description>

Xen has been updated to fix a security issue and a bug:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.

A non-security bug has also been fixed:

    * It is possible to start a VM twice on the same node (bnc#840997)

Security Issue references:

    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39984" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 2 LTSS Xen hypervisor and 
toolset has been updated to fix various security issues and several bugs.

The following security issues have been addressed:

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-76: CVE-2013-4554: Xen 3.0.3 through 4.1.x (possibly 4.1.6.1),
      4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly
      prevent access to hypercalls, which allows local guest users to gain
      privileges via a crafted application running in ring 1 or 2.
      (bnc#849668)

    * 

      XSA-74: CVE-2013-4553: The XEN_DOMCTL_getmemlist hypercall in Xen
      3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the
      page_alloc_lock and mm_rwlock in the same order, which allows local
      guest administrators to cause a denial of service (host deadlock).
      (bnc#849667)

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

Also the following non-security bugs have been fixed:

    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, dom0
      will soft lockup on multiple blades nPar. (bnc#842417)
    * Soft lockup with PCI passthrough and many VCPUs (bnc#846849)

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-28"/>
	<updated date="2014-02-28"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577029" comment="xen-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577030" comment="xen-devel-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577031" comment="xen-doc-html-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577032" comment="xen-doc-pdf-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577033" comment="xen-kmp-default-4.1.6_06_3.0.101_0.7.17-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577034" comment="xen-kmp-pae-4.1.6_06_3.0.101_0.7.17-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577035" comment="xen-kmp-trace-4.1.6_06_3.0.101_0.7.17-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577036" comment="xen-libs-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577037" comment="xen-libs-32bit-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577038" comment="xen-tools-4.1.6_06-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577039" comment="xen-tools-domU-4.1.6_06-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39985" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="907755" ref_url="https://bugzilla.suse.com/907755" source="BUGZILLA"/>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Regular crashes of dom-0 on different servers due to races in MCE
      access were fixed. bsc#907755

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/907755">SUSE bug 907755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577040" comment="xen-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577041" comment="xen-devel-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577042" comment="xen-doc-html-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577043" comment="xen-doc-pdf-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577044" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577045" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577046" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577047" comment="xen-libs-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577048" comment="xen-libs-32bit-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577049" comment="xen-tools-4.1.6_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577050" comment="xen-tools-domU-4.1.6_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39986" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix six security issues:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bsc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bsc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bsc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bsc#931628)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bsc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bsc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577051" comment="xen-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577052" comment="xen-devel-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577053" comment="xen-doc-html-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577054" comment="xen-doc-pdf-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577055" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577056" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577057" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577058" comment="xen-libs-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577059" comment="xen-libs-32bit-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577060" comment="xen-tools-4.1.6_08-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577061" comment="xen-tools-domU-4.1.6_08-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39987" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)
  xsa159.patch
- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#953527 -  CVE-2015-5307: kernel: kvm/xen: x86: avoid
  guest-&gt;host DOS by intercepting #AC (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577062" comment="xen-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577063" comment="xen-devel-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577064" comment="xen-doc-html-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577065" comment="xen-doc-pdf-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577066" comment="xen-kmp-default-4.1.6_08_3.0.101_0.7.37-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577067" comment="xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577068" comment="xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577069" comment="xen-libs-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577070" comment="xen-libs-32bit-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577071" comment="xen-tools-4.1.6_08-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577072" comment="xen-tools-domU-4.1.6_08-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39988" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

Xinetd receives a LTSS rollup update to fix two security issues:

    * CVE-2012-0862: xinetd enabled all services when tcp multiplexing is
      used.
    * CVE-2013-4342: xinetd ignored user and group directives for tcpmux
      services, running services as root.

While both issues are not so problematic on their own, in combination the 
impact is greater and enabling tcpmux would be risky.

Security Issues:

    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;
    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577073" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39989" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<description>

This update fixes the following security issue with xorg-x11-server:

    * bnc#853846: integer underflow when handling trapezoids
      (CVE-2013-6424)

Security Issue reference:

    * CVE-2013-6424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577074" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577075" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577076" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577074" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577075" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577076" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39990" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<description>

This update fixes a stack buffer overflow in xorg-x11 in the 
bdfReadCharacters() function. CVE-2013-6462 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2013-6462
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577077" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577078" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577079" comment="xorg-x11-libs-x86-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577077" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577078" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577079" comment="xorg-x11-libs-x86-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39991" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues (bnc#815451, 
bnc#821664).

Security Issue references:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39992" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2-LTSS</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-27"/>
	<updated date="2015-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575664" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575665" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39993" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982)

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577083" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577084" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577085" comment="xorg-x11-libXext-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577083" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577084" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577085" comment="xorg-x11-libXext-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39994" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577086" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577087" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577088" comment="xorg-x11-libXfixes-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577086" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577087" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577088" comment="xorg-x11-libXfixes-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39995" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39996" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577092" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577093" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577094" comment="xorg-x11-libXrender-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577092" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577093" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577094" comment="xorg-x11-libXrender-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39997" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577095" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577096" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577097" comment="xorg-x11-libXt-x86-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577095" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577096" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577097" comment="xorg-x11-libXt-x86-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39998" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577098" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577099" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577100" comment="xorg-x11-libXv-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577098" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577099" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577100" comment="xorg-x11-libXv-x86-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39999" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following security issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issues:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577101" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577102" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577103" comment="xorg-x11-libxcb-x86-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577101" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577102" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577103" comment="xorg-x11-libxcb-x86-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40000" version="1" class="patch">
	<metadata>
		<title>Security update for zypper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP2</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP2</platform>
		</affected>
		<reference ref_id="770630" ref_url="https://bugzilla.suse.com/770630" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420/" source="CVE"/>
		<description>

The following issue has been fixed:

    * The zypper setuid wrapper linked against libzypp. This is not needed
      and added unnecessary attack vectors. CVE-2012-0420 has been assigned
      to this issue.

Security Issue reference:

    * CVE-2012-0420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp2:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073673" comment="SUSE Linux Enterprise Server 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577104" comment="zypper-1.6.166-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577105" comment="zypper-log-1.6.166-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258809" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577104" comment="zypper-1.6.166-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577105" comment="zypper-log-1.6.166-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40001" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577106" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577107" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577108" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577109" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577110" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577111" comment="libfreebl3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577112" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577113" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577114" comment="libsoftokn3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577115" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577116" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577117" comment="mozilla-nspr-x86-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577118" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577119" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577120" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577121" comment="mozilla-nss-x86-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577106" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577107" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577108" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577109" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577110" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577111" comment="libfreebl3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577112" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577113" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577114" comment="libsoftokn3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577115" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577116" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577117" comment="mozilla-nspr-x86-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577118" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577119" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577120" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577121" comment="mozilla-nss-x86-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577106" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577107" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577108" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577109" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577110" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577111" comment="libfreebl3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577112" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577113" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577114" comment="libsoftokn3-x86-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577115" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577116" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577117" comment="mozilla-nspr-x86-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577118" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577119" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577120" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577121" comment="mozilla-nss-x86-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40002" version="1" class="patch">
	<metadata>
		<title>Security update for Image Magick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

ImageMagick has been updated to fix four security issues:

    * Crafted jpeg file could have lead to a Denial of Service
      (CVE-2014-8716).
    * Out-of-bounds memory access in resize code (CVE-2014-8354)
    * Out-of-bounds memory access in PCX parser (CVE-2014-8355).
    * Out-of-bounds memory error in DCM decode (CVE-2014-8562).

Security Issues:

    * CVE-2014-8716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716&gt;
    * CVE-2014-8355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355&gt;
    * CVE-2014-8354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354&gt;
    * CVE-2014-8562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577122" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577123" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577122" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577123" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577122" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577123" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40003" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575775" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575776" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575775" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575776" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40004" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575777" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575778" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575777" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575778" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40005" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575779" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575780" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575779" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575780" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40006" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570422" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570423" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40007" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570424" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570425" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40008" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570426" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570427" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40009" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570428" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570429" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40010" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570430" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570431" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40011" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570432" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570433" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40012" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570434" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570435" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40013" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570436" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570437" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40014" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570438" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570439" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40015" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570440" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570441" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40016" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570442" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570443" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40017" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570444" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570445" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40018" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570446" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570447" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40019" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570448" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570449" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40020" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570450" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570451" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40021" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570452" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570453" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40022" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570454" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570455" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40023" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570456" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570457" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40024" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570458" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570459" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40025" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570460" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570461" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40026" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570462" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570463" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40027" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1133205" ref_url="https://bugzilla.suse.com/1133205" source="BUGZILLA"/>
		<reference ref_id="1133498" ref_url="https://bugzilla.suse.com/1133498" source="BUGZILLA"/>
		<reference ref_id="1133501" ref_url="https://bugzilla.suse.com/1133501" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).
- CVE-2019-11472: Fixed a denial-of-service in ReadXWDImage() (bsc#1133204).
- CVE-2019-11470: Fixed a denial-of-service in ReadCINImage() (bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133498">SUSE bug 1133498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570464" comment="libMagickCore1-6.4.3.6-78.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570465" comment="libMagickCore1-32bit-6.4.3.6-78.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40028" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134075" ref_url="https://bugzilla.suse.com/1134075" source="BUGZILLA"/>
		<reference ref_id="1135232" ref_url="https://bugzilla.suse.com/1135232" source="BUGZILLA"/>
		<reference ref_id="1135236" ref_url="https://bugzilla.suse.com/1135236" source="BUGZILLA"/>
		<reference ref_id="1136183" ref_url="https://bugzilla.suse.com/1136183" source="BUGZILLA"/>
		<reference ref_id="1136732" ref_url="https://bugzilla.suse.com/1136732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136183">SUSE bug 1136183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570466" comment="libMagickCore1-6.4.3.6-78.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570467" comment="libMagickCore1-32bit-6.4.3.6-78.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40029" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138425" ref_url="https://bugzilla.suse.com/1138425" source="BUGZILLA"/>
		<reference ref_id="1138464" ref_url="https://bugzilla.suse.com/1138464" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138425">SUSE bug 1138425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570468" comment="libMagickCore1-6.4.3.6-78.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570469" comment="libMagickCore1-32bit-6.4.3.6-78.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40030" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139886" ref_url="https://bugzilla.suse.com/1139886" source="BUGZILLA"/>
		<reference ref_id="1140100" ref_url="https://bugzilla.suse.com/1140100" source="BUGZILLA"/>
		<reference ref_id="1140102" ref_url="https://bugzilla.suse.com/1140102" source="BUGZILLA"/>
		<reference ref_id="1140103" ref_url="https://bugzilla.suse.com/1140103" source="BUGZILLA"/>
		<reference ref_id="1140106" ref_url="https://bugzilla.suse.com/1140106" source="BUGZILLA"/>
		<reference ref_id="1140110" ref_url="https://bugzilla.suse.com/1140110" source="BUGZILLA"/>
		<reference ref_id="1140513" ref_url="https://bugzilla.suse.com/1140513" source="BUGZILLA"/>
		<reference ref_id="1140554" ref_url="https://bugzilla.suse.com/1140554" source="BUGZILLA"/>
		<reference ref_id="1140664" ref_url="https://bugzilla.suse.com/1140664" source="BUGZILLA"/>
		<reference ref_id="1140666" ref_url="https://bugzilla.suse.com/1140666" source="BUGZILLA"/>
		<reference ref_id="1141171" ref_url="https://bugzilla.suse.com/1141171" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory() (bsc#1140554).
- CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a wand/mogrify.c error (bsc#1140513).
- CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in MagickCore/layer.c (bsc#1141171).
- CVE-2019-13295: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
- CVE-2019-13297: Fixed a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
- CVE-2019-12979: Fixed the use of uninitialized values in SyncImageSettings() (bsc#1139886).
- CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in coders/dpx.c (bsc#1140106).
- CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage() (bsc#1140103).
- CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
- CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
- CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in coders/pcl.c(bsc#1140110).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-30"/>
	<updated date="2019-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570470" comment="libMagickCore1-6.4.3.6-78.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570471" comment="libMagickCore1-32bit-6.4.3.6-78.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40031" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133204" ref_url="https://bugzilla.suse.com/1133204" source="BUGZILLA"/>
		<reference ref_id="1146068" ref_url="https://bugzilla.suse.com/1146068" source="BUGZILLA"/>
		<reference ref_id="1146211" ref_url="https://bugzilla.suse.com/1146211" source="BUGZILLA"/>
		<reference ref_id="1146212" ref_url="https://bugzilla.suse.com/1146212" source="BUGZILLA"/>
		<reference ref_id="1146213" ref_url="https://bugzilla.suse.com/1146213" source="BUGZILLA"/>
		<reference ref_id="1151781" ref_url="https://bugzilla.suse.com/1151781" source="BUGZILLA"/>
		<reference ref_id="1151782" ref_url="https://bugzilla.suse.com/1151782" source="BUGZILLA"/>
		<reference ref_id="1151783" ref_url="https://bugzilla.suse.com/1151783" source="BUGZILLA"/>
		<reference ref_id="1151786" ref_url="https://bugzilla.suse.com/1151786" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-15139: Fixed a denial-of-service vulnerability in ReadXWDImage. (bsc#1146213)
- CVE-2019-15140: Fixed a use-after-free bug in the Matlab image parser. (bsc#1146212)
- CVE-2019-15141: Fixed a divide-by-zero vulnerability in the MeanShiftImage function. (bsc#1146211)
- CVE-2019-14980: Fixed an application crash resulting from a heap-based buffer over-read in WriteTIFFImage. (bsc#1146068)
- CVE-2019-16708: Fixed a memory leak in magick/xwindow.c (bsc#1151781).
- CVE-2019-16709: Fixed a memory leak in coders/dps.c (bsc#1151782).
- CVE-2019-16710: Fixed a memory leak in coders/dot.c (bsc#1151783).
- CVE-2019-16713: Fixed a memory leak in coders/dot.c (bsc#1151786).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570472" comment="libMagickCore1-6.4.3.6-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570473" comment="libMagickCore1-32bit-6.4.3.6-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40032" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159861" ref_url="https://bugzilla.suse.com/1159861" source="BUGZILLA"/>
		<reference ref_id="1160369" ref_url="https://bugzilla.suse.com/1160369" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2019-19948: Fixed a heap-based buffer overflow in WriteSGIImage() (bsc#1159861).
- CVE-2019-19949: Fixed a heap-based buffer over-read in WritePNGImage() (bsc#1160369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570474" comment="libMagickCore1-6.4.3.6-78.122.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570475" comment="libMagickCore1-32bit-6.4.3.6-78.122.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40033" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047054" ref_url="https://bugzilla.suse.com/1047054" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-11527: Fixed a denial of service in  inReadDPXImage() (bsc#1047054).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570476" comment="libMagickCore1-6.4.3.6-78.125.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570477" comment="libMagickCore1-32bit-6.4.3.6-78.125.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40034" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570478" comment="libMagickCore1-6.4.3.6-78.128.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570479" comment="libMagickCore1-32bit-6.4.3.6-78.128.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40035" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570480" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570481" comment="libMagickCore1-32bit-6.4.3.6-78.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40036" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed an issue where processing a crafted file could lead to division by zero (bsc#1181836).
- CVE-2020-25665: Fixed heap-based buffer overflow in WritePALMImage (bsc#1179208).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570482" comment="libMagickCore1-6.4.3.6-78.140.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570483" comment="libMagickCore1-32bit-6.4.3.6-78.140.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40037" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
- CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
- CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570484" comment="libMagickCore1-6.4.3.6-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570485" comment="libMagickCore1-32bit-6.4.3.6-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40038" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570486" comment="libMagickCore1-6.4.3.6-78.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570487" comment="libMagickCore1-32bit-6.4.3.6-78.146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40039" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684102" comment="libMagickCore1-6.4.3.6-78.149.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684103" comment="libMagickCore1-32bit-6.4.3.6-78.149.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40040" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570488" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40041" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570489" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40042" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577124" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577124" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40043" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570491" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40044" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570492" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40045" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570493" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40046" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570494" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40047" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="985650" ref_url="https://bugzilla.suse.com/985650" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).

Bug fixes:

- Initialize AMD RSxxx chipsets correctly, fixing corruption of the graphical login screen (bsc#985650).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985650">SUSE bug 985650</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577125" comment="Mesa-9.0.3-0.29.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577126" comment="Mesa-32bit-9.0.3-0.29.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40048" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577127" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577128" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577127" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577128" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577127" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577128" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40049" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40050" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40051" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577133" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577134" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40052" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577135" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577136" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577137" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577138" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577139" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577140" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577141" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577142" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577143" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577144" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577145" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577135" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577136" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577137" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577138" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577139" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577140" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577141" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577142" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577143" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577144" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577145" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40053" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-14"/>
	<updated date="2016-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577146" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577147" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577148" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577149" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577150" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577151" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577152" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577153" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577154" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577155" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577156" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577157" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577158" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577146" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577147" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577148" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577149" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577150" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577151" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577152" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577153" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577154" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577155" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577156" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577157" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577158" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40054" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577159" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577160" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577159" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577160" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40055" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577161" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577162" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577161" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577162" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40056" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577163" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577164" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577163" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577164" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40057" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577165" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577166" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577165" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577166" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40058" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577167" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577168" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577167" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577168" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40059" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577169" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577170" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577171" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577172" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577173" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577174" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577175" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577176" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577177" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577178" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577179" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577169" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577170" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577171" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577172" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577173" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577174" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577175" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577176" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577177" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577178" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577179" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40060" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox and mozilla-nss fixes the following issues:

Security issues fixed:
- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)
  - CVE-2017-7758: Out-of-bounds read in Opus encoder
  - CVE-2017-7749: Use-after-free during docshell reloading
  - CVE-2017-7751: Use-after-free with content viewer listeners
  - CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
  - CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
  - CVE-2017-7752: Use-after-free with IME input
  - CVE-2017-7750: Use-after-free with track elements
  - CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service
  - CVE-2017-7778: Vulnerabilities in the Graphite 2 library
  - CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
  - CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files
  - CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
  - CVE-2017-7757: Use-after-free in IndexedDB
  - CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application
  - CVE-2017-7763: Mac fonts render some unicode characters as spaces
  - CVE-2017-7765: Mark of the Web bypass when saving executable files
  - CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)
  - CVE-2016-10196: Vulnerabilities in Libevent library
  - CVE-2017-5443: Out-of-bounds write during BinHex decoding
  - CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
  - CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
  - CVE-2017-5465: Out-of-bounds read in ConvolvePixel
  - CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
  - CVE-2017-5467: Memory corruption when drawing Skia content
  - CVE-2017-5460: Use-after-free in frame selection
  - CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
  - CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
  - CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
  - CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
  - CVE-2017-5447: Out-of-bounds read during glyph processing
  - CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
  - CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content
  - CVE-2017-5442: Use-after-free during style changes
  - CVE-2017-5469: Potential Buffer overflow in flex-generated code
  - CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
  - CVE-2017-5441: Use-after-free with selection during scroll events
  - CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
  - CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
  - CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
  - CVE-2017-5435: Use-after-free during transaction processing in the editor
  - CVE-2017-5434: Use-after-free during focus handling
  - CVE-2017-5433: Use-after-free in SMIL animation functions
  - CVE-2017-5432: Use-after-free in text input selection
  - CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
  - CVE-2017-5459: Buffer overflow in WebGL
  - CVE-2017-5462: DRBG flaw in NSS
  - CVE-2017-5455: Sandbox escape through internal feed reader APIs
  - CVE-2017-5454: Sandbox escape allowing file system read access through file picker
  - CVE-2017-5456: Sandbox escape allowing local file system access
  - CVE-2017-5451: Addressbar spoofing with onblur event

- General
  - CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842)

Bugfixes:
- workaround for Firefox hangs (bsc#1031485, bsc#1025108)
- Update to gcc-5-branch head.
  * Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460),
    (bsc#930496), (bsc#930392) and (bsc#955382).
- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)
- Fix libffi include install.  (bsc#935510)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577180" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577181" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577182" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577183" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577184" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577185" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577186" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577187" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577188" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577189" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577190" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577191" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577180" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577181" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577182" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577183" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577184" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577185" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577186" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577187" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577188" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577189" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577190" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577191" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40061" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<description>


Mozilla Firefox was updated to the ESR 52.3 release (bsc#1052829)

Following security issues were fixed:

* MFSA 2017-19/CVE-2017-7807: Domain hijacking through AppCache fallback
* MFSA 2017-19/CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts
* MFSA 2017-19/CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID
* MFSA 2017-19/CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections
* MFSA 2017-19/CVE-2017-7787: Same-origin policy bypass with iframes through page reloads
* MFSA 2017-19/CVE-2017-7786: Buffer overflow while painting non-displayable SVG
* MFSA 2017-19/CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM
* MFSA 2017-19/CVE-2017-7784: Use-after-free with image observers
* MFSA 2017-19/CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements
* MFSA 2017-19/CVE-2017-7798: XUL injection in the style editor in devtools
* MFSA 2017-19/CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher
* MFSA 2017-19/CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3
* MFSA 2017-19/CVE-2017-7800: Use-after-free in WebSockets during disconnection
* MFSA 2017-19/CVE-2017-7801: Use-after-free with marquee during window resizing
* MFSA 2017-19/CVE-2017-7802: Use-after-free resizing image elements
* MFSA 2017-19/CVE-2017-7803: CSP containing 'sandbox' improperly applied

This update also fixes:

-  fixed firefox hangs after a while in FUTEX_WAIT_PRIVATE if
   cgroups enabled and running on cpu &gt;=1 (bsc#1031485)
-  The Itanium ia64 build was fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577192" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577193" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577194" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577192" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577193" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577194" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40062" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577195" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577196" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577195" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577196" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40063" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577197" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577198" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577197" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577198" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40064" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577199" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577200" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577199" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577200" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40065" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 52.8 release fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577201" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577202" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577201" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577202" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40066" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577203" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577204" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577203" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577204" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40067" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577205" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577206" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577205" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577206" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40068" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).
- CVE-2019-11708: Fix sandbox escape using Prompt:Open (bsc#1138872).
- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Non-security issues fixed:

- Fix broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570564" comment="MozillaFirefox-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570565" comment="MozillaFirefox-translations-common-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570566" comment="MozillaFirefox-translations-other-60.8.0esr-78.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40069" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).

Update mozilla-nss to version 3.47.1 (bsc#1158527):

Security issues fixed:

- CVE-2019-11745: EncryptUpdate should use maxout, not block size.

Bug fixes:

- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)

Update mozilla-nspr to version 4.23:

Bug fixes:

- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570567" comment="MozillaFirefox-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570568" comment="MozillaFirefox-translations-common-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570569" comment="MozillaFirefox-translations-other-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570570" comment="libfreebl3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570571" comment="libfreebl3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570572" comment="libsoftokn3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570573" comment="libsoftokn3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570574" comment="mozilla-nspr-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570575" comment="mozilla-nspr-32bit-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570576" comment="mozilla-nss-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570577" comment="mozilla-nss-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570578" comment="mozilla-nss-certs-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570579" comment="mozilla-nss-certs-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570580" comment="mozilla-nss-tools-3.47.1-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40070" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570581" comment="MozillaFirefox-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570582" comment="MozillaFirefox-translations-common-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570583" comment="MozillaFirefox-translations-other-68.4.1-78.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40071" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="1163368" ref_url="https://bugzilla.suse.com/1163368" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to version 68.5.0 ESR (bsc#1163368).


Security issues fixed:

- CVE-2020-6796: Fixed a missing bounds check on shared memory in the parent process (bsc#1163368).
- CVE-2020-6798: Fixed a JavaScript code injection issue caused by the incorrect parsing of template tags (bsc#1163368).
- CVE-2020-6799: Fixed a local arbitrary code execution issue when handling PDF links from other applications (bsc#1163368).
- CVE-2020-6800: Fixed several memory safety bugs (bsc#1163368).


Non-security issues fixed:

- Fixed various issues opening files with spaces in their path (bmo#1601905, bmo#1602726).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570584" comment="MozillaFirefox-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570585" comment="MozillaFirefox-translations-common-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570586" comment="MozillaFirefox-translations-other-68.5.0-78.61.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40072" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665)

- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully
  escape website-controlled data potentially leading to command injection
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally
  identifiable information were exposed to websites with camera or microphone
  permission
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570587" comment="MozillaFirefox-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570588" comment="MozillaFirefox-translations-common-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570589" comment="MozillaFirefox-translations-other-68.6.0-78.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40073" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.6.1 ESR
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570590" comment="MozillaFirefox-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570591" comment="MozillaFirefox-translations-common-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570592" comment="MozillaFirefox-translations-other-68.6.1-78.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40074" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570593" comment="MozillaFirefox-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570594" comment="MozillaFirefox-translations-common-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570595" comment="MozillaFirefox-translations-other-68.7.0-78.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40075" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162828" ref_url="https://bugzilla.suse.com/1162828" source="BUGZILLA"/>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:


- Firefox Extended Support Release 68.8.0 ESR
  MFSA 2020-17 (bsc#1171186)
  * CVE-2020-12387 (bmo#1545345)
    Use-after-free during worker shutdown
  * CVE-2020-12388 (bmo#1618911)
    Sandbox escape with improperly guarded Access Tokens
  * CVE-2020-12389 (bmo#1554110)
    Sandbox escape with improperly separated process types
  * CVE-2020-6831 (bmo#1632241)
    Buffer overflow in SCTP chunk input validation
  * CVE-2020-12392 (bmo#1614468)
    Arbitrary local file access with 'Copy as cURL'
  * CVE-2020-12393 (bmo#1615471)
    Devtools' 'Copy as cURL' feature did not fully escape
    website-controlled data, potentially leading to command
    injection
  * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704,
    bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076,
    bmo#1631508)
    Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8

- Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
  and firefox-libgcc_s1, those packages don't provide some capabilities,
  we have to disable AutoReqProv in MozillaFirefox too so they're not added as
  automatic requirements. (bsc#1162828)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162828">SUSE bug 1162828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570596" comment="MozillaFirefox-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570597" comment="MozillaFirefox-translations-common-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570598" comment="MozillaFirefox-translations-other-68.8.0-78.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40076" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570599" comment="MozillaFirefox-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570600" comment="MozillaFirefox-translations-common-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570601" comment="MozillaFirefox-translations-other-68.9.0-78.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40077" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570602" comment="MozillaFirefox-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570603" comment="MozillaFirefox-branding-SLED-78-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570604" comment="MozillaFirefox-translations-common-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570605" comment="MozillaFirefox-translations-other-78.0.1-78.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40078" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Fix broken translation-loading (boo#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more

- Mozilla Firefox 78.1 ESR
  * Fixed: Various stability, functionality, and security fixe
    (MFSA 2020-32) (bsc#1174538).
  * CVE-2020-15652 (bmo#1634872)
    Potential leak of redirect targets when loading scripts in a
    worker
  * CVE-2020-6514 (bmo#1642792)
    WebRTC data channel leaks internal address to peer
  * CVE-2020-15655 (bmo#1645204)
    Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653 (bmo#1521542)
    Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463 (bmo#1635293)
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656 (bmo#1647293)
    Type confusion for special arguments in IonMonkey
  * CVE-2020-15658 (bmo#1637745)
    Overriding file type when saving to disk
  * CVE-2020-15657 (bmo#1644954)
    DLL hijacking due to incorrect loading path
  * CVE-2020-15654 (bmo#1648333)
    Custom cursor can overlay user interface
  * CVE-2020-15659 (bmo#1550133, bmo#1633880, bmo#1643613,
    bmo#1644839, bmo#1645835, bmo#1646006, bmo#1646787,
    bmo#1649347, bmo#1650811, bmo#1651678)
    Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

- Add sle11-icu-generation-python3.patch to fix icu-generation
  on big endian platforms 

- Mozilla Firefox 78.0.2 ESR
  * MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570606" comment="MozillaFirefox-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570607" comment="MozillaFirefox-translations-common-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570608" comment="MozillaFirefox-translations-other-78.1.0-78.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40079" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570609" comment="MozillaFirefox-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570610" comment="MozillaFirefox-translations-common-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570611" comment="MozillaFirefox-translations-other-78.2.0-78.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40080" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1175046" ref_url="https://bugzilla.suse.com/1175046" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
- Fixed problems with compiler builtins on SLE-11 (bsc#1175046)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175046">SUSE bug 1175046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570612" comment="MozillaFirefox-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570613" comment="MozillaFirefox-translations-common-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570614" comment="MozillaFirefox-translations-other-78.3.0-78.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40081" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570615" comment="MozillaFirefox-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570616" comment="MozillaFirefox-translations-common-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570617" comment="MozillaFirefox-translations-other-78.4.0-78.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40082" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570618" comment="MozillaFirefox-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570619" comment="MozillaFirefox-translations-common-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570620" comment="MozillaFirefox-translations-other-78.4.1-78.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40083" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570621" comment="MozillaFirefox-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570622" comment="MozillaFirefox-translations-common-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570623" comment="MozillaFirefox-translations-other-78.5.0-78.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40084" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570624" comment="MozillaFirefox-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570625" comment="MozillaFirefox-translations-common-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570626" comment="MozillaFirefox-translations-other-78.6.0-78.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40085" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570627" comment="MozillaFirefox-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570628" comment="MozillaFirefox-translations-common-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570629" comment="MozillaFirefox-translations-other-78.6.1-78.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40086" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570630" comment="MozillaFirefox-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570631" comment="MozillaFirefox-translations-common-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570632" comment="MozillaFirefox-translations-other-78.7.0-78.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40087" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181848" ref_url="https://bugzilla.suse.com/1181848" source="BUGZILLA"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.7.1 ESR (bsc#1181848)

- Fixed: Prevent access to NTFS special paths that could lead to filesystem corruption. 
- Buffer overflow in depth pitch calculations for compressed textures 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181848">SUSE bug 1181848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570633" comment="MozillaFirefox-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570634" comment="MozillaFirefox-translations-common-78.7.1-78.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570635" comment="MozillaFirefox-translations-other-78.7.1-78.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40088" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570636" comment="MozillaFirefox-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570637" comment="MozillaFirefox-translations-common-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570638" comment="MozillaFirefox-translations-other-78.8.0-78.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40089" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570639" comment="MozillaFirefox-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570640" comment="MozillaFirefox-translations-common-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570641" comment="MozillaFirefox-translations-other-78.9.0-78.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40090" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570642" comment="MozillaFirefox-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570643" comment="MozillaFirefox-translations-common-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570644" comment="MozillaFirefox-translations-other-78.10.0-78.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40091" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570645" comment="MozillaFirefox-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570646" comment="MozillaFirefox-translations-common-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570647" comment="MozillaFirefox-translations-other-78.11.0-78.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40092" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625243" comment="MozillaFirefox-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625244" comment="MozillaFirefox-translations-common-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625245" comment="MozillaFirefox-translations-other-78.12.0-78.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40093" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630646" comment="MozillaFirefox-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630647" comment="MozillaFirefox-translations-common-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630648" comment="MozillaFirefox-translations-other-78.13.0-78.137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40094" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-01"/>
	<updated date="2021-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634730" comment="MozillaFirefox-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634731" comment="MozillaFirefox-translations-common-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634732" comment="MozillaFirefox-translations-other-78.14.0-78.140.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40095" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:
	  
MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654421" comment="MozillaFirefox-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654422" comment="MozillaFirefox-translations-common-91.3.0-78.151.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654423" comment="MozillaFirefox-translations-other-91.3.0-78.151.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40096" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659367" comment="MozillaFirefox-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659368" comment="MozillaFirefox-translations-common-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659369" comment="MozillaFirefox-translations-other-91.4.0-78.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40097" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663814" comment="MozillaFirefox-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663815" comment="MozillaFirefox-translations-common-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663816" comment="MozillaFirefox-translations-other-91.5.0-78.159.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40098" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668898" comment="MozillaFirefox-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668899" comment="MozillaFirefox-translations-common-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668900" comment="MozillaFirefox-translations-other-91.6.0-78.162.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40099" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672457" comment="MozillaFirefox-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672458" comment="MozillaFirefox-translations-common-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672459" comment="MozillaFirefox-translations-other-91.7.0-78.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40100" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684104" comment="MozillaFirefox-91.9.0-78.179.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684105" comment="MozillaFirefox-translations-common-91.9.0-78.179.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684106" comment="MozillaFirefox-translations-other-91.9.0-78.179.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40101" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This Mozilla Firefox and Mozilla NSS update to 24.5.0esr fixes the 
following several security and non-security issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to 3.16:

    * required for Firefox 29
    * CVE-2014-1492: In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577207" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577208" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577209" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577210" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577211" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577212" comment="libfreebl3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577213" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577214" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577215" comment="libsoftokn3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577219" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577220" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577221" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577222" comment="mozilla-nss-x86-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577207" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577208" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577209" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577210" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577211" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577212" comment="libfreebl3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577213" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577214" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577215" comment="libsoftokn3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577219" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577220" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577221" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577222" comment="mozilla-nss-x86-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577207" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577208" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577209" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577210" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577211" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577212" comment="libfreebl3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577213" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577214" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577215" comment="libsoftokn3-x86-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577219" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577220" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577221" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577222" comment="mozilla-nss-x86-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40102" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.

The following vulnerabilities have been fixed:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577223" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577224" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577223" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577224" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577223" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577224" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40103" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40104" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577240" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577241" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577242" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577243" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577244" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577245" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577246" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577247" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577248" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577249" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577250" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577240" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577241" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577242" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577243" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577244" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577245" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577246" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577247" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577248" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577249" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577250" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40105" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, rust-cbindgen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652557" comment="MozillaFirefox-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652558" comment="MozillaFirefox-branding-SLED-91-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652559" comment="MozillaFirefox-translations-common-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652560" comment="MozillaFirefox-translations-other-91.2.0-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40106" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-kde4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="663413" ref_url="https://bugzilla.suse.com/663413" source="BUGZILLA"/>
		<reference ref_id="726349" ref_url="https://bugzilla.suse.com/726349" source="BUGZILLA"/>
		<description>
This NetworkManager-kde4 update fixes the following security and non security issues: 

- Fixed a long standing security issue. This makes knetworkmanager probe the RADIUS server for a CA certificate subject and hash if no CA certificate is specified. knetworkmanager then stores this data and send it to NetworkManager for it to do a network validation in the absence of a real certificate (bsc#726349)

- Disabled the loading by default of the NetworkManager plasma applet since it doesn't work.
- Fixed a crash due to the use of an uninitialized variable in the plasma applet in case someone runs it manually (bsc#663413)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/663413">SUSE bug 663413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726349">SUSE bug 726349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570666" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570667" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570668" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570669" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570670" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570671" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40107" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570672" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564202" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40108" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040109" ref_url="https://bugzilla.suse.com/1040109" source="BUGZILLA"/>
		<reference ref_id="1040112" ref_url="https://bugzilla.suse.com/1040112" source="BUGZILLA"/>
		<reference ref_id="1040113" ref_url="https://bugzilla.suse.com/1040113" source="BUGZILLA"/>
		<reference ref_id="1040115" ref_url="https://bugzilla.suse.com/1040115" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2017-9111: Fixed an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h (bsc#1040109).
- CVE-2017-9113: Fixed an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp (bsc#1040113).
- CVE-2017-9115: Fixed an invalid write of size 2 in the = operator function inhalf.h (bsc#1040115).    
- CVE-2017-9112: Fixed invalid read of size 1 in the getBits function in ImfHuf.cpp. (This was already fixed by the previous update bug not referenced.) (bsc#1040112)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-24"/>
	<updated date="2019-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570673" comment="OpenEXR-1.6.1-83.17.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570674" comment="OpenEXR-32bit-1.6.1-83.17.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40109" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061305" ref_url="https://bugzilla.suse.com/1061305" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2017-14988: Fixed a denial of service in Header::readfrom() (bsc#1061305).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570675" comment="OpenEXR-1.6.1-83.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570676" comment="OpenEXR-32bit-1.6.1-83.17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40110" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169574" ref_url="https://bugzilla.suse.com/1169574" source="BUGZILLA"/>
		<reference ref_id="1169576" ref_url="https://bugzilla.suse.com/1169576" source="BUGZILLA"/>
		<reference ref_id="1169578" ref_url="https://bugzilla.suse.com/1169578" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp (bsc#1169574).
- CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp (bsc#1169576).
- CVE-2020-11761: Fixed an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder:refill in ImfFastHuf.cpp (bsc#1169578).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570677" comment="OpenEXR-1.6.1-83.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570678" comment="OpenEXR-32bit-1.6.1-83.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40111" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179879" ref_url="https://bugzilla.suse.com/1179879" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

Security issues fixed:

- CVE-2020-16588: Fixed a null pointer deference in generatePreview (bsc#1179879).
- CVE-2020-16589: Fixed a heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp (bsc#1179879).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570679" comment="OpenEXR-1.6.1-83.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570680" comment="OpenEXR-32bit-1.6.1-83.17.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40112" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184172" ref_url="https://bugzilla.suse.com/1184172" source="BUGZILLA"/>
		<reference ref_id="1184173" ref_url="https://bugzilla.suse.com/1184173" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173)
- CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570681" comment="OpenEXR-1.6.1-83.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570682" comment="OpenEXR-32bit-1.6.1-83.17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40113" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570683" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570684" comment="OpenEXR-32bit-1.6.1-83.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40114" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657133" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657134" comment="OpenEXR-32bit-1.6.1-83.17.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40115" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570687" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564204" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40116" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141844" ref_url="https://bugzilla.suse.com/1141844" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

Secuirty issue fixed:

- CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570688" comment="SDL-1.2.13-106.14.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570689" comment="SDL-32bit-1.2.13-106.14.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40117" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679743" comment="SDL-1.2.13-106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679744" comment="SDL-32bit-1.2.13-106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40118" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40119" version="1" class="patch">
	<metadata>
		<title>Security update for a2ps</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="871097" ref_url="https://bugzilla.suse.com/871097" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>

The text to postscript converter a2ps received a security update.

The fixps script did not call ghostscript with the -DSAFER option, allowing 
command execution by attacker supplied postscript files.

Security Issue reference:

    * CVE-2014-0466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577251" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577251" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577251" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40120" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570691" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40121" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664250" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40122" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112916" ref_url="https://bugzilla.suse.com/1112916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10729" ref_url="https://www.suse.com/security/cve/CVE-2016-10729/" source="CVE"/>
		<description>
This update for amanda fixes the following issues:

Security issue fixed:

- CVE-2016-10729: Fixed a local privilege escalation from amanda to root via unsafe tar command options (bsc#1112916).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10729/">CVE-2016-10729</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570692" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40123" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008037" ref_url="https://bugzilla.suse.com/1008037" source="BUGZILLA"/>
		<reference ref_id="1008038" ref_url="https://bugzilla.suse.com/1008038" source="BUGZILLA"/>
		<reference ref_id="1010940" ref_url="https://bugzilla.suse.com/1010940" source="BUGZILLA"/>
		<reference ref_id="1019021" ref_url="https://bugzilla.suse.com/1019021" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614/" source="CVE"/>
		<reference ref_id="CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628/" source="CVE"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<description>

This update for ansible to version 2.2.0.0 fixes the following issues:

- CVE-2016-8628: Command injection by compromised server via fact variables (bsc#1008037).
- CVE-2016-8614: Improper verification of key fingerprints in apt_key module (bsc#1008038).
- CVE-2016-8647: in some circumstances the mysql_user module may fail to correctly change a password (bsc#1010940).
- CVE-2016-9587: Prevent compromised host to execute commands on the controller (bsc#1019021).

For more information about the upstream bugs fixed please see
/usr/share/doc/packages/ansible/CHANGELOG.md 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010940">SUSE bug 1010940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577252" comment="ansible-2.2.0.0-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40124" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038785" ref_url="https://bugzilla.suse.com/1038785" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<description>

This update for ansible fixes the following issues:

- CVE-2017-7481: Data for lookup plugins used as variables was not being marked as 'unsafe' and could lead to unintentional disclosure of information. (bsc#1038785)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577253" comment="ansible-2.2.0.0-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40125" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059235" ref_url="https://bugzilla.suse.com/1059235" source="BUGZILLA"/>
		<reference ref_id="1065872" ref_url="https://bugzilla.suse.com/1065872" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<description>


This update for ansible fixes the following issues:

Ansible was updated to 2.3.2.0. A full list of changes can be found in
  /usr/share/doc/packages/ansible/CHANGELOG.md

Security issues fixed:

- CVE-2017-7550: Passing passwords in the params field in the Jenkins plugin was disallowed 
  as it can be leaked into log files because contents of params are not protected.
  Instead, the password now must be configured separately as url_password.
  (bsc#1065872)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-15"/>
	<updated date="2018-01-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059235">SUSE bug 1059235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577254" comment="ansible-2.3.2.0-11.5.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577255" comment="libyaml-0-2-0.1.3-0.10.22.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577256" comment="python-Jinja2-2.6-2.19.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577257" comment="python-PyYAML-3.10-0.15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577258" comment="python-ecdsa-0.10-0.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577259" comment="python-paramiko-1.13.1-0.3.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577260" comment="python-pycrypto-2.6-0.3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40126" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, python-straight-plugin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1065872" ref_url="https://bugzilla.suse.com/1065872" source="BUGZILLA"/>
		<reference ref_id="1080682" ref_url="https://bugzilla.suse.com/1080682" source="BUGZILLA"/>
		<reference ref_id="1097775" ref_url="https://bugzilla.suse.com/1097775" source="BUGZILLA"/>
		<reference ref_id="1099808" ref_url="https://bugzilla.suse.com/1099808" source="BUGZILLA"/>
		<reference ref_id="1102126" ref_url="https://bugzilla.suse.com/1102126" source="BUGZILLA"/>
		<reference ref_id="1109957" ref_url="https://bugzilla.suse.com/1109957" source="BUGZILLA"/>
		<reference ref_id="1112959" ref_url="https://bugzilla.suse.com/1112959" source="BUGZILLA"/>
		<reference ref_id="1118896" ref_url="https://bugzilla.suse.com/1118896" source="BUGZILLA"/>
		<reference ref_id="1126503" ref_url="https://bugzilla.suse.com/1126503" source="BUGZILLA"/>
		<reference ref_id="1137479" ref_url="https://bugzilla.suse.com/1137479" source="BUGZILLA"/>
		<reference ref_id="1137528" ref_url="https://bugzilla.suse.com/1137528" source="BUGZILLA"/>
		<reference ref_id="1142542" ref_url="https://bugzilla.suse.com/1142542" source="BUGZILLA"/>
		<reference ref_id="1142690" ref_url="https://bugzilla.suse.com/1142690" source="BUGZILLA"/>
		<reference ref_id="1144453" ref_url="https://bugzilla.suse.com/1144453" source="BUGZILLA"/>
		<reference ref_id="1153452" ref_url="https://bugzilla.suse.com/1153452" source="BUGZILLA"/>
		<reference ref_id="1154231" ref_url="https://bugzilla.suse.com/1154231" source="BUGZILLA"/>
		<reference ref_id="1154232" ref_url="https://bugzilla.suse.com/1154232" source="BUGZILLA"/>
		<reference ref_id="1154830" ref_url="https://bugzilla.suse.com/1154830" source="BUGZILLA"/>
		<reference ref_id="1157968" ref_url="https://bugzilla.suse.com/1157968" source="BUGZILLA"/>
		<reference ref_id="1157969" ref_url="https://bugzilla.suse.com/1157969" source="BUGZILLA"/>
		<reference ref_id="1164133" ref_url="https://bugzilla.suse.com/1164133" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1164135" ref_url="https://bugzilla.suse.com/1164135" source="BUGZILLA"/>
		<reference ref_id="1164136" ref_url="https://bugzilla.suse.com/1164136" source="BUGZILLA"/>
		<reference ref_id="1164137" ref_url="https://bugzilla.suse.com/1164137" source="BUGZILLA"/>
		<reference ref_id="1164138" ref_url="https://bugzilla.suse.com/1164138" source="BUGZILLA"/>
		<reference ref_id="1164139" ref_url="https://bugzilla.suse.com/1164139" source="BUGZILLA"/>
		<reference ref_id="1164140" ref_url="https://bugzilla.suse.com/1164140" source="BUGZILLA"/>
		<reference ref_id="1165393" ref_url="https://bugzilla.suse.com/1165393" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1167440" ref_url="https://bugzilla.suse.com/1167440" source="BUGZILLA"/>
		<reference ref_id="1167532" ref_url="https://bugzilla.suse.com/1167532" source="BUGZILLA"/>
		<reference ref_id="1171162" ref_url="https://bugzilla.suse.com/1171162" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855/" source="CVE"/>
		<reference ref_id="CVE-2018-10875" ref_url="https://www.suse.com/security/cve/CVE-2018-10875/" source="CVE"/>
		<reference ref_id="CVE-2018-16837" ref_url="https://www.suse.com/security/cve/CVE-2018-16837/" source="CVE"/>
		<reference ref_id="CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876/" source="CVE"/>
		<reference ref_id="CVE-2019-10156" ref_url="https://www.suse.com/security/cve/CVE-2019-10156/" source="CVE"/>
		<reference ref_id="CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206/" source="CVE"/>
		<reference ref_id="CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217/" source="CVE"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2019-14856" ref_url="https://www.suse.com/security/cve/CVE-2019-14856/" source="CVE"/>
		<reference ref_id="CVE-2019-14858" ref_url="https://www.suse.com/security/cve/CVE-2019-14858/" source="CVE"/>
		<reference ref_id="CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864/" source="CVE"/>
		<reference ref_id="CVE-2019-14904" ref_url="https://www.suse.com/security/cve/CVE-2019-14904/" source="CVE"/>
		<reference ref_id="CVE-2019-14905" ref_url="https://www.suse.com/security/cve/CVE-2019-14905/" source="CVE"/>
		<reference ref_id="CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828/" source="CVE"/>
		<reference ref_id="CVE-2020-10684" ref_url="https://www.suse.com/security/cve/CVE-2020-10684/" source="CVE"/>
		<reference ref_id="CVE-2020-10685" ref_url="https://www.suse.com/security/cve/CVE-2020-10685/" source="CVE"/>
		<reference ref_id="CVE-2020-10691" ref_url="https://www.suse.com/security/cve/CVE-2020-10691/" source="CVE"/>
		<reference ref_id="CVE-2020-10729" ref_url="https://www.suse.com/security/cve/CVE-2020-10729/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1734" ref_url="https://www.suse.com/security/cve/CVE-2020-1734/" source="CVE"/>
		<reference ref_id="CVE-2020-1735" ref_url="https://www.suse.com/security/cve/CVE-2020-1735/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1737" ref_url="https://www.suse.com/security/cve/CVE-2020-1737/" source="CVE"/>
		<reference ref_id="CVE-2020-1738" ref_url="https://www.suse.com/security/cve/CVE-2020-1738/" source="CVE"/>
		<reference ref_id="CVE-2020-1739" ref_url="https://www.suse.com/security/cve/CVE-2020-1739/" source="CVE"/>
		<reference ref_id="CVE-2020-1740" ref_url="https://www.suse.com/security/cve/CVE-2020-1740/" source="CVE"/>
		<reference ref_id="CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<description>
This update for ansible, python-straight-plugin fixes the following issues:

ansible was updated to version 2.9.9	  

Security issues fixed: 

- CVE-2020-1753: Fixed an issue where kubectl connection plugin leaks sensitive information (bsc#1166389).
- CVE-2020-1746: Fixed a potential information leak in ldap_attr and ldap_entry modules (bsc#1165393).
- CVE-2020-1733,CVE-2020-10744: Fixed a race condition and insecure permissions which could have allowed
  another user on the node to gain control of the become user (bsc#1171823 and bsc#1164140).
- CVE-2020-1740: Fixed a potential secret leak to other local users (bsc#1164135).
- CVE-2020-1739: Fixed an issue which could have disclosed the password to other users within the same node, when it was set with the argument 'password' of svn module (bsc#1164133).
- CVE-2020-1738: Fixed an issue which could have allowed a malicious user to select the module sent to the node (bsc#1164136).
- CVE-2020-1737: Fixed an issue in extract-zip which could have allowed path traversal attacks (bsc#1164138).
- CVE-2020-1736: Fixed an improper implementation of  impatomic_move primitive which could have resulted in world-readable or with less restricted permissions before the move files in the destination (bsc#1164134).
- CVE-2020-1735: Fixed a potential path injection which could have allowed a remote user to choose the destination path on the controller node (bsc#1164137).
- CVE-2020-1734: Fixed an improper default setting in pipe lookup plugin which could have allowed running arbitrary commands by overwriting ansible facts (bsc#1164139). 
- CVE-2020-10729: Fixed an issue where two random password lookups in same task return same value (bsc#1171162).
- CVE-2020-10691: Fixed an improper sanitization in ansible-galaxy which could have allowed attackers to execute archive traversal attacks (bsc#1167873).
- CVE-2020-10685: Fixed an potential information disclosure when a module was using a file that was encrypted with vault (bsc#1167440)
- CVE-2020-10684: Fixed a potential code injection when ansible_facts was used as a subkey (bsc#1167532).
- CVE-2019-3828: Fixed a path traversal in the fetch module (bsc#1126503).
- CVE-2019-14905: Fixed a potential command injection in nxos_file_copy (bsc#1157569).
- CVE-2019-14904: Fixed an issue which could have allowed a malicious user to execute commands into the server manipulating the module behaviour (bsc#1157968).
- CVE-2019-14864: Fixed an issue which could have led to sensitive information disclosure (bsc#1154830).
- CVE-2019-14858: Fixed an issue where data in the sub parameter would have presented with increased verbosity (bsc#1154231)
- CVE-2019-14856: Fixed insufficient fix for CVE-2019-10206 (bsc#1154232).
- CVE-2019-14846: Fixed an issue which could have allowed secrets disclosure on logs due to hardcoded display to DEBUG level (bsc#1153452)
- CVE-2019-10217: Fixed an issue with fields managing sensitive data which could have leaked sensitive data when running ansible playbooks (bsc#1144453).
- CVE-2019-10206: Fixed improper implementation of ansible-playbook -k and ansible cli tools when prompt passwords (bsc#1142690).
- CVE-2019-10156: Fixed an issue when templating which could have caused an unexpected key file to be set on remote node (bsc#1137528).
- CVE-2018-16876: Fixed an issue in retry task when run with -vvv fails which could have leaked sensitive data (bsc#1118896).
- CVE-2018-16837: Fixed an issue which user module was leaking any data had been passed on as a parameter to ssh-keygen (bsc#1112959).
- CVE-2018-10875: Fixed an issue with ansible.cfg  which could have allowed an attaker to execute arbitrary code. (bsc#1099808)
- CVE-2018-10855: Fixed a potential sensitive information disclosure log files and on the terminal of the user running Ansible when the no_log flag has been used (bsc#1097775).
- CVE-2017-7550: Fixed an issue on the way parameters are passed to jenkins_plugin module allowing remote attackers to expose sensitive information from a remote host's logs (bsc#1065872).

Other issues addressed: 	  
	  
- Created missing (empty) template and files directories for 'ansible-galaxy init' during package build (bsc#1137479)
- Added python-passlib which is needed for the 'vars_prompt' feature of ansible (bsc#1080682)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-27"/>
	<updated date="2020-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080682">SUSE bug 1080682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102126">SUSE bug 1102126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112959">SUSE bug 1112959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137479">SUSE bug 1137479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137528">SUSE bug 1137528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142542">SUSE bug 1142542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142690">SUSE bug 1142690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144453">SUSE bug 1144453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154231">SUSE bug 1154231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154830">SUSE bug 1154830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157968">SUSE bug 1157968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157969">SUSE bug 1157969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164133">SUSE bug 1164133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164135">SUSE bug 1164135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164136">SUSE bug 1164136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164138">SUSE bug 1164138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164139">SUSE bug 1164139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165393">SUSE bug 1165393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167440">SUSE bug 1167440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167532">SUSE bug 1167532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171162">SUSE bug 1171162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10875/">CVE-2018-10875</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16837/">CVE-2018-16837</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10156/">CVE-2019-10156</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217</cve>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846</cve>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14856/">CVE-2019-14856</cve>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14858/">CVE-2019-14858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14904/">CVE-2019-14904</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14905/">CVE-2019-14905</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10684/">CVE-2020-10684</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10685/">CVE-2020-10685</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10691/">CVE-2020-10691</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10729/">CVE-2020-10729</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1734/">CVE-2020-1734</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1735/">CVE-2020-1735</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1737/">CVE-2020-1737</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1738/">CVE-2020-1738</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1739/">CVE-2020-1739</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1740/">CVE-2020-1740</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577261" comment="ansible-2.9.9-11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577262" comment="python-coverage-3.6-0.11.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577263" comment="python-passlib-1.6.1-0.3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40127" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

- CVE-2020-14330: Fixed an issue where 'no log' values are not stripped 
  from module response keys (bsc#1174145).
  Sensitive values marked with ``no_log=True`` will automatically
  have that value stripped from module return values. If
  your module could return these sensitive values as
  part of a dictionary key name, you should call the
  ``ansible.module_utils.basic.sanitize_keys()`` function to
  strip the values from the keys. See the ``uri`` module for an
  example.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-06"/>
	<updated date="2020-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577264" comment="ansible-2.9.9-11.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40128" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153452" ref_url="https://bugzilla.suse.com/1153452" source="BUGZILLA"/>
		<reference ref_id="1164134" ref_url="https://bugzilla.suse.com/1164134" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="1174302" ref_url="https://bugzilla.suse.com/1174302" source="BUGZILLA"/>
		<reference ref_id="1175993" ref_url="https://bugzilla.suse.com/1175993" source="BUGZILLA"/>
		<reference ref_id="1177948" ref_url="https://bugzilla.suse.com/1177948" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14846" ref_url="https://www.suse.com/security/cve/CVE-2019-14846/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-14365" ref_url="https://www.suse.com/security/cve/CVE-2020-14365/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-1736" ref_url="https://www.suse.com/security/cve/CVE-2020-1736/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

Update to ansible 2.9.14:

 - CVE-2020-1753, bsc#1166389: Kubectl connection plugin - connection plugin now redact kubectl_token and kubectl_password in console log.
 - revert CVE-2020-1736. Users are encouraged to specify a mode parameter in their file-based tasks when the files being manipulated contain sensitive data.
 - CVE-2020-14365, bsc#1175993: Previously, regardless of the disable_gpg_check option, packages were not GPG validated. They are now.
 - CVE-2020-14332, bsc#1174302: copy - Redact the value of the no_log 'content' parameter in the result's invocation.module_args in check mode. Previously when used with check mode and with '-vvv', the module would not censor the content if a change would be made to the destination path.
 - CVE-2020-1736, bsc#1164134: atomic_move - Change default permissions when creating temporary files so they are not world readable
 - CVE-2020-14330, bsc#1174145: Sanitize no_log values from any response keys that might be returned from the uri module.
 - CVE-2019-14846, bsc#1153452: Reset logging level to INFO.
 - CVE-2020-10744, bsc#1171823, gh#ansible/ansible#69782: incomplete fix for CVE-2020-1733
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153452">SUSE bug 1153452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164134">SUSE bug 1164134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174302">SUSE bug 1174302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175993">SUSE bug 1175993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177948">SUSE bug 1177948</bugzilla>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14846/">CVE-2019-14846</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14365/">CVE-2020-14365</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1736/">CVE-2020-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577265" comment="ansible-2.9.14-11.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40129" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180816" ref_url="https://bugzilla.suse.com/1180816" source="BUGZILLA"/>
		<reference ref_id="1180942" ref_url="https://bugzilla.suse.com/1180942" source="BUGZILLA"/>
		<reference ref_id="1181119" ref_url="https://bugzilla.suse.com/1181119" source="BUGZILLA"/>
		<reference ref_id="1181935" ref_url="https://bugzilla.suse.com/1181935" source="BUGZILLA"/>
		<reference ref_id="1183684" ref_url="https://bugzilla.suse.com/1183684" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178/" source="CVE"/>
		<reference ref_id="CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180/" source="CVE"/>
		<reference ref_id="CVE-2021-20191" ref_url="https://www.suse.com/security/cve/CVE-2021-20191/" source="CVE"/>
		<reference ref_id="CVE-2021-20228" ref_url="https://www.suse.com/security/cve/CVE-2021-20228/" source="CVE"/>
		<reference ref_id="CVE-2021-3447" ref_url="https://www.suse.com/security/cve/CVE-2021-3447/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

- Update to 2.9.22:
- CVE-2021-3447: multiple modules expose secured values (bsc#1183684)
- CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935)
- CVE-2021-20191: multiple collections exposes secured values (bsc#1181119)
- CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942)
- CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181119">SUSE bug 1181119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181935">SUSE bug 1181935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183684">SUSE bug 1183684</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20191/">CVE-2021-20191</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20228/">CVE-2021-20228</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3447/">CVE-2021-3447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577266" comment="ansible-2.9.22-11.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40130" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176460" ref_url="https://bugzilla.suse.com/1176460" source="BUGZILLA"/>
		<reference ref_id="1187725" ref_url="https://bugzilla.suse.com/1187725" source="BUGZILLA"/>
		<reference ref_id="1188061" ref_url="https://bugzilla.suse.com/1188061" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583/" source="CVE"/>
		<reference ref_id="CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620/" source="CVE"/>
		<description>
This update for ansible fixes the following issues:

Update to 2.9.27:

- CVE-2021-3620: ansible-connection module discloses sensitive info in traceback error message (bsc#1187725).
- CVE-2021-3583: Template Injection through yaml multi-line strings with ansible facts used in template (bsc#1188061).
- ansible module nmcli is broken in ansible 2.9.13 (bsc#1176460)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176460">SUSE bug 1176460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187725">SUSE bug 1187725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188061">SUSE bug 1188061</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659370" comment="ansible-2.9.27-11.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40131" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)

Other changes made:

- Removed support for javadoc
- Default value for stripAbsolutePathSpec changed to 'true'
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40132" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188469" ref_url="https://bugzilla.suse.com/1188469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<description>
This update for ant fixes the following issues:

- CVE-2021-36374: Fixed an excessive memory allocation when reading a specially
  crafted ZIP archive (bsc#1188469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188469">SUSE bug 1188469</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677827" comment="ant-1.7.1-20.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677828" comment="ant-trax-1.7.1-16.11.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40133" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001657.html" source="SUSE-SU"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40134" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570707" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570708" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570709" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570710" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570711" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570712" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40135" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570713" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570714" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570715" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570716" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570717" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570718" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40136" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570719" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570720" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570721" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570722" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570723" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570724" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40137" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577273" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577274" comment="apache2-devel-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577275" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577276" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577277" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577278" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577279" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577273" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577274" comment="apache2-devel-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577275" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577276" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577277" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577278" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577279" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40138" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570731" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570732" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570733" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570734" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570735" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570736" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40139" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570737" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570738" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570739" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570740" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570741" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570742" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40140" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145738" ref_url="https://bugzilla.suse.com/1145738" source="BUGZILLA"/>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-16"/>
	<updated date="2019-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570743" comment="apache2-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570744" comment="apache2-doc-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570745" comment="apache2-example-pages-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570746" comment="apache2-prefork-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570747" comment="apache2-utils-2.2.34-70.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570748" comment="apache2-worker-2.2.34-70.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40141" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570749" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570750" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570751" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570752" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570753" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570754" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40142" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145740" ref_url="https://bugzilla.suse.com/1145740" source="BUGZILLA"/>
		<reference ref_id="1182703" ref_url="https://bugzilla.suse.com/1182703" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- Fixed potential content spoofing with default error pages(bsc#118270)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570755" comment="apache2-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570756" comment="apache2-doc-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570757" comment="apache2-example-pages-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570758" comment="apache2-prefork-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570759" comment="apache2-utils-2.2.34-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570760" comment="apache2-worker-2.2.34-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40143" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570761" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570762" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570763" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570764" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570765" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570766" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40144" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633944" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633945" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633946" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633947" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633948" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633949" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40145" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673620" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673621" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673622" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673623" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673624" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673625" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40146" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="927845" ref_url="https://bugzilla.suse.com/927845" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<description>

This update for apache2-mod_jk fixes the following issues:

Security issues fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
- CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules for subtrees of previous JkMount rules, which allowed remote attackers to access otherwise restricted artifacts via unspecified vectors (bsc#927845).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570775" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40147" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575821" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575821" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40148" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570777" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40149" version="1" class="patch">
	<metadata>
		<title>Security update for php53</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="902357" ref_url="https://bugzilla.suse.com/902357" source="BUGZILLA"/>
		<reference ref_id="902360" ref_url="https://bugzilla.suse.com/902360" source="BUGZILLA"/>
		<reference ref_id="902368" ref_url="https://bugzilla.suse.com/902368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00030.html" source="SUSE-SU"/>
		<description>

This update fixes the following vulnerabilities in php:

    * Heap corruption issue in exif_thumbnail(). (CVE-2014-3670)
    * Integer overflow in unserialize(). (CVE-2014-3669)
    * Xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime().
      (CVE-2014-3668)

Security Issues:

    * CVE-2014-3669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669&gt;
    * CVE-2014-3670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670&gt;
    * CVE-2014-3668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-28"/>
	<updated date="2014-10-28"/>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577280" comment="apache2-mod_php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577281" comment="php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577282" comment="php53-bcmath-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577283" comment="php53-bz2-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577284" comment="php53-calendar-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577285" comment="php53-ctype-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577286" comment="php53-curl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577287" comment="php53-dba-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577288" comment="php53-dom-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577289" comment="php53-exif-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577290" comment="php53-fastcgi-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577291" comment="php53-fileinfo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577292" comment="php53-ftp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577293" comment="php53-gd-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577294" comment="php53-gettext-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577295" comment="php53-gmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577296" comment="php53-iconv-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577297" comment="php53-intl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577298" comment="php53-json-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577299" comment="php53-ldap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577300" comment="php53-mbstring-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577301" comment="php53-mcrypt-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577302" comment="php53-mysql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577303" comment="php53-odbc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577304" comment="php53-openssl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577305" comment="php53-pcntl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577306" comment="php53-pdo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577307" comment="php53-pear-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577308" comment="php53-pgsql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577309" comment="php53-pspell-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577310" comment="php53-shmop-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577311" comment="php53-snmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577312" comment="php53-soap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577313" comment="php53-suhosin-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577314" comment="php53-sysvmsg-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577315" comment="php53-sysvsem-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577316" comment="php53-sysvshm-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577317" comment="php53-tokenizer-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577318" comment="php53-wddx-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577319" comment="php53-xmlreader-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577320" comment="php53-xmlrpc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577321" comment="php53-xmlwriter-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577322" comment="php53-xsl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577323" comment="php53-zip-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577324" comment="php53-zlib-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577280" comment="apache2-mod_php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577281" comment="php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577282" comment="php53-bcmath-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577283" comment="php53-bz2-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577284" comment="php53-calendar-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577285" comment="php53-ctype-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577286" comment="php53-curl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577287" comment="php53-dba-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577288" comment="php53-dom-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577289" comment="php53-exif-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577290" comment="php53-fastcgi-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577291" comment="php53-fileinfo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577292" comment="php53-ftp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577293" comment="php53-gd-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577294" comment="php53-gettext-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577295" comment="php53-gmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577296" comment="php53-iconv-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577297" comment="php53-intl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577298" comment="php53-json-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577299" comment="php53-ldap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577300" comment="php53-mbstring-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577301" comment="php53-mcrypt-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577302" comment="php53-mysql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577303" comment="php53-odbc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577304" comment="php53-openssl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577305" comment="php53-pcntl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577306" comment="php53-pdo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577307" comment="php53-pear-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577308" comment="php53-pgsql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577309" comment="php53-pspell-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577310" comment="php53-shmop-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577311" comment="php53-snmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577312" comment="php53-soap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577313" comment="php53-suhosin-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577314" comment="php53-sysvmsg-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577315" comment="php53-sysvsem-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577316" comment="php53-sysvshm-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577317" comment="php53-tokenizer-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577318" comment="php53-wddx-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577319" comment="php53-xmlreader-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577320" comment="php53-xmlrpc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577321" comment="php53-xmlwriter-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577322" comment="php53-xsl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577323" comment="php53-zip-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577324" comment="php53-zlib-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577280" comment="apache2-mod_php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577281" comment="php53-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577282" comment="php53-bcmath-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577283" comment="php53-bz2-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577284" comment="php53-calendar-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577285" comment="php53-ctype-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577286" comment="php53-curl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577287" comment="php53-dba-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577288" comment="php53-dom-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577289" comment="php53-exif-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577290" comment="php53-fastcgi-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577291" comment="php53-fileinfo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577292" comment="php53-ftp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577293" comment="php53-gd-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577294" comment="php53-gettext-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577295" comment="php53-gmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577296" comment="php53-iconv-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577297" comment="php53-intl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577298" comment="php53-json-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577299" comment="php53-ldap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577300" comment="php53-mbstring-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577301" comment="php53-mcrypt-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577302" comment="php53-mysql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577303" comment="php53-odbc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577304" comment="php53-openssl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577305" comment="php53-pcntl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577306" comment="php53-pdo-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577307" comment="php53-pear-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577308" comment="php53-pgsql-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577309" comment="php53-pspell-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577310" comment="php53-shmop-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577311" comment="php53-snmp-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577312" comment="php53-soap-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577313" comment="php53-suhosin-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577314" comment="php53-sysvmsg-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577315" comment="php53-sysvsem-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577316" comment="php53-sysvshm-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577317" comment="php53-tokenizer-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577318" comment="php53-wddx-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577319" comment="php53-xmlreader-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577320" comment="php53-xmlrpc-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577321" comment="php53-xmlwriter-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577322" comment="php53-xsl-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577323" comment="php53-zip-5.3.17-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577324" comment="php53-zlib-5.3.17-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40150" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_security2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="871309" ref_url="https://bugzilla.suse.com/871309" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5705" ref_url="https://www.suse.com/security/cve/CVE-2013-5705/" source="CVE"/>
		<description>

This apache2-mod_security2 update fixes the following security issue:

    * bnc#871309: bypass of intended rules via chunked requests
      (CVE-2013-5705)

Security Issues:

    * CVE-2013-5705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-07"/>
	<updated date="2014-08-07"/>
	<bugzilla href="https://bugzilla.suse.com/871309">SUSE bug 871309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5705/">CVE-2013-5705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577325" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577325" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577325" comment="apache2-mod_security2-2.7.1-0.2.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40151" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="947731" ref_url="https://bugzilla.suse.com/947731" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1338" ref_url="https://www.suse.com/security/cve/CVE-2015-1338/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issue fixed:
- CVE-2015-1338: Insecurely created crash dumps could lead to a DoS or privilege escalation through
  malicious symlinks. (bsc#947731)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-24"/>
	<updated date="2017-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1338/">CVE-2015-1338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570824" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570825" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570826" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40152" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140986" ref_url="https://bugzilla.suse.com/1140986" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7307" ref_url="https://www.suse.com/security/cve/CVE-2019-7307/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

Security issues fixed:

- CVE-2019-7307: Fixed a TOCTOU issue, which allows local users to read arbitrary files. (bsc#1140986)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140986">SUSE bug 1140986</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7307/">CVE-2019-7307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570827" comment="apport-0.114-12.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570828" comment="apport-crashdb-sle-0.114-0.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570829" comment="apport-gtk-0.114-12.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40153" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155479" ref_url="https://bugzilla.suse.com/1155479" source="BUGZILLA"/>
		<reference ref_id="1155481" ref_url="https://bugzilla.suse.com/1155481" source="BUGZILLA"/>
		<reference ref_id="1155482" ref_url="https://bugzilla.suse.com/1155482" source="BUGZILLA"/>
		<reference ref_id="1174108" ref_url="https://bugzilla.suse.com/1174108" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11482" ref_url="https://www.suse.com/security/cve/CVE-2019-11482/" source="CVE"/>
		<reference ref_id="CVE-2019-11485" ref_url="https://www.suse.com/security/cve/CVE-2019-11485/" source="CVE"/>
		<reference ref_id="CVE-2019-15790" ref_url="https://www.suse.com/security/cve/CVE-2019-15790/" source="CVE"/>
		<reference ref_id="CVE-2020-15701" ref_url="https://www.suse.com/security/cve/CVE-2020-15701/" source="CVE"/>
		<description>
This update for apport fixes the following issues:

- CVE-2019-11482: Fixed TOCTTOU race conditions when creating a core file (bsc#1155479).
- CVE-2019-11485: Fixed a permission issue with the directory of lock files (bsc#1155481)
- CVE-2019-15790: Fixed the privilleges that reads /proc/$PID/ files to avoid potential information disclosure (bsc#1155482).
- CVE-2020-15701: Fixed a denial of service while parsing apport-ignore.xml (bsc#1174108).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-21"/>
	<updated date="2020-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155479">SUSE bug 1155479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155481">SUSE bug 1155481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155482">SUSE bug 1155482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174108">SUSE bug 1174108</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11482/">CVE-2019-11482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11485/">CVE-2019-11485</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15790/">CVE-2019-15790</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15701/">CVE-2020-15701</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570830" comment="apport-0.114-12.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570831" comment="apport-crashdb-sle-0.114-0.8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570832" comment="apport-gtk-0.114-12.8.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40154" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616451" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40155" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153892" ref_url="https://bugzilla.suse.com/1153892" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17544" ref_url="https://www.suse.com/security/cve/CVE-2019-17544/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-17544: Fixed a stack-based buffer over-read in acommon:unescape in common/getdata.cpp via an isolated backslash (bsc#1153892).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153892">SUSE bug 1153892</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17544/">CVE-2019-17544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570845" comment="aspell-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570846" comment="aspell-32bit-0.60.6-26.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570847" comment="aspell-ispell-0.60.6-26.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40156" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<description>
This update for aspell fixes the following security issue:

- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570848" comment="aspell-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570849" comment="aspell-32bit-0.60.6-26.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570850" comment="aspell-ispell-0.60.6-26.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40157" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627833" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627834" comment="aspell-32bit-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627835" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40158" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577326" comment="atftp-0.7.0-135.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40159" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190522" ref_url="https://bugzilla.suse.com/1190522" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41054" ref_url="https://www.suse.com/security/cve/CVE-2021-41054/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-41054: Fixed buffer overflow caused by combination of data, OACK, and other options (bsc#1190522).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190522">SUSE bug 1190522</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41054/">CVE-2021-41054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633874" comment="atftp-0.7.0-135.23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40160" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195619" ref_url="https://bugzilla.suse.com/1195619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46671" ref_url="https://www.suse.com/security/cve/CVE-2021-46671/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

- CVE-2021-46671: Fixed a potential information leak in atftpd (bnc#1195619).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1195619">SUSE bug 1195619</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46671/">CVE-2021-46671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667671" comment="atftp-0.7.0-135.23.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40161" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570852" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570853" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40162" version="1" class="patch">
	<metadata>
		<title>Security update for augeas</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="853044" ref_url="https://bugzilla.suse.com/853044" source="BUGZILLA"/>
		<reference ref_id="871323" ref_url="https://bugzilla.suse.com/871323" source="BUGZILLA"/>
		<reference ref_id="876044" ref_url="https://bugzilla.suse.com/876044" source="BUGZILLA"/>
		<reference ref_id="885003" ref_url="https://bugzilla.suse.com/885003" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>

Augeas has been updated to fix a symlink overwrite problem (CVE-2012-0786, 
CVE-2013-6412).

Also a bug has been fixed where 'augtool -s set was failing' (bnc#876044)

Additionally parsing the multipath configuration has been fixed. bnc#871323

Security Issues:

    * CVE-2012-0786
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786&gt;
    * CVE-2013-6412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-30"/>
	<updated date="2014-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871323">SUSE bug 871323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876044">SUSE bug 876044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577327" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577328" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577329" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577327" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577328" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577329" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577327" comment="augeas-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577328" comment="augeas-lenses-0.9.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577329" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40163" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40164" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
This update for augeas fixes the following issues:

Security issues fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
- CVE-2014-8119: Fix improper handling of escaped strings leading to memory corruption (bsc#925225).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577333" comment="augeas-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577334" comment="augeas-lenses-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577335" comment="libaugeas0-0.9.0-3.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40165" version="1" class="patch">
	<metadata>
		<title>Security update for automake</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="559815" ref_url="https://bugzilla.suse.com/559815" source="BUGZILLA"/>
		<reference ref_id="770618" ref_url="https://bugzilla.suse.com/770618" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>

This update of automake fixes a race condition in 'distcheck'. 
(CVE-2012-3386)

Also a bug where world writeable tarballs were generated during 'make dist' 
has been fixed (CVE-2009-4029).

Security Issue references:

    * CVE-2012-3386
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386&gt;
    * CVE-2009-4029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-12"/>
	<updated date="2013-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575912" comment="automake-1.10.1-4.131.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40166" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577336" comment="avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577337" comment="avahi-lang-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577338" comment="avahi-utils-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577339" comment="libavahi-client3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577340" comment="libavahi-client3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577341" comment="libavahi-common3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577342" comment="libavahi-common3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577343" comment="libavahi-core5-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577344" comment="libavahi-glib1-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577345" comment="libavahi-glib1-32bit-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577346" comment="libdns_sd-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577347" comment="libdns_sd-32bit-0.6.23-35.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40167" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085255" ref_url="https://bugzilla.suse.com/1085255" source="BUGZILLA"/>
		<description>
This update for avahi fixes the following issues:

- increase data and stack limits to fix remote denial of service (bsc#1085255). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085255">SUSE bug 1085255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577348" comment="avahi-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577349" comment="avahi-lang-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577350" comment="avahi-utils-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577351" comment="libavahi-client3-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577352" comment="libavahi-client3-32bit-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577353" comment="libavahi-common3-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577354" comment="libavahi-common3-32bit-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577355" comment="libavahi-core5-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577356" comment="libavahi-glib1-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577357" comment="libavahi-glib1-32bit-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577358" comment="libdns_sd-0.6.23-35.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577359" comment="libdns_sd-32bit-0.6.23-35.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40168" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827).
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-24"/>
	<updated date="2021-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577360" comment="avahi-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577361" comment="avahi-lang-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577362" comment="avahi-utils-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577363" comment="libavahi-client3-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577364" comment="libavahi-client3-32bit-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577365" comment="libavahi-common3-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577366" comment="libavahi-common3-32bit-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577367" comment="libavahi-core5-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577368" comment="libavahi-glib1-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577369" comment="libavahi-glib1-32bit-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577370" comment="libdns_sd-0.6.23-35.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577371" comment="libdns_sd-32bit-0.6.23-35.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40169" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577372" comment="avahi-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577373" comment="avahi-lang-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577374" comment="avahi-utils-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577375" comment="libavahi-client3-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577376" comment="libavahi-client3-32bit-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577377" comment="libavahi-common3-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577378" comment="libavahi-common3-32bit-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577379" comment="libavahi-core5-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577380" comment="libavahi-glib1-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577381" comment="libavahi-glib1-32bit-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577382" comment="libdns_sd-0.6.23-35.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577383" comment="libdns_sd-32bit-0.6.23-35.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40170" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-12"/>
	<updated date="2018-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577384" comment="axis-1.4-236.236.44.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40171" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134598" ref_url="https://bugzilla.suse.com/1134598" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<description>
This update for axis fixes the following issues:

Security issue fixed:

- CVE-2012-5784, CVE-2014-3596: Fixed missing connection hostname check against X.509 certificate name (bsc#1134598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577385" comment="axis-1.4-236.236.44.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40172" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

The command-line shell 'bash' evaluates environment variables, which allows 
the injection of characters and might be used to access files on the system 
in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed 
vulnerability tracked under CVE-2014-6271 and is less serious due to the 
special, non-default system configuration that is needed to create an 
exploitable situation.

To remove further exploitation potential we now limit the 
function-in-environment variable to variables prefixed with BASH_FUNC_. 
This hardening feature is work in progress and might be improved in later 
updates.

Additionally, two other security issues have been fixed:

    * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
    * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

    * CVE-2014-7169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169&gt;
    * CVE-2014-7186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186&gt;
    * CVE-2014-7187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577386" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577387" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577388" comment="bash-x86-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577389" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577390" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577391" comment="libreadline5-x86-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577392" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577386" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577387" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577388" comment="bash-x86-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577389" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577390" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577391" comment="libreadline5-x86-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577392" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577386" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577387" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577388" comment="bash-x86-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577389" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577390" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577391" comment="libreadline5-x86-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577392" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40173" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="898812" ref_url="https://bugzilla.suse.com/898812" source="BUGZILLA"/>
		<reference ref_id="898884" ref_url="https://bugzilla.suse.com/898884" source="BUGZILLA"/>
		<reference ref_id="913701" ref_url="https://bugzilla.suse.com/913701" source="BUGZILLA"/>
		<reference ref_id="959755" ref_url="https://bugzilla.suse.com/959755" source="BUGZILLA"/>
		<reference ref_id="971410" ref_url="https://bugzilla.suse.com/971410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<description>
This update for bash fixes the following issues:

- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially crafted SHELLOPTS+PS4 variables (bsc#1001299)
- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when $HOSTNAME was expanded in the prompt (bsc#1000396)
- CVE-2014-6278: code execution vulnerability via fd redirection (bsc#898884)
- CVE-2014-6277: Remote attackers could have executed arbitrary code or caused a denial of service due to improper parsing of function definitions in the values of environment variables (bsc#898812)

The following bugs were fixed:

- bsc#971410: bash script would teminated unexpectedly due to mishandled recursive traps
- bsc#913701: bash hangs if DEBUG trap is enabled

The following documentation updates are included:

- bsc#959755: Make clear that the files /etc/profile as well as /etc/bash.bashrc may source other files as well even if the bash does not.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-28"/>
	<updated date="2016-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913701">SUSE bug 913701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959755">SUSE bug 959755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971410">SUSE bug 971410</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577393" comment="bash-3.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577394" comment="bash-doc-3.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577395" comment="libreadline5-5.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577396" comment="libreadline5-32bit-5.2-147.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577397" comment="readline-doc-5.2-147.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40174" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1031729" ref_url="https://bugzilla.suse.com/1031729" source="BUGZILLA"/>
		<reference ref_id="976776" ref_url="https://bugzilla.suse.com/976776" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>

This update for bash fixed several issues

This security issue was fixed:

- CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845).

This non-security issue was fixed:

- Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031729">SUSE bug 1031729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976776">SUSE bug 976776</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577398" comment="bash-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577399" comment="bash-doc-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577400" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577401" comment="libreadline5-32bit-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577402" comment="readline-doc-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40175" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575913" comment="bind-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575914" comment="bind-chrootenv-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575916" comment="bind-doc-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575917" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575918" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575919" comment="bind-libs-x86-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575920" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40176" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40177" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40178" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40179" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40180" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575949" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575950" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575952" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575953" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575954" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575955" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575949" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575950" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575952" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575953" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575954" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575955" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40181" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575956" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575957" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575959" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575960" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575961" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575962" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575956" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575957" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575959" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575960" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575961" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575962" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40182" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575963" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575964" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575966" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575967" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575968" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575969" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575963" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575964" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575966" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575967" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575968" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575969" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40183" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575970" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575971" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575973" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575974" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575975" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575976" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575970" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575971" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575973" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575974" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575975" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575976" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40184" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577431" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577432" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577433" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577434" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577435" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577436" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577431" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577432" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577433" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577434" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577435" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577436" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40185" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service
(daemon crash) via a long request that uses the lightweight resolver protocol.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577437" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577438" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577439" comment="bind-devel-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577440" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577441" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577442" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577443" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577437" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577438" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577439" comment="bind-devel-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577440" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577441" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577442" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577443" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40186" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034162" ref_url="https://bugzilla.suse.com/1034162" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00018.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577444" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577445" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577446" comment="bind-devel-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577447" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577448" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577449" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577450" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577444" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577445" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577446" comment="bind-devel-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577447" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577448" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577449" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577450" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40187" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577451" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577452" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577453" comment="bind-devel-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577454" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577455" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577456" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577457" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577451" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577452" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577453" comment="bind-devel-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577454" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577455" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577456" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577457" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40188" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00006.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577458" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577459" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577460" comment="bind-devel-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577461" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577462" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577463" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577464" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577458" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577459" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577460" comment="bind-devel-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577461" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577462" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577463" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577464" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40189" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577465" comment="bind-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577466" comment="bind-chrootenv-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577467" comment="bind-doc-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577468" comment="bind-libs-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577469" comment="bind-libs-32bit-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577470" comment="bind-utils-9.9.6P1-0.51.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40190" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033843" ref_url="https://bugzilla.suse.com/1033843" source="BUGZILLA"/>
		<reference ref_id="1092283" ref_url="https://bugzilla.suse.com/1092283" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172220" ref_url="https://bugzilla.suse.com/1172220" source="BUGZILLA"/>
		<reference ref_id="1172680" ref_url="https://bugzilla.suse.com/1172680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- Removed rndc.key generation from bind.spec file (bsc#1092283, bsc#1033843)
  bind should create the key on first boot or if it went missing.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033843">SUSE bug 1033843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092283">SUSE bug 1092283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172220">SUSE bug 1172220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172680">SUSE bug 1172680</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577471" comment="bind-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577472" comment="bind-chrootenv-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577473" comment="bind-doc-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577474" comment="bind-libs-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577475" comment="bind-libs-32bit-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577476" comment="bind-utils-9.9.6P1-0.51.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40191" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577477" comment="bind-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577478" comment="bind-chrootenv-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577479" comment="bind-doc-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577480" comment="bind-libs-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577481" comment="bind-libs-32bit-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577482" comment="bind-utils-9.9.6P1-0.51.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40192" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577483" comment="bind-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577484" comment="bind-chrootenv-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577485" comment="bind-doc-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577486" comment="bind-libs-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577487" comment="bind-libs-32bit-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577488" comment="bind-utils-9.9.6P1-0.51.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40193" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654155" comment="bind-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654156" comment="bind-chrootenv-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654157" comment="bind-doc-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654158" comment="bind-libs-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654159" comment="bind-libs-32bit-9.9.6P1-0.51.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654160" comment="bind-utils-9.9.6P1-0.51.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40194" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-03"/>
	<updated date="2022-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683753" comment="bind-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683754" comment="bind-chrootenv-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683755" comment="bind-doc-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683756" comment="bind-libs-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683757" comment="bind-libs-32bit-9.9.6P1-0.51.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683758" comment="bind-utils-9.9.6P1-0.51.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40195" version="1" class="patch">
	<metadata>
		<title>Security update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="902676" ref_url="https://bugzilla.suse.com/902676" source="BUGZILLA"/>
		<reference ref_id="902677" ref_url="https://bugzilla.suse.com/902677" source="BUGZILLA"/>
		<reference ref_id="903655" ref_url="https://bugzilla.suse.com/903655" source="BUGZILLA"/>
		<reference ref_id="905735" ref_url="https://bugzilla.suse.com/905735" source="BUGZILLA"/>
		<reference ref_id="905736" ref_url="https://bugzilla.suse.com/905736" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to fix eight security issues:

    * Lack of range checking leading to controlled write in
      _bfd_elf_setup_sections() (CVE-2014-8485).
    * Invalid read flaw in libbfd (CVE-2014-8484).
    * Write to uninitialized memory in the PE parser (CVE-2014-8501).
    * Crash in the PE parser (CVE-2014-8502).
    * Segfault in the ihex parser when it encounters a malformed ihex file
      (CVE-2014-8503).
    * Stack buffer overflow in srec_scan (CVE-2014-8504).
    * Out-of-bounds memory write while processing a crafted 'ar' archive
      (CVE-2014-8738).
    * Directory traversal vulnerability allowing random file
      deletion/creation (CVE-2014-8737).

Security Issues:

    * CVE-2014-8501
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501&gt;
    * CVE-2014-8502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502&gt;
    * CVE-2014-8503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503&gt;
    * CVE-2014-8504
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504&gt;
    * CVE-2014-8485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485&gt;
    * CVE-2014-8738
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738&gt;
    * CVE-2014-8484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484&gt;
    * CVE-2014-8737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577489" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577489" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577489" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40196" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057342" ref_url="https://bugzilla.suse.com/1057342" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

Security issue fixed:

- CVE-2017-1000250: Fixed Out-of-bounds heap read in service_search_attr_req check if there is enough data to continue otherwise return an error (bsc#1057342).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577490" comment="bluez-4.99-0.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577491" comment="libbluetooth3-4.99-0.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40197" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575977" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575977" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40198" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1059139" ref_url="https://bugzilla.suse.com/1059139" source="BUGZILLA"/>
		<reference ref_id="985601" ref_url="https://bugzilla.suse.com/985601" source="BUGZILLA"/>
		<reference ref_id="985706" ref_url="https://bugzilla.suse.com/985706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<description>
This update for bsdtar fixes the following issues:

- CVE-2015-8915: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985601).
- CVE-2015-8925: Fixed an invalid read which could have allowed 
  remote attackers to cause a denial of service (bsc#985706).
- CVE-2017-14503: Fixed an out of bounds read within lha_read_data_none() 
  in archive_read_support_format_lha.c (bsc#1059139).
- CVE-2016-8687: Fixed a buffer overflow when printing a filename (bsc#1005070).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985601">SUSE bug 985601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571004" comment="libarchive2-2.5.5-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40199" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-16"/>
	<updated date="2019-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577492" comment="bzip2-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577493" comment="bzip2-doc-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577494" comment="libbz2-1-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577495" comment="libbz2-1-32bit-1.0.6-257.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577496" comment="libbz2-devel-1.0.6-257.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40200" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-02"/>
	<updated date="2019-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577497" comment="bzip2-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577498" comment="bzip2-doc-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577499" comment="libbz2-1-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577500" comment="libbz2-1-32bit-1.0.6-257.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577501" comment="libbz2-devel-1.0.6-257.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40201" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571021" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571022" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571023" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40202" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633398" comment="cairo-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633399" comment="cairo-32bit-1.8.8-2.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633400" comment="cairo-doc-1.8.8-2.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40203" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="870168" ref_url="https://bugzilla.suse.com/870168" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2830" ref_url="https://www.suse.com/security/cve/CVE-2014-2830/" source="CVE"/>
		<description>

This update for cifs-utils fixes the following issues:

Security issue fixed:
- CVE-2014-2830: Fixed pam module pam_cifscreds stack overflow (bsc#870168).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/870168">SUSE bug 870168</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2830/">CVE-2014-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577502" comment="cifs-utils-5.1-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40204" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681249" comment="cifs-utils-5.1-0.14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40205" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577503" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577503" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40206" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577504" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577504" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40207" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577505" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577505" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40208" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577506" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577506" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40209" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577507" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577507" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40210" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571030" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40211" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571031" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40212" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571032" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40213" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571033" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40214" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571034" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40215" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657135" comment="clamav-0.103.4-0.20.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657136" comment="clamav-openssl1-0.103.4-0.20.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40216" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664013" comment="clamav-0.103.5-0.20.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664014" comment="clamav-openssl1-0.103.5-0.20.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40217" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199242" ref_url="https://bugzilla.suse.com/1199242" source="BUGZILLA"/>
		<reference ref_id="1199244" ref_url="https://bugzilla.suse.com/1199244" source="BUGZILLA"/>
		<reference ref_id="1199245" ref_url="https://bugzilla.suse.com/1199245" source="BUGZILLA"/>
		<reference ref_id="1199246" ref_url="https://bugzilla.suse.com/1199246" source="BUGZILLA"/>
		<reference ref_id="1199274" ref_url="https://bugzilla.suse.com/1199274" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20770" ref_url="https://www.suse.com/security/cve/CVE-2022-20770/" source="CVE"/>
		<reference ref_id="CVE-2022-20771" ref_url="https://www.suse.com/security/cve/CVE-2022-20771/" source="CVE"/>
		<reference ref_id="CVE-2022-20785" ref_url="https://www.suse.com/security/cve/CVE-2022-20785/" source="CVE"/>
		<reference ref_id="CVE-2022-20792" ref_url="https://www.suse.com/security/cve/CVE-2022-20792/" source="CVE"/>
		<reference ref_id="CVE-2022-20796" ref_url="https://www.suse.com/security/cve/CVE-2022-20796/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM file parser (bsc#1199242).
- CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the scan verdict cache check (bsc#1199246).
- CVE-2022-20771: Fixed a possible infinite loop vulnerability in the TIFF file parser (bsc#1199244).
- CVE-2022-20785: Fixed a possible memory leak in the HTML file parser / Javascript normalizer (bsc#1199245).
- CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write vulnerability in the signature database load module (bsc#1199274).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199242">SUSE bug 1199242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199244">SUSE bug 1199244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199245">SUSE bug 1199245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199246">SUSE bug 1199246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199274">SUSE bug 1199274</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20770/">CVE-2022-20770</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20771/">CVE-2022-20771</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20785/">CVE-2022-20785</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20792/">CVE-2022-20792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20796/">CVE-2022-20796</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682693" comment="clamav-0.103.6-0.20.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682694" comment="clamav-openssl1-0.103.6-0.20.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40218" version="1" class="patch">
	<metadata>
		<title>Recommended udpate for SUSE Manager Client Tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="970550" ref_url="https://bugzilla.suse.com/970550" source="BUGZILLA"/>
		<reference ref_id="970989" ref_url="https://bugzilla.suse.com/970989" source="BUGZILLA"/>
		<description>

This update for SUSE Manager Client Tools provides the following fixes and enhancements:

rhnlib:

- Use TLSv1_METHOD in SSL Context (bsc#970989)

suseRegisterInfo:

- Fix file permissions (bsc#970550)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-19"/>
	<updated date="2016-05-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/970550">SUSE bug 970550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970989">SUSE bug 970989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577508" comment="rhnlib-2.5.69.8-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577509" comment="suseRegisterInfo-2.1.12-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40219" version="1" class="patch">
	<metadata>
		<title>Security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099358" ref_url="https://bugzilla.suse.com/1099358" source="BUGZILLA"/>
		<reference ref_id="1125950" ref_url="https://bugzilla.suse.com/1125950" source="BUGZILLA"/>
		<reference ref_id="1125992" ref_url="https://bugzilla.suse.com/1125992" source="BUGZILLA"/>
		<reference ref_id="1126101" ref_url="https://bugzilla.suse.com/1126101" source="BUGZILLA"/>
		<reference ref_id="1129124" ref_url="https://bugzilla.suse.com/1129124" source="BUGZILLA"/>
		<reference ref_id="1132692" ref_url="https://bugzilla.suse.com/1132692" source="BUGZILLA"/>
		<reference ref_id="1136440" ref_url="https://bugzilla.suse.com/1136440" source="BUGZILLA"/>
		<reference ref_id="1141969" ref_url="https://bugzilla.suse.com/1141969" source="BUGZILLA"/>
		<reference ref_id="1142988" ref_url="https://bugzilla.suse.com/1142988" source="BUGZILLA"/>
		<reference ref_id="1144363" ref_url="https://bugzilla.suse.com/1144363" source="BUGZILLA"/>
		<reference ref_id="1144881" ref_url="https://bugzilla.suse.com/1144881" source="BUGZILLA"/>
		<reference ref_id="1151488" ref_url="https://bugzilla.suse.com/1151488" source="BUGZILLA"/>
		<reference ref_id="1154092" ref_url="https://bugzilla.suse.com/1154092" source="BUGZILLA"/>
		<reference ref_id="1155376" ref_url="https://bugzilla.suse.com/1155376" source="BUGZILLA"/>
		<reference ref_id="1156139" ref_url="https://bugzilla.suse.com/1156139" source="BUGZILLA"/>
		<reference ref_id="1157894" ref_url="https://bugzilla.suse.com/1157894" source="BUGZILLA"/>
		<reference ref_id="1161132" ref_url="https://bugzilla.suse.com/1161132" source="BUGZILLA"/>
		<reference ref_id="1161133" ref_url="https://bugzilla.suse.com/1161133" source="BUGZILLA"/>
		<reference ref_id="1162936" ref_url="https://bugzilla.suse.com/1162936" source="BUGZILLA"/>
		<reference ref_id="1162937" ref_url="https://bugzilla.suse.com/1162937" source="BUGZILLA"/>
		<reference ref_id="1163178" ref_url="https://bugzilla.suse.com/1163178" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816/" source="CVE"/>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<description>
This update for cloud-init fixes the following issues:

cloud-init was updated to version 19.4.


Security issues fixed:

- CVE-2020-8631: Replaced the theoretically predictable deterministic RNG with the system RNG (bsc#1162937).
- CVE-2020-8632: Increased the default random password length from 9 to 20 (bsc#1162936).


Non-security issues fixed:

- Entries in the routes definition have changed causing a traceback during rout config file writing. This patch update addresses the issue by extracting the new entries properly (bsc#1163178).
- Do not attempt to configure an ephemeral network on OCI. We boot off iSCSI and the network is up. Just read the data (bsc#1161132, bsc#1161133).
- Support a mix of DHCP and static on a single interface (bsc#1157894).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-19"/>
	<updated date="2020-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099358">SUSE bug 1099358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125950">SUSE bug 1125950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125992">SUSE bug 1125992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126101">SUSE bug 1126101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129124">SUSE bug 1129124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132692">SUSE bug 1132692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136440">SUSE bug 1136440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141969">SUSE bug 1141969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142988">SUSE bug 1142988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144363">SUSE bug 1144363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144881">SUSE bug 1144881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151488">SUSE bug 1151488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154092">SUSE bug 1154092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155376">SUSE bug 1155376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156139">SUSE bug 1156139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157894">SUSE bug 1157894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161132">SUSE bug 1161132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161133">SUSE bug 1161133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162936">SUSE bug 1162936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162937">SUSE bug 1162937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163178">SUSE bug 1163178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577510" comment="cloud-init-19.4-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577511" comment="cloud-init-config-suse-19.4-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577512" comment="cloud-init-doc-19.4-3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40220" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
This update for coreutils fixes one issue.

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send
  SIGKILL to selected other processes with root privileges (bsc#1023041)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577513" comment="coreutils-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577514" comment="coreutils-lang-8.12-6.25.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40221" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="928749" ref_url="https://bugzilla.suse.com/928749" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
This update for coreutils fixes the following issues:

Security issues fixed:

- CVE-2015-4041, CVE-2015-4042: Fixed a buffer overflow related to case conversion (bsc#928749).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577515" comment="coreutils-8.12-6.25.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577516" comment="coreutils-lang-8.12-6.25.33.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40222" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="907456" ref_url="https://bugzilla.suse.com/907456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>

This cpio update fixes the following security issue:

    * bnc#907456: heap-based buffer overflow flaw in list_file()
      (CVE-2014-9112)

Security Issues:

    * CVE-2014-9112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577517" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577518" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577517" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577518" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577517" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577518" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40223" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155199" ref_url="https://bugzilla.suse.com/1155199" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2019-14866: Fixed an improper validation of the values written 
  in the header of a TAR file through the to_oct() function which could 
  have led to unexpected TAR generation (bsc#1155199).	  
- CVE-2016-2037: Fixed an out-of-bounds write in the way cpio parses 
  certain cpio files (bsc#963448).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571037" comment="cpio-2.9-75.81.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571038" comment="cpio-lang-2.9-75.81.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40224" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630756" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630757" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40225" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631548" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631549" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40226" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571039" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571040" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40227" version="1" class="patch">
	<metadata>
		<title>Security update for cron (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046229" ref_url="https://bugzilla.suse.com/1046229" source="BUGZILLA"/>
		<reference ref_id="1128935" ref_url="https://bugzilla.suse.com/1128935" source="BUGZILLA"/>
		<reference ref_id="1128937" ref_url="https://bugzilla.suse.com/1128937" source="BUGZILLA"/>
		<reference ref_id="932499" ref_url="https://bugzilla.suse.com/932499" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
This update for cron fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9704: Fixed an insufficient check in the return value of calloc which
  could allow a local user to create Denial of Service by crashing the deamon (bsc#1128937).
- CVE-2019-9705: Fixed an implementation vulnerability which could allow a local user to
  exhaust the memory resulting in Denial of Service (bsc#1128935).

Other issues addressed: 

- Fixed an issue with SElinux where cron jobs were bocked when [permisive mode is selected (bsc#1046229).
- Removed a duplicate sprintf and made some monepage changes (bsc#932499). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1046229">SUSE bug 1046229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128935">SUSE bug 1128935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128937">SUSE bug 1128937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932499">SUSE bug 932499</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571041" comment="cron-4.1-194.211.213.3.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40228" version="1" class="patch">
	<metadata>
		<title>Security update for ctags (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="899486" ref_url="https://bugzilla.suse.com/899486" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
This update for ctags fixes the following issues:

- CVE-2014-7204: Fixes a potential denial of service caused by an endless loop in javascript parser (bsc#899486).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571042" comment="ctags-2013.10.2-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40229" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="887240" ref_url="https://bugzilla.suse.com/887240" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00002.html" source="SUSE-SU"/>
		<description>

This update fixes various issues in CUPS.

    * CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031: Various
      insufficient symbolic link checking could have lead to privilege
      escalation from the lp user to root.

Security Issues:

    * CVE-2014-3537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537&gt;
    * CVE-2014-5029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029&gt;
    * CVE-2014-5030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030&gt;
    * CVE-2014-5031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577519" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577520" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577521" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577522" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577523" comment="cups-libs-x86-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577519" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577520" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577521" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577522" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577523" comment="cups-libs-x86-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577519" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577520" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577521" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577522" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577523" comment="cups-libs-x86-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40230" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571048" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571049" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571050" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571051" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40231" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571052" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571053" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571054" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571055" comment="cups-libs-32bit-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40232" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571056" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571057" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571058" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571059" comment="cups-libs-32bit-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40233" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571060" comment="cups-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571061" comment="cups-client-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571062" comment="cups-libs-1.3.9-8.46.56.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571063" comment="cups-libs-32bit-1.3.9-8.46.56.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40234" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571064" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571065" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571066" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571067" comment="cups-libs-32bit-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40235" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<description>

This curl update fixes the following security issues:

    * bnc#868627: wrong re-use of connections (CVE-2014-0138).
    * bnc#868629: IP address wildcard certificate validation
      (CVE-2014-0139).
    * bnc#870444: --insecure option inappropriately enforcing security
      safeguard.

Security Issue references:

    * CVE-2014-0138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138&gt;
    * CVE-2014-0139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577524" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577525" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577526" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577527" comment="libcurl4-x86-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577524" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577525" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577526" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577527" comment="libcurl4-x86-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577524" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577525" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577526" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577527" comment="libcurl4-x86-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40236" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40237" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577532" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571075" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577533" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577534" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571078" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571079" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577532" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571075" comment="curl-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577533" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577534" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571078" comment="libcurl4-openssl1-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571079" comment="libcurl4-openssl1-32bit-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40238" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571080" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571081" comment="curl-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571082" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571083" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571084" comment="libcurl4-openssl1-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571085" comment="libcurl4-openssl1-32bit-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40239" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571086" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571087" comment="curl-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571088" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571089" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571090" comment="libcurl4-openssl1-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571091" comment="libcurl4-openssl1-32bit-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40240" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571092" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571093" comment="curl-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571094" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571095" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571096" comment="libcurl4-openssl1-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571097" comment="libcurl4-openssl1-32bit-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40241" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571098" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571099" comment="curl-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571100" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571101" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571102" comment="libcurl4-openssl1-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571103" comment="libcurl4-openssl1-32bit-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40242" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571104" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571105" comment="curl-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571106" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571107" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571108" comment="libcurl4-openssl1-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571109" comment="libcurl4-openssl1-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40243" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577535" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571111" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577536" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577537" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571114" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571115" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577535" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571111" comment="curl-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577536" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577537" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571114" comment="libcurl4-openssl1-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571115" comment="libcurl4-openssl1-32bit-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40244" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571116" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571117" comment="curl-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571118" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571119" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571120" comment="libcurl4-openssl1-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571121" comment="libcurl4-openssl1-32bit-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40245" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571122" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571123" comment="curl-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571124" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571125" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571126" comment="libcurl4-openssl1-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571127" comment="libcurl4-openssl1-32bit-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40246" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571128" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571129" comment="curl-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577538" comment="libcurl-devel-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571130" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571131" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571132" comment="libcurl4-openssl1-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571133" comment="libcurl4-openssl1-32bit-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40247" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571134" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571135" comment="curl-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577539" comment="libcurl-devel-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571136" comment="libcurl4-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571137" comment="libcurl4-32bit-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571138" comment="libcurl4-openssl1-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571139" comment="libcurl4-openssl1-32bit-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40248" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571140" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571141" comment="curl-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577540" comment="libcurl-devel-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571142" comment="libcurl4-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571143" comment="libcurl4-32bit-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571144" comment="libcurl4-openssl1-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571145" comment="libcurl4-openssl1-32bit-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40249" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571146" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571147" comment="curl-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577541" comment="libcurl-devel-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571148" comment="libcurl4-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571149" comment="libcurl4-32bit-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571150" comment="libcurl4-openssl1-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571151" comment="libcurl4-openssl1-32bit-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40250" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571152" comment="curl-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571153" comment="curl-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577542" comment="libcurl-devel-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571154" comment="libcurl4-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571155" comment="libcurl4-32bit-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571156" comment="libcurl4-openssl1-7.37.0-70.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571157" comment="libcurl4-openssl1-32bit-7.37.0-70.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40251" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8284: Fixed an issue where a malicious FTP server could make curl connect to a different IP (bsc#1179398).
- CVE-2020-8285: Fixed an FTP wildcard stack overflow (bsc#1179399).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571158" comment="curl-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571159" comment="curl-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577543" comment="libcurl-devel-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571160" comment="libcurl4-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571161" comment="libcurl4-32bit-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571162" comment="libcurl4-openssl1-7.37.0-70.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571163" comment="libcurl4-openssl1-32bit-7.37.0-70.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40252" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571164" comment="curl-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571165" comment="curl-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577544" comment="libcurl-devel-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571166" comment="libcurl4-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571167" comment="libcurl4-32bit-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571168" comment="libcurl4-openssl1-7.37.0-70.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571169" comment="libcurl4-openssl1-32bit-7.37.0-70.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40253" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571170" comment="curl-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571171" comment="curl-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577545" comment="libcurl-devel-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571172" comment="libcurl4-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571173" comment="libcurl4-32bit-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571174" comment="libcurl4-openssl1-7.37.0-70.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571175" comment="libcurl4-openssl1-32bit-7.37.0-70.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40254" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571176" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571177" comment="curl-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577546" comment="libcurl-devel-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571178" comment="libcurl4-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571179" comment="libcurl4-32bit-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571180" comment="libcurl4-openssl1-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571181" comment="libcurl4-openssl1-32bit-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40255" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626169" comment="curl-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626170" comment="curl-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626175" comment="libcurl-devel-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626171" comment="libcurl4-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626172" comment="libcurl4-32bit-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626173" comment="libcurl4-openssl1-7.37.0-70.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626174" comment="libcurl4-openssl1-32bit-7.37.0-70.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40256" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633950" comment="curl-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633951" comment="curl-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633956" comment="libcurl-devel-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633952" comment="libcurl4-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633953" comment="libcurl4-32bit-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633954" comment="libcurl4-openssl1-7.37.0-70.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633955" comment="libcurl4-openssl1-32bit-7.37.0-70.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40257" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198614" ref_url="https://bugzilla.suse.com/1198614" source="BUGZILLA"/>
		<reference ref_id="1198766" ref_url="https://bugzilla.suse.com/1198766" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27776: Fixed Auth/cookie leak on redirect (bsc#1198766)
- CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198614">SUSE bug 1198614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682695" comment="curl-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682696" comment="curl-openssl1-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682697" comment="libcurl-devel-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682698" comment="libcurl4-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682699" comment="libcurl4-32bit-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682700" comment="libcurl4-openssl1-7.37.0-70.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682701" comment="libcurl4-openssl1-32bit-7.37.0-70.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40258" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577547" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577548" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577549" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577550" comment="libcurl4-x86-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577547" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577548" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577549" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577550" comment="libcurl4-x86-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577547" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577548" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577549" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577550" comment="libcurl4-x86-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40259" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009685703" comment="curl-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685704" comment="curl-openssl1-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685705" comment="libcurl-devel-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685706" comment="libcurl4-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685707" comment="libcurl4-32bit-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685708" comment="libcurl4-openssl1-7.37.0-70.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685709" comment="libcurl4-openssl1-32bit-7.37.0-70.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40260" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571184" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571185" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40261" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571189" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571190" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571191" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40262" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1058021" ref_url="https://bugzilla.suse.com/1058021" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14230" ref_url="https://www.suse.com/security/cve/CVE-2017-14230/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

Security issue fixed:

- CVE-2017-14230: Fixed a off-by-one error in prefix calculation for the LIST command that could cause use of uninitialized memory (bsc#1058021).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1058021">SUSE bug 1058021</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14230/">CVE-2017-14230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571192" comment="cyrus-imapd-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571193" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571194" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40263" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189313" ref_url="https://bugzilla.suse.com/1189313" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33582" ref_url="https://www.suse.com/security/cve/CVE-2021-33582/" source="CVE"/>
		<description>
This update for cyrus-imapd fixes the following issues:

- CVE-2021-33582: Fixed possible hash denial of service (bsc#1189313).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189313">SUSE bug 1189313</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33582/">CVE-2021-33582</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632634" comment="cyrus-imapd-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632635" comment="perl-Cyrus-IMAP-2.3.11-60.65.71.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632636" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.71.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40264" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577551" comment="cyrus-sasl-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577552" comment="cyrus-sasl-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577553" comment="cyrus-sasl-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577554" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577555" comment="cyrus-sasl-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577556" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577557" comment="cyrus-sasl-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577558" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571195" comment="cyrus-sasl-openssl1-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571196" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571197" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571198" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571199" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571200" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571201" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571202" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571203" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571204" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571205" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571206" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571207" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577559" comment="cyrus-sasl-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577560" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577561" comment="cyrus-sasl-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577562" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577563" comment="cyrus-sasl-saslauthd-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577564" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577565" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40265" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669486" comment="cyrus-sasl-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669487" comment="cyrus-sasl-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669488" comment="cyrus-sasl-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669489" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669490" comment="cyrus-sasl-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669491" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669492" comment="cyrus-sasl-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669493" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669470" comment="cyrus-sasl-openssl1-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669471" comment="cyrus-sasl-openssl1-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669472" comment="cyrus-sasl-openssl1-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669473" comment="cyrus-sasl-openssl1-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669474" comment="cyrus-sasl-openssl1-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669475" comment="cyrus-sasl-openssl1-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669476" comment="cyrus-sasl-openssl1-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669477" comment="cyrus-sasl-openssl1-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669478" comment="cyrus-sasl-openssl1-ntlm-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669479" comment="cyrus-sasl-openssl1-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669480" comment="cyrus-sasl-openssl1-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669481" comment="cyrus-sasl-openssl1-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669482" comment="cyrus-sasl-openssl1-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669494" comment="cyrus-sasl-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669495" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669496" comment="cyrus-sasl-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669497" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669498" comment="cyrus-sasl-saslauthd-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669499" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669500" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40266" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="896453" ref_url="https://bugzilla.suse.com/896453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<description>

Various denial of service issues were fixed in the DBUS service.

    * CVE-2014-3638: dbus-daemon tracks whether method call messages expect
      a reply, so that unsolicited replies can be dropped. As currently
      implemented, if there are n parallel method calls in progress, each
      method reply takes O(n) CPU time. A malicious user could exploit this
      by opening the maximum allowed number of parallel connections and
      sending the maximum number of parallel method calls on each one,
      causing subsequent method calls to be unreasonably slow, a denial of
      service.
    * CVE-2014-3639: dbus-daemon allows a small number of 'incomplete'
      connections (64 by default) whose identity has not yet been
      confirmed. When this limit has been reached, subsequent connections
      are dropped. Alban's testing indicates that one malicious process
      that makes repeated connection attempts, but never completes the
      authentication handshake and instead waits for dbus-daemon to time
      out and disconnect it, can cause the majority of legitimate
      connection attempts to fail.

Security Issues:

    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;
    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-16"/>
	<updated date="2014-09-16"/>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577566" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577567" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577568" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577569" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577566" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577567" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577568" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577569" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577566" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577567" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577568" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577569" comment="dbus-1-x86-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40267" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571219" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571220" comment="dbus-1-32bit-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571221" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40268" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40269" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577574" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577575" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577576" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577577" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577574" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577575" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577576" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577577" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40270" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<description>
This update for dhcp fixes several issues.
 
This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119)

This non-security issue was fixed:

- Enhance dhclient-script to handle static route updates. (bsc#1023415)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577578" comment="dhcp-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577579" comment="dhcp-client-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577580" comment="dhcp-relay-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577581" comment="dhcp-server-4.2.4.P2-0.28.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40271" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577582" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577583" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577584" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577585" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577582" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577583" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577584" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577585" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40272" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577586" comment="dhcp-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577587" comment="dhcp-client-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577588" comment="dhcp-relay-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577589" comment="dhcp-server-4.2.4.P2-0.28.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40273" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40274" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1146569" ref_url="https://bugzilla.suse.com/1146569" source="BUGZILLA"/>
		<reference ref_id="1146571" ref_url="https://bugzilla.suse.com/1146571" source="BUGZILLA"/>
		<reference ref_id="1146572" ref_url="https://bugzilla.suse.com/1146572" source="BUGZILLA"/>
		<reference ref_id="1146702" ref_url="https://bugzilla.suse.com/1146702" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146569">SUSE bug 1146569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146571">SUSE bug 1146571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146572">SUSE bug 1146572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146702">SUSE bug 1146702</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571241" comment="libdjvulibre21-3.5.21-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40275" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156188" ref_url="https://bugzilla.suse.com/1156188" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:
- CVE-2019-18804: Fixed a null pointer dereference (bsc#1156188).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571242" comment="libdjvulibre21-3.5.21-3.6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40276" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571243" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40277" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571244" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40278" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624088" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40279" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627836" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40280" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577591" comment="dnsmasq-2.71-0.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40281" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]

This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577592" comment="dnsmasq-2.78-0.16.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577592" comment="dnsmasq-2.78-0.16.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40282" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577593" comment="dnsmasq-2.78-0.16.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40283" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577594" comment="dnsmasq-2.78-0.16.11.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40284" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issues fixed:

- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686: Fixed multiple Cache Poisoning attacks (bsc#1177077).
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687: Fixed multiple potential Heap-based overflows when DNSSEC is enabled (bsc#1177077).

Non-security issue fixed:

- Retry query to other servers on receipt of SERVFAIL rcode (bsc#1176076).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577595" comment="dnsmasq-2.78-0.16.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40285" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).

Non-security fixes:

- Removed cache size limit (bsc#1138743).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679569" comment="dnsmasq-2.78-0.16.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40286" version="1" class="patch">
	<metadata>
		<title>Security update for dosfstools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="980364" ref_url="https://bugzilla.suse.com/980364" source="BUGZILLA"/>
		<reference ref_id="980377" ref_url="https://bugzilla.suse.com/980377" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
dosfstools was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-8872: The set_fat function in fat.c in dosfstools might have allowed attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an 'off-by-two error (bsc#980364).
- CVE-2016-4804: The read_boot function in boot.c in dosfstools allowed attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function (bsc#980377).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577596" comment="dosfstools-2.11-121.31.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40287" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, badblocks was enhanced to work with very large partitions. 
(bsc#932539)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-26"/>
	<updated date="2015-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577597" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577598" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577599" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577600" comment="libblkid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577601" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577602" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577603" comment="libcom_err2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577604" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577605" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577606" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577607" comment="libuuid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577608" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577597" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577598" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577599" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577600" comment="libblkid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577601" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577602" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577603" comment="libcom_err2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577604" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577605" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577606" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577607" comment="libuuid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577608" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577597" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577598" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577599" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577600" comment="libblkid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577601" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577602" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577603" comment="libcom_err2-x86-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577604" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577605" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577606" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577607" comment="libuuid1-x86-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577608" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40288" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029927" ref_url="https://bugzilla.suse.com/1029927" source="BUGZILLA"/>
		<reference ref_id="1038885" ref_url="https://bugzilla.suse.com/1038885" source="BUGZILLA"/>
		<reference ref_id="1160571" ref_url="https://bugzilla.suse.com/1160571" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This update for e2fsprogs fixes the following issues:

Security issue fixed:

- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).

Non-security issue fixed:

- Fix resize2fs to not clear resize inode for 0 resvd blocks (bsc#1029927).
- Don't use the extended rec_len encoding for standard file systems (bsc#1038885).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-07"/>
	<updated date="2020-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029927">SUSE bug 1029927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038885">SUSE bug 1038885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577609" comment="e2fsprogs-1.41.9-2.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577610" comment="libcom_err2-1.41.9-2.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577611" comment="libcom_err2-32bit-1.41.9-2.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577612" comment="libext2fs2-1.41.9-2.11.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40289" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40290" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<description>

This update for ed fixes the following security issues:

- CVE-2017-5357: An invalid free in the regular expression handling
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571264" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40291" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577616" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577617" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577618" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577619" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577620" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577621" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577622" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577623" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577624" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577625" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577626" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577627" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577616" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577617" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577618" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577619" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577620" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577621" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577622" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577623" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577624" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577625" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577626" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577627" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577616" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577617" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577618" comment="libasm1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577619" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577620" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577621" comment="libdw1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577622" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577623" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577624" comment="libebl1-x86-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577625" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577626" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577627" comment="libelf1-x86-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40292" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1030472" ref_url="https://bugzilla.suse.com/1030472" source="BUGZILLA"/>
		<reference ref_id="1030476" ref_url="https://bugzilla.suse.com/1030476" source="BUGZILLA"/>
		<reference ref_id="1033084" ref_url="https://bugzilla.suse.com/1033084" source="BUGZILLA"/>
		<reference ref_id="1033085" ref_url="https://bugzilla.suse.com/1033085" source="BUGZILLA"/>
		<reference ref_id="1033087" ref_url="https://bugzilla.suse.com/1033087" source="BUGZILLA"/>
		<reference ref_id="1033088" ref_url="https://bugzilla.suse.com/1033088" source="BUGZILLA"/>
		<reference ref_id="1033089" ref_url="https://bugzilla.suse.com/1033089" source="BUGZILLA"/>
		<reference ref_id="1033090" ref_url="https://bugzilla.suse.com/1033090" source="BUGZILLA"/>
		<reference ref_id="1106390" ref_url="https://bugzilla.suse.com/1106390" source="BUGZILLA"/>
		<reference ref_id="1107067" ref_url="https://bugzilla.suse.com/1107067" source="BUGZILLA"/>
		<reference ref_id="1111973" ref_url="https://bugzilla.suse.com/1111973" source="BUGZILLA"/>
		<reference ref_id="1112723" ref_url="https://bugzilla.suse.com/1112723" source="BUGZILLA"/>
		<reference ref_id="1112726" ref_url="https://bugzilla.suse.com/1112726" source="BUGZILLA"/>
		<reference ref_id="1123685" ref_url="https://bugzilla.suse.com/1123685" source="BUGZILLA"/>
		<reference ref_id="1125007" ref_url="https://bugzilla.suse.com/1125007" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254/" source="CVE"/>
		<reference ref_id="CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This update for elfutils fixes the following issues:

Security issues fixed: 
 
- CVE-2018-16403: Fixed a heap-based buffer over-read in in libdw/dwarf_getabbrev.c 
  and libwd/dwarf_hasattr.c which could have lead to denial of service (bsc#1107067).
- CVE-2016-10254: Fixed a memory allocation failure in alloxate_elf (bsc#1030472).
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007).
- CVE-2016-10255: Fixed a memory allocation failure in libelf_set_rawdata_wrlock (bsc#1030476).
- CVE-2019-7150: Added a missing check in dwfl_segment_report_module which could have allowed truncated files 
  to be read (bsc#1123685).
- CVE-2018-16062: Fixed a heap-buffer-overflow (bsc#1106390).
- CVE-2017-7611: Fixed a heap-based buffer over-read that could have led to Denial of Service (bsc#1033088).
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections 
  and the number of segments in a crafted ELF file (bsc#1033090).
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084).
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085).
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087).
- CVE-2018-18521: Fixed multiple divide-by-zero vulnerabilities in function arlib_add_symbols() (bsc#1112723).
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089).
- CVE-2018-18310: Fixed an invalid address read in dwfl_segment_report_module.c (bsc#1111973).
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726).    
- CVE-2017-7613: Missing validation of the number of sections and the number of
  segments allowed remote attackers to cause a denial of service (memory
  consumption) via a crafted ELF file (bsc#1033090).
- CVE-2017-7612: The check_sysv_hash function allowed remote attackers to cause
  a denial of service (heap-based buffer over-read and application crash) via a
  crafted ELF file (bsc#1033089).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577628" comment="elfutils-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577629" comment="libasm1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577630" comment="libasm1-32bit-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577631" comment="libdw1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577632" comment="libdw1-32bit-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577633" comment="libebl1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577634" comment="libebl1-32bit-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577635" comment="libelf1-0.152-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577636" comment="libelf1-32bit-0.152-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40293" version="1" class="patch">
	<metadata>
		<title>Security update for emacs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="854683" ref_url="https://bugzilla.suse.com/854683" source="BUGZILLA"/>
		<reference ref_id="876847" ref_url="https://bugzilla.suse.com/876847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<description>

Emacs has been updated to fix the following issues:

    * Several cases of insecure usage of temporary files. (CVE-2014-3421,
      CVE-2014-3422, CVE-2014-3423, CVE-2014-3424)
    * Use of vc-annotate for renamed files when using Git. (bnc#854683)

Security Issues:

    * CVE-2014-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421&gt;
    * CVE-2014-3422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422&gt;
    * CVE-2014-3423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423&gt;
    * CVE-2014-3424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<bugzilla href="https://bugzilla.suse.com/854683">SUSE bug 854683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577637" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577638" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577639" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577640" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577641" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577637" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577638" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577639" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577640" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577641" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577637" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577638" comment="emacs-el-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577639" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577640" comment="emacs-nox-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577641" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40294" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00075.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577642" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577643" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577644" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577645" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577646" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577642" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577643" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577644" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577645" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577646" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40295" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571282" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571283" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571284" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40296" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571285" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571286" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571287" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40297" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="901553" ref_url="https://bugzilla.suse.com/901553" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

evolution-data-server has been updated to disable support for SSLv3.

This security issues has been fixed:

    * SSLv3 POODLE attack (CVE-2014-3566)

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/901553">SUSE bug 901553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577647" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577648" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577649" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577650" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577647" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577648" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577649" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577650" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577647" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577648" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577649" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577650" comment="evolution-data-server-x86-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40298" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="830491" ref_url="https://bugzilla.suse.com/830491" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4166" ref_url="https://www.suse.com/security/cve/CVE-2013-4166/" source="CVE"/>
		<description>

This update for evolution-data-server fixes the following issue:

- CVE-2013-4166: Enclose email addresses in brackets to ensure an exact match (bsc#830491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/830491">SUSE bug 830491</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4166/">CVE-2013-4166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577651" comment="evolution-data-server-2.28.2-0.32.3.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577652" comment="evolution-data-server-32bit-2.28.2-0.32.3.109 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577653" comment="evolution-data-server-lang-2.28.2-0.32.3.109 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40299" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571288" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40300" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571293" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571294" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571295" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40301" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571296" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571297" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571298" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40302" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571299" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571300" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571301" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40303" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139937" ref_url="https://bugzilla.suse.com/1139937" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2018-20843: Fixed a denial of service triggered by high resource consumption 
  in the XML parser when XML names contain a large amount of colons (bsc#1139937).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571302" comment="expat-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571303" comment="libexpat1-2.0.1-88.42.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571304" comment="libexpat1-32bit-2.0.1-88.42.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40304" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

Security issue fixed:

- CVE-2019-15903: Fixed a heap-based buffer over-read caused by crafted XML documents. (bsc#1149429)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571305" comment="expat-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571306" comment="libexpat1-2.0.1-88.42.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571307" comment="libexpat1-32bit-2.0.1-88.42.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40305" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664120" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664121" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664122" comment="libexpat1-32bit-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40306" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666458" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666459" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666460" comment="libexpat1-32bit-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40307" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669483" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669484" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669485" comment="libexpat1-32bit-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40308" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671290" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671291" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671292" comment="libexpat1-32bit-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40309" version="1" class="patch">
	<metadata>
		<title>Security update for facter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="917383" ref_url="https://bugzilla.suse.com/917383" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1426" ref_url="https://www.suse.com/security/cve/CVE-2015-1426/" source="CVE"/>
		<description>
This update for facter fixes the following issues:

- CVE-2015-1426: Prevent the EC2 metadata fact from collecting security credentials (bsc#917383).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917383">SUSE bug 917383</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1426/">CVE-2015-1426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571308" comment="facter-1.6.18-0.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40310" version="1" class="patch">
	<metadata>
		<title>Security update for fastjar</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="607043" ref_url="https://bugzilla.suse.com/607043" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-0831" ref_url="https://www.suse.com/security/cve/CVE-2010-0831/" source="CVE"/>
		<description>

This fastjar update fixes a directory traversal issue (bnc#607043).

Security Issue reference:

    * CVE-2010-0831
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0831&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0831/">CVE-2010-0831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576037" comment="fastjar-0.95-1.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40311" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571310" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571311" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40312" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627042" comment="fetchmail-6.3.8.90-13.20.22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627043" comment="fetchmailconf-6.3.8.90-13.20.22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40313" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>

file was updated to fix one security issue.

    * An out-of-bounds read flaw file's donote() function. This could
      possibly lead to file executable crash (CVE-2014-3710).

Security Issues:

    * CVE-2014-3710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577654" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577655" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577656" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577654" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577655" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577656" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577654" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577655" comment="file-32bit-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577656" comment="file-x86-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40314" version="1" class="patch">
	<metadata>
		<title>Security update for file-roller (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="937635" ref_url="https://bugzilla.suse.com/937635" source="BUGZILLA"/>
		<description>
This update for file-roller fixes the following issues:

- Fixed a potential denial of service when extracting a zip files (bsc#937635).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937635">SUSE bug 937635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577657" comment="file-roller-2.28.2-0.10.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577658" comment="file-roller-lang-2.28.2-0.10.3.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40315" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

    * 

      MFSA 2013-41: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      References

          o Christoph Diehl, Christian Holler, Jesse Ruderman, Timothy
            Nikkel, and Jeff Walden reported memory safety problems and
            crashes that affect Firefox ESR 17, and Firefox 20.
          o Bob Clary, Ben Turner, Benoit Jacob, Bobby Holley, Christoph
            Diehl, Christian Holler, Andrew McCreight, Gary Kwong, Jason
            Orendorff, Jesse Ruderman, Matt Wobensmith, and Mats Palmgren
            reported memory safety problems and crashes that affect Firefox
            20.
    * 

      MFSA 2013-42 / CVE-2013-1670: Security researcher Cody Crews reported
      a method to call a content level constructor that allows for this
      constructor to have chrome privileged accesss. This affects chrome
      object wrappers (COW) and allows for write actions on objects when
      only read actions should be allowed. This can lead to cross-site
      scripting (XSS) attacks.

    * 

      MFSA 2013-43 / CVE-2013-1671: Mozilla security researcher
      moz_bug_r_a4 reported a mechanism to exploit the control when set to
      the file type in order to get the full path. This can lead to
      information leakage and could be combined with other exploits to
      target attacks on the local file system.

    * 

      MFSA 2013-44 / CVE-2013-1672: Security researcher Seb Patane reported
      an issue with the Mozilla Maintenance Service on Windows. This issue
      allows unprivileged users to local privilege escalation through the
      system privileges used by the service when interacting with local
      malicious software. This allows the user to bypass integrity checks
      leading to local privilege escalation. Local file system access is
      necessary in order for this issue to be exploitable and it cannot be
      triggered through web content.

    * 

      MFSA 2013-45: Security researcher Robert Kugler discovered that in
      some instances the Mozilla Maintenance Service on Windows will be
      vulnerable to some previously fixed privilege escalation attacks that
      allowed for local privilege escalation. This was caused by the
      Mozilla Updater not updating Windows Registry entries for the Mozilla
      Maintenance Service, which fixed the earlier issues present if
      Firefox 12 had been installed. New installations of Firefox after
      version 12 are not affected by this issue. Local file system access
      is necessary in order for this issue to be exploitable and it cannot
      be triggered through web content. References: - old
      MozillaMaintenance Service registry entry not updated leading to
      Trusted Path Privilege Escalation (CVE-2013-1673) - Possible
      Arbitrary Code Execution by Update Service (CVE-2012-1942)

    * 

      MFSA 2013-46 / CVE-2013-1674: Security researcher Nils reported a
      use-after-free when resizing video while playing. This could allow
      for arbitrary code execution.

    * 

      MFSA 2013-47 / CVE-2013-1675: Mozilla community member Ms2ger
      discovered that some DOMSVGZoomEvent functions are used without being
      properly initialized, causing uninitialized memory to be used when
      they are called by web content. This could lead to a information
      leakage to sites depending on the contents of this uninitialized
      memory.

    * 

      MFSA 2013-48: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and invalid
      write problems rated as moderate to critical as security issues in
      shipped software. Some of these issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting additional use-after-free flaws in dir=auto
      code introduced during Firefox development. These were fixed before
      general release.

      References

          o Out of Bounds Read in SelectionIterator::GetNextSegment
            (CVE-2013-1676)
          o Out-of-bound read in gfxSkipCharsIterator::SetOffsets
            (CVE-2013-1677))
          o Invalid write in _cairo_xlib_surface_add_glyph (CVE-2013-1678)
          o Heap-use-after-free in mozilla::plugins::child::_geturlnotify
            (CVE-2013-1679)
          o Heap-use-after-free in nsFrameList::FirstChild (CVE-2013-1680)
          o Heap-use-after-free in nsContentUtils::RemoveScriptBlocker
            (CVE-2013-1681)
    * 

      CVE-2012-1942
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942&gt;

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;
    * CVE-2013-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801&gt;
    * CVE-2013-1669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669&gt;
    * CVE-2013-1670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670&gt;
    * CVE-2013-1671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671&gt;
    * CVE-2013-1672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672&gt;
    * CVE-2013-1673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673&gt;
    * CVE-2013-1674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674&gt;
    * CVE-2013-1675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675&gt;
    * CVE-2013-1676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676&gt;
    * CVE-2013-1677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677&gt;
    * CVE-2013-1678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678&gt;
    * CVE-2013-1679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679&gt;
    * CVE-2013-1680
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680&gt;
    * CVE-2013-1681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681&gt;
    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-02"/>
	<updated date="2013-07-02"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577659" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577660" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577661" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577659" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577660" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577661" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577659" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577660" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577661" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40316" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577662" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577663" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577664" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577662" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577663" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577664" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577662" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577663" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577664" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40317" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

This updates the Mozilla Firefox browser to the 24.3.0ESR security release. 
The Mozilla NSS libraries are now on version 3.15.4.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-07"/>
	<updated date="2014-02-07"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577665" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577666" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577667" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577668" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577669" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577670" comment="libfreebl3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577671" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577672" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577673" comment="libsoftokn3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577674" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577675" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577676" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577677" comment="mozilla-nss-x86-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577665" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577666" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577667" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577668" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577669" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577670" comment="libfreebl3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577671" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577672" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577673" comment="libsoftokn3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577674" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577675" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577676" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577677" comment="mozilla-nss-x86-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577665" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577666" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577667" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577668" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577669" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577670" comment="libfreebl3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577671" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577672" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577673" comment="libsoftokn3-x86-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577674" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577675" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577676" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577677" comment="mozilla-nss-x86-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40318" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577678" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577679" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577680" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577678" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577679" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577680" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577678" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577679" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577680" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577216" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577217" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577218" comment="mozilla-nspr-x86-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40319" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577681" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577682" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577683" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577684" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577685" comment="libfreebl3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577686" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577687" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577688" comment="libsoftokn3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577689" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577690" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577691" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577692" comment="mozilla-nss-x86-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577681" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577682" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577683" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577684" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577685" comment="libfreebl3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577686" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577687" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577688" comment="libsoftokn3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577689" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577690" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577691" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577692" comment="mozilla-nss-x86-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577681" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577682" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577683" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577684" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577685" comment="libfreebl3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577686" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577687" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577688" comment="libsoftokn3-x86-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577689" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577690" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577691" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577692" comment="mozilla-nss-x86-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40320" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577693" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577694" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577695" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577696" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577697" comment="libfreebl3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577698" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577699" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577700" comment="libsoftokn3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577701" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577702" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577703" comment="mozilla-nspr-x86-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577704" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577705" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577706" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577707" comment="mozilla-nss-x86-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577693" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577694" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577695" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577696" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577697" comment="libfreebl3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577698" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577699" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577700" comment="libsoftokn3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577701" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577702" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577703" comment="mozilla-nspr-x86-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577704" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577705" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577706" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577707" comment="mozilla-nss-x86-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577693" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577694" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577695" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577696" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577697" comment="libfreebl3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577698" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577699" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577700" comment="libsoftokn3-x86-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577701" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577702" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577703" comment="mozilla-nspr-x86-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577704" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577705" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577706" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577707" comment="mozilla-nss-x86-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40321" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577708" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577709" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577708" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577709" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577708" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577709" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40322" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-27"/>
	<updated date="2015-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577710" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577711" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577712" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577713" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577714" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577715" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577716" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577717" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577718" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577719" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577720" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577721" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577710" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577711" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577712" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577713" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577714" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577715" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577716" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577717" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577718" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577719" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577720" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577721" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577710" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577711" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577712" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577713" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577714" comment="libfreebl3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577715" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577716" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577717" comment="libsoftokn3-x86-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577718" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577719" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577720" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577721" comment="mozilla-nss-x86-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40323" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577722" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577723" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577722" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577723" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577722" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577723" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40324" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577724" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577725" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577724" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577725" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577724" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577725" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40325" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40326" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40327" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577733" comment="MozillaFirefox-branding-SLES-for-VMware-38-10.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577733" comment="MozillaFirefox-branding-SLES-for-VMware-38-10.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577733" comment="MozillaFirefox-branding-SLES-for-VMware-38-10.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40328" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-13"/>
	<updated date="2017-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577748" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577749" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577750" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577751" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577752" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577753" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577754" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577755" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577756" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577748" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577749" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577750" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577751" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577752" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577753" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577754" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577755" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577756" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40329" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-glib2, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145550" ref_url="https://bugzilla.suse.com/1145550" source="BUGZILLA"/>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox, firefox-glib2, firefox-gtk3 fixes the following issues:

Mozilla Firefox was updated to the 60.9.0esr release:

Security Advisory MFSA 2019-27:

* Use-after-free while manipulating video
  CVE-2019-11746 (bmo#1564449, bsc#1149297)
* XSS by breaking out of title and textarea elements using innerHTML
  CVE-2019-11744 (bmo#1562033, bsc#1149297)
* Same-origin policy violation with SVG filters and canvas to steal
  cross-origin images
  CVE-2019-11742 (bmo#1559715, bsc#1149303)
* Privilege escalation with Mozilla Maintenance Service in custom
  Firefox installation location
  CVE-2019-11753 (bmo#1574980, bsc#1149295)
* Use-after-free while extracting a key value in IndexedDB
  CVE-2019-11752 (bmo#1501152, bsc#1149296)
* Sandbox escape through Firefox Sync
  CVE-2019-9812 (bmo#1538008, bmo#1538015, bsc#1149294)
* Cross-origin access to unload event attributes
  CVE-2019-11743 (bmo#1560495, bsc#1149298)
  Navigation-Timing Level 2 specification
* Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
  CVE-2019-11740 (bmo#1563133, bmo#1573160, bsc#1149299)

- Rebuild glib2 schemas on SLE-11 (bsc#1145550)

Changes in firefox-glib2:

- Fix the rpm macros %glib2_gsettings_schema_* which were replaced with
  %nil in Factory because they're no longer needed, but we still need
  them in SLE11 (bsc#1145550)

Changes in firefox-gtk3:

- Rebuild so %glib2_gsettings_schema_post gets called with fixed 
  rpm macros %glib2_gsettings_schema_* in firefox-glib2 package
  which were replaced with %nil in Factory because they're no 
  longer needed, but we still need them in SLE11 (bsc#1145550)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145550">SUSE bug 1145550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571463" comment="MozillaFirefox-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571464" comment="MozillaFirefox-translations-common-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571465" comment="MozillaFirefox-translations-other-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571466" comment="firefox-gio-branding-upstream-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571467" comment="firefox-glib2-lang-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571468" comment="firefox-glib2-tools-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571469" comment="firefox-gtk3-branding-upstream-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571470" comment="firefox-gtk3-data-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571471" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571472" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571473" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571474" comment="firefox-gtk3-immodule-thai-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571475" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571476" comment="firefox-gtk3-immodule-xim-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571477" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571478" comment="firefox-gtk3-lang-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571479" comment="firefox-gtk3-tools-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571480" comment="firefox-libgtk-3-0-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571481" comment="libfirefox-gio-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571482" comment="libfirefox-glib-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571483" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571484" comment="libfirefox-gobject-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571485" comment="libfirefox-gthread-2_0-0-2.54.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40330" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000036" ref_url="https://bugzilla.suse.com/1000036" source="BUGZILLA"/>
		<reference ref_id="1001652" ref_url="https://bugzilla.suse.com/1001652" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="104105" ref_url="https://bugzilla.suse.com/104105" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1047925" ref_url="https://bugzilla.suse.com/1047925" source="BUGZILLA"/>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1058013" ref_url="https://bugzilla.suse.com/1058013" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1066953" ref_url="https://bugzilla.suse.com/1066953" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1072320" ref_url="https://bugzilla.suse.com/1072320" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="1073796" ref_url="https://bugzilla.suse.com/1073796" source="BUGZILLA"/>
		<reference ref_id="1073798" ref_url="https://bugzilla.suse.com/1073798" source="BUGZILLA"/>
		<reference ref_id="1073799" ref_url="https://bugzilla.suse.com/1073799" source="BUGZILLA"/>
		<reference ref_id="1073803" ref_url="https://bugzilla.suse.com/1073803" source="BUGZILLA"/>
		<reference ref_id="1073808" ref_url="https://bugzilla.suse.com/1073808" source="BUGZILLA"/>
		<reference ref_id="1073818" ref_url="https://bugzilla.suse.com/1073818" source="BUGZILLA"/>
		<reference ref_id="1073823" ref_url="https://bugzilla.suse.com/1073823" source="BUGZILLA"/>
		<reference ref_id="1073829" ref_url="https://bugzilla.suse.com/1073829" source="BUGZILLA"/>
		<reference ref_id="1073830" ref_url="https://bugzilla.suse.com/1073830" source="BUGZILLA"/>
		<reference ref_id="1073832" ref_url="https://bugzilla.suse.com/1073832" source="BUGZILLA"/>
		<reference ref_id="1073846" ref_url="https://bugzilla.suse.com/1073846" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="1097401" ref_url="https://bugzilla.suse.com/1097401" source="BUGZILLA"/>
		<reference ref_id="1097404" ref_url="https://bugzilla.suse.com/1097404" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1104841" ref_url="https://bugzilla.suse.com/1104841" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130694" ref_url="https://bugzilla.suse.com/1130694" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1134209" ref_url="https://bugzilla.suse.com/1134209" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1144919" ref_url="https://bugzilla.suse.com/1144919" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1146090" ref_url="https://bugzilla.suse.com/1146090" source="BUGZILLA"/>
		<reference ref_id="1146091" ref_url="https://bugzilla.suse.com/1146091" source="BUGZILLA"/>
		<reference ref_id="1146093" ref_url="https://bugzilla.suse.com/1146093" source="BUGZILLA"/>
		<reference ref_id="1146094" ref_url="https://bugzilla.suse.com/1146094" source="BUGZILLA"/>
		<reference ref_id="1146095" ref_url="https://bugzilla.suse.com/1146095" source="BUGZILLA"/>
		<reference ref_id="1146097" ref_url="https://bugzilla.suse.com/1146097" source="BUGZILLA"/>
		<reference ref_id="1146099" ref_url="https://bugzilla.suse.com/1146099" source="BUGZILLA"/>
		<reference ref_id="1146100" ref_url="https://bugzilla.suse.com/1146100" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="1153423" ref_url="https://bugzilla.suse.com/1153423" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="1447070" ref_url="https://bugzilla.suse.com/1447070" source="BUGZILLA"/>
		<reference ref_id="1447409" ref_url="https://bugzilla.suse.com/1447409" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="845955" ref_url="https://bugzilla.suse.com/845955" source="BUGZILLA"/>
		<reference ref_id="865853" ref_url="https://bugzilla.suse.com/865853" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="937414" ref_url="https://bugzilla.suse.com/937414" source="BUGZILLA"/>
		<reference ref_id="947747" ref_url="https://bugzilla.suse.com/947747" source="BUGZILLA"/>
		<reference ref_id="948045" ref_url="https://bugzilla.suse.com/948045" source="BUGZILLA"/>
		<reference ref_id="948602" ref_url="https://bugzilla.suse.com/948602" source="BUGZILLA"/>
		<reference ref_id="955142" ref_url="https://bugzilla.suse.com/955142" source="BUGZILLA"/>
		<reference ref_id="957814" ref_url="https://bugzilla.suse.com/957814" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="961254" ref_url="https://bugzilla.suse.com/961254" source="BUGZILLA"/>
		<reference ref_id="962297" ref_url="https://bugzilla.suse.com/962297" source="BUGZILLA"/>
		<reference ref_id="966076" ref_url="https://bugzilla.suse.com/966076" source="BUGZILLA"/>
		<reference ref_id="966077" ref_url="https://bugzilla.suse.com/966077" source="BUGZILLA"/>
		<reference ref_id="985201" ref_url="https://bugzilla.suse.com/985201" source="BUGZILLA"/>
		<reference ref_id="986541" ref_url="https://bugzilla.suse.com/986541" source="BUGZILLA"/>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="998743" ref_url="https://bugzilla.suse.com/998743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2882" ref_url="https://www.suse.com/security/cve/CVE-2013-2882/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<description>

This update contains the Mozilla Firefox ESR 68.2 release.

Mozilla Firefox was updated to ESR 68.2 release:

* Enterprise: New administrative policies were added. More
  information and templates are available at the Policy
  Templates page.

* Various security fixes:
  MFSA 2019-33 (bsc#1154738)
  * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
  * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
  * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
  * CVE-2019-11759: Stack buffer overflow in HKDF output
  * CVE-2019-11760: Stack buffer overflow in WebRTC networking
  * CVE-2019-11761: Unintended access to a privileged JSONView object
  * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
  * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
  * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2

Other Issues resolved:

* [bsc#1104841] Newer versions of firefox have a dependency on
                GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
                inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
                scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528]  Firefox malfunctions due to broken omni.ja
                archives

		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-17"/>
	<updated date="2020-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000036">SUSE bug 1000036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104105">SUSE bug 104105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047925">SUSE bug 1047925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058013">SUSE bug 1058013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066953">SUSE bug 1066953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073796">SUSE bug 1073796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073798">SUSE bug 1073798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073799">SUSE bug 1073799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073803">SUSE bug 1073803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073808">SUSE bug 1073808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073818">SUSE bug 1073818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073823">SUSE bug 1073823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073829">SUSE bug 1073829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073830">SUSE bug 1073830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073832">SUSE bug 1073832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073846">SUSE bug 1073846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104841">SUSE bug 1104841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130694">SUSE bug 1130694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134209">SUSE bug 1134209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144919">SUSE bug 1144919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153423">SUSE bug 1153423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447070">SUSE bug 1447070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447409">SUSE bug 1447409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845955">SUSE bug 845955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865853">SUSE bug 865853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947747">SUSE bug 947747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948045">SUSE bug 948045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948602">SUSE bug 948602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955142">SUSE bug 955142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961254">SUSE bug 961254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962297">SUSE bug 962297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966076">SUSE bug 966076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966077">SUSE bug 966077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986541">SUSE bug 986541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998743">SUSE bug 998743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2882/">CVE-2013-2882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571486" comment="MozillaFirefox-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571487" comment="MozillaFirefox-branding-SLED-68-21.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571488" comment="MozillaFirefox-translations-common-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571489" comment="MozillaFirefox-translations-other-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571490" comment="firefox-atk-lang-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571491" comment="firefox-gdk-pixbuf-lang-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571492" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571493" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571494" comment="firefox-gio-branding-upstream-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571495" comment="firefox-glib2-lang-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571496" comment="firefox-glib2-tools-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571497" comment="firefox-gtk3-branding-upstream-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571498" comment="firefox-gtk3-data-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571499" comment="firefox-gtk3-immodule-amharic-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571500" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571501" comment="firefox-gtk3-immodule-multipress-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571502" comment="firefox-gtk3-immodule-thai-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571503" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571504" comment="firefox-gtk3-immodule-xim-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571505" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571506" comment="firefox-gtk3-lang-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571507" comment="firefox-gtk3-tools-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571508" comment="firefox-libatk-1_0-0-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571509" comment="firefox-libcairo-gobject2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571510" comment="firefox-libcairo2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571511" comment="firefox-libffi4-5.3.1+r233831-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571512" comment="firefox-libffi7-3.2.1.git259-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571513" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571514" comment="firefox-libgtk-3-0-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571515" comment="firefox-libharfbuzz0-1.7.5-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571516" comment="firefox-libpango-1_0-0-1.40.14-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571517" comment="libfirefox-gio-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571518" comment="libfirefox-glib-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571519" comment="libfirefox-gmodule-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571520" comment="libfirefox-gobject-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571521" comment="libfirefox-gthread-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571522" comment="libfreebl3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571523" comment="libfreebl3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571524" comment="libsoftokn3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571525" comment="libsoftokn3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571526" comment="mozilla-nspr-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571527" comment="mozilla-nspr-32bit-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571528" comment="mozilla-nss-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571529" comment="mozilla-nss-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571530" comment="mozilla-nss-certs-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571531" comment="mozilla-nss-certs-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571532" comment="mozilla-nss-tools-3.45-38.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40331" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137338" ref_url="https://bugzilla.suse.com/1137338" source="BUGZILLA"/>
		<description>

This update contains Mozilla Firefox 60.7ESR.

It brings lots of security fixes and other improvements.

It also includes new additional helper libraries to allow Firefox to run on SUSE Linux Enterprise 11.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137338">SUSE bug 1137338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571533" comment="MozillaFirefox-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571534" comment="MozillaFirefox-branding-SLED-60-21.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571535" comment="MozillaFirefox-translations-common-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571536" comment="MozillaFirefox-translations-other-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571537" comment="firefox-at-spi2-core-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571538" comment="firefox-at-spi2-core-lang-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571539" comment="firefox-atk-lang-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571540" comment="firefox-dbus-1-glib-0.76-34.2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571541" comment="firefox-gdk-pixbuf-lang-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571542" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571543" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571544" comment="firefox-gio-branding-upstream-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571545" comment="firefox-glib2-lang-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571546" comment="firefox-glib2-tools-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571547" comment="firefox-gtk3-branding-upstream-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571548" comment="firefox-gtk3-data-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571549" comment="firefox-gtk3-immodule-amharic-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571550" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571551" comment="firefox-gtk3-immodule-multipress-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571552" comment="firefox-gtk3-immodule-thai-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571553" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571554" comment="firefox-gtk3-immodule-xim-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571555" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571556" comment="firefox-gtk3-lang-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571557" comment="firefox-gtk3-tools-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571558" comment="firefox-libatk-1_0-0-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571559" comment="firefox-libatk-bridge-2_0-0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571560" comment="firefox-libatspi0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571561" comment="firefox-libcairo-gobject2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571562" comment="firefox-libcairo2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571563" comment="firefox-libfreetype6-2.9-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571564" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571565" comment="firefox-libgtk-3-0-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571566" comment="firefox-libharfbuzz0-1.7.5-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571567" comment="firefox-libpango-1_0-0-1.40.14-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571568" comment="firefox-libpixman-1-0-0.34.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571569" comment="libfirefox-gio-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571570" comment="libfirefox-glib-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571571" comment="libfirefox-gmodule-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571572" comment="libfirefox-gobject-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571573" comment="libfirefox-gthread-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571574" comment="libfreebl3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571575" comment="libfreebl3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571576" comment="libsoftokn3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571577" comment="libsoftokn3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571578" comment="mozilla-nspr-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571579" comment="mozilla-nspr-32bit-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571580" comment="mozilla-nss-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571581" comment="mozilla-nss-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571582" comment="mozilla-nss-certs-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571583" comment="mozilla-nss-certs-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571584" comment="mozilla-nss-tools-3.41.1-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40332" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="854370" ref_url="https://bugzilla.suse.com/854370" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 24.2.0 ESR security release.

This is a major upgrade from the 17 ESR release branch.

Security issues fixed:

    * CVE-2013-5611 Application Installation doorhanger persists on
      navigation (MFSA 2013-105)
    * CVE-2013-5609 Miscellaneous memory safety hazards (rv:24.2) (MFSA
      2013-104)
    * CVE-2013-5610 Miscellaneous memory safety hazards (rv:26.0) (MFSA
      2013-104)
    * CVE-2013-5612 Character encoding cross-origin XSS attack (MFSA
      2013-106)
    * CVE-2013-5614 Sandbox restrictions not applied to nested object
      elements (MFSA 2013-107)
    * CVE-2013-5616 Use-after-free in event listeners (MFSA 2013-108)
    * CVE-2013-5619 Potential overflow in JavaScript binary search
      algorithms (MFSA 2013-110)
    * CVE-2013-6671 Segmentation violation when replacing ordered list
      elements (MFSA 2013-111)
    * CVE-2013-6673 Trust settings for built-in roots ignored during EV
      certificate validation (MFSA 2013-113)
    * CVE-2013-5613 Use-after-free in synthetic mouse movement (MFSA
      2013-114)
    * CVE-2013-5615 GetElementIC typed array stubs can be generated outside
      observed typesets (MFSA 2013-115)
    * CVE-2013-6672 Linux clipboard information disclosure though selection
      paste (MFSA 2013-112)
    * CVE-2013-5618 Use-after-free during Table Editing (MFSA 2013-109)

Security Issue references:

    * CVE-2013-5609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609&gt;
    * CVE-2013-5610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610&gt;
    * CVE-2013-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611&gt;
    * CVE-2013-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612&gt;
    * CVE-2013-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613&gt;
    * CVE-2013-5614
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614&gt;
    * CVE-2013-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615&gt;
    * CVE-2013-5616
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616&gt;
    * CVE-2013-5618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618&gt;
    * CVE-2013-5619
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619&gt;
    * CVE-2013-6671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671&gt;
    * CVE-2013-6672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672&gt;
    * CVE-2013-6673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577757" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577758" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577759" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577760" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577761" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577762" comment="libfreebl3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577763" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577764" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577765" comment="libsoftokn3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577766" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577767" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577768" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577769" comment="mozilla-nss-x86-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577757" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577758" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577759" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577760" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577761" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577762" comment="libfreebl3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577763" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577764" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577765" comment="libsoftokn3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577766" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577767" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577768" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577769" comment="mozilla-nss-x86-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577757" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577758" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577759" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577760" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577761" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577762" comment="libfreebl3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577763" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577764" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577765" comment="libsoftokn3-x86-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577766" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577767" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577768" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577769" comment="mozilla-nss-x86-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40333" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577770" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577771" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577772" comment="MozillaFirefox-branding-SLES-for-VMware-31.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577773" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577774" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577775" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577776" comment="libfreebl3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577777" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577778" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577779" comment="libsoftokn3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577780" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577781" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577782" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577783" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577784" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577785" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577786" comment="mozilla-nss-x86-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577770" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577771" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577772" comment="MozillaFirefox-branding-SLES-for-VMware-31.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577773" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577774" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577775" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577776" comment="libfreebl3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577777" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577778" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577779" comment="libsoftokn3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577780" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577781" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577782" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577783" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577784" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577785" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577786" comment="mozilla-nss-x86-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577770" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577771" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577772" comment="MozillaFirefox-branding-SLES-for-VMware-31.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577773" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577774" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577775" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577776" comment="libfreebl3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577777" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577778" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577779" comment="libsoftokn3-x86-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577780" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577781" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577782" comment="mozilla-nspr-x86-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577783" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577784" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577785" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577786" comment="mozilla-nss-x86-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40334" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-09"/>
	<updated date="2015-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577789" comment="MozillaFirefox-branding-SLES-for-VMware-31.0-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577789" comment="MozillaFirefox-branding-SLES-for-VMware-31.0-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577789" comment="MozillaFirefox-branding-SLES-for-VMware-31.0-0.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40335" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577801" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577802" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577803" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577804" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577801" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577802" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577803" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577804" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577801" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577802" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577803" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577804" comment="libFLAC8-x86-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40336" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671852" comment="libFLAC++6-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671853" comment="libFLAC8-1.2.1-68.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671854" comment="libFLAC8-32bit-1.2.1-68.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40337" version="1" class="patch">
	<metadata>
		<title>Security update for fontconfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="992534" ref_url="https://bugzilla.suse.com/992534" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>

This update for fontconfig fixes the following issues:

- security update:
  * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577805" comment="fontconfig-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577806" comment="fontconfig-32bit-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40338" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40339" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="864576" ref_url="https://bugzilla.suse.com/864576" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>

This update fixes a denial of service (crash) security issue rlm_pap hash 
processing in FreeRadius, which could have been caused by special passwords 
fed into the RLM-PAP password checking method via LDAP by remote attackers.

Security Issue reference:

    * CVE-2014-2015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-01"/>
	<updated date="2014-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/864576">SUSE bug 864576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577808" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577809" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577810" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577811" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577812" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577808" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577809" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577810" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577811" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577812" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577808" comment="freeradius-server-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577809" comment="freeradius-server-dialupadmin-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577810" comment="freeradius-server-doc-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577811" comment="freeradius-server-libs-2.1.1-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577812" comment="freeradius-server-utils-2.1.1-7.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40340" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571599" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571600" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571601" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571602" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571603" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40341" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571604" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571605" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571606" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571607" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571608" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40342" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180525" ref_url="https://bugzilla.suse.com/1180525" source="BUGZILLA"/>
		<description>
This update for freeradius-server fixes the following issues:

- Moved logrotate options into specific parts for each config as 'global' options
  will persist past and clobber global options in the main logrotate config (bsc#1180525)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180525">SUSE bug 1180525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571609" comment="freeradius-server-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571610" comment="freeradius-server-dialupadmin-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571611" comment="freeradius-server-doc-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571612" comment="freeradius-server-libs-2.1.1-7.25.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571613" comment="freeradius-server-utils-2.1.1-7.25.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40343" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571618" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571619" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571620" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40344" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571621" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571622" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571623" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40345" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571624" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571625" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571626" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40346" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="1149384" ref_url="https://bugzilla.suse.com/1149384" source="BUGZILLA"/>
		<reference ref_id="1149395" ref_url="https://bugzilla.suse.com/1149395" source="BUGZILLA"/>
		<reference ref_id="1149397" ref_url="https://bugzilla.suse.com/1149397" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9381" ref_url="https://www.suse.com/security/cve/CVE-2015-9381/" source="CVE"/>
		<reference ref_id="CVE-2015-9382" ref_url="https://www.suse.com/security/cve/CVE-2015-9382/" source="CVE"/>
		<reference ref_id="CVE-2015-9383" ref_url="https://www.suse.com/security/cve/CVE-2015-9383/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2015-9381, CVE-2015-9382, CVE-2015-9383: Fixed various invalid memory accesses
  when opening a crafted font (bsc#1149384 bsc#1149395 bsc#1149397).
- CVE-2017-8105, CVE-2017-8287: Fixed various invalid memory writes in the type
  1 glyph loader (bsc#1035807 bsc#1036457).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149384">SUSE bug 1149384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149395">SUSE bug 1149395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149397">SUSE bug 1149397</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9381/">CVE-2015-9381</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9382/">CVE-2015-9382</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9383/">CVE-2015-9383</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679676" comment="freetype2-2.3.7-25.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679677" comment="freetype2-32bit-2.3.7-25.45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679678" comment="ft2demos-2.3.7-25.45.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40347" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577813" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577814" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577815" comment="freetype2-x86-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577816" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577813" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577814" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577815" comment="freetype2-x86-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577816" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577813" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577814" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577815" comment="freetype2-x86-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577816" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40348" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196147" ref_url="https://bugzilla.suse.com/1196147" source="BUGZILLA"/>
		<reference ref_id="1196148" ref_url="https://bugzilla.suse.com/1196148" source="BUGZILLA"/>
		<reference ref_id="1196150" ref_url="https://bugzilla.suse.com/1196150" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<description>
This update for fribidi fixes the following issues:

- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode (bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in fribidi_remove_bidi_marks (bsc#1196150).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196147">SUSE bug 1196147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196148">SUSE bug 1196148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196150">SUSE bug 1196150</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009685710" comment="fribidi-0.10.9-59.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685711" comment="fribidi-32bit-0.10.9-59.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40349" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<description>

This update for FUSE fixes the following security issue:

    * CVE-2015-3202: FUSE did not clear the environment upon execution of
      external programs.

Security Issues:

    * CVE-2015-3202
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-20"/>
	<updated date="2015-05-20"/>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577817" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577818" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577817" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577818" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577817" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577818" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40350" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
This update for fuse fixes the following issues:

Security issue fixed:

- CVE-2018-10906: Fix a bypass of the user_allow_other restriction (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577819" comment="fuse-2.8.7-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577820" comment="libfuse2-2.8.7-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40351" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="938159" ref_url="https://bugzilla.suse.com/938159" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="999596" ref_url="https://bugzilla.suse.com/999596" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
		<description>

  
This update for gcc43 fixes the following issues:

Security issue fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

New features:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection to mitigate the Stack Clash attack.  [bnc#1039513]

Non security bugs fixed:

- Fixed build of 32bit libgcov.a with LFS support.  [bsc#1044016]
- Fixed issue with libstdc++ functional when an exception is thrown during construction.  [bsc#999596]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed ICE compiling AFS modules for the s390x kernel.  [bsc#938159]
- Backport large file support from GCC 4.6.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938159">SUSE bug 938159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999596">SUSE bug 999596</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577821" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577822" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577823" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577824" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577825" comment="gcc43-fortran-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577826" comment="gcc43-fortran-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577827" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577828" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577829" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577830" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577821" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577822" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577823" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577824" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577825" comment="gcc43-fortran-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577826" comment="gcc43-fortran-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577827" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577828" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577829" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577830" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40352" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577831" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577832" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577833" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577834" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577835" comment="gcc43-fortran-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577836" comment="gcc43-fortran-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577837" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577838" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577839" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577840" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577831" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577832" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577833" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577834" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577835" comment="gcc43-fortran-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577836" comment="gcc43-fortran-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577837" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577838" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577839" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577840" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40353" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="878067" ref_url="https://bugzilla.suse.com/878067" source="BUGZILLA"/>
		<reference ref_id="889990" ref_url="https://bugzilla.suse.com/889990" source="BUGZILLA"/>
		<reference ref_id="899871" ref_url="https://bugzilla.suse.com/899871" source="BUGZILLA"/>
		<reference ref_id="917169" ref_url="https://bugzilla.suse.com/917169" source="BUGZILLA"/>
		<reference ref_id="919274" ref_url="https://bugzilla.suse.com/919274" source="BUGZILLA"/>
		<reference ref_id="922534" ref_url="https://bugzilla.suse.com/922534" source="BUGZILLA"/>
		<reference ref_id="924525" ref_url="https://bugzilla.suse.com/924525" source="BUGZILLA"/>
		<reference ref_id="924687" ref_url="https://bugzilla.suse.com/924687" source="BUGZILLA"/>
		<reference ref_id="927993" ref_url="https://bugzilla.suse.com/927993" source="BUGZILLA"/>
		<reference ref_id="930176" ref_url="https://bugzilla.suse.com/930176" source="BUGZILLA"/>
		<reference ref_id="934689" ref_url="https://bugzilla.suse.com/934689" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="947772" ref_url="https://bugzilla.suse.com/947772" source="BUGZILLA"/>
		<reference ref_id="947791" ref_url="https://bugzilla.suse.com/947791" source="BUGZILLA"/>
		<reference ref_id="948168" ref_url="https://bugzilla.suse.com/948168" source="BUGZILLA"/>
		<reference ref_id="949000" ref_url="https://bugzilla.suse.com/949000" source="BUGZILLA"/>
		<reference ref_id="951644" ref_url="https://bugzilla.suse.com/951644" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="970009" ref_url="https://bugzilla.suse.com/970009" source="BUGZILLA"/>
		<reference ref_id="976627" ref_url="https://bugzilla.suse.com/976627" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="981311" ref_url="https://bugzilla.suse.com/981311" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bsc#1028744]
- Backport patch for PR65612. [bsc#1022062]
- Re-spin to provide missing libasan0-32bit and other multilibs via the updated product description.  [bsc#951644]
- Fixed for DR#1288.  [bsc#1011348]
- Fix libffi issue for armv7l.  [bsc#988274]
- Fixed a kernel miscompile on aarch64.  [bnc #981311]
- Fixed a ppc64le internal compiler error. [bnc #976627]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed samba build on AARCH64.  [bsc#970009]
- Build without GRAPHITE where cloog-isl is not available.
- Fixed HTM builtins on powerpc.  [bsc#955382]
- Fixed build of SLOF.  [bsc#949000]
- Fixed C++11 std::random_device short reads, CVE-2015-5276.  [bsc#945842]
- Fixed libffi issues on aarch64.  [bsc#948168]
- Fixed no_instrument_function attribute handling on PPC64 with -mprofile-kernel.  [bsc#947791]
- Enable 32bit code generation for ppc64le but do not build 32bit
  target libraries.  Fixes ppc64le kernel compile.
- Update to GCC 4.8.5 release. 
  * Fixes bogus integer overflow in constant expression.  [bsc#934689]
  * Fixes ICE with atomics on aarch64.  [bsc#930176]
- Fixed reload issue on S390.
- Add patch to keep functions leaf when they are instrumented for
  profiling on s390[x].  [bsc#899871]
- Avoid accessing invalid memory when passing aggregates by value.  [bsc#922534]
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11
  again.  [bsc#927993]
- Update to gcc-4_8-branch head (r221715).
  * Includes GCC 4.8.4 release.
  * Includes fix for -imacros bug.  [bsc#917169]
  * Includes fix for incorrect -Warray-bounds warnings.  [bsc#919274]
  * Includes updated -mhotpatch for s390x.  [bsc#924525]
  * Includes fix for ppc64le issue with doubleword vector extract.
    [bsc#924687]
- Backport rework of the memory allocator for C++ exceptions used in OOM situations.  [bsc#889990]
- Remove invalid use of glibc internals in TSAN.
- Update to gcc-4_8-branch head (r218481).
  * Includes patches to allow building against ISL 0.14.
- Disable all languages but C, C++, Fortran and Ada.  [fate#316860]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878067">SUSE bug 878067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889990">SUSE bug 889990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899871">SUSE bug 899871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917169">SUSE bug 917169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919274">SUSE bug 919274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922534">SUSE bug 922534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924525">SUSE bug 924525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924687">SUSE bug 924687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927993">SUSE bug 927993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930176">SUSE bug 930176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934689">SUSE bug 934689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947772">SUSE bug 947772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947791">SUSE bug 947791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948168">SUSE bug 948168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949000">SUSE bug 949000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951644">SUSE bug 951644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970009">SUSE bug 970009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976627">SUSE bug 976627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981311">SUSE bug 981311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571653" comment="cpp48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571654" comment="gcc48-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571655" comment="gcc48-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571656" comment="gcc48-c++-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571657" comment="gcc48-fortran-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571658" comment="gcc48-fortran-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571659" comment="gcc48-info-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571660" comment="gcc48-locale-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571661" comment="libasan0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571662" comment="libasan0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571663" comment="libatomic1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571664" comment="libatomic1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571665" comment="libgcc_s1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571666" comment="libgcc_s1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571667" comment="libgfortran3-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571668" comment="libgfortran3-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571669" comment="libgomp1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571670" comment="libgomp1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571671" comment="libitm1-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571672" comment="libitm1-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571673" comment="libmpfr4-3.1.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571674" comment="libquadmath0-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571675" comment="libquadmath0-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571676" comment="libstdc++48-devel-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571677" comment="libstdc++48-devel-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571678" comment="libstdc++6-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571679" comment="libstdc++6-32bit-4.8.5-5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571680" comment="libtsan0-4.8.5-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40354" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1082130" ref_url="https://bugzilla.suse.com/1082130" source="BUGZILLA"/>
		<reference ref_id="1083945" ref_url="https://bugzilla.suse.com/1083945" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="1093797" ref_url="https://bugzilla.suse.com/1093797" source="BUGZILLA"/>
		<reference ref_id="1131264" ref_url="https://bugzilla.suse.com/1131264" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1177947" ref_url="https://bugzilla.suse.com/1177947" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="1185395" ref_url="https://bugzilla.suse.com/1185395" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<description>
This update for gcc48 fixes the following issues:

- CVE-2019-14250: Fixed an integer overflow that could lead to an invalid memory
  access (bsc#1142649).

Non-security fixes:
- Fixed an issue with manual page builds (bsc#1185395).
- Fixed an issue with static initializers (bsc#1177947).
- Fixed an issue with exception handling on s390x (bsc#1161913).
- Fixed a reload bug on aarch64 (bsc#1093797).
- Added a Spectre V2 mitigation for s390x (bsc#1083945).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082130">SUSE bug 1082130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083945">SUSE bug 1083945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093797">SUSE bug 1093797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131264">SUSE bug 1131264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177947">SUSE bug 1177947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185395">SUSE bug 1185395</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678381" comment="cpp48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678382" comment="gcc48-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678383" comment="gcc48-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678384" comment="gcc48-c++-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678385" comment="gcc48-fortran-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678386" comment="gcc48-fortran-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678387" comment="gcc48-info-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678388" comment="gcc48-locale-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678389" comment="libasan0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678390" comment="libasan0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678391" comment="libatomic1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678392" comment="libatomic1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678393" comment="libgcc_s1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678394" comment="libgcc_s1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678395" comment="libgfortran3-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678396" comment="libgfortran3-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678397" comment="libgomp1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678398" comment="libgomp1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678399" comment="libitm1-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678400" comment="libitm1-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678401" comment="libquadmath0-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678402" comment="libquadmath0-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678403" comment="libstdc++48-devel-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678404" comment="libstdc++48-devel-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678405" comment="libstdc++6-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678406" comment="libstdc++6-32bit-4.8.5-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678407" comment="libtsan0-4.8.5-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40355" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577841" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577841" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577841" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40356" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571682" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40357" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571683" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40358" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571684" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40359" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571685" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40360" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571686" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40361" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="1140120" ref_url="https://bugzilla.suse.com/1140120" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for gd fixes the following issues:

Security vulnerability addressed:

- CVE-2017-7890: Fixed a buffer over-read into uninitialized memory (bsc#1050241).
- CVE-2019-6978: Fixed a double free in the GD graphics library (bsc#1123522).
- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140120).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-09"/>
	<updated date="2020-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140120">SUSE bug 1140120</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571687" comment="gd-2.0.36.RC1-52.33.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40362" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

Security issue fixed:

- CVE-2019-1010180: Fixed a buffer overflow and out of bound memory access that can lead to deny of service, memory disclosure, and possible code execution (bsc#1142772).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-27"/>
	<updated date="2019-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577842" comment="gdb-7.5.1-0.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40363" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

- CVE-2019-1010180: Fixed a buffer overflow (bsc#1142772).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577843" comment="gdb-7.5.1-0.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40364" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571688" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571689" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571690" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571691" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571692" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571693" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571694" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40365" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576164" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576165" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576166" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576167" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576168" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576169" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576170" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576164" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576165" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576166" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576167" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576168" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576169" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576170" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40366" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571702" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571703" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571704" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571705" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571706" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571707" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571708" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40367" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00052.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577844" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577845" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577846" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577847" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577848" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577849" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577850" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577844" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577845" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577846" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577847" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577848" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577849" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577850" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40368" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571716" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571717" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571718" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571719" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571720" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571721" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571722" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40369" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571723" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571724" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571725" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571726" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571727" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571728" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571729" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40370" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577851" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577852" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577853" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577854" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577855" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577856" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577857" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577851" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577852" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577853" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577854" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577855" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577856" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577857" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40371" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571737" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571738" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571739" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571740" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571741" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571742" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571743" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40372" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40373" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571746" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571747" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571748" comment="giflib-progs-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40374" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571749" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571750" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571751" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571752" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571753" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571754" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571755" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571756" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571757" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571758" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571759" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571760" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571761" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40375" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571762" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571763" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571764" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571765" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571766" comment="libgio-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571767" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571768" comment="libglib-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571769" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571770" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571771" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571772" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571773" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571774" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40376" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1191489" ref_url="https://bugzilla.suse.com/1191489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:


- CVE-2021-3800: Fixed a file content leak in pkexec due to charset aliases (bsc#1191489).
- CVE-2018-16428: Fixed a NULL pointer dereference in g_markup_parse_context_end_parse() (bsc#1107121).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-22"/>
	<updated date="2022-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191489">SUSE bug 1191489</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672765" comment="glib2-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672766" comment="glib2-doc-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672767" comment="glib2-lang-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672768" comment="libgio-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672769" comment="libgio-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672770" comment="libglib-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672771" comment="libglib-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672772" comment="libgmodule-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672773" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672774" comment="libgobject-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672775" comment="libgobject-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672776" comment="libgthread-2_0-0-2.22.5-0.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672777" comment="libgthread-2_0-0-32bit-2.22.5-0.8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40377" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="888347" ref_url="https://bugzilla.suse.com/888347" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<description>

This glibc update fixes a critical privilege escalation problem and two 
non-security issues:

    * bnc#892073: An off-by-one error leading to a heap-based buffer
      overflow was found in __gconv_translit_find(). An exploit that
      targets the problem is publicly available. (CVE-2014-5119)
    * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv.
    * bnc#888347: printf-multibyte-format.patch: Don't parse %s format
      argument as multi-byte string.

Security Issues:

    * CVE-2014-5119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-29"/>
	<updated date="2014-08-29"/>
	<bugzilla href="https://bugzilla.suse.com/888347">SUSE bug 888347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577862" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577863" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577864" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577865" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577866" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577867" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577868" comment="glibc-info-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577869" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577870" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577871" comment="glibc-locale-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577872" comment="glibc-profile-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577873" comment="glibc-profile-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577874" comment="glibc-profile-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577875" comment="glibc-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577876" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577862" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577863" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577864" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577865" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577866" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577867" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577868" comment="glibc-info-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577869" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577870" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577871" comment="glibc-locale-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577872" comment="glibc-profile-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577873" comment="glibc-profile-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577874" comment="glibc-profile-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577875" comment="glibc-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577876" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577862" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577863" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577864" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577865" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577866" comment="glibc-html-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577867" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577868" comment="glibc-info-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577869" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577870" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577871" comment="glibc-locale-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577872" comment="glibc-profile-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577873" comment="glibc-profile-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577874" comment="glibc-profile-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577875" comment="glibc-x86-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577876" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40378" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40379" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40380" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="931399" ref_url="https://bugzilla.suse.com/931399" source="BUGZILLA"/>
		<reference ref_id="965699" ref_url="https://bugzilla.suse.com/965699" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="973179" ref_url="https://bugzilla.suse.com/973179" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="986302" ref_url="https://bugzilla.suse.com/986302" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>

This update for glibc fixes the following issues:

- Drop old fix that could break services that start before IPv6 is up. (bsc#931399)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Relocate DSOs in dependency order, fixing a potential crash during symbol
  relocation phase. (bsc#986302)
- Fix nscd assertion failure in gc. (bsc#965699)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931399">SUSE bug 931399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965699">SUSE bug 965699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973179">SUSE bug 973179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986302">SUSE bug 986302</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577907" comment="glibc-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577908" comment="glibc-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577909" comment="glibc-devel-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577910" comment="glibc-devel-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577911" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577912" comment="glibc-i18ndata-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577913" comment="glibc-info-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577914" comment="glibc-locale-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577915" comment="glibc-locale-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577916" comment="glibc-profile-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577917" comment="glibc-profile-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577918" comment="nscd-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40381" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00018.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577919" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577920" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577921" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577922" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577923" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577924" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577925" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577926" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577927" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577928" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577929" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577930" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577919" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577920" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577921" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577922" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577923" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577924" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577925" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577926" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577927" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577928" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577929" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577930" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40382" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00038.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577931" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577932" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577933" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577934" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577935" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577936" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577937" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577938" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577939" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577940" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577941" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577942" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577931" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577932" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577933" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577934" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577935" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577936" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577937" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577938" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577939" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577940" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577941" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577942" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40383" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-28"/>
	<updated date="2018-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577943" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577944" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577945" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577946" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577947" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577948" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577949" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577950" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577951" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577952" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577953" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577954" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577943" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577944" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577945" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577946" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577947" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577948" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577949" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577950" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577951" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577952" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577953" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577954" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40384" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076871" ref_url="https://bugzilla.suse.com/1076871" source="BUGZILLA"/>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

Non security issue fixed:

- Fix incorrect getaddrinfo assertion trigger (bsc#1076871)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076871">SUSE bug 1076871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577955" comment="glibc-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577956" comment="glibc-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577957" comment="glibc-devel-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577958" comment="glibc-devel-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577959" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577960" comment="glibc-i18ndata-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577961" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577962" comment="glibc-locale-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577963" comment="glibc-locale-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577964" comment="glibc-profile-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577965" comment="glibc-profile-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577966" comment="nscd-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40385" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077763" ref_url="https://bugzilla.suse.com/1077763" source="BUGZILLA"/>
		<reference ref_id="1079625" ref_url="https://bugzilla.suse.com/1079625" source="BUGZILLA"/>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161).

Bug fixes:

- bsc#1086690: Fix crash in resolver on memory allocation failure.
- bsc#1077763: Fix allocation in in6ailist_add.
- bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077763">SUSE bug 1077763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079625">SUSE bug 1079625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577967" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577968" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577969" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577970" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577971" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577972" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577973" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577974" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577975" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577976" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577977" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577978" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577967" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577968" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577969" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577970" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577971" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577972" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577973" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577974" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577975" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577976" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577977" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577978" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40386" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1058774" ref_url="https://bugzilla.suse.com/1058774" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583)
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580)
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234).

This non-security issue was fixed:

- Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058774">SUSE bug 1058774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577979" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577980" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577981" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577982" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577983" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577984" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577985" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577986" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577987" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577988" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577989" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577990" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577979" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577980" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577981" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577982" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577983" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577984" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577985" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577986" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577987" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577988" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577989" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577990" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40387" version="1" class="patch">
	<metadata>
		<title>Recommended update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1110170" ref_url="https://bugzilla.suse.com/1110170" source="BUGZILLA"/>
		<reference ref_id="1110174" ref_url="https://bugzilla.suse.com/1110174" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325).

Non-security issue fixed:

- Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618).
- Remove improper assert in dlclose (bsc#1110174, BZ #11941).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110170">SUSE bug 1110170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110174">SUSE bug 1110174</bugzilla>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577991" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577992" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577993" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577994" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577995" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577996" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577997" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577998" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577999" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578000" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578001" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578002" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577991" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577992" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577993" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577994" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577995" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577996" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577997" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577998" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577999" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578000" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578001" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578002" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40388" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<description>
This update for glibc fixes the following issue:

Security issue fixed:

- CVE-2009-5155: Fixed a local denial of service inside the parse_reg_exp in posix/regcomp.c (bsc#1127223).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578003" comment="glibc-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578004" comment="glibc-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578005" comment="glibc-devel-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578006" comment="glibc-devel-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578007" comment="glibc-html-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578008" comment="glibc-i18ndata-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578009" comment="glibc-info-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578010" comment="glibc-locale-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578011" comment="glibc-locale-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578012" comment="glibc-profile-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578013" comment="glibc-profile-32bit-2.11.3-17.110.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578014" comment="nscd-2.11.3-17.110.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40389" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2019-9169: Fixed heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-20"/>
	<updated date="2019-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578015" comment="glibc-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578016" comment="glibc-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578017" comment="glibc-devel-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578018" comment="glibc-devel-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578019" comment="glibc-html-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578020" comment="glibc-i18ndata-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578021" comment="glibc-info-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578022" comment="glibc-locale-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578023" comment="glibc-locale-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578024" comment="glibc-profile-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578025" comment="glibc-profile-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578026" comment="nscd-2.11.3-17.110.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40390" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-04"/>
	<updated date="2021-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634748" comment="glibc-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634749" comment="glibc-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634750" comment="glibc-devel-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634751" comment="glibc-devel-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634752" comment="glibc-html-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634753" comment="glibc-i18ndata-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634754" comment="glibc-info-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634755" comment="glibc-locale-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634756" comment="glibc-locale-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634757" comment="glibc-profile-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634758" comment="glibc-profile-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634759" comment="nscd-2.11.3-17.110.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40391" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed in getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673411" comment="glibc-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673412" comment="glibc-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673413" comment="glibc-devel-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673414" comment="glibc-devel-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673415" comment="glibc-html-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673416" comment="glibc-i18ndata-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673417" comment="glibc-info-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673418" comment="glibc-locale-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673419" comment="glibc-locale-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673420" comment="glibc-profile-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673421" comment="glibc-profile-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673422" comment="nscd-2.11.3-17.110.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40392" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This update for gmp fixes the following issues:

- CVE-2021-43618: Fixed buffer overflow on malformed input to mpz_inp_raw (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658238" comment="gmp-4.2.3-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658239" comment="gmp-32bit-4.2.3-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40393" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-session (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1048274" ref_url="https://bugzilla.suse.com/1048274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171/" source="CVE"/>
		<description>


This update for gnome-session fixes the following issues:

- CVE-2017-11171: Fix a denial of service condition. an unauthenticated local user
  can create ICE connections, causing a file descriptor leak in
  gnome-session (bsc#1048274).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571906" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571907" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40394" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044638" ref_url="https://bugzilla.suse.com/1044638" source="BUGZILLA"/>
		<reference ref_id="1117463" ref_url="https://bugzilla.suse.com/1117463" source="BUGZILLA"/>
		<reference ref_id="1117464" ref_url="https://bugzilla.suse.com/1117464" source="BUGZILLA"/>
		<reference ref_id="1117465" ref_url="https://bugzilla.suse.com/1117465" source="BUGZILLA"/>
		<reference ref_id="375175" ref_url="https://bugzilla.suse.com/375175" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19491" ref_url="https://www.suse.com/security/cve/CVE-2018-19491/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<description>
This update for gnuplot fixes the following issues:

Security issues fixed:

- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
- CVE-2018-19491: Fixed a buffer overflow in the PS_options function (bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
- CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a
  Denial of Service (bsc#1044638)

Non-security issues fixed:

- postscript output does not show any German 'umlauts' (bsc#375175)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044638">SUSE bug 1044638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117464">SUSE bug 1117464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117465">SUSE bug 1117465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/375175">SUSE bug 375175</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19491/">CVE-2018-19491</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571908" comment="gnuplot-4.2.3-7.3.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40395" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have 
been fixed.

Further information is available at 
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578027" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578028" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578029" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578030" comment="libgnutls26-x86-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578027" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578028" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578029" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578030" comment="libgnutls26-x86-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578027" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563356" comment="libgnutls-extra26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578028" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578029" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578030" comment="libgnutls26-x86-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40396" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40397" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40398" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571918" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578039" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571919" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571920" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40399" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571921" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578040" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571922" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571923" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40400" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

Security issues fixed:

- CVE-2018-10846: Improve mitigations against Lucky 13 class of attacks (PRIME + PROBE) (bsc#1105460).
- CVE-2017-10790: Fixed a denial of service in the _asn1_check_identifier() function (bsc#1047002).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571924" comment="gnutls-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578041" comment="libgnutls-extra26-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571925" comment="libgnutls26-2.4.1-24.39.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571926" comment="libgnutls26-32bit-2.4.1-24.39.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40401" version="1" class="patch">
	<metadata>
		<title>Security update for GPG2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="884130" ref_url="https://bugzilla.suse.com/884130" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>

GPG2 has been updated to fix a possible denial of service.

This security issue has been fixed:

    * Denial of service through infinite loop with garbled compressed data
      packets (CVE-2014-4617)

Security Issues:

    * CVE-2014-4617
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-26"/>
	<updated date="2014-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578042" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578043" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578042" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578043" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578042" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578043" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40402" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40403" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578046" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578047" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578046" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578047" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40404" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1124847" ref_url="https://bugzilla.suse.com/1124847" source="BUGZILLA"/>
		<reference ref_id="1141093" ref_url="https://bugzilla.suse.com/1141093" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
This update for gpg2 fixes the following issues:

Security issue fixed:

- CVE-2019-13050: Fixed denial-of-service attacks via big keys. (bsc#1141093)

Non-security issue fixed:

- Allow coredumps in X11 desktop sessions (bsc#1124847).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124847">SUSE bug 1124847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571931" comment="gpg2-2.0.9-25.33.42.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571932" comment="gpg2-lang-2.0.9-25.33.42.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40405" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578048" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578049" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578048" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578049" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578048" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578049" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40406" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1093447" ref_url="https://bugzilla.suse.com/1093447" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196/" source="CVE"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2018-10196: Fixed a null dereference in rebuild_vlis (bsc#1093447).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571935" comment="graphviz-2.20.2-8.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571936" comment="graphviz-gd-2.20.2-8.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571937" comment="graphviz-gnome-2.20.2-8.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40407" version="1" class="patch">
	<metadata>
		<title>Security update for grep (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="795827" ref_url="https://bugzilla.suse.com/795827" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5667" ref_url="https://www.suse.com/security/cve/CVE-2012-5667/" source="CVE"/>
		<description>
This update for grep fixes the following issues:

- CVE-2012-5667: Fixed an integer overflow when reading long lines (bsc#795827).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/795827">SUSE bug 795827</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5667/">CVE-2012-5667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679679" comment="grep-2.7-5.7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40408" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Bugs fixed:
- Expand list of grub.cfg search path in PV Xen guests for systems installed on btrfs
  snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40409" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045063" ref_url="https://bugzilla.suse.com/1045063" source="BUGZILLA"/>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="1174782" ref_url="https://bugzilla.suse.com/1174782" source="BUGZILLA"/>
		<reference ref_id="1175036" ref_url="https://bugzilla.suse.com/1175036" source="BUGZILLA"/>
		<reference ref_id="1175060" ref_url="https://bugzilla.suse.com/1175060" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<description>
This update for grub2 fixes the following security issues:

- CVE-2017-9763: Fix a memory leak in grub_ext2_read_block. (bsc#1045063)

- CVE-2020-10713: Prevent parsing overflows from bypassing secure boot
  restrictions. (bsc#1168994)

- CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311: Avoid
  integer overflows. (bsc#1173812)

- CVE-2020-15706: Avoid a use-after-free when redefining a function during
  execution. (bsc#1174463)

- CVE-2020-15707: Fix integer overflows in initrd size handling.
  (bsc#1174570)

This update for grub2 fixes the following non-security issue:

- A potential regression has been fixed that would cause systems with an
  updated 'grub2' to boot no longer due to a missing 'grub-calloc' linker
  symbol. (bsc#1174782)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-17"/>
	<updated date="2020-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045063">SUSE bug 1045063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174782">SUSE bug 1174782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175036">SUSE bug 1175036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175060">SUSE bug 1175060</bugzilla>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578050" comment="grub2-x86_64-efi-2.00-0.53.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578051" comment="grub2-x86_64-xen-2.00-0.53.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40410" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578052" comment="grub2-x86_64-efi-2.00-0.53.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578053" comment="grub2-x86_64-xen-2.00-0.53.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40411" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)


grub2 was updated to version 2.02, same as in SUSE Linux Enterprise 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578054" comment="grub2-x86_64-efi-2.02-0.53.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578055" comment="grub2-x86_64-xen-2.02-0.53.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40412" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: Out of bounds memory read in windows_icon_typefind (bsc#1013669).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578056" comment="gstreamer-0_10-plugins-base-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578057" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578058" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578059" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578060" comment="libgstapp-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578061" comment="libgstapp-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578062" comment="libgstinterfaces-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578063" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40413" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578064" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578065" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578066" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578067" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578068" comment="libgstapp-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578069" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578070" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578071" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40414" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<description>

gstreamer-0_10-plugins-good was updated to fix six security issues.

These security issues were fixed:

- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102)
- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103)
- CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104).
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655)
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653)
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578072" comment="gstreamer-0_10-plugins-good-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578073" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578074" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40415" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40416" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40417" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>

This update for gtk2 fixes the following security issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578085" comment="gtk2-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578086" comment="gtk2-32bit-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578087" comment="gtk2-doc-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578088" comment="gtk2-lang-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40418" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578089" comment="gtk2-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578090" comment="gtk2-32bit-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578091" comment="gtk2-doc-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578092" comment="gtk2-lang-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40419" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1039465" ref_url="https://bugzilla.suse.com/1039465" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<description>
This update for gtk2 provides the following fixes:

These security issues were fixed:

- CVE-2017-6312: Prevent integer overflow that allowed context-dependent
  attackers to cause a denial of service (segmentation fault and application
  crash) via a crafted image entry offset in an ICO file (bsc#1027026).
- CVE-2017-6314: The make_available_at_least function allowed context-dependent
  attackers to cause a denial of service (infinite loop) via a large TIFF file
  (bsc#1027025).
- CVE-2017-6313: Prevent integer underflow in the load_resources function that
  allowed context-dependent attackers to cause a denial of service (out-of-bounds
  read and program crash) via a crafted image entry size in an ICO file
  (bsc#1027024).
- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544).

This non-security issue was fixed:

- Prevent an infinite loop when a window is destroyed while traversed (bsc#1039465).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039465">SUSE bug 1039465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578093" comment="gtk2-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578094" comment="gtk2-32bit-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578095" comment="gtk2-doc-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578096" comment="gtk2-lang-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40420" version="1" class="patch">
	<metadata>
		<title>Security update for guestfs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="845720" ref_url="https://bugzilla.suse.com/845720" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>

A predictable socketname in the guestfish commandline tool could be used by 
a local attacker to gain access to guestfish sessions of other users on the 
same system. (CVE-2013-4419)

Security Issue reference:

    * CVE-2013-4419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-24"/>
	<updated date="2013-10-24"/>
	<bugzilla href="https://bugzilla.suse.com/845720">SUSE bug 845720</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578097" comment="guestfs-data-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578098" comment="guestfs-tools-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578099" comment="guestfsd-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578100" comment="libguestfs0-1.20.4-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578097" comment="guestfs-data-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578098" comment="guestfs-tools-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578099" comment="guestfsd-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578100" comment="libguestfs0-1.20.4-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578097" comment="guestfs-data-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578098" comment="guestfs-tools-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578099" comment="guestfsd-1.20.4-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578100" comment="libguestfs0-1.20.4-0.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40421" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571967" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40422" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683759" comment="gzip-1.3.12-69.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40423" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log).

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576209" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576210" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40424" version="1" class="patch">
	<metadata>
		<title>Security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1151867" ref_url="https://bugzilla.suse.com/1151867" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
This update for hunspell fixes the following issues:

- CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring (bsc#1151867).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571977" comment="hunspell-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571978" comment="hunspell-32bit-1.2.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571979" comment="hunspell-tools-1.2.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40425" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue in icu:

    * CVE-2014-9654: insufficient size limit checks in regular expression
      compiler (bsc#917129)

Security Issues:

    * CVE-2014-9654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-18"/>
	<updated date="2015-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578101" comment="libicu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578102" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578103" comment="libicu-doc-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578104" comment="libicu-x86-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578101" comment="libicu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578102" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578103" comment="libicu-doc-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578104" comment="libicu-x86-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578101" comment="libicu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578102" comment="libicu-32bit-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578103" comment="libicu-doc-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578104" comment="libicu-x86-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40426" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952260" ref_url="https://bugzilla.suse.com/952260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>

This update for icu fixes the following issue:

The previous patch for CVE-2014-9654 was incorrect and lead
to non-working regular expressions. This update fixes this 
problem (bsc#952260)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578105" comment="libicu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564558" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578106" comment="libicu-doc-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40427" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571983" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564562" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571984" comment="libicu-doc-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40428" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571985" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564566" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571986" comment="libicu-doc-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40429" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571987" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564570" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571988" comment="libicu-doc-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40430" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154302" ref_url="https://bugzilla.suse.com/1154302" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3692" ref_url="https://www.suse.com/security/cve/CVE-2019-3692/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2019-3692: Fixed a local privilege escalation from any user to 'news' (bsc#1154302).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154302">SUSE bug 1154302</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3692/">CVE-2019-3692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571990" comment="inn-2.4.2-170.21.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40431" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571991" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40432" version="1" class="patch">
	<metadata>
		<title>Security update for intel-SINIT (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069754" ref_url="https://bugzilla.suse.com/1069754" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5174" ref_url="https://www.suse.com/security/cve/CVE-2011-5174/" source="CVE"/>
		<description>
This update for intel-SINIT fixes the following issues:

Security issue fixed:

- CVE-2011-5174: Fixed security issue in old SINIT files which allowed local users to bypass the TXT protection mechanism (bsc#1069754). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-13"/>
	<updated date="2017-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069754">SUSE bug 1069754</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-5174/">CVE-2011-5174</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578107" comment="intel-SINIT-1-0.81.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40433" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="931989" ref_url="https://bugzilla.suse.com/931989" source="BUGZILLA"/>
		<reference ref_id="939810" ref_url="https://bugzilla.suse.com/939810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001531.html" source="SUSE-SU"/>
		<description>
ipsec-tools was updated to fix one security issue and a bug.

This security issue was fixed:

- CVE-2015-4047: racoon/gssapi.c in ipsec-tools allowed remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests (bsc#931989).

Due to a packaging error, the racoonf.conf config file was symlinked to /usr/share/doc/packages/ipsec-tools/examples/racoon/samples/racoon.conf
on some processor platforms, edits might have happened only in this example file.

Before upgrading, please check if /etc/racoon/racoon.conf is a symlink to this example file and backup the content. (bsc#939810)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939810">SUSE bug 939810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40434" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571994" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40435" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="954102" ref_url="https://bugzilla.suse.com/954102" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001828.html" source="SUSE-SU"/>
		<description>

This update to jakarta-commons-collections 3.2.2 fixes the following security issues:

* bsc#954102 code-execution by unserialization
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954102">SUSE bug 954102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40436" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="862781" ref_url="https://bugzilla.suse.com/862781" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>

This update fixes a security issue with jakarta-commons-fileupload:

    * bnc#862781: denial of service due to too-small buffer size used
      (CVE-2014-0050)

Security Issue reference:

    * CVE-2014-0050
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-03"/>
	<updated date="2014-04-03"/>
	<bugzilla href="https://bugzilla.suse.com/862781">SUSE bug 862781</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578109" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578110" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578109" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578110" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578109" comment="jakarta-commons-fileupload-1.1.1-1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578110" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40437" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40438" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40439" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following security issues:

    * 

      CVE-2014-8137: Double free in jas_iccattrval_destroy(). Double call
      to free() allowed attackers to cause a denial of service or possibly
      have unspecified other impact via unknown vectors. (bsc#909474)

    * 

      CVE-2014-8138: Heap overflow in jas_decode(). This could be used to
      do an arbitrary write and could result in arbitrary code execution.
      (bsc#909475)

    * 

      CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot(). Could
      allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image, which
      triggers a heap-based buffer overflow. (bsc#911837)

    * 

      CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c.
      Could allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image.
      (bsc#911837)

Security Issues:

    * CVE-2014-8138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138&gt;
    * CVE-2014-8137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137&gt;
    * CVE-2014-8157
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157&gt;
    * CVE-2014-8158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-03"/>
	<updated date="2015-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578111" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578112" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578113" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578111" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578112" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578113" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578111" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578112" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578113" comment="libjasper-x86-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40440" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572006" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572007" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40441" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572008" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572009" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40442" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572010" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572011" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40443" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010783" ref_url="https://bugzilla.suse.com/1010783" source="BUGZILLA"/>
		<reference ref_id="1087020" ref_url="https://bugzilla.suse.com/1087020" source="BUGZILLA"/>
		<reference ref_id="1117505" ref_url="https://bugzilla.suse.com/1117505" source="BUGZILLA"/>
		<reference ref_id="1117507" ref_url="https://bugzilla.suse.com/1117507" source="BUGZILLA"/>
		<reference ref_id="1117508" ref_url="https://bugzilla.suse.com/1117508" source="BUGZILLA"/>
		<reference ref_id="1117511" ref_url="https://bugzilla.suse.com/1117511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:

- CVE-2018-19540: Fixed  a heap based overflow in jas_icctxtdesc_input (bsc#1117508).
- CVE-2018-19541: Fix heap based overread in jas_image_depalettize (bsc#1117507).    
- CVE-2018-19542: Fixed a denial of service in jp2_decode (bsc#1117505).
- CVE-2018-19539: Fixed a denial of service in jas_image_readcmpt (bsc#1117511).
- CVE-2018-9055: Fixed a denial of service in jpc_firstone (bsc#1087020).
- CVE-2016-9396: Fixed a denial of service in jpc_cox_getcompparms (bsc#1010783).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117505">SUSE bug 1117505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117507">SUSE bug 1117507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117508">SUSE bug 1117508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117511">SUSE bug 1117511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572012" comment="libjasper-1.900.14-134.33.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572013" comment="libjasper-32bit-1.900.14-134.33.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40444" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010786" ref_url="https://bugzilla.suse.com/1010786" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1011829" ref_url="https://bugzilla.suse.com/1011829" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9397" ref_url="https://www.suse.com/security/cve/CVE-2016-9397/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2016-9397: Fix assert in jpc_dequantize (bsc#1010786).
- CVE-2016-9557: Fix signed integer overflow (bsc#1011829).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9397/">CVE-2016-9397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572014" comment="libjasper-1.900.14-134.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572015" comment="libjasper-32bit-1.900.14-134.33.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40445" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572016" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572017" comment="libjasper-32bit-1.900.14-134.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40446" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668400" comment="libjasper-1.900.14-134.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668401" comment="libjasper-32bit-1.900.14-134.33.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40447" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182104" ref_url="https://bugzilla.suse.com/1182104" source="BUGZILLA"/>
		<reference ref_id="1182105" ref_url="https://bugzilla.suse.com/1182105" source="BUGZILLA"/>
		<reference ref_id="1184757" ref_url="https://bugzilla.suse.com/1184757" source="BUGZILLA"/>
		<reference ref_id="1184798" ref_url="https://bugzilla.suse.com/1184798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-3467: Fixed NULL pointer deref in jp2_decode() (bsc#1184757). 
- CVE-2021-3443: Fixed NULL pointer deref in jp2_decode() (bsc#1184798).
- CVE-2021-26927: Fixed NULL pointer deref in jp2_decode() (bsc#1182104).
- CVE-2021-26926: Fixed an out of bounds read in jp2_decode() (bsc#1182105).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-29"/>
	<updated date="2022-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182104">SUSE bug 1182104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182105">SUSE bug 1182105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184757">SUSE bug 1184757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184798">SUSE bug 1184798</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680672" comment="libjasper-1.900.14-134.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680673" comment="libjasper-32bit-1.900.14-134.33.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40448" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html" source="SUSE-SU"/>
		<description>

java-1_6_0-ibm has been updated to version 1.6.0_sr16.2 to fix 18 security 
issues.

These security issues has been fixed:

    * Unspecified vulnerability in Oracle Java SE 6u81 (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578114" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578115" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578116" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578117" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578114" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578115" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578116" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578117" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578114" comment="java-1_6_0-ibm-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578115" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578116" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578117" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578118" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40449" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="936844" ref_url="https://bugzilla.suse.com/936844" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to version 6 SR16 FP7 (6.0-16.7) to fix several security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. (bnc#935540)
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.

The following non-security bugs were fixed:

* bsc#936844: misconfigured update-alternative entries
* bsc#941939: provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936844">SUSE bug 936844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578119" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578120" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578121" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578119" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578120" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578121" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578119" comment="java-1_6_0-ibm-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572027" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578120" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578121" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.7-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572030" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.7-10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40450" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572031" comment="java-1_6_0-ibm-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572032" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572033" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572034" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40451" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="960286" ref_url="https://bugzilla.suse.com/960286" source="BUGZILLA"/>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937)

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
- bsc#960286: resolve package conflicts in the fonts subpackage
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960286">SUSE bug 960286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578122" comment="java-1_6_0-ibm-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578123" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578124" comment="java-1_6_0-ibm-devel-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578125" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578126" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.20-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578127" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.20-51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40452" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.6.0 SR16 FP25 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576232" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576233" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576234" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576235" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576236" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576237" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576232" comment="java-1_6_0-ibm-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576233" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576234" comment="java-1_6_0-ibm-devel-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576235" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576236" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.25-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576237" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.25-69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40453" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00018.html" source="SUSE-SU"/>
		<description>

IBM Java 6 was updated to version 6.0-16.30.

Following security issue was fixed: CVE-2016-3485

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576238" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576239" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576240" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576241" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576242" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576238" comment="java-1_6_0-ibm-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567999" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576239" comment="java-1_6_0-ibm-devel-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576240" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576241" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.30-75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576242" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.30-75.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40454" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:

- Version update to 6.0-16.35 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576243" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576244" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576245" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576246" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576247" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576243" comment="java-1_6_0-ibm-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568005" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576244" comment="java-1_6_0-ibm-devel-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576245" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576246" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.35-78.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576247" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.35-78.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40455" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<description>

This update for java-1_6_0-ibm to 8.0-4.1 fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572047" comment="java-1_6_0-ibm-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572048" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572049" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.41-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572050" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.41-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40456" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues:


  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578128" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568011" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578129" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578130" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578131" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578132" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578128" comment="java-1_6_0-ibm-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568011" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578129" comment="java-1_6_0-ibm-devel-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578130" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578131" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.45-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578132" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.45-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40457" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<description>
This update for java-1_6_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 6.0.16.50 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2017-10355 CVE-2017-10357
    CVE-2017-10348 CVE-2017-10349 CVE-2017-10347 CVE-2017-10350
    CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-19"/>
	<updated date="2017-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578133" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568017" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578134" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578135" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578136" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578137" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578133" comment="java-1_6_0-ibm-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568017" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578134" comment="java-1_6_0-ibm-devel-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578135" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578136" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.50-85.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578137" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.50-85.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40458" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_6_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<description>

This update for java-1_6_0-ibm fixes the following issues: 

- Version update to 6.0-16.15 bsc#955131:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006

  CVE-2015-2808 CVE-2015-2625 CVE-2015-0491 CVE-2015-0459 CVE-2015-0469
  CVE-2015-0458 CVE-2015-0480 CVE-2015-0488 CVE-2015-0478 CVE-2015-0477
  CVE-2015-0204		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578138" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578139" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578140" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578138" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578139" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578140" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578138" comment="java-1_6_0-ibm-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576249" comment="java-1_6_0-ibm-alsa-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578139" comment="java-1_6_0-ibm-fonts-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578140" comment="java-1_6_0-ibm-jdbc-1.6.0_sr16.15-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576253" comment="java-1_6_0-ibm-plugin-1.6.0_sr16.15-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40459" version="1" class="patch">
	<metadata>
		<title>Security update for IBM Java</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="904889" ref_url="https://bugzilla.suse.com/904889" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<description>

java-1_7_0-ibm has been updated to version 1.7.0_sr7.2 to fix 21 security 
issues.

These security issues have been fixed:

    * Unspecified vulnerability (CVE-2014-3065).
    * The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
      products, uses nondeterministic CBC padding, which makes it easier
      for man-in-the-middle attackers to obtain cleartext data via a
      padding-oracle attack, aka the 'POODLE' issue (CVE-2014-3566).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and
      Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via vectors related to
      AWT (CVE-2014-6513).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors (CVE-2014-6456).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532
      (CVE-2014-6503).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503
      (CVE-2014-6532).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-4288).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment, a different
      vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532
      (CVE-2014-6493).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Firefox, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6492).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows local users to affect confidentiality, integrity, and
      availability via unknown vectors related to Deployment
      (CVE-2014-6458).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20,
      when running on Internet Explorer, allows local users to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Deployment (CVE-2014-6466).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality, integrity, and availability via unknown vectors
      related to Libraries (CVE-2014-6506).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect integrity via unknown vectors related to
      Deployment, a different vulnerability than CVE-2014-6527
      (CVE-2014-6476).
    * Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20
      allows remote attackers to affect integrity via unknown vectors
      related to Deployment (CVE-2014-6515).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20 allows remote attackers to affect confidentiality via unknown
      vectors related to 2D (CVE-2014-6511).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      confidentiality via unknown vectors related to Libraries
      (CVE-2014-6531).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows
      remote attackers to affect integrity via unknown vectors related to
      Libraries (CVE-2014-6512).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows
      remote attackers to affect confidentiality and integrity via vectors
      related to JSSE (CVE-2014-6457).
    * Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows
      remote attackers to affect integrity via unknown vectors related to
      Deployment, a different vulnerability than CVE-2014-6476
      (CVE-2014-6527).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20, and Java SE Embedded 7u60, allows remote attackers to affect
      integrity via unknown vectors related to Libraries (CVE-2014-6502).
    * Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and
      8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3
      allows remote attackers to affect integrity via unknown vectors
      related to Security (CVE-2014-6558).

More information can be found at 
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014
&lt;http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2014&gt;

Security Issues:

    * CVE-2014-3065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-6506
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506&gt;
    * CVE-2014-6511
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511&gt;
    * CVE-2014-6531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531&gt;
    * CVE-2014-6512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512&gt;
    * CVE-2014-6457
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457&gt;
    * CVE-2014-6502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502&gt;
    * CVE-2014-6558
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558&gt;
    * CVE-2014-6513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513&gt;
    * CVE-2014-6503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503&gt;
    * CVE-2014-4288
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288&gt;
    * CVE-2014-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493&gt;
    * CVE-2014-6532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532&gt;
    * CVE-2014-6492
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492&gt;
    * CVE-2014-6458
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458&gt;
    * CVE-2014-6466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466&gt;
    * CVE-2014-6515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515&gt;
    * CVE-2014-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456&gt;
    * CVE-2014-6476
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476&gt;
    * CVE-2014-6527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-21"/>
	<updated date="2014-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578141" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578142" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578143" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578144" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578141" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578142" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578143" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578144" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578141" comment="java-1_7_0-ibm-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578142" comment="java-1_7_0-ibm-alsa-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578143" comment="java-1_7_0-ibm-jdbc-1.7.0_sr8.0-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578144" comment="java-1_7_0-ibm-plugin-1.7.0_sr8.0-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40460" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<description>
java-1_7_0-ibm was updated to fix 21 security issues.

These security issues were fixed:
- CVE-2015-4729: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-4748: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security (bsc#938895).
- CVE-2015-2664: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment (bsc#938895).
- CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allowed remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine (bsc#938895).
- CVE-2015-2613: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-4731: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX (bsc#938895).
- CVE-2015-2637: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4733: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI (bsc#938895).
- CVE-2015-4732: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590 (bsc#938895).
- CVE-2015-2621: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allowed remote attackers to affect confidentiality via vectors related to JMX (bsc#938895).
- CVE-2015-2619: Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2590: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732 (bsc#938895).
- CVE-2015-2638: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-2625: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JSSE (bsc#938895).
- CVE-2015-2632: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#938895).
- CVE-2015-1931: Unspecified vulnerability (bsc#938895).
- CVE-2015-4760: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#938895).
- CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the 'Logjam' issue (bsc#935540).
- CVE-2015-2601: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect confidentiality via vectors related to JCE (bsc#938895).
- CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, did not properly combine state data with key data during the initialization phase, which made it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the 'Bar Mitzvah' issue (bsc#938895).
- CVE-2015-4749: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allowed remote attackers to affect availability via vectors related to JNDI (bsc#938895).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578145" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578146" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578145" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578146" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578145" comment="java-1_7_0-ibm-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576260" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578146" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.10-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576263" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.10-9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40461" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<description>
The java-1_7_0-ibm package was updated to version 7.0-9.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.0-9.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578147" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578148" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578147" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578148" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578147" comment="java-1_7_0-ibm-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576265" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578148" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.20-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576268" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.20-42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40462" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578149" comment="java-1_7_0-ibm-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578150" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578151" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578152" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40463" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-02"/>
	<updated date="2016-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578153" comment="java-1_7_0-ibm-1.7.0_sr9.30-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578154" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.30-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578155" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.30-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578156" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.30-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40464" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.0 SR9 FP40 release fixes the following issues:

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576274" comment="java-1_7_0-ibm-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576275" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576277" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576278" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576274" comment="java-1_7_0-ibm-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576275" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576277" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.40-52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576278" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.40-52.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40465" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<description>

IBM Java 7 was updated to 7.1-9.50, fixing bugs and security issues (bsc#992537).

Security issues fixed:
  CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-10"/>
	<updated date="2016-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576279" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576280" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576281" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576282" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576283" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576279" comment="java-1_7_0-ibm-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576280" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576281" comment="java-1_7_0-ibm-devel-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576282" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.50-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576283" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.50-55.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40466" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

- Version update to 7.0-9.60 (bsc#1009280, bsc#992537) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576284" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576285" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576286" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576287" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576288" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576284" comment="java-1_7_0-ibm-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576285" comment="java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576286" comment="java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576287" comment="java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576288" comment="java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40467" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578157" comment="java-1_7_0-ibm-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578158" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578159" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578160" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578161" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578157" comment="java-1_7_0-ibm-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578158" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578159" comment="java-1_7_0-ibm-devel-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578160" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.1-61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578161" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.1-61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40468" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-ibm fixes the following issues:

Version update to 7.0-10.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578162" comment="java-1_7_0-ibm-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578163" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578164" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578165" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578166" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578162" comment="java-1_7_0-ibm-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578163" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578164" comment="java-1_7_0-ibm-devel-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578165" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.5-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578166" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.5-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40469" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578167" comment="java-1_7_0-ibm-1.7.0_sr10.10-65.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578168" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.10-65.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578169" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.10-65.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578170" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.10-65.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40470" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Security update to version 7.0.10.15 (bsc#1070162):
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10356
    CVE-2017-10293 CVE-2016-9841  CVE-2016-10165 CVE-2017-10355
    CVE-2017-10357 CVE-2017-10348 CVE-2017-10349 CVE-2017-10347
    CVE-2017-10350 CVE-2017-10281 CVE-2017-10295 CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-10"/>
	<updated date="2018-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578171" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578172" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578173" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578174" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578175" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578171" comment="java-1_7_0-ibm-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578172" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578173" comment="java-1_7_0-ibm-devel-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578174" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.15-65.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578175" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.15-65.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40471" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<description>

  
This update for java-1_7_0-ibm provides the following fixes:

The version was updated to 7.0.10.20 [bsc#1082810]:

* Following security issues were fixed:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

    - IJ04281 Class Libraries: Startup time increase after applying
      	      apar IV96905
    - IJ03822 Class Libraries: Update timezone information to tzdata2017c
    - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
      	      trace, log was not enabled by default
    - IJ03607 JIT Compiler: Result String contains a redundant dot when
      	      converted from BigDecimal with 0 on all platforms
    - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
    - IJ04282 Security: Change in location and default of jurisdiction
      	      policy files
    - IJ03853 Security: IBMCAC provider does not support SHA224
    - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
      	      specification attribute
    - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
    - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
      	      stash, JKS Chain issue and JVM argument parse issue with iKeyman
    - IJ02284 JIT Compiler: Division by zero in JIT compiler

    - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578176" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578177" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578178" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578179" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578180" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578176" comment="java-1_7_0-ibm-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578177" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578178" comment="java-1_7_0-ibm-devel-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578179" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.20-65.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578180" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.20-65.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40472" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

IBM Java was updated to 7.1.4.25 (bsc#1093311, bsc#1085449)

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-29"/>
	<updated date="2018-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578181" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578182" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578183" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578184" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578185" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578181" comment="java-1_7_0-ibm-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578182" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578183" comment="java-1_7_0-ibm-devel-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578184" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.25-65.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578185" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.25-65.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40473" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578186" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578187" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578188" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578189" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578190" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578186" comment="java-1_7_0-ibm-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578187" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578188" comment="java-1_7_0-ibm-devel-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578189" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.30-65.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578190" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.30-65.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40474" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<description>


java-1_7_0-ibm is updated to Java 7.0 Service Refresh 10 Fix Pack 35 (bsc#1116574):

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS

* Java Virtual Machine

  - IJ10931 CVE-2018-3169

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING

* Security
  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578191" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578192" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578193" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578194" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578195" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578191" comment="java-1_7_0-ibm-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578192" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578193" comment="java-1_7_0-ibm-devel-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578194" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.35-65.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578195" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.35-65.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40475" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm to version 7.0.10.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578196" comment="java-1_7_0-ibm-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578197" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578198" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578199" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40476" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Update to Java 7.0 Service Refresh 10 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-23"/>
	<updated date="2019-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578200" comment="java-1_7_0-ibm-1.7.0_sr10.45-65.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578201" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.45-65.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578202" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.45-65.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578203" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.45-65.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40477" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:
	  
Update to Java 7.0 Service Refresh 10 Fix Pack 50 (bsc#1147021).

Security issues fixed:

- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1147021).
- CVE-2019-4473: Fixed insecure RPATH in multiple binaries on AIX (bsc#1147021).
- CVE-2019-7317: Fixed use-after-free in libpng, affecting client-libs/java.awt (bsc#1147021).
- CVE-2019-11771: Fixed insecure RPATH in OpenJ9 on AIX (bsc#1147021).
- CVE-2019-11775: Fixed failure to privatize a value pulled out of the loop by versioning (bsc#1147021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-04"/>
	<updated date="2019-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578204" comment="java-1_7_0-ibm-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578205" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578206" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.50-65.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578207" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.50-65.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40478" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to 7.0 Service Refresh 10 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958 CVE-2019-2962
    CVE-2019-2964 CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2999 CVE-2019-2973
    CVE-2019-2981    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578208" comment="java-1_7_0-ibm-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578209" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578210" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.55-65.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578211" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.55-65.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40479" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:
Java was updated to 7.0 Service Refresh 10 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-20"/>
	<updated date="2020-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578212" comment="java-1_7_0-ibm-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578213" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578214" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.60-65.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578215" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.60-65.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40480" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578216" comment="java-1_7_0-ibm-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578217" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578218" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.65-65.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578219" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.65-65.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40481" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE

- The pack200 and unpack200 alternatives should be slaves of java [bsc#1171352]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578220" comment="java-1_7_0-ibm-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578221" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578222" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.70-65.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578223" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.70-65.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40482" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578224" comment="java-1_7_0-ibm-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578225" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578226" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578227" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40483" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

- Update to Java 7.0 Service Refresh 10 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578228" comment="java-1_7_0-ibm-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578229" comment="java-1_7_0-ibm-alsa-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578230" comment="java-1_7_0-ibm-jdbc-1.7.0_sr10.80-65.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578231" comment="java-1_7_0-ibm-plugin-1.7.0_sr10.80-65.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40484" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This update for java-1_7_0-ibm fixes the following issues:

Update Java 7.0 to Service Refresh 11 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-23"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674103" comment="java-1_7_0-ibm-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674104" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674105" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.5-65.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674106" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.5-65.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40485" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662525" comment="java-1_7_0-ibm-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662526" comment="java-1_7_0-ibm-alsa-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662527" comment="java-1_7_0-ibm-jdbc-1.7.0_sr11.0-65.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662528" comment="java-1_7_0-ibm-plugin-1.7.0_sr11.0-65.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40486" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572067" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572068" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572069" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40487" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128712" ref_url="https://bugzilla.suse.com/1128712" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This update for jpeg fixes the following issue:

Security issue fixed: 

- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row function
  which could allow to an attacker to cause denial of service (bsc#1128712).
- CVE-2018-11212: Fixed divide by zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-14498: Fixed denial of service in get_8bit_row in rdbmp.c (bsc#1128712).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572070" comment="jpeg-6b-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572071" comment="libjpeg-6.2.0-879.12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572072" comment="libjpeg-32bit-6.2.0-879.12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40488" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="1172995" ref_url="https://bugzilla.suse.com/1172995" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="CVE-2020-14152" ref_url="https://www.suse.com/security/cve/CVE-2020-14152/" source="CVE"/>
		<description>
This update for jpeg fixes the following issues:

- CVE-2020-14152: Fixed an improper implementation which vould have potentially exhausted the memory (bsc#1172995).
- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14152/">CVE-2020-14152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572073" comment="jpeg-6b-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572074" comment="libjpeg-6.2.0-879.12.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572075" comment="libjpeg-32bit-6.2.0-879.12.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40489" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578232" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578233" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578234" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578235" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578236" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578232" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578233" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578234" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578235" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578236" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578232" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578233" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578234" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578235" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578236" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40490" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001292.html" source="SUSE-SU"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578237" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578237" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572086" comment="kde4-l10n-bg-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572087" comment="kde4-l10n-ca-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572088" comment="kde4-l10n-csb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572089" comment="kde4-l10n-el-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572090" comment="kde4-l10n-et-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572091" comment="kde4-l10n-eu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572092" comment="kde4-l10n-fi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572093" comment="kde4-l10n-ga-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572094" comment="kde4-l10n-gl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572095" comment="kde4-l10n-hi-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572096" comment="kde4-l10n-is-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572097" comment="kde4-l10n-kk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572098" comment="kde4-l10n-km-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572099" comment="kde4-l10n-ku-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572100" comment="kde4-l10n-lt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572101" comment="kde4-l10n-lv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572102" comment="kde4-l10n-mk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572103" comment="kde4-l10n-ml-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572104" comment="kde4-l10n-nds-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572105" comment="kde4-l10n-nn-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572106" comment="kde4-l10n-pa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572107" comment="kde4-l10n-ro-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572108" comment="kde4-l10n-sl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572109" comment="kde4-l10n-th-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572110" comment="kde4-l10n-tr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572111" comment="kde4-l10n-uk-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572112" comment="kde4-l10n-wa-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578237" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40491" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40492" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572119" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564597" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572120" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564601" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40493" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the kdelibs4 KSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578243" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578244" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578245" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578246" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578247" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578248" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578249" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578250" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578243" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578244" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578245" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578246" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578247" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578248" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578249" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578250" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578243" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578244" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563392" comment="kdelibs4-doc-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578245" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578246" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578247" comment="libkde4-x86-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578248" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578249" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578250" comment="libkdecore4-x86-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40494" version="1" class="patch">
	<metadata>
		<title>Security update for kdirstat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="868682" ref_url="https://bugzilla.suse.com/868682" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527/" source="CVE"/>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in
      kcleanup

Security Issues:

    * CVE-2014-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527&gt;
    * CVE-2014-2528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578251" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578251" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578251" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40495" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871134" ref_url="https://bugzilla.suse.com/871134" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879304" ref_url="https://bugzilla.suse.com/879304" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891281" ref_url="https://bugzilla.suse.com/891281" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="891746" ref_url="https://bugzilla.suse.com/891746" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895608" ref_url="https://bugzilla.suse.com/895608" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux 
kernel through 3.14.5 does not ensure that calls have two different futex 
addresses, which allows local users to gain privileges via a crafted 
FUTEX_REQUEUE command that facilitates unsafe waiter modification. 
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs 
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec 
(bnc#891746). - Add option to automatically enforce module signatures when 
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). 
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported 
new patches of Lock down functions for UEFI secure boot Also updated 
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file 
system snapshot. - Btrfs: abort the transaction when we does not find our 
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - 
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile 
flags on seqlock retry. - Btrfs: does not check nodes for extent items. - 
Btrfs: fix a possible deadlock between scrub and transaction committing. - 
Btrfs: fix corruption after write/fsync failure + fsync + log recovery 
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated 
checksums (bnc#891619). - Btrfs: fix double free in 
find_lock_delalloc_range. - Btrfs: fix possible memory leak in 
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config 
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected 
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when 
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) 
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - 
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - 
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - 
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - 
drm/i915: create functions for the 'unclaimed register' checks 
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks 
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory 
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - 
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). 
- hibernate: Disable in a signed modules environment (bnc#884333). - 
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init 
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory 
barriers for send / receive (bnc#885382). - inet: add a redirect generation 
id in inetpeer (bnc#860593). - inetpeer: initialize -&gt;redirect_genid in 
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() 
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base 
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: 
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - 
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). 
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - 
kexec: Disable at runtime if the kernel enforces module loading 
restrictions (bnc#884333). - md/raid6: avoid data corruption during 
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of 
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized 
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE 
check in vma_has_reserves() - mm, hugetlb: change variable name 
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE 
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus 
pages - mm, hugetlb: do not use a page in page cache for cow optimization - 
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, 
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting 
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: 
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which 
check availability of free huge page - mm, hugetlb: protect reserved pages 
when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets 
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy 
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples 
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - 
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: 
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid 
escalating the SCSI error handler if the command is not found in firmware 
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost 
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware 
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue 
abort command for outstanding commands during cleanup when only firmware is 
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to 
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host 
can_queue value based on available resources (bnc#859840). - restore 
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy 
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the 
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: 
Enable integrated ASCII console per default (bnc#885262, LTC#112035). - 
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start 
(bnc#833820). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix 
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - 
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add 
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity 
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - 
x86/UV: Update UV support for external NMI signals (bnc#888847). - 
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number 
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port 
access when module security is enabled (bnc#884333). - x86: Restrict MSR 
access when module loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871134">SUSE bug 871134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879304">SUSE bug 879304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891281">SUSE bug 891281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891746">SUSE bug 891746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895608">SUSE bug 895608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578252" comment="kernel-bigsmp-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578253" comment="kernel-bigsmp-base-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578254" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578255" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578256" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578257" comment="kernel-default-man-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578258" comment="kernel-ec2-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578259" comment="kernel-ec2-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578260" comment="kernel-ec2-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578261" comment="kernel-ppc64-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578262" comment="kernel-ppc64-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578263" comment="kernel-ppc64-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578264" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578265" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578266" comment="kernel-trace-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578267" comment="kernel-trace-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578268" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578252" comment="kernel-bigsmp-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578253" comment="kernel-bigsmp-base-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578254" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578255" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578256" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578257" comment="kernel-default-man-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578258" comment="kernel-ec2-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578259" comment="kernel-ec2-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578260" comment="kernel-ec2-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578261" comment="kernel-ppc64-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578262" comment="kernel-ppc64-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578263" comment="kernel-ppc64-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578264" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578265" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578266" comment="kernel-trace-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578267" comment="kernel-trace-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578268" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40496" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="919351" ref_url="https://bugzilla.suse.com/919351" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="962404" ref_url="https://bugzilla.suse.com/962404" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="966460" ref_url="https://bugzilla.suse.com/966460" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="974428" ref_url="https://bugzilla.suse.com/974428" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="987709" ref_url="https://bugzilla.suse.com/987709" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3955" ref_url="https://www.suse.com/security/cve/CVE-2016-3955/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)

The following non-security bugs were fixed:
- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
- Update PCI VPD size patch to upstream: 
  * PCI: Determine actual VPD size on first access (bsc#971729). 
  * PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
- hid-elo: kill not flush the work.
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- nfs: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- nfs: reduce access cache shrinker locking (bnc#866130).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
- usbhid: more mice with ALWAYS_POLL (bsc#919351).
- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
- veth: do not modify ip_summed (bsc#969149).
- virtio_scsi: Implement eh_timed_out callback.
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919351">SUSE bug 919351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962404">SUSE bug 962404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966460">SUSE bug 966460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974428">SUSE bug 974428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-3955/">CVE-2016-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578269" comment="kernel-bigsmp-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578270" comment="kernel-bigsmp-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578271" comment="kernel-bigsmp-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578272" comment="kernel-default-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578273" comment="kernel-default-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578274" comment="kernel-default-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578275" comment="kernel-default-man-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578276" comment="kernel-ec2-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578277" comment="kernel-ec2-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578278" comment="kernel-ec2-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568113" comment="kernel-pae-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568114" comment="kernel-pae-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568115" comment="kernel-pae-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578279" comment="kernel-source-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578280" comment="kernel-syms-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578281" comment="kernel-trace-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578282" comment="kernel-trace-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578283" comment="kernel-trace-devel-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578284" comment="kernel-xen-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578285" comment="kernel-xen-base-3.0.101-0.47.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578286" comment="kernel-xen-devel-3.0.101-0.47.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40497" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP 3 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578287" comment="kernel-bigsmp-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578288" comment="kernel-bigsmp-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578289" comment="kernel-bigsmp-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578290" comment="kernel-default-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578291" comment="kernel-default-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578292" comment="kernel-default-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578293" comment="kernel-default-man-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578294" comment="kernel-ec2-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578295" comment="kernel-ec2-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578296" comment="kernel-ec2-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568130" comment="kernel-pae-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568131" comment="kernel-pae-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568132" comment="kernel-pae-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578297" comment="kernel-source-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578298" comment="kernel-syms-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578299" comment="kernel-trace-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578300" comment="kernel-trace-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578301" comment="kernel-trace-devel-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578302" comment="kernel-xen-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578303" comment="kernel-xen-base-3.0.101-0.47.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578304" comment="kernel-xen-devel-3.0.101-0.47.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40498" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00005.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following security bug:

CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver (drivers/tty/n_hdlc.c)
could have been exploited to gain a local privilege escalation (bnc#1027565)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-03"/>
	<updated date="2017-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578305" comment="kernel-bigsmp-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578306" comment="kernel-bigsmp-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578307" comment="kernel-bigsmp-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578308" comment="kernel-default-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578309" comment="kernel-default-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578310" comment="kernel-default-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578311" comment="kernel-default-man-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578312" comment="kernel-ec2-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578313" comment="kernel-ec2-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578314" comment="kernel-ec2-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568147" comment="kernel-pae-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568148" comment="kernel-pae-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568149" comment="kernel-pae-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578315" comment="kernel-source-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578316" comment="kernel-syms-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578317" comment="kernel-trace-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578318" comment="kernel-trace-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578319" comment="kernel-trace-devel-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578320" comment="kernel-xen-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578321" comment="kernel-xen-base-3.0.101-0.47.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578322" comment="kernel-xen-devel-3.0.101-0.47.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40499" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00012.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.

The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using 
more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page
  to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a 
hardening measure against this kind of userland attack.(bsc#1039348)

- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain 
privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero 
(bnc#979021).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578323" comment="kernel-bigsmp-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578324" comment="kernel-bigsmp-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578325" comment="kernel-bigsmp-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578326" comment="kernel-default-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578327" comment="kernel-default-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578328" comment="kernel-default-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578329" comment="kernel-default-man-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578330" comment="kernel-ec2-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578331" comment="kernel-ec2-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578332" comment="kernel-ec2-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568164" comment="kernel-pae-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568165" comment="kernel-pae-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568166" comment="kernel-pae-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578333" comment="kernel-source-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578334" comment="kernel-syms-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578335" comment="kernel-trace-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578336" comment="kernel-trace-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578337" comment="kernel-trace-devel-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578338" comment="kernel-xen-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578339" comment="kernel-xen-base-3.0.101-0.47.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578340" comment="kernel-xen-devel-3.0.101-0.47.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40500" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00037.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340, bsc#1045406]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578341" comment="kernel-bigsmp-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578342" comment="kernel-bigsmp-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578343" comment="kernel-bigsmp-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578344" comment="kernel-default-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578345" comment="kernel-default-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578346" comment="kernel-default-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578347" comment="kernel-default-man-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578348" comment="kernel-ec2-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578349" comment="kernel-ec2-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578350" comment="kernel-ec2-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568181" comment="kernel-pae-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568182" comment="kernel-pae-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568183" comment="kernel-pae-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578351" comment="kernel-source-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578352" comment="kernel-syms-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578353" comment="kernel-trace-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578354" comment="kernel-trace-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578355" comment="kernel-trace-devel-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578356" comment="kernel-xen-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578357" comment="kernel-xen-base-3.0.101-0.47.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578358" comment="kernel-xen-devel-3.0.101-0.47.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40501" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00017.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following issues:

- Stack corruption could have lead to local privilege escalation
  (bsc#1059525, CVE-2017-1000253).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-13"/>
	<updated date="2017-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578359" comment="kernel-bigsmp-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578360" comment="kernel-bigsmp-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578361" comment="kernel-bigsmp-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578362" comment="kernel-default-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578363" comment="kernel-default-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578364" comment="kernel-default-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578365" comment="kernel-default-man-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578366" comment="kernel-ec2-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578367" comment="kernel-ec2-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578368" comment="kernel-ec2-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568198" comment="kernel-pae-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568199" comment="kernel-pae-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568200" comment="kernel-pae-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578369" comment="kernel-source-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578370" comment="kernel-syms-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578371" comment="kernel-trace-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578372" comment="kernel-trace-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578373" comment="kernel-trace-devel-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578374" comment="kernel-xen-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578375" comment="kernel-xen-base-3.0.101-0.47.106.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578376" comment="kernel-xen-devel-3.0.101-0.47.106.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40502" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912).
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322).
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119).

The following non-security bugs were fixed:

- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: x86: Free vmx_msr_bitmap_longmode while kvm_init failed (bsc#1104367).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578377" comment="kernel-bigsmp-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578378" comment="kernel-bigsmp-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578379" comment="kernel-bigsmp-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578380" comment="kernel-default-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578381" comment="kernel-default-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578382" comment="kernel-default-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578383" comment="kernel-default-man-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578384" comment="kernel-ec2-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578385" comment="kernel-ec2-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578386" comment="kernel-ec2-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568215" comment="kernel-pae-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568216" comment="kernel-pae-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568217" comment="kernel-pae-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578387" comment="kernel-source-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578388" comment="kernel-syms-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578389" comment="kernel-trace-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578390" comment="kernel-trace-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578391" comment="kernel-trace-devel-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578392" comment="kernel-xen-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578393" comment="kernel-xen-base-3.0.101-0.47.106.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578394" comment="kernel-xen-devel-3.0.101-0.47.106.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40503" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="851068" ref_url="https://bugzilla.suse.com/851068" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="927786" ref_url="https://bugzilla.suse.com/927786" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930761" ref_url="https://bugzilla.suse.com/930761" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931538" ref_url="https://bugzilla.suse.com/931538" source="BUGZILLA"/>
		<reference ref_id="932348" ref_url="https://bugzilla.suse.com/932348" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934742" ref_url="https://bugzilla.suse.com/934742" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:

- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel allowed local users to bypass intended
  size restrictions and trigger read operations on additional memory
  locations by changing the handle_bytes value of a file handle during
  the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
  to a crash which could occur while fetching inode information from a
  corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
  issues in handling UDF filesystems in the Linux kernel allowed the
  corruption of kernel memory and other issues. An attacker able to mount
  a corrupted/malicious UDF file system image could cause the kernel to
  crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
  PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
  kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
  to obtain sensitive information from uninitialized locations in host OS
  kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
  read and write functionality did not take into account the I/O vectors
  that were already processed when retrying after a failed atomic access
  operation, potentially resulting in memory corruption due to an I/O vector
  array overrun. A local, unprivileged user could use this flaw to crash
  the system or, potentially, escalate their privileges on the system.
  (bsc#933429).


Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler  (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851068">SUSE bug 851068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927786">SUSE bug 927786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930761">SUSE bug 930761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931538">SUSE bug 931538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932348">SUSE bug 932348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934742">SUSE bug 934742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578395" comment="kernel-bigsmp-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578396" comment="kernel-bigsmp-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578397" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578398" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578399" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578400" comment="kernel-default-man-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578401" comment="kernel-ec2-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578402" comment="kernel-ec2-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578403" comment="kernel-ec2-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578404" comment="kernel-ppc64-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578405" comment="kernel-ppc64-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578406" comment="kernel-ppc64-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578407" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578408" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578409" comment="kernel-trace-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578410" comment="kernel-trace-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578411" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578395" comment="kernel-bigsmp-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578396" comment="kernel-bigsmp-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578397" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578398" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578399" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578400" comment="kernel-default-man-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578401" comment="kernel-ec2-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578402" comment="kernel-ec2-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578403" comment="kernel-ec2-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578404" comment="kernel-ppc64-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578405" comment="kernel-ppc64-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578406" comment="kernel-ppc64-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578407" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578408" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578409" comment="kernel-trace-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578410" comment="kernel-trace-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578411" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40504" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="781018" ref_url="https://bugzilla.suse.com/781018" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="934787" ref_url="https://bugzilla.suse.com/934787" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941514" ref_url="https://bugzilla.suse.com/941514" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="946122" ref_url="https://bugzilla.suse.com/946122" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955354" ref_url="https://bugzilla.suse.com/955354" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956707" ref_url="https://bugzilla.suse.com/956707" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961518" ref_url="https://bugzilla.suse.com/961518" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="963998" ref_url="https://bugzilla.suse.com/963998" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="965923" ref_url="https://bugzilla.suse.com/965923" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967863" ref_url="https://bugzilla.suse.com/967863" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3955" ref_url="https://www.suse.com/security/cve/CVE-2016-3955/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically
  proximate attackers to cause a denial of service (system crash) via
  a crafted no-journal filesystem, a related issue to CVE-2013-2015
  (bnc#956707).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-7566: A malicious USB device could cause kernel crashes in
  the visor device driver (bnc#961512).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in
  the Linux kernel did not ensure that certain slot numbers are valid,
  which allowed local users to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
  (bnc#949936).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux
  kernel did not validate attempted changes to the MTU value, which allowed
  context-dependent attackers to cause a denial of service (packet loss)
  via a value that is (1) smaller than the minimum compliant value or
  (2) larger than the MTU of an interface, as demonstrated by a Router
  Advertisement (RA) message that is not validated by a daemon, a different
  vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is
  limited to the NetworkManager product (bnc#955354).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Optimizations introduced by the compiler could have
  lead to double fetch vulnerabilities, potentially possibly leading to
  arbitrary code execution in backend (bsc#957988). (bsc#957988 XSA-155).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an
  x86 system and using Linux as the driver domain, allowed local guest
  administrators to hit BUG conditions and cause a denial of service
  (NULL pointer dereference and host OS crash) by leveraging a system with
  access to a passed-through MSI or MSI-X capable physical PCI device
  and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback
  missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an
  x86 system and using Linux as the driver domain, allowed local guest
  administrators to generate a continuous stream of WARN messages and
  cause a denial of service (disk consumption) by leveraging a system with
  access to a passed-through MSI or MSI-X capable physical PCI device and
  XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks
  (bnc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel do not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in
  the Linux kernel did not verify an address length, which allowed local
  users to obtain sensitive information from kernel memory and bypass the
  KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when
  the network was considered congested. The kernel would incorrectly
  misinterpret the congestion as an error condition and incorrectly
  free/clean up the skb. When the device would then send the skb's queued,
  these structures would be referenced and may panic the system
  or allow an attacker to escalate privileges in a use-after-free
  scenario.(bsc#966437).
- CVE-2015-8816: A malicious USB device could cause kernel crashes in
  the in hub_activate() function (bnc#968010).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: A race in invalidating paging structures that were not
  in use locally could have lead to disclosoure of information or arbitrary
  code exectution (bnc#963767).
- CVE-2016-2143: On zSeries a fork of a large process could have caused
  memory corruption due to incorrect page table handling. (bnc#970504,
  LTC#138810).
- CVE-2016-2184: A malicious USB device could cause kernel crashes in
  the alsa usb-audio device driver (bsc#971125).
- CVE-2016-2185: A malicious USB device could cause kernel crashes in
  the usb_driver_claim_interface function (bnc#971124).
- CVE-2016-2186: A malicious USB device could cause kernel crashes in
  the powermate device driver (bnc#970958).
- CVE-2016-2384: A double free on the ALSA umidi object was
  fixed. (bsc#966693).
- CVE-2016-2543: A missing NULL check at remove_events ioctl in the ALSA
  seq driver was fixed. (bsc#967972).
- CVE-2016-2544: Fix race at timer setup and close in the ALSA seq driver
  was fixed. (bsc#967973).
- CVE-2016-2545: A double unlink of active_list in the ALSA timer driver
  was fixed. (bsc#967974).
- CVE-2016-2546: A race among ALSA timer ioctls was fixed (bsc#967975).
- CVE-2016-2547,CVE-2016-2548: The ALSA slave
  timer list handling was hardened against hangs and
  races. (CVE-2016-2547,CVE-2016-2548,bsc#968011,bsc#968012).
- CVE-2016-2549: A stall in ALSA hrtimer handling was fixed (bsc#968013).
- CVE-2016-2782: A malicious USB device could cause kernel crashes in
  the visor device driver (bnc#968670).
- CVE-2016-3137: A malicious USB device could cause kernel crashes in
  the cypress_m8 device driver (bnc#970970).
- CVE-2016-3139: A malicious USB device could cause kernel crashes in
  the wacom device driver (bnc#970909).
- CVE-2016-3140: A malicious USB device could cause kernel crashes in
  the digi_acceleport device driver (bnc#970892).
- CVE-2016-3156: A quadratic algorithm could lead to long
  kernel ipv4 hangs when removing a device with a large number of
  addresses. (bsc#971360).
- CVE-2016-3955: A remote buffer overflow in the usbip driver could be used
  by authenticated attackers to crash the kernel. (bsc#975945)
- CVE-2016-2847: A local user could exhaust kernel memory by pushing lots of data
  into pipes. (bsc#970948).
- CVE-2016-2188: A malicious USB device could cause kernel crashes in the
  iowarrior device driver (bnc#970956).
- CVE-2016-3138: A malicious USB device could cause kernel crashes in the
  cdc-acm device driver (bnc#970911).

The following non-security bugs were fixed:
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- cifs: Schedule on hard mount retry (bsc#941514).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kbuild: create directory for dir/file.o (bsc#959312).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfs: use smaller allocations for 'struct id_map' (bsc#965923).
- nfsv4: Fix two infinite loops in the mount code (bsc#954628).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pciback: do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
- pciback: for XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled.
- pciback: return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled.
- pciback: return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled.
- pci: Update VPD size with correct length (bsc#958906).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rdma/ucma: Fix AB-BA deadlock (bsc#963998).
- README.BRANCH: Switch to LTSS mode
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Restore kabi after lock-owner change (bnc#968141).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- scsi: mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- sunrcp: restore fair scheduling to priority queues (bsc#955308).
- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- vmxnet3: fix netpoll race condition (bsc#958912).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: fix maintenance of guest/host xcr0 state (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- x86/mce: Fix return value of mce_chrdev_read() when erst is disabled (bsc#934787).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfrm: do not segment UFO packets (bsc#946122).
- xhci: silence TD warning (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934787">SUSE bug 934787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941514">SUSE bug 941514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946122">SUSE bug 946122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956707">SUSE bug 956707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961518">SUSE bug 961518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963998">SUSE bug 963998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965923">SUSE bug 965923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967863">SUSE bug 967863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-3955/">CVE-2016-3955</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578412" comment="kernel-bigsmp-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578413" comment="kernel-bigsmp-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578414" comment="kernel-bigsmp-devel-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578415" comment="kernel-default-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578416" comment="kernel-default-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578417" comment="kernel-default-devel-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578418" comment="kernel-default-man-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578419" comment="kernel-ec2-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578420" comment="kernel-ec2-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578421" comment="kernel-ec2-devel-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578422" comment="kernel-pae-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578423" comment="kernel-pae-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578424" comment="kernel-pae-devel-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578425" comment="kernel-source-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578426" comment="kernel-syms-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578427" comment="kernel-trace-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578428" comment="kernel-trace-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578429" comment="kernel-trace-devel-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578430" comment="kernel-xen-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578431" comment="kernel-xen-base-3.0.101-0.47.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578432" comment="kernel-xen-devel-3.0.101-0.47.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40505" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1069708" ref_url="https://bugzilla.suse.com/1069708" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1074033" ref_url="https://bugzilla.suse.com/1074033" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please contact your CPU / hardware vendor for potential microcode
  or BIOS updates needed for this fix.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This feature is disabled on unaffected architectures.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ) was vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space (bnc#1057389).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer was fixed. (bnc#1072876).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel didn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702 1069708).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695 1074033).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- asm alternatives: remove incorrect alignment notes.
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- ptrace: Add a new thread access check (bsc#1068032).
- Revert 'mac80211: accept key reinstall without changing anything' This reverts commit 1def0d4e1446974356bacd9f4be06eee32b66473.
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi: mpt2sas: fix cleanup on controller resource mapping failure (bsc#999245).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- temporary fix (bsc#1068032).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578433" comment="kernel-bigsmp-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578434" comment="kernel-bigsmp-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578435" comment="kernel-bigsmp-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578436" comment="kernel-default-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578437" comment="kernel-default-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578438" comment="kernel-default-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578439" comment="kernel-default-man-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578440" comment="kernel-ec2-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578441" comment="kernel-ec2-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578442" comment="kernel-ec2-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568232" comment="kernel-pae-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568233" comment="kernel-pae-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568234" comment="kernel-pae-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578443" comment="kernel-source-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578444" comment="kernel-syms-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578445" comment="kernel-trace-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578446" comment="kernel-trace-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578447" comment="kernel-trace-devel-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578448" comment="kernel-xen-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578449" comment="kernel-xen-base-3.0.101-0.47.106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578450" comment="kernel-xen-devel-3.0.101-0.47.106.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40506" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578451" comment="kernel-default-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578452" comment="kernel-default-base-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578453" comment="kernel-default-devel-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578454" comment="kernel-default-man-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578455" comment="kernel-source-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578456" comment="kernel-syms-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578457" comment="kernel-trace-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578458" comment="kernel-trace-base-3.0.101-0.47.106.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578459" comment="kernel-trace-devel-3.0.101-0.47.106.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40507" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).

The following non-security bugs were fixed:

- cdc-acm: apply quirk for card reader (bsc#1060279).
- Enable CPU vulnerabilities reporting via sysfs
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382, bnc#1076278).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- Move kABI fixup for retpolines to proper place.
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578460" comment="kernel-bigsmp-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578461" comment="kernel-bigsmp-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578462" comment="kernel-bigsmp-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578463" comment="kernel-default-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578464" comment="kernel-default-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578465" comment="kernel-default-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578466" comment="kernel-default-man-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578467" comment="kernel-ec2-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578468" comment="kernel-ec2-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578469" comment="kernel-ec2-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568249" comment="kernel-pae-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568250" comment="kernel-pae-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568251" comment="kernel-pae-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578470" comment="kernel-source-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578471" comment="kernel-syms-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578472" comment="kernel-trace-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578473" comment="kernel-trace-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578474" comment="kernel-trace-devel-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578475" comment="kernel-xen-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578476" comment="kernel-xen-base-3.0.101-0.47.106.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578477" comment="kernel-xen-devel-3.0.101-0.47.106.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40508" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed
  local users to cause a denial of service (use-after-free) or possibly
  have unspecified other impact via crafted system calls (bnc#1091755).
- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.
- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions
  merged from the upstream kernel.

The following non-security bugs were fixed:

- Update config files. Set CONFIG_RETPOLINE=y for i386.
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578478" comment="kernel-bigsmp-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578479" comment="kernel-bigsmp-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578480" comment="kernel-bigsmp-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578481" comment="kernel-default-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578482" comment="kernel-default-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578483" comment="kernel-default-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578484" comment="kernel-default-man-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578485" comment="kernel-ec2-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578486" comment="kernel-ec2-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578487" comment="kernel-ec2-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568266" comment="kernel-pae-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568267" comment="kernel-pae-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568268" comment="kernel-pae-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578488" comment="kernel-source-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578489" comment="kernel-syms-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578490" comment="kernel-trace-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578491" comment="kernel-trace-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578492" comment="kernel-trace-devel-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578493" comment="kernel-xen-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578494" comment="kernel-xen-base-3.0.101-0.47.106.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578495" comment="kernel-xen-devel-3.0.101-0.47.106.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40509" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578496" comment="kernel-bigsmp-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578497" comment="kernel-bigsmp-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578498" comment="kernel-bigsmp-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578499" comment="kernel-default-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578500" comment="kernel-default-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578501" comment="kernel-default-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578502" comment="kernel-default-man-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578503" comment="kernel-ec2-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578504" comment="kernel-ec2-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578505" comment="kernel-ec2-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568283" comment="kernel-pae-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568284" comment="kernel-pae-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568285" comment="kernel-pae-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578506" comment="kernel-source-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578507" comment="kernel-syms-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578508" comment="kernel-trace-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578509" comment="kernel-trace-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578510" comment="kernel-trace-devel-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578511" comment="kernel-xen-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578512" comment="kernel-xen-base-3.0.101-0.47.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578513" comment="kernel-xen-devel-3.0.101-0.47.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40510" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1094186" ref_url="https://bugzilla.suse.com/1094186" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1104070" ref_url="https://bugzilla.suse.com/1104070" source="BUGZILLA"/>
		<reference ref_id="1104366" ref_url="https://bugzilla.suse.com/1104366" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1107189" ref_url="https://bugzilla.suse.com/1107189" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109200" ref_url="https://bugzilla.suse.com/1109200" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1116412" ref_url="https://bugzilla.suse.com/1116412" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117515" ref_url="https://bugzilla.suse.com/1117515" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="905299" ref_url="https://bugzilla.suse.com/905299" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1108498).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: Fixed a denial of service, which was caused by flooding the diagnostic port 0x80 an exception leading to a kernel panic (bnc#1071021).

The following non-security bugs were fixed:

- ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018, bsc#1104366).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- Drivers: scsi: storvsc: Change the limits to reflect the values on the host (bug#1107189).
- drivers: scsi: storvsc: Correctly handle TEST_UNIT_READY failure (bug#1107189).
- Drivers: scsi: storvsc: Filter commands based on the storage protocol version (bug#1107189).
- Drivers: scsi: storvsc: Fix a bug in handling VMBUS protocol version (bug#1107189).
- Drivers: scsi: storvsc: Implement a eh_timed_out handler (bug#1107189).
- Drivers: scsi: storvsc: Set cmd_per_lun to reflect value supported by the Host (bug#1107189).
- drivers: scsi: storvsc: Set srb_flags in all cases (bug#1107189).
- EHCI: improved logic for isochronous scheduling (bsc#1117515).
- ipv4: remove the unnecessary variable in udp_mcast_next (bsc#1104070).
- KEYS: prevent creating a different user's keyrings (bnc#1094186).
- KVM: x86: Fix the duplicate failure path handling in vmx_init (bsc#1104367).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#1116412).
- MM/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#1116412).
- net/ipv6/udp: Fix ipv6 multicast socket filter regression (bsc#1104070).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#1116412).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#1116412).
- NFS: Do not write enable new pages while an invalidation is proceeding (bsc#1116412).
- NFS: Fix a regression in the read() syscall (bsc#1116412).
- NFS: Fix races in nfs_revalidate_mapping (bsc#1116412).
- NFS: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#1116412).
- NFS: Fix writeback performance issue on cache invalidation (bsc#1116412).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- reiserfs: fix race in readdir (bsc#1039803).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: storvsc: Always send on the selected outgoing channel (bug#1107189).
- scsi: storvsc: Do not assume that the scatterlist is not chained (bug#1107189).
- scsi: storvsc: Fix a bug in copy_from_bounce_buffer() (bug#1107189).
- scsi: storvsc: Increase the ring buffer size (bug#1107189).
- scsi: storvsc: Size the queue depth based on the ringbuffer size (bug#1107189).
- storvsc: fix a bug in storvsc limits (bug#1107189).
- storvsc: force discovery of LUNs that may have been removed (bug#1107189).
- storvsc: get rid of overly verbose warning messages (bug#1107189).
- storvsc: in responce to a scan event, scan the host (bug#1107189).
- storvsc: Set the SRB flags correctly when no data transfer is needed (bug#1107189).
- udp: ipv4: Add udp early demux (bsc#1104070).
- udp: restore UDPlite many-cast delivery (bsc#1104070).
- udp: Simplify __udp*_lib_mcast_deliver (bsc#1104070).
- udp: Use hash2 for long hash1 chains in __udp*_lib_mcast_deliver (bsc#1104070).
- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
- USB: EHCI: add symbolic constants for QHs (bsc#1117515).
- USB: EHCI: always scan each interrupt QH (bsc#1117515).
- USB: EHCI: do not lose events during a scan (bsc#1117515).
- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
- USB: EHCI: do not refcount QHs (bsc#1117515).
- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).
- USB: EHCI: fix up locking (bsc#1117515).
- USB: EHCI: initialize data before resetting hardware (bsc#1117515).
- USB: EHCI: introduce high-res timer (bsc#1117515).
- USB: EHCI: remove PS3 status polling (bsc#1117515).
- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
- USB: EHCI: rename 'reclaim' (bsc#1117515).
- USB: EHCI: resolve some unlikely races (bsc#1117515).
- USB: EHCI: return void instead of 0 (bsc#1117515).
- USB: EHCI: simplify isochronous scanning (bsc#1117515).
- USB: EHCI: unlink multiple async QHs together (bsc#1117515).
- USB: EHCI: use hrtimer for async schedule (bsc#1117515).
- USB: EHCI: use hrtimer for controller death (bsc#1117515).
- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
- XFS: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- XFS: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- XFS: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-29"/>
	<updated date="2019-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094186">SUSE bug 1094186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104070">SUSE bug 1104070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104366">SUSE bug 1104366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107189">SUSE bug 1107189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109200">SUSE bug 1109200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116412">SUSE bug 1116412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117515">SUSE bug 1117515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905299">SUSE bug 905299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578514" comment="kernel-bigsmp-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578515" comment="kernel-bigsmp-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578516" comment="kernel-bigsmp-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578517" comment="kernel-default-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578518" comment="kernel-default-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578519" comment="kernel-default-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578520" comment="kernel-default-man-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578521" comment="kernel-ec2-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578522" comment="kernel-ec2-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578523" comment="kernel-ec2-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568300" comment="kernel-pae-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568301" comment="kernel-pae-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568302" comment="kernel-pae-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578524" comment="kernel-source-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578525" comment="kernel-syms-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578526" comment="kernel-trace-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578527" comment="kernel-trace-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578528" comment="kernel-trace-devel-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578529" comment="kernel-xen-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578530" comment="kernel-xen-base-3.0.101-0.47.106.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578531" comment="kernel-xen-devel-3.0.101-0.47.106.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40511" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - Add option to automatically enforce module 
signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() 
call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() 
(bnc#880344). - Backported new patches of Lock down functions for UEFI 
secure boot Also updated series.conf and removed old patches. - Btrfs: 
Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction 
when we does not find our extent ref. - Btrfs: avoid warning bomb of 
btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - 
Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not 
check nodes for extent items. - Btrfs: fix a possible deadlock between 
scrub and transaction committing. - Btrfs: fix corruption after write/fsync 
failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree 
corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix 
double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak 
in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if 
enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at 
driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed 
register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed 
register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map 
fbdev memory (bnc #806990). - e1000e: enable support for new device IDs 
(bnc#885509). - fs/fscache: remove spin_lock() from the condition in 
while() (bnc#880344). - hibernate: Disable in a signed modules environment 
(bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - 
ibmvscsi: Abort init sequence during error recovery (bnc#885382). - 
ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add 
a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize 
-&gt;redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix 
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of 
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang 
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading 
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load 
of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty 
reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if 
the kernel enforces module loading restrictions (bnc#884333). - md/raid6: 
avoid data corruption during recovery of double-degraded RAID6. - memcg, 
vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - mm, 
hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change 
variable name reservations to resv - mm, hugetlb: decrement reserve count 
if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when 
gathering surplus pages - mm, hugetlb: do not use a page in page cache for 
cow optimization - mm, hugetlb: fix and clean-up node iteration code to 
alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix 
subpool accounting handling - mm, hugetlb: improve page-fault scalability - 
mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up 
the code which check availability of free huge page - mm, hugetlb: protect 
reserved pages when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114). - 
perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add 
memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic 
memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the 
SCSI error handler if the command is not found in firmware (bnc#859840). - 
qla2xxx: Clear loop_id for ports that are marked lost during fabric 
scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during 
the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command 
for outstanding commands during cleanup when only firmware is alive 
(bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete 
during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue 
value based on available resources (bnc#859840). - restore smp_mb() in 
unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing 
for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical 
signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable 
integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: 
use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86/UV: Add call to 
KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI 
handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI 
handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: 
Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix 
Sparse warnings (bnc#888847). - x86: Lock down IO port access when module 
security is enabled (bnc#884333). - x86: Restrict MSR access when module 
loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578532" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578533" comment="kernel-bigsmp-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578534" comment="kernel-bigsmp-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566743" comment="kernel-bigsmp-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578535" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578536" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578532" comment="iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578533" comment="kernel-bigsmp-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578534" comment="kernel-bigsmp-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566743" comment="kernel-bigsmp-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578535" comment="ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578536" comment="oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

The following non-security bugs were fixed:

- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- xen/x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600). 
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578537" comment="kernel-bigsmp-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578538" comment="kernel-bigsmp-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578539" comment="kernel-bigsmp-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578540" comment="kernel-default-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578541" comment="kernel-default-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578542" comment="kernel-default-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578543" comment="kernel-default-man-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578544" comment="kernel-ec2-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578545" comment="kernel-ec2-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578546" comment="kernel-ec2-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568317" comment="kernel-pae-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568318" comment="kernel-pae-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568319" comment="kernel-pae-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578547" comment="kernel-source-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578548" comment="kernel-syms-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578549" comment="kernel-trace-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578550" comment="kernel-trace-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578551" comment="kernel-trace-devel-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578552" comment="kernel-xen-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578553" comment="kernel-xen-base-3.0.101-0.47.106.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578554" comment="kernel-xen-devel-3.0.101-0.47.106.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40513" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="926007" ref_url="https://bugzilla.suse.com/926007" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).

The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926007">SUSE bug 926007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578555" comment="kernel-bigsmp-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578556" comment="kernel-bigsmp-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578557" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578558" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578559" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578560" comment="kernel-default-man-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578561" comment="kernel-ec2-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578562" comment="kernel-ec2-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578563" comment="kernel-ec2-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578564" comment="kernel-ppc64-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578565" comment="kernel-ppc64-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578566" comment="kernel-ppc64-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578567" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578568" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578569" comment="kernel-trace-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578570" comment="kernel-trace-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578571" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578555" comment="kernel-bigsmp-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578556" comment="kernel-bigsmp-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578557" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578558" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578559" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578560" comment="kernel-default-man-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578561" comment="kernel-ec2-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578562" comment="kernel-ec2-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578563" comment="kernel-ec2-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578564" comment="kernel-ppc64-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578565" comment="kernel-ppc64-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578566" comment="kernel-ppc64-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578567" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578568" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578569" comment="kernel-trace-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578570" comment="kernel-trace-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578571" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40514" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-24"/>
	<updated date="2016-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578572" comment="kernel-bigsmp-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578573" comment="kernel-bigsmp-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578574" comment="kernel-bigsmp-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578575" comment="kernel-default-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578576" comment="kernel-default-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578577" comment="kernel-default-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578578" comment="kernel-default-man-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578579" comment="kernel-ec2-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578580" comment="kernel-ec2-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578581" comment="kernel-ec2-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568334" comment="kernel-pae-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568335" comment="kernel-pae-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568336" comment="kernel-pae-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578582" comment="kernel-source-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578583" comment="kernel-syms-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578584" comment="kernel-trace-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578585" comment="kernel-trace-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578586" comment="kernel-trace-devel-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578587" comment="kernel-xen-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578588" comment="kernel-xen-base-3.0.101-0.47.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578589" comment="kernel-xen-devel-3.0.101-0.47.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40515" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025013" ref_url="https://bugzilla.suse.com/1025013" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1027179" ref_url="https://bugzilla.suse.com/1027179" source="BUGZILLA"/>
		<reference ref_id="1027406" ref_url="https://bugzilla.suse.com/1027406" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1030575" ref_url="https://bugzilla.suse.com/1030575" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031481" ref_url="https://bugzilla.suse.com/1031481" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1031660" ref_url="https://bugzilla.suse.com/1031660" source="BUGZILLA"/>
		<reference ref_id="1033287" ref_url="https://bugzilla.suse.com/1033287" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1034838" ref_url="https://bugzilla.suse.com/1034838" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1037182" ref_url="https://bugzilla.suse.com/1037182" source="BUGZILLA"/>
		<reference ref_id="1037183" ref_url="https://bugzilla.suse.com/1037183" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038564" ref_url="https://bugzilla.suse.com/1038564" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038883" ref_url="https://bugzilla.suse.com/1038883" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039349" ref_url="https://bugzilla.suse.com/1039349" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1042364" ref_url="https://bugzilla.suse.com/1042364" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042892" ref_url="https://bugzilla.suse.com/1042892" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050677" ref_url="https://bugzilla.suse.com/1050677" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053760" ref_url="https://bugzilla.suse.com/1053760" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="870618" ref_url="https://bugzilla.suse.com/870618" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bsc#1030593).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bsc#1029850).
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bsc#1038879).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 1050677 ).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336)
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability. This requires a malicious PCI Card. (bnc#1037994).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038544).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1039883).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1040069).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).
- CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary  could have overflowed the parport_nr array in the following code (bnc#1039456).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).

The following non-security bugs were fixed:

- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- btrfs: cleanup code of btrfs_balance_delayed_items() (bsc#1034838).
- btrfs: do not run delayed nodes again after all nodes flush (bsc#1034838).
- btrfs: remove btrfs_end_transaction_dmeta() (bsc#1034838).
- btrfs: remove residual code in delayed inode async helper (bsc#1034838).
- btrfs: use flags instead of the bool variants in delayed node (bsc#1034838).
- cifs: cifs_get_root shouldn't use path with tree name, alternate fix (bsc#963655, bsc#979681, bsc#1027406).
- dentry name snapshots (bsc#1049483).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562) (bsc#948562).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919, bnc#1053760).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- keys: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- nfs: Avoid getting confused by confused server (bsc#1045416).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Make nfs_readdir revalidate less often (bsc#1048232).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi: virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- sunrpc: Clean up the slot table allocation (bsc#1013862).
- sunrpc: Initalise the struct xprt upon allocation (bsc#1013862).
- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- usb: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Use make --output-sync feature when available (bsc#1012422). 
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027406">SUSE bug 1027406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033287">SUSE bug 1033287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034838">SUSE bug 1034838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053760">SUSE bug 1053760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578590" comment="kernel-bigsmp-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578591" comment="kernel-bigsmp-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578592" comment="kernel-bigsmp-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578593" comment="kernel-default-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578594" comment="kernel-default-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578595" comment="kernel-default-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578596" comment="kernel-default-man-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578597" comment="kernel-ec2-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578598" comment="kernel-ec2-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578599" comment="kernel-ec2-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568351" comment="kernel-pae-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568352" comment="kernel-pae-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568353" comment="kernel-pae-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578600" comment="kernel-source-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578601" comment="kernel-syms-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578602" comment="kernel-trace-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578603" comment="kernel-trace-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578604" comment="kernel-trace-devel-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578605" comment="kernel-xen-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578606" comment="kernel-xen-base-3.0.101-0.47.106.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578607" comment="kernel-xen-devel-3.0.101-0.47.106.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40516" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108227" ref_url="https://bugzilla.suse.com/1108227" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="905299" ref_url="https://bugzilla.suse.com/905299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: An issue was discovered in yurex_read in drivers/usb/misc/yurex.c where local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).

The following non-security bugs were fixed:

- net: fix neighbours after MAC change (bnc#905299).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
- x86/fpu: fix signal handling with eager FPU switching (ia32) (bsc#1108227).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108227">SUSE bug 1108227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905299">SUSE bug 905299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578608" comment="kernel-bigsmp-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578609" comment="kernel-bigsmp-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578610" comment="kernel-bigsmp-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578611" comment="kernel-default-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578612" comment="kernel-default-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578613" comment="kernel-default-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578614" comment="kernel-default-man-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578615" comment="kernel-ec2-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578616" comment="kernel-ec2-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578617" comment="kernel-ec2-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568368" comment="kernel-pae-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568369" comment="kernel-pae-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568370" comment="kernel-pae-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578618" comment="kernel-source-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578619" comment="kernel-syms-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578620" comment="kernel-trace-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578621" comment="kernel-trace-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578622" comment="kernel-trace-devel-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578623" comment="kernel-xen-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578624" comment="kernel-xen-base-3.0.101-0.47.106.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578625" comment="kernel-xen-devel-3.0.101-0.47.106.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40517" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087209" ref_url="https://bugzilla.suse.com/1087209" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).
- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.
- KABI: x86/kaiser: properly align trampoline stack.
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- kvm/x86: fix icebp instruction handling (bsc#1087088).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578626" comment="kernel-bigsmp-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578627" comment="kernel-bigsmp-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578628" comment="kernel-bigsmp-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578629" comment="kernel-default-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578630" comment="kernel-default-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578631" comment="kernel-default-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578632" comment="kernel-default-man-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578633" comment="kernel-ec2-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578634" comment="kernel-ec2-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578635" comment="kernel-ec2-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568385" comment="kernel-pae-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568386" comment="kernel-pae-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568387" comment="kernel-pae-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578636" comment="kernel-source-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578637" comment="kernel-syms-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578638" comment="kernel-trace-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578639" comment="kernel-trace-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578640" comment="kernel-trace-devel-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578641" comment="kernel-xen-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578642" comment="kernel-xen-base-3.0.101-0.47.106.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578643" comment="kernel-xen-devel-3.0.101-0.47.106.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40518" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="891082" ref_url="https://bugzilla.suse.com/891082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<description>

This MIT krb5 update fixes a buffer overrun problem in kadmind:

    * bnc#891082: buffer overrun in kadmind with LDAP back end
      (MITKRB5-SA-2014-001) (CVE-2014-4345)

MIT krb5 Security Advisory 2014-001

    * http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt

Security Issues:

    * CVE-2014-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578644" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578645" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578646" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578647" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578648" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578649" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578650" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578651" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578652" comment="krb5-x86-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578644" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578645" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578646" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578647" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578648" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578649" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578650" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578651" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578652" comment="krb5-x86-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578644" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578645" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578646" comment="krb5-apps-clients-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578647" comment="krb5-apps-servers-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578648" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572175" comment="krb5-doc-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578649" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578650" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578651" comment="krb5-server-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578652" comment="krb5-x86-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40519" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40520" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40521" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572193" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572194" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572195" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572196" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572197" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40522" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572198" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572199" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572200" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572201" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572202" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572203" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40523" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="770172" ref_url="https://bugzilla.suse.com/770172" source="BUGZILLA"/>
		<reference ref_id="816413" ref_url="https://bugzilla.suse.com/816413" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="952190" ref_url="https://bugzilla.suse.com/952190" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1015" ref_url="https://www.suse.com/security/cve/CVE-2012-1015/" source="CVE"/>
		<reference ref_id="CVE-2013-1416" ref_url="https://www.suse.com/security/cve/CVE-2013-1416/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

- Incorrect string handling in build_principal_va can lead to DOS. (bsc#952190, CVE-2015-2697)
- Fix potential heap corruption and crash vulnerability described in MIT krb5 Security Advisory 2012-001. 
  (bsc#770172, CVE-2012-1015)
- Fix prep_reprocess_req NULL pointer deref. (bsc#816413, CVE-2013-1416)
- Fix Denial of service in krb5_read_message. (bsc#918595, CVE-2014-5355)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-12"/>
	<updated date="2017-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1015/">CVE-2012-1015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1416/">CVE-2013-1416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572204" comment="krb5-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572205" comment="krb5-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572206" comment="krb5-apps-clients-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572207" comment="krb5-apps-servers-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572208" comment="krb5-client-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572209" comment="krb5-devel-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572210" comment="krb5-devel-32bit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572211" comment="krb5-doc-1.8.6-133.49.121.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572212" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572213" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572214" comment="krb5-server-1.8.6-133.49.121.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40524" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025126" ref_url="https://bugzilla.suse.com/1025126" source="BUGZILLA"/>
		<reference ref_id="1049819" ref_url="https://bugzilla.suse.com/1049819" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-11368: Fix an unintended assertion failure in KDC (bsc#1049819)


Also the openssl1 LDAP library build is now used for the LDAP plugin components. (bsc#1025126).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-07"/>
	<updated date="2017-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025126">SUSE bug 1025126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572215" comment="krb5-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572216" comment="krb5-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572217" comment="krb5-apps-clients-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572218" comment="krb5-apps-servers-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572219" comment="krb5-client-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572220" comment="krb5-devel-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572221" comment="krb5-devel-32bit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572222" comment="krb5-doc-1.8.6-133.49.125.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572223" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572224" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572225" comment="krb5-server-1.8.6-133.49.125.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40525" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issues:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572226" comment="krb5-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572227" comment="krb5-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572228" comment="krb5-apps-clients-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572229" comment="krb5-apps-servers-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572230" comment="krb5-client-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572231" comment="krb5-devel-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572232" comment="krb5-devel-32bit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572233" comment="krb5-doc-1.8.6-133.49.125.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572234" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572235" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572236" comment="krb5-server-1.8.6-133.49.125.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40526" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572237" comment="krb5-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572238" comment="krb5-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572239" comment="krb5-apps-clients-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572240" comment="krb5-apps-servers-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572241" comment="krb5-client-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572242" comment="krb5-devel-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572243" comment="krb5-devel-32bit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572244" comment="krb5-doc-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572245" comment="krb5-plugin-kdb-ldap-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572246" comment="krb5-plugin-preauth-pkinit-1.8.6-133.49.125.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572247" comment="krb5-server-1.8.6-133.49.125.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40527" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578669" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578670" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578671" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578672" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578673" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578674" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578675" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578676" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578677" comment="krb5-x86-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578669" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578670" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578671" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578672" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578673" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578674" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578675" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578676" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578677" comment="krb5-x86-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578669" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578670" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578671" comment="krb5-apps-clients-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578672" comment="krb5-apps-servers-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578673" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572252" comment="krb5-doc-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578674" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578675" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578676" comment="krb5-server-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578677" comment="krb5-x86-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40528" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578678" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578679" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578680" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578681" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578682" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578683" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578684" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578685" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578686" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578678" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578679" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578680" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578681" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578682" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578683" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578684" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578685" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578686" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578678" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578679" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578680" comment="krb5-apps-clients-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578681" comment="krb5-apps-servers-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578682" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572260" comment="krb5-doc-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578683" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578684" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578685" comment="krb5-server-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578686" comment="krb5-x86-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40529" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40530" version="1" class="patch">
	<metadata>
		<title>Security update for kvm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="876842" ref_url="https://bugzilla.suse.com/876842" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="877645" ref_url="https://bugzilla.suse.com/877645" source="BUGZILLA"/>
		<reference ref_id="878541" ref_url="https://bugzilla.suse.com/878541" source="BUGZILLA"/>
		<reference ref_id="886535" ref_url="https://bugzilla.suse.com/886535" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html" source="SUSE-SU"/>
		<description>

kvm has been updated to fix issues in the embedded qemu:

    * 

      CVE-2014-0223: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could potentially have
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

    * 

      CVE-2014-3461: A user able to alter the savevm data (either on the
      disk or over the wire during migration) could have used this flaw to
      to corrupt QEMU process memory on the (destination) host, which could
      have potentially resulted in arbitrary code execution on the host
      with the privileges of the QEMU process.

    * 

      CVE-2014-0222: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could have potentially
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

Non-security bugs fixed:

    * Fix exceeding IRQ routes that could have caused freezes of guests.
      (bnc#876842)
    * Fix CPUID emulation bugs that may have broken Windows guests with
      newer -cpu types (bnc#886535)

Security Issues:

    * CVE-2014-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222&gt;
    * CVE-2014-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223&gt;
    * CVE-2014-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-19"/>
	<updated date="2014-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/876842">SUSE bug 876842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886535">SUSE bug 886535</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578696" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578696" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578696" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40531" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00000.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578697" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578697" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578697" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40532" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Bugs fixed:
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578698" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578698" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578698" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40533" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="934069" ref_url="https://bugzilla.suse.com/934069" source="BUGZILLA"/>
		<reference ref_id="936132" ref_url="https://bugzilla.suse.com/936132" source="BUGZILLA"/>
		<reference ref_id="940929" ref_url="https://bugzilla.suse.com/940929" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945987" ref_url="https://bugzilla.suse.com/945987" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="947159" ref_url="https://bugzilla.suse.com/947159" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961333" ref_url="https://bugzilla.suse.com/961333" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961556" ref_url="https://bugzilla.suse.com/961556" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="970036" ref_url="https://bugzilla.suse.com/970036" source="BUGZILLA"/>
		<reference ref_id="970037" ref_url="https://bugzilla.suse.com/970037" source="BUGZILLA"/>
		<reference ref_id="975128" ref_url="https://bugzilla.suse.com/975128" source="BUGZILLA"/>
		<reference ref_id="975136" ref_url="https://bugzilla.suse.com/975136" source="BUGZILLA"/>
		<reference ref_id="975700" ref_url="https://bugzilla.suse.com/975700" source="BUGZILLA"/>
		<reference ref_id="976109" ref_url="https://bugzilla.suse.com/976109" source="BUGZILLA"/>
		<reference ref_id="978158" ref_url="https://bugzilla.suse.com/978158" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="980711" ref_url="https://bugzilla.suse.com/980711" source="BUGZILLA"/>
		<reference ref_id="980723" ref_url="https://bugzilla.suse.com/980723" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<reference ref_id="CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix 33 security issues.

These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109) 
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).

This non-security issue was fixed:
- Fix case of IDE interface needing busy status set before flush (bsc#936132)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-28"/>
	<updated date="2016-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936132">SUSE bug 936132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578699" comment="kvm-1.4.2-46.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578699" comment="kvm-1.4.2-46.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40534" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="982017" ref_url="https://bugzilla.suse.com/982017" source="BUGZILLA"/>
		<reference ref_id="982018" ref_url="https://bugzilla.suse.com/982018" source="BUGZILLA"/>
		<reference ref_id="982019" ref_url="https://bugzilla.suse.com/982019" source="BUGZILLA"/>
		<reference ref_id="982222" ref_url="https://bugzilla.suse.com/982222" source="BUGZILLA"/>
		<reference ref_id="982223" ref_url="https://bugzilla.suse.com/982223" source="BUGZILLA"/>
		<reference ref_id="982285" ref_url="https://bugzilla.suse.com/982285" source="BUGZILLA"/>
		<reference ref_id="982959" ref_url="https://bugzilla.suse.com/982959" source="BUGZILLA"/>
		<reference ref_id="983961" ref_url="https://bugzilla.suse.com/983961" source="BUGZILLA"/>
		<reference ref_id="983982" ref_url="https://bugzilla.suse.com/983982" source="BUGZILLA"/>
		<reference ref_id="991080" ref_url="https://bugzilla.suse.com/991080" source="BUGZILLA"/>
		<reference ref_id="991466" ref_url="https://bugzilla.suse.com/991466" source="BUGZILLA"/>
		<reference ref_id="996441" ref_url="https://bugzilla.suse.com/996441" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<description>
kvm was updated to fix 16 security issues.

These security issues were fixed:
- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS.  (bsc#944697).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578700" comment="kvm-1.4.2-49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40535" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007450" ref_url="https://bugzilla.suse.com/1007450" source="BUGZILLA"/>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<description>

This update for kvm fixes the following issues:

- Address various security/stability issues
 * Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161 bsc#1001151)
 * Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
 * Fix DOS in ColdFire Fast Ethernet Controller emulation
   (CVE-2016-7908 bsc#1002550)
 * Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
 * Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
 * Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
 * Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
 * Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
 * Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
 * Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
 * Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
 * Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
 * Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
 * Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
 * Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
 * Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
 * Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)
- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE11-SP3
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578701" comment="kvm-1.4.2-52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40536" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015048" ref_url="https://bugzilla.suse.com/1015048" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031051" ref_url="https://bugzilla.suse.com/1031051" source="BUGZILLA"/>
		<reference ref_id="1034044" ref_url="https://bugzilla.suse.com/1034044" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1038396" ref_url="https://bugzilla.suse.com/1038396" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="1045035" ref_url="https://bugzilla.suse.com/1045035" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1049785" ref_url="https://bugzilla.suse.com/1049785" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674)
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902)
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-6505: The ohci_service_ed_list function allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866)
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159)
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801)
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296)
* Fix privilege escalation in TCG mode (bsc#1030624)

These non-security issues were fixed:

- bsc#1045035: Fixed regression introduced by previous virtfs security fixes
- bsc#1038396: Fixed 12 tempest tests
- bsc#1034044: Prevent KVM guests stuck when waiting for sg_io() completion
- bsc#1031051: Prevent I/O errors when using pvmove with disk device=lun
- bsc#1049785: Make virsh dump output readable by crash
- bsc#1015048: Fixed virtio interface failure 
- bsc#1016779: Fixed graphical update errors introduced by previous security fix
- Fixed various inaccuracies in cirrus vga device emulation
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015048">SUSE bug 1015048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031051">SUSE bug 1031051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034044">SUSE bug 1034044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038396">SUSE bug 1038396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045035">SUSE bug 1045035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049785">SUSE bug 1049785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578702" comment="kvm-1.4.2-53.11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578702" comment="kvm-1.4.2-53.11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40537" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00022.html" source="SUSE-SU"/>
		<description>


This update for kvm fixes the following issues:

A security flaw mitigation has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

Also a security fix has been applied:

- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578703" comment="kvm-1.4.2-53.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578703" comment="kvm-1.4.2-53.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40538" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<description>

  
This update for kvm fixes the following issues:

This update has the next round of Spectre v2 related patches,
which now integrates with corresponding changes in libvirt. A
January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution. We remove that initial patch and now
rely on patches from upstream. This update defines spec_ctrl and
ibpb cpu feature flags as well as new cpu models which are clones
of existing models with either -IBRS or -IBPB added to the end of
the model name. These new vcpu models explicitly include the new
feature(s), whereas the feature flags can be added to the cpu
parameter as with other features. In short, for continued Spectre
v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu
models is used. Although migration from older versions is
supported, the new cpu features won't be properly exposed to the
guest until it is restarted with the cpu features explicitly
added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)

For additional information on Spectre v2 as it relates to QEMU,
see:
	https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

(CVE-2017-5715 bsc#1068032)

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

Additional security fixes:

- CVE-2018-5683: An out-of-bounds read in vga_draw_text routine was fixed which could lead to crashes or information leakage. (bsc#1076114)
- CVE-2018-7550: multiboot OOB access while loading kernel image was fixed that could lead to crashes (bsc#1083291)
- CVE-2017-18030: An out-of-bounds access in cirrus_invalidate_region routine could lead to crashes or information leakage (bsc#1076179)

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578704" comment="kvm-1.4.2-53.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578704" comment="kvm-1.4.2-53.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40539" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578705" comment="kvm-1.4.2-53.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578705" comment="kvm-1.4.2-53.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40540" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-04"/>
	<updated date="2018-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578706" comment="kvm-1.4.2-53.23.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578706" comment="kvm-1.4.2-53.23.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40541" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1112185" ref_url="https://bugzilla.suse.com/1112185" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
- CVE-2018-18438: Fixed integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value (bnc#1112185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578707" comment="kvm-1.4.2-53.26.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578707" comment="kvm-1.4.2-53.26.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40542" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109544" ref_url="https://bugzilla.suse.com/1109544" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).

Non-security issue fixed:

- Fixed LAPIC TSC deadline timer save/restore (bsc#1109544)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109544">SUSE bug 1109544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578708" comment="kvm-1.4.2-53.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40543" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578709" comment="kvm-1.4.2-53.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40544" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578710" comment="kvm-1.4.2-53.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40545" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix use-after-free in slirp (CVE-2019-15890 bsc#1149811)
- Fix for similar problems as for the original fix prompting this issue (CVE-2019-6778 bsc#1123156)
- Fix potential OOB accesses in slirp (CVE-2020-8608 bsc#1163018 CVE-2020-7039 bsc#1161066)
- Fix use after free in slirp (CVE-2020-1983 bsc#1170940)
- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068 bsc#1146873)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-23"/>
	<updated date="2021-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578711" comment="kvm-1.4.2-53.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40546" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031692" ref_url="https://bugzilla.suse.com/1031692" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1186473" ref_url="https://bugzilla.suse.com/1186473" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)
- CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)
- CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)
- CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)
- CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)
- CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031692">SUSE bug 1031692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626873" comment="kvm-1.4.2-53.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40547" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630650" comment="kvm-1.4.2-53.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40548" version="1" class="patch">
	<metadata>
		<title>Security update for kvm and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="843074" ref_url="https://bugzilla.suse.com/843074" source="BUGZILLA"/>
		<reference ref_id="852397" ref_url="https://bugzilla.suse.com/852397" source="BUGZILLA"/>
		<reference ref_id="878350" ref_url="https://bugzilla.suse.com/878350" source="BUGZILLA"/>
		<reference ref_id="879665" ref_url="https://bugzilla.suse.com/879665" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="897783" ref_url="https://bugzilla.suse.com/897783" source="BUGZILLA"/>
		<reference ref_id="899144" ref_url="https://bugzilla.suse.com/899144" source="BUGZILLA"/>
		<reference ref_id="899484" ref_url="https://bugzilla.suse.com/899484" source="BUGZILLA"/>
		<reference ref_id="900084" ref_url="https://bugzilla.suse.com/900084" source="BUGZILLA"/>
		<reference ref_id="904176" ref_url="https://bugzilla.suse.com/904176" source="BUGZILLA"/>
		<reference ref_id="905097" ref_url="https://bugzilla.suse.com/905097" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="908381" ref_url="https://bugzilla.suse.com/908381" source="BUGZILLA"/>
		<reference ref_id="910145" ref_url="https://bugzilla.suse.com/910145" source="BUGZILLA"/>
		<reference ref_id="911742" ref_url="https://bugzilla.suse.com/911742" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<description>

This collective update for KVM and libvirt provides fixes for security and 
non-security issues.

kvm:

    * Fix NULL pointer dereference because of uninitialized UDP socket.
      (bsc#897654, CVE-2014-3640)
    * Fix performance degradation after migration. (bsc#878350)
    * Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag
      in FS_IOC_FIEMAP ioctl. (bsc#908381)
    * Add validate hex properties for qdev. (bsc#852397)
    * Add boot option to do strict boot (bsc#900084)
    * Add query-command-line-options QMP command. (bsc#899144)
    * Fix incorrect return value of migrate_cancel. (bsc#843074)
    * Fix insufficient parameter validation during ram load. (bsc#905097,
      CVE-2014-7840)
    * Fix insufficient blit region checks in qemu/cirrus. (bsc#907805,
      CVE-2014-8106)

libvirt:

    * Fix security hole with migratable flag in dumpxml. (bsc#904176,
      CVE-2014-7823)
    * Fix domain deadlock. (bsc#899484, CVE-2014-3657)
    * Use correct definition when looking up disk in qemu blkiotune.
      (bsc#897783, CVE-2014-3633)
    * Fix undefined symbol when starting virtlockd. (bsc#910145)
    * Add '-boot strict' to qemu's commandline whenever possible.
      (bsc#900084)
    * Add support for 'reboot-timeout' in qemu. (bsc#899144)
    * Increase QEMU's monitor timeout to 30sec. (bsc#911742)
    * Allow setting QEMU's migration max downtime any time. (bsc#879665)

Security Issues:

    * CVE-2014-7823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823&gt;
    * CVE-2014-3657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657&gt;
    * CVE-2014-3633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633&gt;
    * CVE-2014-3640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640&gt;
    * CVE-2014-7840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840&gt;
    * CVE-2014-8106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/843074">SUSE bug 843074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852397">SUSE bug 852397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878350">SUSE bug 878350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879665">SUSE bug 879665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899144">SUSE bug 899144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900084">SUSE bug 900084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908381">SUSE bug 908381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910145">SUSE bug 910145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911742">SUSE bug 911742</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578712" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578713" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578714" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578715" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578716" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578717" comment="libvirt-lock-sanlock-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578718" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578712" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578713" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578714" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578715" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578716" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578717" comment="libvirt-lock-sanlock-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578718" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578712" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578713" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578714" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578715" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578716" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578717" comment="libvirt-lock-sanlock-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578718" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40549" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576413" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576414" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576415" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576416" comment="liblcms1-x86-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40550" version="1" class="patch">
	<metadata>
		<title>Security update for less (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="921719" ref_url="https://bugzilla.suse.com/921719" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
This update for less fixes the following issues:

Security issue fixed:

- CVE-2014-9488: Malformed UTF-8 data could have caused an out of bounds read in 
  the UTF-8 decoding routines, causing an invalid read access (bsc#921719).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/921719">SUSE bug 921719</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572276" comment="less-424b-10.24.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40551" version="1" class="patch">
	<metadata>
		<title>Security update for lha (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="962528" ref_url="https://bugzilla.suse.com/962528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1925" ref_url="https://www.suse.com/security/cve/CVE-2016-1925/" source="CVE"/>
		<description>

lha was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1925: Buffer Overflow while parsing level0 and level1 headers (bsc#962528).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-28"/>
	<updated date="2016-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1925/">CVE-2016-1925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572277" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40552" version="1" class="patch">
	<metadata>
		<title>Security update for libQt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="856832" ref_url="https://bugzilla.suse.com/856832" source="BUGZILLA"/>
		<reference ref_id="859158" ref_url="https://bugzilla.suse.com/859158" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<description>

The Qt library was updated to fix a XML entity expansion attack (XXE). 
(CVE-2013-4549)

Security Issue reference:

    * CVE-2013-4549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859158">SUSE bug 859158</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578719" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578720" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578721" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578722" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578723" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578724" comment="libqt4-qt3support-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578725" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578726" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578727" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578728" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578729" comment="libqt4-sql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578730" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578731" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578732" comment="libqt4-x11-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578733" comment="libqt4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578734" comment="qt4-x11-tools-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578719" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578720" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578721" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578722" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578723" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578724" comment="libqt4-qt3support-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578725" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578726" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578727" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578728" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578729" comment="libqt4-sql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578730" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578731" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578732" comment="libqt4-x11-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578733" comment="libqt4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578734" comment="qt4-x11-tools-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578719" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563420" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563421" comment="libQtWebKit4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578720" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578721" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578722" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578723" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578724" comment="libqt4-qt3support-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578725" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578726" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578727" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578728" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578729" comment="libqt4-sql-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578730" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578731" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578732" comment="libqt4-x11-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578733" comment="libqt4-x86-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578734" comment="qt4-x11-tools-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40553" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572282" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578735" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40554" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="moderate" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572283" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40555" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670907" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40556" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681248" comment="libcaca-0.99.beta13b-49.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40557" version="1" class="patch">
	<metadata>
		<title>Security update for libcap-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="876832" ref_url="https://bugzilla.suse.com/876832" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3215" ref_url="https://www.suse.com/security/cve/CVE-2014-3215/" source="CVE"/>
		<description>
libcap-ng was updated to fix one security issue.

This security issue was fixed:

- CVE-2014-3215: seunshare in policycoreutils (which uses libcap-ng) is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which made it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges (bsc#876832).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/876832">SUSE bug 876832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3215/">CVE-2014-3215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578736" comment="libcap-ng-utils-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578737" comment="libcap-ng0-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578738" comment="libcap-ng0-32bit-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40558" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578739" comment="libcares2-1.7.4-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40559" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630424" comment="libcares2-1.7.4-7.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40560" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082821" ref_url="https://bugzilla.suse.com/1082821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<description>
This update for libcdio and libcdio-mini fixes the following issues:

Security issue fixed: 

- CVE-2017-18199: Fixed a NULL Pointer Dereference in realloc_symlink which could allow remote attackers to cause Denial of Service (bsc#1082821).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572288" comment="libcdio7-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572289" comment="libcdio7-32bit-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572290" comment="libcdio_cdda0-0.80-8.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572291" comment="libcdio_paranoia0-0.80-8.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40561" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1030747" ref_url="https://bugzilla.suse.com/1030747" source="BUGZILLA"/>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).

Bug fixes:

- bsc#1030747: Unable to use freezer sub system via libcgroup API when both freezer and cpuset subsystems are used.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1030747">SUSE bug 1030747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572292" comment="libcgroup1-0.37.1-5.19.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40562" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034481" ref_url="https://bugzilla.suse.com/1034481" source="BUGZILLA"/>
		<reference ref_id="1034482" ref_url="https://bugzilla.suse.com/1034482" source="BUGZILLA"/>
		<reference ref_id="1043898" ref_url="https://bugzilla.suse.com/1043898" source="BUGZILLA"/>
		<reference ref_id="1043899" ref_url="https://bugzilla.suse.com/1043899" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

Security issues fixed:

- CVE-2017-7960: Fixed heap overflow (input: check end of input before reading a byte) (bsc#1034481).
- CVE-2017-7961: Fixed undefined behavior (tknzr: support only max long rgb values) (bsc#1034482).
- CVE-2017-8834: Fixed denial of service (memory allocation error) via a crafted CSS file (bsc#1043898).
- CVE-2017-8871: Fixed denial of service (infinite loop and CPU consumption) via a crafted CSS file (bsc#1043899).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-13"/>
	<updated date="2019-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572293" comment="libcroco-0_6-3-0.6.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572294" comment="libcroco-0_6-3-32bit-0.6.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40563" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631918" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631919" comment="libcroco-0_6-3-32bit-0.6.1-122.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40564" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572295" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572296" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572297" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572298" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572299" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40565" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578740" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578741" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578742" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578743" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578744" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578745" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578746" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578740" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578741" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578742" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578743" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578744" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578745" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578746" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578740" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578741" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578742" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578743" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578744" comment="postgresql91-contrib-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578745" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578746" comment="postgresql91-server-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40566" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629508" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40567" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578747" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578747" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578747" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40568" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572308" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40569" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572312" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572313" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40570" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572314" comment="libexif-0.6.17-2.14.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572315" comment="libexif-32bit-0.6.17-2.14.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40571" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery 
issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578748" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578749" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578750" comment="libfreebl3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578751" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578752" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578753" comment="libsoftokn3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578754" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578755" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578756" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578757" comment="mozilla-nss-x86-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578748" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578749" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578750" comment="libfreebl3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578751" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578752" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578753" comment="libsoftokn3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578754" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578755" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578756" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578757" comment="mozilla-nss-x86-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578748" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578749" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578750" comment="libfreebl3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578751" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578752" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578753" comment="libsoftokn3-x86-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578754" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578755" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578756" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578757" comment="mozilla-nss-x86-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40572" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576472" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576473" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576474" comment="libgcrypt11-x86-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40573" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40574" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578761" comment="libgcrypt11-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578762" comment="libgcrypt11-32bit-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40575" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening a against local side-channel attack in RSA key handling has been added (bsc#1046607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578763" comment="libgcrypt11-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578764" comment="libgcrypt11-32bit-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40576" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issue fixed:

- CVE-2019-13627: Mitigated against an ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578765" comment="libgcrypt11-1.5.0-0.26.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578766" comment="libgcrypt11-32bit-1.5.0-0.26.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40577" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578767" comment="libgcrypt11-1.5.0-0.26.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578768" comment="libgcrypt11-32bit-1.5.0-0.26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40578" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578769" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578770" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578771" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578769" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578770" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578771" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578769" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578770" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578771" comment="libgcrypt11-x86-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40579" version="1" class="patch">
	<metadata>
		<title>Recommended update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578772" comment="libical0-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578773" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40580" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572336" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572337" comment="libidn-32bit-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40581" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572338" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572339" comment="libidn-32bit-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40582" version="1" class="patch">
	<metadata>
		<title>Security update for libjasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>

This update for libjasper fixes multiple off-by-one errors which could 
allow remote attackers to execute arbitrary code via a heap-based buffer 
overflow triggered by a crafted jp2 (JPEG 2000) file. (bsc#906364, 
CVE-2014-9029)

Security Issues:

    * CVE-2014-9029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578774" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578775" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578776" comment="libjasper-x86-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578774" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578775" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578776" comment="libjasper-x86-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578774" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578775" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578776" comment="libjasper-x86-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40583" version="1" class="patch">
	<metadata>
		<title>Security update for libksba
</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578777" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578777" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578777" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40584" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572342" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40585" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40586" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101)
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097)  ()
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572350" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572351" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572352" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40587" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062458" ref_url="https://bugzilla.suse.com/1062458" source="BUGZILLA"/>
		<reference ref_id="1067336" ref_url="https://bugzilla.suse.com/1067336" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2017-15101: Buffer overflow in findTable (bsc#1067336).
- CVE-2014-8184: stack-based buffer overflow in findTable() (bsc#1062458).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572353" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572354" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572355" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40588" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<description>
This update for liblouis, python-louis fixes the following issues:

Security issues fixed:

- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars()
  in compileTranslationTable.c (bsc#1095827)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572356" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572357" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572358" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40589" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<description>
This update for liblouis and python-louis fixes the following issue:

Security issue fixed: 

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572359" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572360" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572361" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40590" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1097103" ref_url="https://bugzilla.suse.com/1097103" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
This update for liblouis fixes the following issues:

- CVE-2018-12085: Fixed an off-by-one error resulting in a buffer overrun (bsc#1097103).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097103">SUSE bug 1097103</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572362" comment="liblouis-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572363" comment="liblouis0-1.7.0-1.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572364" comment="python-louis-1.7.0-1.3.19.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40591" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578779" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578780" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578781" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578779" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578780" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578781" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578779" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578780" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578781" comment="liblzo2-2-x86-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40592" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578782" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578783" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578784" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578782" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578783" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578784" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578782" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578783" comment="libmpfr1-32bit-2.3.2-3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578784" comment="libmpfr1-x86-2.3.2-3.118.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40593" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could have been exploited causing a denial of service (endless loop)
      (bnc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578785" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578785" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578785" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40594" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40595" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572370" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40596" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141680" ref_url="https://bugzilla.suse.com/1141680" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This update for libmspack fixes the following issues:

Security issue fixed: 

- CVE-2019-1010305: Fixed a buffer overflow triggered by a crafted chm file
  which could have led to information disclosure (bsc#1141680).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572371" comment="libmspack0-0.0.20060920alpha-74.11.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40597" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="887580" ref_url="https://bugzilla.suse.com/887580" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<description>

This MySQL update provides the following:

    * upgrade to version 5.5.39, [bnc#887580]
    * CVE's fixed: CVE-2014-2484, CVE-2014-4258, CVE-2014-4260,
      CVE-2014-2494, CVE-2014-4238, CVE-2014-4207, CVE-2014-4233,
      CVE-2014-4240, CVE-2014-4214, CVE-2014-4243

See also:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
&lt;http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html&gt;

Security Issues:

    * CVE-2014-2484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484&gt;
    * CVE-2014-4258
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258&gt;
    * CVE-2014-4260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260&gt;
    * CVE-2014-2494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494&gt;
    * CVE-2014-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238&gt;
    * CVE-2014-4207
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207&gt;
    * CVE-2014-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233&gt;
    * CVE-2014-4240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240&gt;
    * CVE-2014-4214
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214&gt;
    * CVE-2014-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578787" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578788" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578789" comment="libmysql55client18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578790" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578791" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578792" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578793" comment="libmysqlclient15-x86-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578794" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578795" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578796" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578797" comment="mysql-tools-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578787" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578788" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578789" comment="libmysql55client18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578790" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578791" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578792" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578793" comment="libmysqlclient15-x86-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578794" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578795" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578796" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578797" comment="mysql-tools-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578787" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578788" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578789" comment="libmysql55client18-x86-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578790" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578791" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578792" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578793" comment="libmysqlclient15-x86-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578794" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578795" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578796" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578797" comment="mysql-tools-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40598" version="1" class="patch">
	<metadata>
		<title>Security update for libnl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020123" ref_url="https://bugzilla.suse.com/1020123" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386/" source="CVE"/>
		<description>
This update for libnl fixes the following issues:

Security issue fixed:

- CVE-2017-0386: Fixed a privilege escalation vulnerability which allowed a local user to execute code within a privileged process (bsc#1020123).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572380" comment="libnl-1.1-49.22.6.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572381" comment="libnl-32bit-1.1-49.22.6.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40599" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-25"/>
	<updated date="2014-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578798" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578799" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578800" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578801" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578802" comment="libopenssl0_9_8-x86-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578803" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578804" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578798" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578799" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578800" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578801" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578802" comment="libopenssl0_9_8-x86-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578803" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578804" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578798" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578799" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578800" comment="libopenssl0_9_8-hmac-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578801" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578802" comment="libopenssl0_9_8-x86-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578803" comment="openssl-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578804" comment="openssl-doc-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40600" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572398" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40601" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578805" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578806" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578807" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578805" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578806" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578807" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578805" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578806" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578807" comment="libpixman-1-0-x86-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40602" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="873123" ref_url="https://bugzilla.suse.com/873123" source="BUGZILLA"/>
		<reference ref_id="873124" ref_url="https://bugzilla.suse.com/873124" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>

This libpng update fixes the following two overflow security issues.

    * bnc#873123: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_sPLT() and png_set_text_2()
      (CVE-2013-7354).
    * bnc#873124: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_unknown_chunks()
      (CVE-2013-7353).

Security Issue references:

    * CVE-2013-7353
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353&gt;
    * CVE-2013-7354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-29"/>
	<updated date="2014-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578808" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578809" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578810" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578808" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578809" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578810" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578808" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578809" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578810" comment="libpng12-0-x86-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40603" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40604" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40605" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572414" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572415" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40606" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This update for libpng12-0 fixes the following issues:

Security issue fixed:

- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572416" comment="libpng12-0-1.2.31-5.44.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572417" comment="libpng12-0-32bit-1.2.31-5.44.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40607" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="845765" ref_url="https://bugzilla.suse.com/845765" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<description>

This update fixes problems in DCTStream error handling in poppler.

Security Issue reference:

    * CVE-2010-5110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578817" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578818" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578819" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578820" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578817" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578818" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578819" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578820" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578817" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578818" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578819" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578820" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40608" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

The following security issue is fixed in this update:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv.

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578821" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578822" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578823" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578824" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578825" comment="libpulse0-x86-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578826" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578827" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578828" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578829" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578830" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578831" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578832" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578821" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578822" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578823" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578824" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578825" comment="libpulse0-x86-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578826" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578827" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578828" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578829" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578830" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578831" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578832" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578821" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578822" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578823" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578824" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578825" comment="libpulse0-x86-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578826" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578827" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578828" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578829" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578830" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578831" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578832" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40609" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="1118599" ref_url="https://bugzilla.suse.com/1118599" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2018-15518: Fixed a double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed a segmantation fault via a malformed 
  BMP file (bsc#1118596).
- CVE-2018-19869: Fixed an improper checking which might lead to
  a crach via a malformed url reference (bsc#1118599).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578833" comment="libQtWebKit4-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578834" comment="libQtWebKit4-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578835" comment="libqt4-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578836" comment="libqt4-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578837" comment="libqt4-qt3support-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578838" comment="libqt4-qt3support-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578839" comment="libqt4-sql-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578840" comment="libqt4-sql-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578841" comment="libqt4-sql-mysql-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578842" comment="libqt4-sql-sqlite-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578843" comment="libqt4-x11-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578844" comment="libqt4-x11-32bit-4.6.3-5.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578845" comment="qt4-x11-tools-4.6.3-5.42.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40610" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt4 fixes the following issues:

- CVE-2020-17507: Fixed buffer over-read in read_xbm_body (bsc#1176315) 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578846" comment="libQtWebKit4-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578847" comment="libQtWebKit4-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578848" comment="libqt4-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578849" comment="libqt4-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578850" comment="libqt4-qt3support-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578851" comment="libqt4-qt3support-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578852" comment="libqt4-sql-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578853" comment="libqt4-sql-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578854" comment="libqt4-sql-mysql-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578855" comment="libqt4-sql-sqlite-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578856" comment="libqt4-x11-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578857" comment="libqt4-x11-32bit-4.6.3-5.42.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578858" comment="qt4-x11-tools-4.6.3-5.42.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40611" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the QT4 QSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578859" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578860" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578861" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578862" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578863" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578864" comment="libqt4-qt3support-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578865" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578866" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578867" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578868" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578869" comment="libqt4-sql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578870" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578871" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578872" comment="libqt4-x11-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578873" comment="libqt4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578874" comment="qt4-x11-tools-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578859" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578860" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578861" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578862" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578863" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578864" comment="libqt4-qt3support-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578865" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578866" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578867" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578868" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578869" comment="libqt4-sql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578870" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578871" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578872" comment="libqt4-x11-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578873" comment="libqt4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578874" comment="qt4-x11-tools-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578859" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563473" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563474" comment="libQtWebKit4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578860" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578861" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578862" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578863" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578864" comment="libqt4-qt3support-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578865" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578866" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578867" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578868" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578869" comment="libqt4-sql-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578870" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578871" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578872" comment="libqt4-x11-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578873" comment="libqt4-x86-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578874" comment="qt4-x11-tools-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40612" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<description>

The libqt4 library was updated to fix several security issues:

    * CVE-2015-0295: Division by zero when processing malformed BMP files.
      (bsc#921999)
    * CVE-2015-1858: Segmentation fault in BMP Qt Image Format Handling.
      (bsc#927806)
    * CVE-2015-1859: Segmentation fault in ICO Qt Image Format Handling.
      (bsc#927807)
    * CVE-2015-1860: Segmentation fault in GIF Qt Image Format Handling.
      (bsc#927808)

Security Issues:

    * CVE-2015-1858
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858&gt;
    * CVE-2015-1859
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859&gt;
    * CVE-2015-1860
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860&gt;
    * CVE-2015-0295
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578875" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578876" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578877" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578878" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578879" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578880" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578881" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578882" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578883" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578884" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578885" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578886" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578887" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578888" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578889" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578890" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578875" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578876" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578877" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578878" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578879" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578880" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578881" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578882" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578883" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578884" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578885" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578886" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578887" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578888" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578889" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578890" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578875" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563489" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563490" comment="libQtWebKit4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578876" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578877" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578878" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578879" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578880" comment="libqt4-qt3support-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578881" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578882" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578883" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578884" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578885" comment="libqt4-sql-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578886" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578887" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578888" comment="libqt4-x11-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578889" comment="libqt4-x86-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578890" comment="qt4-x11-tools-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40613" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40614" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083232" ref_url="https://bugzilla.suse.com/1083232" source="BUGZILLA"/>
		<reference ref_id="1094213" ref_url="https://bugzilla.suse.com/1094213" source="BUGZILLA"/>
		<reference ref_id="1162501" ref_url="https://bugzilla.suse.com/1162501" source="BUGZILLA"/>
		<reference ref_id="977985" ref_url="https://bugzilla.suse.com/977985" source="BUGZILLA"/>
		<reference ref_id="977986" ref_url="https://bugzilla.suse.com/977986" source="BUGZILLA"/>
		<reference ref_id="987877" ref_url="https://bugzilla.suse.com/987877" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7558" ref_url="https://www.suse.com/security/cve/CVE-2015-7558/" source="CVE"/>
		<reference ref_id="CVE-2016-4348" ref_url="https://www.suse.com/security/cve/CVE-2016-4348/" source="CVE"/>
		<reference ref_id="CVE-2016-6163" ref_url="https://www.suse.com/security/cve/CVE-2016-6163/" source="CVE"/>
		<reference ref_id="CVE-2018-1000041" ref_url="https://www.suse.com/security/cve/CVE-2018-1000041/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>

This update for librsvg fixes the following issues:

- CVE-2019-20446: Fixed an issue where a crafted SVG file with nested
  patterns can cause denial of service (bsc#1162501).
  NOTE: Librsvg now has limits on the number of loaded XML elements,
  and the number of referenced elements within an SVG document.    
- CVE-2015-7558: librsvg allowed context-dependent attackers to cause a denial of service (infinite loop, stack consumption, and application crash) via cyclic references in an SVG document (bsc#977985).
- CVE-2016-6163: svg pattern linking to non-pattern fallback leads to invalid memory access, allowing to cause DoS (bsc#987877).
- CVE-2018-1000041: Fixed leaking credentials via SVG files that reference UNC paths (bsc#1083232)
- CVE-2016-4348: Fixed a denial of service parsing SVGs with circular definitions _rsvg_css_normalize_font_size() function (bsc#977986)
- Fixed a stack exhaustion with circular references in &lt;use&gt;
  elements.
- Fixed a denial-of-service condition from exponential explosion
  of rendered elements, through nested use of SVG 'use' elements in
  malicious SVGs.

This updated also removes the the Mozilla plugin package. Firefox can render SVG on its own and
the plugin interface is obsolete.
    
This update for libcroco fixes the following issue:

- Fixed an issue where librsvg was throwing a segmentation fault (bsc#1094213).    
    
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-17"/>
	<updated date="2020-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083232">SUSE bug 1083232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094213">SUSE bug 1094213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977985">SUSE bug 977985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977986">SUSE bug 977986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987877">SUSE bug 987877</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7558/">CVE-2015-7558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4348/">CVE-2016-4348</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6163/">CVE-2016-6163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000041/">CVE-2018-1000041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572459" comment="libcroco-0_6-3-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572460" comment="libcroco-0_6-3-32bit-0.6.1-122.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572461" comment="librsvg-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572462" comment="librsvg-32bit-2.26.0-2.6.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572463" comment="rsvg-view-2.26.0-2.6.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40615" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572464" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572465" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40616" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

This update for libsndfile fixes two buffer read overflows in 
sd2_parse_rsrc_fork(). (CVE-2014-9496, bsc#911796)

Security Issues:

    * CVE-2014-9496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578895" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578896" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578897" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578895" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578896" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578897" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578895" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578896" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578897" comment="libsndfile-x86-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40617" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40618" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572470" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572471" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40619" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572472" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572473" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40620" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572474" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572475" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40621" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572476" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572477" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40622" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626760" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626761" comment="libsndfile-32bit-1.0.20-2.19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40623" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662523" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662524" comment="libsndfile-32bit-1.0.20-2.19.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40624" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="865222" ref_url="https://bugzilla.suse.com/865222" source="BUGZILLA"/>
		<reference ref_id="894361" ref_url="https://bugzilla.suse.com/894361" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>

This update for net-snmp fixes a remote denial of service problem inside 
snmptrapd when it is started with the '-OQ' option. (CVE-2014-3565, 
bnc#894361)

Additionally, a timeout issue during SNMP MIB walk on OID 1.3.6.1.2.1.4.24 
when using newer (v5.5+) versions of snmpwalk has been fixed. (bnc#865222)

Security Issues:

    * CVE-2014-3565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865222">SUSE bug 865222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578901" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578902" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578903" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578904" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578905" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578906" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578901" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578902" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578903" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578904" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578905" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578906" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578901" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578902" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578903" comment="libsnmp15-x86-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578904" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578905" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578906" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40625" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fixed a denial of service which was caused handling empty hostnames in get_cookies() (bsc#1100097).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578907" comment="libsoup-2_4-1-2.32.2-4.16.3.37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578908" comment="libsoup-2_4-1-32bit-2.32.2-4.16.3.37 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40626" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<description>

The ssh client library libssh2_org was updated to fix a security issue:

    * CVE-2015-1782: A malicious server could send a crafted
      SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a
      crash of the application using libssh2_org.

Security Issues:

    * CVE-2015-1782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578909" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578909" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578909" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40627" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572489" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40628" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed:   

- Fixed an issue where libssh2 stops parsing known_hosts (bsc#1091236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572490" comment="libssh2-1-1.2.9-4.2.12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40629" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572491" comment="libssh2-1-1.2.9-4.2.12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40630" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572492" comment="libssh2-1-1.2.9-4.2.12.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40631" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572493" comment="libssh2-1-1.2.9-4.2.12.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40632" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578910" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578911" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578912" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578913" comment="libtasn1-3-x86-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578910" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578911" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578912" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578913" comment="libtasn1-3-x86-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578910" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578911" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578912" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578913" comment="libtasn1-3-x86-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40633" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="1105435" ref_url="https://bugzilla.suse.com/1105435" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

Security issues fixed:

- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
- CVE-2017-6891: Fixed a stack overflow in asn1_find_node() (bsc#1040621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-29"/>
	<updated date="2019-05-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572496" comment="libtasn1-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572497" comment="libtasn1-3-1.5-1.35.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572498" comment="libtasn1-3-32bit-1.5-1.35.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40634" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="938945" ref_url="https://bugzilla.suse.com/938945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- CVE-2015-4000: Disable 512-bit export-grade cryptography to prevent Logjam 
  vulnerability (bsc#938945) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572508" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40635" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572509" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40636" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576506" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576507" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576508" comment="libtiff3-x86-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576509" comment="tiff-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40637" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00080.html" source="SUSE-SU"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578914" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578915" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578914" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578915" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40638" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572516" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40639" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572517" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40640" version="1" class="patch">
	<metadata>
		<title>Security update for libunwind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="936786" ref_url="https://bugzilla.suse.com/936786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
This update for libunwind fixes the following issues:

- CVE-2015-3239: Fixed an off-by-one in dwarf_to_unw_regnum() (bsc#936786).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572518" comment="libunwind-0.98.6-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572519" comment="libunwind-devel-0.98.6-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40641" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="857490" ref_url="https://bugzilla.suse.com/857490" source="BUGZILLA"/>
		<reference ref_id="873705" ref_url="https://bugzilla.suse.com/873705" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<description>

libvirt has been patched to fix two security issues.

Further information is available at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179&gt; and
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456&gt;

These security issues have been fixed:

    * Unsafe parsing of XML documents allows arbitrary file read or denial
      of service (CVE-2014-0179)
    * Ability to delete or create arbitrary host devices (CVE-2013-6456)

Security Issue references:

    * CVE-2014-0179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179&gt;
    * CVE-2013-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-07"/>
	<updated date="2014-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578916" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578917" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578918" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578919" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578920" comment="libvirt-lock-sanlock-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578921" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578916" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578917" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578918" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578919" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578920" comment="libvirt-lock-sanlock-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578921" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578916" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578917" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578918" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578919" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578920" comment="libvirt-lock-sanlock-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578921" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40642" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025340" ref_url="https://bugzilla.suse.com/1025340" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="1087887" ref_url="https://bugzilla.suse.com/1087887" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="936233" ref_url="https://bugzilla.suse.com/936233" source="BUGZILLA"/>
		<reference ref_id="960742" ref_url="https://bugzilla.suse.com/960742" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Spectre fixes for libvirt (bsc#1079869, bsc#1088147, bsc#1087887).
- CVE-2018-1064: Avoid denial of service reading from QEMU guest agent (bsc#1083625).
- CVE-2018-5748: Avoid denial of service reading from QEMU monitor (bsc#1076500).

Bug fixes:

- bsc#1025340: Use xend for nodeGetFreeMemory API.
- bsc#960742: Allow read access to script directories in libvirtd AppArmor profile.
- bsc#936233: Introduce qemuDomainDefCheckABIStability.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025340">SUSE bug 1025340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936233">SUSE bug 936233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960742">SUSE bug 960742</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578922" comment="libvirt-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578923" comment="libvirt-client-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578924" comment="libvirt-client-32bit-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578925" comment="libvirt-doc-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578926" comment="libvirt-lock-sanlock-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578927" comment="libvirt-python-1.0.5.9-21.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578922" comment="libvirt-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578923" comment="libvirt-client-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578924" comment="libvirt-client-32bit-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578925" comment="libvirt-doc-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578926" comment="libvirt-lock-sanlock-1.0.5.9-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578927" comment="libvirt-python-1.0.5.9-21.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40643" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578928" comment="libvirt-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578929" comment="libvirt-client-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578930" comment="libvirt-client-32bit-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578931" comment="libvirt-doc-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578932" comment="libvirt-lock-sanlock-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578933" comment="libvirt-python-1.0.5.9-21.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578928" comment="libvirt-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578929" comment="libvirt-client-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578930" comment="libvirt-client-32bit-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578931" comment="libvirt-doc-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578932" comment="libvirt-lock-sanlock-1.0.5.9-21.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578933" comment="libvirt-python-1.0.5.9-21.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40644" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2019-3886: Fixed a information exposure which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578934" comment="libvirt-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578935" comment="libvirt-client-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578936" comment="libvirt-client-32bit-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578937" comment="libvirt-doc-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578938" comment="libvirt-lock-sanlock-1.0.5.9-21.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578939" comment="libvirt-python-1.0.5.9-21.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40645" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578940" comment="libvirt-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578941" comment="libvirt-client-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578942" comment="libvirt-client-32bit-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578943" comment="libvirt-doc-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578944" comment="libvirt-lock-sanlock-1.0.5.9-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578945" comment="libvirt-python-1.0.5.9-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40646" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578946" comment="libvirt-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578947" comment="libvirt-client-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578948" comment="libvirt-client-32bit-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578949" comment="libvirt-doc-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578950" comment="libvirt-lock-sanlock-1.0.5.9-21.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578951" comment="libvirt-python-1.0.5.9-21.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40647" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952889" ref_url="https://bugzilla.suse.com/952889" source="BUGZILLA"/>
		<reference ref_id="987527" ref_url="https://bugzilla.suse.com/987527" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issue fixed:

- CVE-2016-5008: Fixed an issue where an empty VNC password would disables authentication (bsc#987527).

Non-security issue fixed:

- Fixed an issue where increasing the RAM or CPUs over a certain threshold would lead to soft lockups (bsc#952889).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952889">SUSE bug 952889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578952" comment="libvirt-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578953" comment="libvirt-client-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578954" comment="libvirt-client-32bit-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578955" comment="libvirt-doc-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578956" comment="libvirt-lock-sanlock-1.0.5.9-21.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578957" comment="libvirt-python-1.0.5.9-21.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40648" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197636" ref_url="https://bugzilla.suse.com/1197636" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2022-0897: Fixed a crash in nwfilter when counting number of network filters (bsc#1197636).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-05"/>
	<updated date="2022-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197636">SUSE bug 1197636</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681450" comment="libvirt-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681451" comment="libvirt-client-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681452" comment="libvirt-client-32bit-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681453" comment="libvirt-doc-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681454" comment="libvirt-lock-sanlock-1.0.5.9-21.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681455" comment="libvirt-python-1.0.5.9-21.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40649" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40650" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572529" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572530" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572531" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40651" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572532" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572533" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572534" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40652" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572535" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572536" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572537" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40653" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572538" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572539" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572540" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40654" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578959" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578960" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578961" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578959" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578960" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578961" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578959" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578960" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578961" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40655" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>

This update fixes a denial of service via recursive entity expansion. 
(CVE-2014-3660)

Security Issues:

    * CVE-2014-3660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-20"/>
	<updated date="2014-10-20"/>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578962" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578963" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578964" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578965" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578966" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578962" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578963" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578964" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578965" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578966" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578962" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578963" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578964" comment="libxml2-doc-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578965" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578966" comment="libxml2-x86-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40656" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572552" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572553" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572554" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572555" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40657" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576520" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576521" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576522" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576523" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576520" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576521" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576522" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576523" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40658" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572560" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572561" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572562" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572563" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40659" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572564" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572565" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572566" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572567" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40660" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578967" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578968" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578969" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578970" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578967" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578968" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578969" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578970" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40661" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572572" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572573" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572574" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572575" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40662" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572576" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572577" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572578" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572579" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40663" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572580" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572581" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572582" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572583" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40664" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572584" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572585" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572586" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572587" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40665" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572588" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572589" comment="libxml2-32bit-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572590" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572591" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40666" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-22"/>
	<updated date="2020-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572592" comment="libxml2-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572593" comment="libxml2-32bit-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572594" comment="libxml2-doc-2.7.6-0.77.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572595" comment="libxml2-python-2.7.6-0.77.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40667" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-18"/>
	<updated date="2020-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572596" comment="libxml2-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572597" comment="libxml2-32bit-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572598" comment="libxml2-doc-2.7.6-0.77.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572599" comment="libxml2-python-2.7.6-0.77.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40668" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572600" comment="libxml2-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572601" comment="libxml2-32bit-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572602" comment="libxml2-doc-2.7.6-0.77.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572603" comment="libxml2-python-2.7.6-0.77.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40669" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572604" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572605" comment="libxml2-32bit-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572606" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572607" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40670" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack that could bypass all existing protection mechanisms (bsc#1186015).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572608" comment="libxml2-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572609" comment="libxml2-32bit-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572610" comment="libxml2-doc-2.7.6-0.77.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572611" comment="libxml2-python-2.7.6-0.77.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40671" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670908" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670909" comment="libxml2-32bit-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670910" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670911" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40672" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199132" ref_url="https://bugzilla.suse.com/1199132" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c (bsc#1199132).
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682702" comment="libxml2-2.7.6-0.77.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682703" comment="libxml2-32bit-2.7.6-0.77.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682704" comment="libxml2-doc-2.7.6-0.77.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682705" comment="libxml2-python-2.7.6-0.77.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40673" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40674" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40675" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576524" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576525" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576526" comment="libxslt-x86-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40676" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572621" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572622" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40677" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132160" ref_url="https://bugzilla.suse.com/1132160" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issue fixed:

- CVE-2019-11068: Fixed a protection mechanism bypass where callers of 
  xsltCheckRead() and xsltCheckWrite() would permit access upon receiving an
  error (bsc#1132160).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572623" comment="libxslt-1.1.24-19.34.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572624" comment="libxslt-32bit-1.1.24-19.34.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40678" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140095" ref_url="https://bugzilla.suse.com/1140095" source="BUGZILLA"/>
		<reference ref_id="1140101" ref_url="https://bugzilla.suse.com/1140101" source="BUGZILLA"/>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issues:

Security issues fixed:

- CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
- CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572625" comment="libxslt-1.1.24-19.34.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572626" comment="libxslt-32bit-1.1.24-19.34.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40679" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003253" ref_url="https://bugzilla.suse.com/1003253" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008850" ref_url="https://bugzilla.suse.com/1008850" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010713" ref_url="https://bugzilla.suse.com/1010713" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012183" ref_url="https://bugzilla.suse.com/1012183" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012852" ref_url="https://bugzilla.suse.com/1012852" source="BUGZILLA"/>
		<reference ref_id="1012895" ref_url="https://bugzilla.suse.com/1012895" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019079" ref_url="https://bugzilla.suse.com/1019079" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="935436" ref_url="https://bugzilla.suse.com/935436" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="961923" ref_url="https://bugzilla.suse.com/961923" source="BUGZILLA"/>
		<reference ref_id="966826" ref_url="https://bugzilla.suse.com/966826" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="992569" ref_url="https://bugzilla.suse.com/992569" source="BUGZILLA"/>
		<reference ref_id="992906" ref_url="https://bugzilla.suse.com/992906" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="999943" ref_url="https://bugzilla.suse.com/999943" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374).
- CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).

The following non-security bugs were fixed:

- Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: add flock_owner to open context (bnc#998689).
- NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others).
- __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- include/linux/math64.h: add div64_ul() (bsc#996329).
- kabi-fix for flock_owner addition (bsc#998689).
- kabi: get back scsi_device.current_cmnd (bsc#935436).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS and cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- qlcnic: Schedule napi directly in netpoll (bsc#966826).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/config.sh: Set a fitting release string (bsc#997059)
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: remove current_cmnd field from struct scsi_device (bsc#935436). 
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xfs: remove the deprecated nodelaylog option (bsc#992906).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012895">SUSE bug 1012895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935436">SUSE bug 935436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961923">SUSE bug 961923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966826">SUSE bug 966826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992906">SUSE bug 992906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999943">SUSE bug 999943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578981" comment="kernel-bigsmp-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578982" comment="kernel-bigsmp-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578983" comment="kernel-bigsmp-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578984" comment="kernel-default-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578985" comment="kernel-default-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578986" comment="kernel-default-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578987" comment="kernel-default-man-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578988" comment="kernel-ec2-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578989" comment="kernel-ec2-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578990" comment="kernel-ec2-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568449" comment="kernel-pae-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568450" comment="kernel-pae-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568451" comment="kernel-pae-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578991" comment="kernel-source-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578992" comment="kernel-syms-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578993" comment="kernel-trace-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578994" comment="kernel-trace-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578995" comment="kernel-trace-devel-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578996" comment="kernel-xen-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578997" comment="kernel-xen-base-3.0.101-0.47.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578998" comment="kernel-xen-devel-3.0.101-0.47.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40680" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40681" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40682" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40683" version="1" class="patch">
	<metadata>
		<title>Security update for lxc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="839653" ref_url="https://bugzilla.suse.com/839653" source="BUGZILLA"/>
		<reference ref_id="839663" ref_url="https://bugzilla.suse.com/839663" source="BUGZILLA"/>
		<reference ref_id="855809" ref_url="https://bugzilla.suse.com/855809" source="BUGZILLA"/>
		<reference ref_id="869663" ref_url="https://bugzilla.suse.com/869663" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>

The container framework LXC has been updated to fix various bugs and a 
security issue:

    * CVE-2013-6441: The sshd template allowed privilege escalation on the
      host.
    * SLES container time not aligned with host time (bnc#839653)
    * SLES container boot takes ages (bnc#839663)
    * lxc mounts /dev/pts with wrong options (bnc#869663)

Security Issues:

    * CVE-2013-6441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/839653">SUSE bug 839653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839663">SUSE bug 839663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869663">SUSE bug 869663</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578999" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578999" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578999" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40684" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40685" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman to version 2.1.15 fixes the following issues:

- CVE-2016-6893: Prevent cross-site request forgery (CSRF) vulnerability in the
  user options page that allowed remote attackers to hijack the authentication of
  arbitrary users for requests that modify an option (bsc#995352).
- Various other hardenings against CSFR attacks

For details please see https://launchpad.net/mailman/+milestone/2.1.15
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-11"/>
	<updated date="2018-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572629" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40686" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579001" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579001" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40687" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572631" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40688" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572632" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40689" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572633" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40690" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).

Non-security issue fixed:

- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572634" comment="mailman-2.1.15-9.6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40691" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572635" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40692" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026 bsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation (MFSA 2016-92  bsc#1012964)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)
    
The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579002" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579003" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579004" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579005" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579006" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579007" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579008" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579009" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579010" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579002" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579003" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579004" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579005" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579006" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579007" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579008" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579009" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579010" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40693" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572643" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572644" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40694" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1142770" ref_url="https://bugzilla.suse.com/1142770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190/" source="CVE"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2019-1010190: Fixed a denial of service which could be caused by a local attacker in putwhitespan() (bsc#1142770).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1142770">SUSE bug 1142770</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572645" comment="g3utils-1.1.36-28.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572646" comment="mgetty-1.1.36-28.6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40695" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00033.html" source="SUSE-SU"/>
		<description>


Update to Intel microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

Among other updates it contains:

- IVT C0          (06-3e-04:ed) 428-&gt;42a
- SKL-U/Y D0      (06-4e-03:c0) ba-&gt;c2
- BDW-U/Y E/F     (06-3d-04:c0) 25-&gt;28
- HSW-ULT Cx/Dx   (06-45-01:72) 20-&gt;21
- Crystalwell Cx  (06-46-01:32) 17-&gt;18
- BDW-H E/G       (06-47-01:22) 17-&gt;1b
- HSX-EX E0       (06-3f-04:80) 0f-&gt;10
- SKL-H/S R0      (06-5e-03:36) ba-&gt;c2
- HSW Cx/Dx       (06-3c-03:32) 22-&gt;23
- HSX C0          (06-3f-02:6f) 3a-&gt;3b
- BDX-DE V0/V1    (06-56-02:10) 0f-&gt;14
- BDX-DE V2       (06-56-03:10) 700000d-&gt;7000011
- KBL-U/Y H0      (06-8e-09:c0) 62-&gt;80
- KBL Y0 / CFL D0 (06-8e-0a:c0) 70-&gt;80
- KBL-H/S B0      (06-9e-09:2a) 5e-&gt;80
- CFL U0          (06-9e-0a:22) 70-&gt;80
- CFL B0          (06-9e-0b:02) 72-&gt;80
- SKX H0          (06-55-04:b7) 2000035-&gt;200003c
- GLK B0          (06-7a-01:01) 1e-&gt;22
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40696" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00043.html" source="SUSE-SU"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40697" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following security issue:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579013" comment="microcode_ctl-1.17-102.83.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40698" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<description>

  
This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40699" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the 
mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40700" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
- CFL-H        R0       6-9e-d/22 000000b0-&gt;000000b8 Core Gen9 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579016" comment="microcode_ctl-1.17-102.83.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40701" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1141977" ref_url="https://bugzilla.suse.com/1141977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded what missing in last update:
BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579017" comment="microcode_ctl-1.17-102.83.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40702" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579018" comment="microcode_ctl-1.17-102.83.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40703" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579019" comment="microcode_ctl-1.17-102.83.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40704" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579020" comment="microcode_ctl-1.17-102.83.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40705" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issue:

- Updated Intel CPU Microcode to 20201027 prerelease (bsc#1170446)

- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

  # New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579021" comment="microcode_ctl-1.17-102.83.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40706" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated Intel CPU Microcode to 20201110 official release.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile

  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579022" comment="microcode_ctl-1.17-102.83.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40707" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20210525 release:

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (bsc#1179833)
- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (bsc#1179836)
- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837)
- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (bsc#1179839)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579023" comment="microcode_ctl-1.17-102.83.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40708" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)
Updated to Intel CPU Microcode 20220207 release.

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683760" comment="microcode_ctl-1.17-102.83.75.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40709" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>

This update for minicom fixes the following issues:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code 
  execution (bsc#1033783)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572653" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40710" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40711" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary
  code execution through the string-to-double parser implementation. (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU
  consumption due to lack of protection against predictable hash collisions when processing
  form parameters. (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579032" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579033" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579034" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579035" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579036" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579037" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579038" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579039" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579032" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579033" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579034" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579035" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579036" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579037" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579038" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579039" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40712" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40713" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40714" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40715" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659172" comment="libfreebl3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659173" comment="libfreebl3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659174" comment="libsoftokn3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659175" comment="libsoftokn3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659176" comment="mozilla-nss-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659177" comment="mozilla-nss-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659178" comment="mozilla-nss-certs-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659179" comment="mozilla-nss-certs-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659180" comment="mozilla-nss-tools-3.68.1-47.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40716" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678408" comment="libfreebl3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678409" comment="libfreebl3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678410" comment="libsoftokn3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678411" comment="libsoftokn3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678412" comment="mozilla-nss-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678413" comment="mozilla-nss-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678414" comment="mozilla-nss-certs-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678415" comment="mozilla-nss-certs-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678416" comment="mozilla-nss-tools-3.68.3-47.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40717" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-30"/>
	<updated date="2013-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579066" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579067" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579068" comment="libfreebl3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579069" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579070" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579071" comment="libsoftokn3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579072" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579073" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579074" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579075" comment="mozilla-nss-x86-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579066" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579067" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579068" comment="libfreebl3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579069" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579070" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579071" comment="libsoftokn3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579072" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579073" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579074" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579075" comment="mozilla-nss-x86-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579066" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579067" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579068" comment="libfreebl3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579069" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579070" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579071" comment="libsoftokn3-x86-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576547" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576548" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576549" comment="mozilla-nspr-x86-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579072" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579073" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579074" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579075" comment="mozilla-nss-x86-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40718" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572691" comment="libfreebl3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572692" comment="libfreebl3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572693" comment="libsoftokn3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572694" comment="libsoftokn3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572695" comment="mozilla-nspr-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572696" comment="mozilla-nspr-32bit-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572697" comment="mozilla-nss-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572698" comment="mozilla-nss-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572699" comment="mozilla-nss-certs-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572700" comment="mozilla-nss-certs-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572701" comment="mozilla-nss-tools-3.53.1-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40719" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="868115" ref_url="https://bugzilla.suse.com/868115" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<description>

The mailreader mutt was updated to fix a security issue in displaying mail 
headers, where a crafted e-mail could cause a heap overflow, which in turn 
might be used by attackers to crash mutt or potentially even execute code.

Security Issues references:

    * CVE-2014-0467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-17"/>
	<updated date="2014-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579076" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579076" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579076" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40720" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579077" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579077" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40721" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572714" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40722" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572715" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40723" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181221" ref_url="https://bugzilla.suse.com/1181221" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<description>
This update for mutt fixes the following issue:

- CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572716" comment="mutt-1.5.17-42.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40724" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680095" comment="mutt-1.5.17-42.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40725" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40726" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40727" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40728" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="976341" ref_url="https://bugzilla.suse.com/976341" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<description>
mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

More details are available at
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579099" comment="libmysql55client18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579100" comment="libmysql55client18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579101" comment="libmysql55client_r18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579102" comment="mysql-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579103" comment="mysql-client-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579104" comment="mysql-tools-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40729" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572717" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572718" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572719" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40730" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="967374" ref_url="https://bugzilla.suse.com/967374" source="BUGZILLA"/>
		<reference ref_id="989913" ref_url="https://bugzilla.suse.com/989913" source="BUGZILLA"/>
		<reference ref_id="989919" ref_url="https://bugzilla.suse.com/989919" source="BUGZILLA"/>
		<reference ref_id="989922" ref_url="https://bugzilla.suse.com/989922" source="BUGZILLA"/>
		<reference ref_id="989926" ref_url="https://bugzilla.suse.com/989926" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<description>

This mysql update to verson 5.5.52 fixes the following issues: 

Security issues fixed:
- CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913).
- CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919).
- CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922).
- CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926).
- CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and , under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)


More details can be found on:
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html

Bugs fixed:
- bsc#967374: properly restart mysql multi instances during upgrade
- bnc#937258: multi script to restart after crash
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-20"/>
	<updated date="2016-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967374">SUSE bug 967374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579105" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579106" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579107" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579108" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579109" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579110" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579105" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579106" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579107" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579108" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579109" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579110" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40731" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005580" ref_url="https://bugzilla.suse.com/1005580" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<description>

This mysql version update to 5.5.53 fixes the following issues:

- CVE-2016-6662: Unspecified vulnerability in subcomponent Logging (bsc#1005580)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)

Release Notes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-12"/>
	<updated date="2016-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579111" comment="libmysql55client18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579112" comment="libmysql55client18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579113" comment="libmysql55client_r18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579114" comment="mysql-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579115" comment="mysql-client-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579116" comment="mysql-tools-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40732" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.54 fixes the following issues:

- CVE-2017-3318: Unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component (bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

Release Notes: 
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579117" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579118" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579119" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579120" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579121" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579122" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579117" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579118" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579119" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579120" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579121" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579122" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40733" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1029014" ref_url="https://bugzilla.suse.com/1029014" source="BUGZILLA"/>
		<reference ref_id="1029396" ref_url="https://bugzilla.suse.com/1029396" source="BUGZILLA"/>
		<reference ref_id="1034850" ref_url="https://bugzilla.suse.com/1034850" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3329" ref_url="https://www.suse.com/security/cve/CVE-2017-3329/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3461" ref_url="https://www.suse.com/security/cve/CVE-2017-3461/" source="CVE"/>
		<reference ref_id="CVE-2017-3462" ref_url="https://www.suse.com/security/cve/CVE-2017-3462/" source="CVE"/>
		<reference ref_id="CVE-2017-3463" ref_url="https://www.suse.com/security/cve/CVE-2017-3463/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600/" source="CVE"/>
		<description>

This update for mysql to version 5.5.55 fixes the following issues:

These security issues were fixed:

- CVE-2017-3308: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3309: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3329: Unspecified vulnerability in Server: Thread (bsc#1034850)
- CVE-2017-3600: Unspecified vulnerability in Client: mysqldump (bsc#1034850)
- CVE-2017-3453: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3456: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3463: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3462: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3461: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3464: Unspecified vulnerability in Server: DDL (bsc#1034850)
- CVE-2017-3305: MySQL client sent authentication request unencrypted even if SSL was required (aka Ridddle) (bsc#1029396).
- CVE-2016-5483: Mysqldump failed to properly quote certain identifiers in SQL statements written to the dump output, allowing for execution of arbitrary commands (bsc#1029014)
- '--ssl-mode=REQUIRED' can be specified to require a secure connection (it fails if a secure connection cannot be obtained)

This non-security issue was fixed:

- Set the default umask to 077 in rc.mysql-multi [bsc#1020976]

For additional changes please see
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-55.html

Note: The issue tracked in bsc#1022428 and fixed in the last update was
assigned CVE-2017-3302.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3329/">CVE-2017-3329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3461/">CVE-2017-3461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3462/">CVE-2017-3462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3463/">CVE-2017-3463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579123" comment="libmysql55client18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579124" comment="libmysql55client18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579125" comment="libmysql55client_r18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579126" comment="mysql-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579127" comment="mysql-client-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579128" comment="mysql-tools-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40734" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049398" ref_url="https://bugzilla.suse.com/1049398" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049411" ref_url="https://bugzilla.suse.com/1049411" source="BUGZILLA"/>
		<reference ref_id="1049415" ref_url="https://bugzilla.suse.com/1049415" source="BUGZILLA"/>
		<reference ref_id="1049416" ref_url="https://bugzilla.suse.com/1049416" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1049422" ref_url="https://bugzilla.suse.com/1049422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3635" ref_url="https://www.suse.com/security/cve/CVE-2017-3635/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3648" ref_url="https://www.suse.com/security/cve/CVE-2017-3648/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<reference ref_id="CVE-2017-3652" ref_url="https://www.suse.com/security/cve/CVE-2017-3652/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<description>
This update for mysql fixes the following issues:


- CVE-2017-3635: C API unspecified vulnerability (bsc#1049398) 
- CVE-2017-3636: Client programs unspecified vulnerability (bsc#1049399)
- CVE-2017-3641: DML unspecified vulnerability (bsc#1049404)
- CVE-2017-3648: Charsets unspecified vulnerability (bsc#1049411)
- CVE-2017-3651: Client mysqldump unspecified vulnerability (bsc#1049415)
- CVE-2017-3652: DDL unspecified vulnerability (bsc#1049416)
- CVE-2017-3653: DDL unspecified vulnerability (bsc#1049417)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049398">SUSE bug 1049398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3635/">CVE-2017-3635</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3648/">CVE-2017-3648</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3652/">CVE-2017-3652</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579129" comment="libmysql55client18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579130" comment="libmysql55client18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579131" comment="libmysql55client_r18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579132" comment="mysql-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579133" comment="mysql-client-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579134" comment="mysql-tools-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40735" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1064116" ref_url="https://bugzilla.suse.com/1064116" source="BUGZILLA"/>
		<reference ref_id="1064117" ref_url="https://bugzilla.suse.com/1064117" source="BUGZILLA"/>
		<reference ref_id="1064119" ref_url="https://bugzilla.suse.com/1064119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<description>


This update for mysql to version 5.5.58 fixes the following issues:

Fixed security issues:

- CVE-2017-10268: issue inside subcomponent Server Replication [bsc#1064101] 
- CVE-2017-10378: issue inside subcomponent Server Optimizer [bsc#1064115] 
- CVE-2017-10379: issue inside subcomponent Client programs [bsc#1064116] 
- CVE-2017-10384: issue inside subcomponent Server DDL [bsc#1064117] 

For a full list of changes check:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579135" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579136" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579137" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579138" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579139" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579140" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579135" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579136" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579137" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579138" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579139" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579140" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40736" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076369" ref_url="https://bugzilla.suse.com/1076369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<description>
This update for mysql to version 5.5.59 fixes several issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369)
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server.  Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)

For additional changes please see http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579141" comment="libmysql55client18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579142" comment="libmysql55client18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579143" comment="libmysql55client_r18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579144" comment="mysql-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579145" comment="mysql-client-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579146" comment="mysql-tools-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40737" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089987" ref_url="https://bugzilla.suse.com/1089987" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2773" ref_url="https://www.suse.com/security/cve/CVE-2018-2773/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2818" ref_url="https://www.suse.com/security/cve/CVE-2018-2818/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<description>

  This update fixes the following issues:

  - Update to 5.5.60 in Oracle Apr2018 CPU (bsc#1089987).
  - CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
  - CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2818: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
  - CVE-2018-2773: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2773/">CVE-2018-2773</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2818/">CVE-2018-2818</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579147" comment="libmysql55client18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579148" comment="libmysql55client18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579149" comment="libmysql55client_r18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579150" comment="mysql-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579151" comment="mysql-client-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579152" comment="mysql-tools-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40738" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1101679" ref_url="https://bugzilla.suse.com/1101679" source="BUGZILLA"/>
		<reference ref_id="1101680" ref_url="https://bugzilla.suse.com/1101680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3070" ref_url="https://www.suse.com/security/cve/CVE-2018-3070/" source="CVE"/>
		<reference ref_id="CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081/" source="CVE"/>
		<description>
This update for mysql to version 5.5.61 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-3066: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Client. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3063: Fixed an easily exploitable vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101677)

 You can find more detailed information about this update in the
 [release notes](http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101679">SUSE bug 1101679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3070/">CVE-2018-3070</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579153" comment="libmysql55client18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579154" comment="libmysql55client18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579155" comment="libmysql55client_r18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579156" comment="mysql-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579157" comment="mysql-client-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579158" comment="mysql-tools-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40739" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112369" ref_url="https://bugzilla.suse.com/1112369" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3133" ref_url="https://www.suse.com/security/cve/CVE-2018-3133/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<description>

  
MySQL server was updated to version 5.5.62, fixing bugs and security issues.

Changes:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html

Following security issues were fixed:

- CVE-2016-9843: The crc32_big function in zlib might have allowed context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. (bsc#1013882)
  Please note that SUSE uses the system zlib, not the embedded copy.

- CVE-2018-3133: Authenticated low privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112369)
- CVE-2018-3174: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112368)
- CVE-2018-3282: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112432)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3133/">CVE-2018-3133</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579159" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579160" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579161" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579162" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579163" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579164" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579159" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579160" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579161" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579162" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579163" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579164" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40740" version="1" class="patch">
	<metadata>
		<title>Security update for nagios</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="864843" ref_url="https://bugzilla.suse.com/864843" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1878" ref_url="https://www.suse.com/security/cve/CVE-2014-1878/" source="CVE"/>
		<description>

The monitoring service Nagios has been updated to fix potential buffer 
overflows in its CGI scripts. (CVE-2014-1878)

Security Issue reference:

    * CVE-2014-1878
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1878&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/864843">SUSE bug 864843</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1878/">CVE-2014-1878</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579165" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579166" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579165" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579166" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579165" comment="nagios-3.0.6-1.25.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579166" comment="nagios-www-3.0.6-1.25.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40741" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572724" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572725" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40742" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe, nagios-nrpe-debuginfo, nagios-nrpe-debugsource, nagios-nrpe-doc, nagios-plugins-nrpe</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="874743" ref_url="https://bugzilla.suse.com/874743" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2913" ref_url="https://www.suse.com/security/cve/CVE-2014-2913/" source="CVE"/>
		<description>

nagios-nrpe has been updated to prevent possible remote command execution 
when command arguments are enabled. This issue affects versions 2.15 and 
older.

Further information is available at
http://seclists.org/fulldisclosure/2014/Apr/240
&lt;http://seclists.org/fulldisclosure/2014/Apr/240&gt;

These security issues have been fixed:

    * Remote command execution (CVE-2014-2913)

Security Issue references:

    * CVE-2014-2913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-06"/>
	<updated date="2014-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/874743">SUSE bug 874743</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2913/">CVE-2014-2913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579167" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579168" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579169" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579167" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579168" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579169" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579167" comment="nagios-nrpe-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579168" comment="nagios-nrpe-doc-2.12-24.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579169" comment="nagios-plugins-nrpe-2.12-24.4.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40743" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This update for nagios-nrpe fixes one issue.

This security issue was fixed:

- CVE-2015-4000: Prevent Logjam. The TLS protocol 1.2 and earlier, when a
  DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not
  properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers
  to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE
  replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
  replaced by DHE (bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572726" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572727" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572728" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40744" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-plugins</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="885205" ref_url="https://bugzilla.suse.com/885205" source="BUGZILLA"/>
		<reference ref_id="885207" ref_url="https://bugzilla.suse.com/885207" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4701" ref_url="https://www.suse.com/security/cve/CVE-2014-4701/" source="CVE"/>
		<reference ref_id="CVE-2014-4702" ref_url="https://www.suse.com/security/cve/CVE-2014-4702/" source="CVE"/>
		<description>

This security update fixes the following issues:

    * Removed the requirement for root access from
      plugins-root/check_icmp.c and plugins-root/check_icmp.c. The
      necessary capabilities(7) were added to the README file.
    * Fixed array out of bounds issue in plugins-root/check_dhcp.c.

Security Issues:

    * CVE-2014-4701
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4701&gt;
    * CVE-2014-4702
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4702&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/885205">SUSE bug 885205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885207">SUSE bug 885207</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4701/">CVE-2014-4701</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4702/">CVE-2014-4702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579170" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579171" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579170" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579171" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579170" comment="nagios-plugins-1.4.16-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579171" comment="nagios-plugins-extras-1.4.16-0.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40745" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572729" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572730" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572731" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40746" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572732" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572733" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572734" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572735" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572736" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565005" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572737" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572738" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572739" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572740" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40747" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572741" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572742" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572743" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572744" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572745" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565008" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572746" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572747" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572748" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572749" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40748" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572750" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572751" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572752" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572753" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572754" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565011" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572755" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572756" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572757" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572758" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40749" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572759" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572760" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572761" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572762" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572763" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565014" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572764" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572765" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572766" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572767" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40750" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1131830" ref_url="https://bugzilla.suse.com/1131830" source="BUGZILLA"/>
		<reference ref_id="1154037" ref_url="https://bugzilla.suse.com/1154037" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="CVE-2018-10754" ref_url="https://www.suse.com/security/cve/CVE-2018-10754/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fixed an infinite loop in the next_char function (bsc#1056136).
- CVE-2017-13729: Fixed an illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fixed an illegal address access in the function _nc_read_entry_source (bsc#1056131).
- CVE-2017-13731: Fixed an illegal address access in the function postprocess_termcap (bsc#1056129).
- CVE-2017-13732: Fixed an illegal address access in the function dump_uses (bsc#1056128).
- CVE-2017-13733: Fixed an illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13734: Fixed an illegal address access in the _nc_safe_strcat (bsc#1056126).
- CVE-2018-10754: Fixed a denial of service caused by a NULL Pointer Dereference in the _nc_parse_entry() (bsc#1131830).
- CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10754/">CVE-2018-10754</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572768" comment="libncurses5-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572769" comment="libncurses5-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572770" comment="libncurses6-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572771" comment="libncurses6-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572772" comment="ncurses-devel-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572773" comment="ncurses-devel-32bit-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572774" comment="ncurses-utils-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572775" comment="tack-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572776" comment="terminfo-5.6-93.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572777" comment="terminfo-base-5.6-93.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40751" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1115929" ref_url="https://bugzilla.suse.com/1115929" source="BUGZILLA"/>
		<reference ref_id="1121450" ref_url="https://bugzilla.suse.com/1121450" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2018-19211: Fixed NULL pointer dereference at function _nc_parse_entry in parse_entry.c (bsc#1115929).

Bug fixes:

- Modify bsc#1115929 patch to fix change in form_driver() that breaks ncurses-5.9 and the variable move_after_insert of ncurses-6.1 (bsc#1121450).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121450">SUSE bug 1121450</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572778" comment="libncurses5-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572779" comment="libncurses5-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572780" comment="libncurses6-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572781" comment="libncurses6-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572782" comment="ncurses-devel-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572783" comment="ncurses-devel-32bit-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572784" comment="ncurses-utils-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572785" comment="tack-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572786" comment="terminfo-5.6-93.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572787" comment="terminfo-base-5.6-93.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40752" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652290" comment="libncurses5-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652291" comment="libncurses5-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652292" comment="libncurses6-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652293" comment="libncurses6-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652294" comment="ncurses-devel-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652295" comment="ncurses-devel-32bit-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652296" comment="ncurses-utils-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652297" comment="tack-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652298" comment="terminfo-5.6-93.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652299" comment="terminfo-base-5.6-93.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40753" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40754" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572792" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572793" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572794" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40755" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572795" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572796" comment="libnetpbm10-32bit-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572797" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40756" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104139" ref_url="https://bugzilla.suse.com/1104139" source="BUGZILLA"/>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2018-15173: Fixed a remote denial of service attack via a crafted TCP-based service (bsc#1104139).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104139">SUSE bug 1104139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572798" comment="nmap-4.75-1.30.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40757" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579178" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579179" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579180" comment="libfreebl3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579181" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579182" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579183" comment="libsoftokn3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579184" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579185" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579186" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579187" comment="mozilla-nss-x86-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579178" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579179" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579180" comment="libfreebl3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579181" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579182" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579183" comment="libsoftokn3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579184" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579185" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579186" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579187" comment="mozilla-nss-x86-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579178" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579179" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579180" comment="libfreebl3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579181" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579182" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579183" comment="libsoftokn3-x86-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576562" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576563" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576564" comment="mozilla-nspr-x86-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579184" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579185" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579186" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579187" comment="mozilla-nss-x86-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40758" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="920183" ref_url="https://bugzilla.suse.com/920183" source="BUGZILLA"/>
		<reference ref_id="920238" ref_url="https://bugzilla.suse.com/920238" source="BUGZILLA"/>
		<reference ref_id="926510" ref_url="https://bugzilla.suse.com/926510" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="937837" ref_url="https://bugzilla.suse.com/937837" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="943218" ref_url="https://bugzilla.suse.com/943218" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="946386" ref_url="https://bugzilla.suse.com/946386" source="BUGZILLA"/>
		<reference ref_id="951351" ref_url="https://bugzilla.suse.com/951351" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="954982" ref_url="https://bugzilla.suse.com/954982" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<description>

This network time protocol server ntp was updated to 4.2.8p6 to fix the following
issues:

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

Major functional changes:
- The 'sntp' commandline tool changed its option handling in a major way.
- 'controlkey 1' is added during update to ntp.conf to allow sntp to work.
- The local clock is being disabled during update.
- ntpd is no longer running chrooted.


Other functional changes:
- ntp-signd is installed.
- 'enable mode7' can be added to the configuration to allow ntdpc to work as compatibility mode option.
- 'kod' was removed from the default restrictions.
- SHA1 keys are used by default instead of MD5 keys.

These security issues were fixed:
- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).
- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).
- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).
- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).
- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).
- CVE-2015-7849: trusted key use-after-free (bsc#951608).
- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).
- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).
- CVE-2015-7703: configuration directives 'pidfile' and 'driftfile' should only be allowed locally (bsc#951608).
- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.
- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.
- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.
- bsc#944300: Remove 'kod' from the restrict line in ntp.conf.
- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.
- Add 'addserver' as a new legacy action.
- bsc#910063: Fix the comment regarding addserver in ntp.conf.
- bsc#926510: Disable chroot by default.
- bsc#920238: Enable ntpdc for backwards compatibility.
- bsc#784760: Remove local clock from default configuration.
- bsc#942441/fate#319496: Require perl-Socket6.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- bsc#920183: Allow -4 and -6 address qualifiers in 'server' directives.
- Use upstream ntp-wait, because our version is incompatible with
  the new ntpq command line syntax.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920183">SUSE bug 920183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920238">SUSE bug 920238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926510">SUSE bug 926510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937837">SUSE bug 937837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946386">SUSE bug 946386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951351">SUSE bug 951351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954982">SUSE bug 954982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576576" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576577" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576576" comment="ntp-4.2.8p6-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576577" comment="ntp-doc-4.2.8p6-41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40759" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues: 

- Separate the creation of ntp.keys and key #1 in it to avoid
  problems when upgrading installations that have the file, but
  no key #1, which is needed e.g. by 'rcntp addserver'.

- Update to 4.2.8p7 (bsc#977446):
  * CVE-2016-1547, bsc#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, bsc#977461: Interleave-pivot
  * CVE-2016-1549, bsc#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, bsc#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576578" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576579" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576578" comment="ntp-4.2.8p7-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576579" comment="ntp-doc-4.2.8p7-44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40760" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572824" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572825" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572826" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40761" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576580" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576581" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576580" comment="ntp-4.2.8p8-47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576581" comment="ntp-doc-4.2.8p8-47.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40762" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576582" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576583" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576582" comment="ntp-4.2.8p9-48.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576583" comment="ntp-doc-4.2.8p9-48.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40763" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="1031085" ref_url="https://bugzilla.suse.com/1031085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>

This ntp update to version 4.2.8p10 fixes the following issues:

Security issues fixed (bsc#1030050):
- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:
- Remove spurious log messages (bsc#1014172).
- Fixing ppc and ppc64 linker issue (bsc#1031085).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031085">SUSE bug 1031085</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572831" comment="ntp-4.2.8p10-48.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572832" comment="ntp-doc-4.2.8p10-48.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40764" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-16"/>
	<updated date="2018-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572833" comment="ntp-4.2.8p11-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572834" comment="ntp-doc-4.2.8p11-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40765" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579188" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579189" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579188" comment="ntp-4.2.8p12-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579189" comment="ntp-doc-4.2.8p12-48.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40766" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:
	  
Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572837" comment="ntp-4.2.8p13-48.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572838" comment="ntp-doc-4.2.8p13-48.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40767" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-01"/>
	<updated date="2020-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572839" comment="ntp-4.2.8p15-48.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572840" comment="ntp-doc-4.2.8p15-48.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40768" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40769" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1143194" ref_url="https://bugzilla.suse.com/1143194" source="BUGZILLA"/>
		<reference ref_id="1143273" ref_url="https://bugzilla.suse.com/1143273" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2019-13565: Fixed an authentication bypass caused by incorrect authorization of another connection, granting excess connection rights (bsc#1143194).
- CVE-2019-13057: Fixed an issue with improper authorization with delegated database admin privileges (bsc#1143273).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579197" comment="compat-libldap-2_3-0-2.3.37-2.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579198" comment="libldap-2_4-2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579199" comment="libldap-2_4-2-32bit-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579200" comment="libldap-openssl1-2_4-2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579201" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579202" comment="openldap2-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579203" comment="openldap2-back-meta-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579204" comment="openldap2-client-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579205" comment="openldap2-client-openssl1-2.4.26-0.74.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579206" comment="openldap2-openssl1-2.4.26-0.74.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40770" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579207" comment="compat-libldap-2_3-0-2.3.37-2.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579208" comment="libldap-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579209" comment="libldap-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579210" comment="libldap-openssl1-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579211" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579212" comment="openldap2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579213" comment="openldap2-back-meta-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579214" comment="openldap2-client-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579215" comment="openldap2-client-openssl1-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579216" comment="openldap2-openssl1-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40771" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579217" comment="compat-libldap-2_3-0-2.3.37-2.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579218" comment="libldap-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579219" comment="libldap-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579220" comment="libldap-openssl1-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579221" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579222" comment="openldap2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579223" comment="openldap2-back-meta-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579224" comment="openldap2-client-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579225" comment="openldap2-client-openssl1-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579226" comment="openldap2-openssl1-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40772" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579227" comment="compat-libldap-2_3-0-2.3.37-2.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579228" comment="libldap-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579229" comment="libldap-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579230" comment="libldap-openssl1-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579231" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579232" comment="openldap2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579233" comment="openldap2-back-meta-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579234" comment="openldap2-client-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579235" comment="openldap2-client-openssl1-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579236" comment="openldap2-openssl1-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40773" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579237" comment="compat-libldap-2_3-0-2.3.37-2.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579238" comment="libldap-2_4-2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579239" comment="libldap-2_4-2-32bit-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579240" comment="libldap-openssl1-2_4-2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579241" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579242" comment="openldap2-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579243" comment="openldap2-back-meta-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579244" comment="openldap2-client-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579245" comment="openldap2-client-openssl1-2.4.26-0.74.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579246" comment="openldap2-openssl1-2.4.26-0.74.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40774" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579247" comment="compat-libldap-2_3-0-2.3.37-2.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579248" comment="libldap-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579249" comment="libldap-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579250" comment="libldap-openssl1-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579251" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579252" comment="openldap2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579253" comment="openldap2-back-meta-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579254" comment="openldap2-client-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579255" comment="openldap2-client-openssl1-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579256" comment="openldap2-openssl1-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40775" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682706" comment="compat-libldap-2_3-0-2.3.37-2.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682707" comment="libldap-2_4-2-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682708" comment="libldap-2_4-2-32bit-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682709" comment="libldap-openssl1-2_4-2-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682710" comment="libldap-openssl1-2_4-2-32bit-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682711" comment="openldap2-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682712" comment="openldap2-back-meta-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682713" comment="openldap2-client-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682714" comment="openldap2-client-openssl1-2.4.26-0.74.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682715" comment="openldap2-openssl1-2.4.26-0.74.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40776" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-13"/>
	<updated date="2015-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579257" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579258" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579259" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579260" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579261" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579262" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579263" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579257" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579258" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579259" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579260" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579261" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579262" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579263" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579257" comment="compat-libldap-2_3-0-2.3.37-2.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579258" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579259" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579260" comment="libldap-2_4-2-x86-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579261" comment="openldap2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579262" comment="openldap2-back-meta-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579263" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40777" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40778" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572909" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572910" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572911" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572912" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40779" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122756" ref_url="https://bugzilla.suse.com/1122756" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

Security issue fixed:

- CVE-2019-6502: Fixed a memory leak in sc_context_create() (bsc#1122756).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122756">SUSE bug 1122756</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572913" comment="libopensc2-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572914" comment="libopensc2-32bit-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572915" comment="opensc-0.11.6-5.27.6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572916" comment="opensc-32bit-0.11.6-5.27.6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40780" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149746" ref_url="https://bugzilla.suse.com/1149746" source="BUGZILLA"/>
		<reference ref_id="1149747" ref_url="https://bugzilla.suse.com/1149747" source="BUGZILLA"/>
		<reference ref_id="1158256" ref_url="https://bugzilla.suse.com/1158256" source="BUGZILLA"/>
		<reference ref_id="1177378" ref_url="https://bugzilla.suse.com/1177378" source="BUGZILLA"/>
		<reference ref_id="1177380" ref_url="https://bugzilla.suse.com/1177380" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2020-26571: gemsafe GPK smart card software driver stack-based buffer overflow (bsc#1177380)
- CVE-2019-15946: out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-15945: out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746)
- CVE-2019-19479: incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2020-26572: Prevent out of bounds write (bsc#1177378)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572917" comment="libopensc2-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572918" comment="libopensc2-32bit-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572919" comment="opensc-0.11.6-5.27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572920" comment="opensc-32bit-0.11.6-5.27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40781" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653634" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653635" comment="libopensc2-32bit-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653636" comment="opensc-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653637" comment="opensc-32bit-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40782" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSLP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="778508" ref_url="https://bugzilla.suse.com/778508" source="BUGZILLA"/>
		<reference ref_id="855385" ref_url="https://bugzilla.suse.com/855385" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001397.html" source="SUSE-SU"/>
		<description>

This update for OpenSLP fixes a bug in SLPIntersectStringList that could 
lead to an out-of-bounds read (CVE-2012-4428). Additionally, the SLP daemon 
now always use localtime(3) when writing to log files to avoid having 
timestamps with different timezones.

Security Issues:

    * CVE-2012-4428
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-06"/>
	<updated date="2015-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855385">SUSE bug 855385</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579271" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579272" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579273" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579274" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579271" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579272" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579273" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579274" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579271" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579272" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579273" comment="openslp-server-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579274" comment="openslp-x86-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40783" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572921" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572922" comment="libslp1-openssl1-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579275" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579276" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579277" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572921" comment="libslp1-openssl1-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572922" comment="libslp1-openssl1-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579275" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579276" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579277" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40784" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="826427" ref_url="https://bugzilla.suse.com/826427" source="BUGZILLA"/>
		<reference ref_id="833605" ref_url="https://bugzilla.suse.com/833605" source="BUGZILLA"/>
		<reference ref_id="847710" ref_url="https://bugzilla.suse.com/847710" source="BUGZILLA"/>
		<reference ref_id="869101" ref_url="https://bugzilla.suse.com/869101" source="BUGZILLA"/>
		<reference ref_id="870532" ref_url="https://bugzilla.suse.com/870532" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<description>

This update for OpenSSH fixes the following issues:

    * Exit sshd normally when port is already in use. (bnc#832628)
    * Use hardware crypto engines where available. (bnc#826427)
    * Use correct options for login when it is used. (bnc#833605)
    * Move FIPS messages to higher debug level. (bnc#862875)
    * Fix forwarding with IPv6 addresses in DISPLAY. (bnc#847710)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)
    * Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)
    * Check SSHFP DNS records even for server certificates. (bnc#870532,
      CVE-2014-2653)

Security Issues references:

    * CVE-2014-2532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532&gt;
    * CVE-2014-2653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-07"/>
	<updated date="2014-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/826427">SUSE bug 826427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833605">SUSE bug 833605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847710">SUSE bug 847710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579278" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579279" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579280" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579278" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579279" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579280" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579278" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579279" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579280" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40785" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="916549" ref_url="https://bugzilla.suse.com/916549" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix several security issues and bugs.

These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
  in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
  the refusal deadline for X connections, which made it easier for remote
  attackers to bypass intended access restrictions via a connection outside
  of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd in OpenSSH did not properly restrict the processing of
  keyboard-interactive devices within a single connection, which made it
  easier for remote attackers to conduct brute-force attacks or cause a
  denial of service (CPU consumption) via a long and duplicative list in
  the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
  client that provides a different password for each pam element on this
  list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
  extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
  allowed local users to conduct impersonation attacks by leveraging any SSH
  login access in conjunction with control of the sshd uid to send a crafted
  MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
* CVE-2015-6564: Use-after-free vulnerability in the
  mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
  have allowed local users to gain privileges by leveraging control of the
  sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
- bsc#916549: Fixed support for aesXXX-gcm@openssh.com.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916549">SUSE bug 916549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579281" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579282" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579283" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579281" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579282" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579283" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579281" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579282" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579283" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40786" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="959096" ref_url="https://bugzilla.suse.com/959096" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="962794" ref_url="https://bugzilla.suse.com/962794" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<description>

This update for OpenSSH fixes the following issues:

- Prevent user enumeration through the timing of password processing.
  (bsc#989363, CVE-2016-6210)
- Allow lowering the DH groups parameter limit in server as well as when GSSAPI
  key exchange is used. (bsc#948902)
- Sanitize input for xauth(1). (bsc#970632, CVE-2016-3115)
- Prevent X11 SECURITY circumvention when forwarding X11 connections.
  (bsc#962313, CVE-2016-1908)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back
  to the RFC 4419 specified minimum through an option. (bsc#932483, bsc#948902)
- Ignore PAM environment when using login. (bsc#975865, CVE-2015-8325)
- Limit the accepted password length (prevents a possible denial of service).
  (bsc#992533, CVE-2016-6515)
- Relax version requires for the openssh-askpass sub-package. (bsc#962794)
- Avoid complaining about unset DISPLAY variable. (bsc#981654)
- Initialize message id to prevent connection breakups in some cases. (bsc#959096)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959096">SUSE bug 959096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962794">SUSE bug 962794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579284" comment="openssh-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579285" comment="openssh-askpass-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579286" comment="openssh-askpass-gnome-6.2p2-0.33.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579284" comment="openssh-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579285" comment="openssh-askpass-6.2p2-0.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579286" comment="openssh-askpass-gnome-6.2p2-0.33.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40787" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

Security issues fixed:
- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
- CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

Non security issues fixed:
- Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579287" comment="openssh-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579288" comment="openssh-askpass-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579289" comment="openssh-askpass-gnome-6.2p2-0.40.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579287" comment="openssh-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579288" comment="openssh-askpass-6.2p2-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579289" comment="openssh-askpass-gnome-6.2p2-0.40.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40788" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1105180" ref_url="https://bugzilla.suse.com/1105180" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="1106726" ref_url="https://bugzilla.suse.com/1106726" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2017-15906: The process_open function in sftp-server.c in OpenSSH did not properly prevent write operations in readonly mode, which allowed attackers to create zero-length files. (bsc#1065000, bsc#1106726)
- CVE-2016-10708: sshd allowed remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.  (bsc#1076957)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)
- CVE-2016-10012: Removed pre-auth compression support from the server to prevent possible cryptographic attacks.  (bsc#1016370)

Bugs fixed:

- Fixed failing 'AuthorizedKeysCommand' within a 'Match User' block in sshd_config (bsc#1105180)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105180">SUSE bug 1105180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106726">SUSE bug 1106726</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579290" comment="openssh-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579291" comment="openssh-askpass-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579292" comment="openssh-askpass-gnome-6.2p2-0.41.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579290" comment="openssh-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579291" comment="openssh-askpass-6.2p2-0.41.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579292" comment="openssh-askpass-gnome-6.2p2-0.41.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40789" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<description>

  
This update for openssh to version 6.6p1 fixes the following issues:

Security issues fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579293" comment="openssh-6.6p1-41.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579294" comment="openssh-askpass-gnome-6.6p1-41.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579295" comment="openssh-openssl1-6.6p1-41.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579296" comment="openssh-openssl1-helpers-6.6p1-41.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40790" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-11"/>
	<updated date="2019-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579297" comment="openssh-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579298" comment="openssh-askpass-gnome-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579299" comment="openssh-openssl1-6.6p1-41.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579300" comment="openssh-openssl1-helpers-6.6p1-41.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40791" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579301" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579302" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579303" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579301" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579302" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579303" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579301" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579302" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579303" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40792" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="961494" ref_url="https://bugzilla.suse.com/961494" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>

This update for openssh-openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-6210: Prevent user enumeration through the timing of password
  processing (bsc#989363)
- CVE-2016-6515: limit accepted password length (prevents possible DoS)
  (bsc#992533)
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: prevent X11 SECURITY circumvention when forwarding X11
  connections (bsc#962313)
- CVE-2015-8325: ignore PAM environment when using login (bsc#975865)
- Disable DH parameters under 2048 bits by default and allow
  lowering the limit back to the RFC 4419 specified minimum
  through an option (bsc#932483, bsc#948902)
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)

Bugs fixed:
- avoid complaining about unset DISPLAY variable (bsc#981654)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- more verbose FIPS mode/CC related documentation in README.FIPS
  (bsc#965576, bsc#960414)
- fix PRNG re-seeding (bsc#960414, bsc#729190)
- Allow empty Match blocks (bsc#961494)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-17"/>
	<updated date="2016-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961494">SUSE bug 961494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579304" comment="openssh-openssl1-6.6p1-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579305" comment="openssh-openssl1-helpers-6.6p1-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40793" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<description>
This update for openssh-openssl1 fixes the following issues:


- Properly verify CIDR masks in configuration (bsc#1005893)

- CVE-2016-10009: limit directories for loading PKCS11 modules (bsc#1016366)

- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege
  process handling authentication (bsc#1016369)

- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)

- fix suggested command for removing conflicting server keys from
  the known_hosts file (bsc#1006221)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579306" comment="openssh-openssl1-6.6p1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579307" comment="openssh-openssl1-helpers-6.6p1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40794" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1017099" ref_url="https://bugzilla.suse.com/1017099" source="BUGZILLA"/>
		<reference ref_id="1023275" ref_url="https://bugzilla.suse.com/1023275" source="BUGZILLA"/>
		<reference ref_id="1053972" ref_url="https://bugzilla.suse.com/1053972" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

These security issues were fixed:

- CVE-2016-10708: Prevent NULL pointer dereference via an out-of-sequence
  NEWKEYS message allowed remote attackers to cause a denial of service
  (bsc#1076957).
- CVE-2017-15906: The process_open function did not properly prevent write
  operations in readonly mode, which allowed attackers to create zero-length
  files (bsc#1065000).
- CVE-2016-10012: The shared memory manager (associated with pre-authentication
  compression) did not ensure that a bounds check is enforced by all compilers,
  which might have allowed local users to gain privileges by leveraging access to
  a sandboxed privilege-separation process, related to the m_zback and m_zlib
  data structures (bsc#1016370).
- CVE-2008-1483: Prevent local users from hijacking forwarded X connections by
  causing ssh to set DISPLAY to :10, even when another process is listening on
  the associated port. This problem was reontroduced by another patch and was
  previously fixed by another update (bsc#1069509).

These non-security issues were fixed:

- Remove duplicate KEX method (bsc#1053972)
- New switch for printing diagnostic messages in sftp client's batch mode (bsc#1023275)
- Enable case-insensitive hostname matching (bsc#1017099)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017099">SUSE bug 1017099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023275">SUSE bug 1023275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053972">SUSE bug 1053972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579308" comment="openssh-openssl1-6.6p1-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579309" comment="openssh-openssl1-helpers-6.6p1-19.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40795" version="1" class="patch">
	<metadata>
		<title>Security update for openssh-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>
This update for openssh-openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Following non-security issues were fixed:

- Fix for sftp client because it returns wrong error code upon failure (bsc#1091396)
- Stop leaking File descriptors (bsc#964336)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579310" comment="openssh-openssl1-6.6p1-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579311" comment="openssh-openssl1-helpers-6.6p1-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40796" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40797" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576597" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576598" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576599" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576600" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576601" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576602" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576597" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576598" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576599" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576600" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576601" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576602" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40798" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576603" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576604" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576605" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576606" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576607" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576608" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576609" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576603" comment="libopenssl-devel-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576604" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576605" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576606" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576607" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576608" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576609" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40799" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576610" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576611" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576612" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576613" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576614" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576615" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576616" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576610" comment="libopenssl-devel-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576611" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576612" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576613" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576614" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576615" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576616" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40800" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579319" comment="libopenssl-devel-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579320" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579321" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579322" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579323" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579324" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579325" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579319" comment="libopenssl-devel-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579320" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579321" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579322" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579323" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579324" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579325" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40801" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572978" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572979" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572980" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579326" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572981" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572982" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40802" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579327" comment="libopenssl-devel-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579328" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579329" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579330" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579331" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579332" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579333" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579327" comment="libopenssl-devel-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579328" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579329" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579330" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579331" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579332" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579333" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40803" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572988" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572989" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572990" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579334" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572991" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572992" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40804" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579335" comment="libopenssl-devel-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579336" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579337" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579338" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579339" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579340" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579341" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579335" comment="libopenssl-devel-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579336" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579337" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579338" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579339" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579340" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579341" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40805" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572998" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572999" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573000" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579342" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573001" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573002" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40806" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573003" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573004" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573005" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579343" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573006" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573007" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40807" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573008" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573009" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573010" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579344" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573011" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573012" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40808" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573013" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573014" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573015" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579345" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573016" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573017" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40809" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573018" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573019" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573020" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579346" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573021" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573022" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40810" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573023" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573024" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573025" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579347" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573026" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573027" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40811" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631740" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631741" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631742" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631751" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631743" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631744" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40812" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632461" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632462" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632463" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632466" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632464" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632465" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40813" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673400" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673401" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673402" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673423" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673403" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673404" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40814" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="875647" ref_url="https://bugzilla.suse.com/875647" source="BUGZILLA"/>
		<reference ref_id="881241" ref_url="https://bugzilla.suse.com/881241" source="BUGZILLA"/>
		<description>

openssl-certs has been updated to include four new and remove two 
certificates:

    * new: Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.crt
    * new:
      E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.crt
    * new:
      TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.250.139.205.150.crt
    * new: T-TeleSec_GlobalRoot_Class_2:2.1.1.crt
    * removed: Firmaprofesional_Root_CA:2.1.1.crt
    * removed: TDC_OCES_Root_CA:2.4.62.72.189.196.crt

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/875647">SUSE bug 875647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881241">SUSE bug 881241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40815" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="971354" ref_url="https://bugzilla.suse.com/971354" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977616" ref_url="https://bugzilla.suse.com/977616" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="977621" ref_url="https://bugzilla.suse.com/977621" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

Bugs fixed:
- bsc#971354: libopenssl1_0_0 now Recommends: openssl1 to get correct SSL Root
  Certificate hashes
- bsc#889013: Rename README.SuSE to the new spelling README.SUSE
- bsc#976943: Fixed a buffer overrun in ASN1_parse.
- bsc#977621: Preserve negotiated digests for SNI (bsc#977621)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971354">SUSE bug 971354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977621">SUSE bug 977621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573028" comment="libopenssl1-devel-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573029" comment="libopenssl1_0_0-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573030" comment="libopenssl1_0_0-32bit-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573031" comment="openssl1-1.0.1g-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573032" comment="openssl1-doc-1.0.1g-0.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40816" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="982745" ref_url="https://bugzilla.suse.com/982745" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="990419" ref_url="https://bugzilla.suse.com/990419" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues:

penSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-06"/>
	<updated date="2016-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982745">SUSE bug 982745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573033" comment="libopenssl1-devel-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573034" comment="libopenssl1_0_0-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573035" comment="libopenssl1_0_0-32bit-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573036" comment="openssl1-1.0.1g-0.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573037" comment="openssl1-doc-1.0.1g-0.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40817" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001707" ref_url="https://bugzilla.suse.com/1001707" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022644" ref_url="https://bugzilla.suse.com/1022644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<description>

This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001707">SUSE bug 1001707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022644">SUSE bug 1022644</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573038" comment="libopenssl1-devel-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573039" comment="libopenssl1-devel-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573040" comment="libopenssl1_0_0-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573041" comment="libopenssl1_0_0-32bit-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573042" comment="openssl1-1.0.1g-0.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573043" comment="openssl1-doc-1.0.1g-0.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40818" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027908" ref_url="https://bugzilla.suse.com/1027908" source="BUGZILLA"/>
		<reference ref_id="1032261" ref_url="https://bugzilla.suse.com/1032261" source="BUGZILLA"/>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1057660" ref_url="https://bugzilla.suse.com/1057660" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="990592" ref_url="https://bugzilla.suse.com/990592" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
- Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

- support alternate root ca chains (bsc#1032261)
- Require openssl1, so c_rehash1 is available during %post to hash the certificates (bsc#1057660)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027908">SUSE bug 1027908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032261">SUSE bug 1032261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057660">SUSE bug 1057660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573044" comment="libopenssl1-devel-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573045" comment="libopenssl1-devel-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573046" comment="libopenssl1_0_0-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573047" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573048" comment="openssl1-1.0.1g-0.58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573049" comment="openssl1-doc-1.0.1g-0.58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40819" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573050" comment="libopenssl1-devel-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573051" comment="libopenssl1-devel-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573052" comment="libopenssl1_0_0-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573053" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573054" comment="openssl1-1.0.1g-0.58.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573055" comment="openssl1-doc-1.0.1g-0.58.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40820" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573056" comment="libopenssl1-devel-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573057" comment="libopenssl1-devel-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573058" comment="libopenssl1_0_0-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573059" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573060" comment="openssl1-1.0.1g-0.58.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573061" comment="openssl1-doc-1.0.1g-0.58.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40821" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573062" comment="libopenssl1-devel-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573063" comment="libopenssl1-devel-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573064" comment="libopenssl1_0_0-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573065" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573066" comment="openssl1-1.0.1g-0.58.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573067" comment="openssl1-doc-1.0.1g-0.58.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40822" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issues:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Fixed 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573068" comment="libopenssl1-devel-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573069" comment="libopenssl1-devel-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573070" comment="libopenssl1_0_0-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573071" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573072" comment="openssl1-1.0.1g-0.58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573073" comment="openssl1-doc-1.0.1g-0.58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40823" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573074" comment="libopenssl1-devel-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573075" comment="libopenssl1-devel-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573076" comment="libopenssl1_0_0-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573077" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573078" comment="openssl1-1.0.1g-0.58.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573079" comment="openssl1-doc-1.0.1g-0.58.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40824" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<description>
This update for openssl1 fixes the following issues:

- Add missing commits fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory problem in 'BN_copy()'. (bsc#1160163)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573080" comment="libopenssl1-devel-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573081" comment="libopenssl1-devel-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573082" comment="libopenssl1_0_0-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573083" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573084" comment="openssl1-1.0.1g-0.58.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573085" comment="openssl1-doc-1.0.1g-0.58.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40825" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573086" comment="libopenssl1-devel-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573087" comment="libopenssl1-devel-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573088" comment="libopenssl1_0_0-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573089" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573090" comment="openssl1-1.0.1g-0.58.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573091" comment="openssl1-doc-1.0.1g-0.58.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40826" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573092" comment="libopenssl1-devel-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573093" comment="libopenssl1-devel-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573094" comment="libopenssl1_0_0-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573095" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573096" comment="openssl1-1.0.1g-0.58.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573097" comment="openssl1-doc-1.0.1g-0.58.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40827" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573098" comment="libopenssl1-devel-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573099" comment="libopenssl1-devel-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573100" comment="libopenssl1_0_0-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573101" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573102" comment="openssl1-1.0.1g-0.58.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573103" comment="openssl1-doc-1.0.1g-0.58.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40828" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631745" comment="libopenssl1-devel-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631746" comment="libopenssl1-devel-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631747" comment="libopenssl1_0_0-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631748" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631749" comment="openssl1-1.0.1g-0.58.36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631750" comment="openssl1-doc-1.0.1g-0.58.36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40829" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.                                                                                                                   
  Read buffer overruns processing ASN.1 strings (bsc#1189521).                                                                                                                                 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632543" comment="libopenssl1-devel-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632544" comment="libopenssl1-devel-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632545" comment="libopenssl1_0_0-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632546" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632547" comment="openssl1-1.0.1g-0.58.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632548" comment="openssl1-doc-1.0.1g-0.58.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40830" version="1" class="patch">
	<metadata>
		<title>Security update for openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl1 fixes the following issues:

- CVE-2022-0778: Fixed an infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673405" comment="libopenssl1-devel-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673406" comment="libopenssl1-devel-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673407" comment="libopenssl1_0_0-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673408" comment="libopenssl1_0_0-32bit-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673409" comment="openssl1-1.0.1g-0.58.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673410" comment="openssl1-doc-1.0.1g-0.58.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40831" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579348" comment="openvpn-2.0.9-143.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579349" comment="openvpn-auth-pam-plugin-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579348" comment="openvpn-2.0.9-143.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579349" comment="openvpn-auth-pam-plugin-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579348" comment="openvpn-2.0.9-143.40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579349" comment="openvpn-auth-pam-plugin-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40832" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00028.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579350" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579351" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579350" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579351" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40833" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<description>


This update for openvpn fixes the following security issues:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
- CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
- CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
- CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
- Some other hardening fixes have also been applied (bsc#1038713)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579352" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579353" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579352" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579353" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40834" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="959511" ref_url="https://bugzilla.suse.com/959511" source="BUGZILLA"/>
		<reference ref_id="988522" ref_url="https://bugzilla.suse.com/988522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]

- The installed sample configuration file was updated to comply to FIPS
  requirements. [bsc#988522]

- Remedy large latencies on the openVPN server during authentication process.
  [bsc#959511]

- Fix potential denial-of-service attacks found during independent audits.
  [bsc#1038713, bsc#1038709, CVE-2017-7478, bsc#1038711, CVE-2017-7479]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959511">SUSE bug 959511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988522">SUSE bug 988522</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579354" comment="openvpn-openssl1-2.3.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579355" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40835" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

Security issue fixed:

- CVE-2017-12166: Fix remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579356" comment="openvpn-openssl1-2.3.2-0.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579357" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40836" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="959714" ref_url="https://bugzilla.suse.com/959714" source="BUGZILLA"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- Fixed Out of bounds read on getaddrinfo() result (bsc#959714).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959714">SUSE bug 959714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579358" comment="openvpn-openssl1-2.3.2-0.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579359" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40837" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085803" ref_url="https://bugzilla.suse.com/1085803" source="BUGZILLA"/>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579360" comment="openvpn-openssl1-2.3.2-0.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579361" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40838" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn-openssl1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<description>
This update for openvpn-openssl1 fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676888" comment="openvpn-openssl1-2.3.2-0.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676889" comment="openvpn-openssl1-down-root-plugin-2.3.2-0.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40839" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573116" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573117" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573118" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40840" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40841" version="1" class="patch">
	<metadata>
		<title>Security update for pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="848417" ref_url="https://bugzilla.suse.com/848417" source="BUGZILLA"/>
		<reference ref_id="870433" ref_url="https://bugzilla.suse.com/870433" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>

This update changes the broken default behavior of pam_pwhistory to not 
enforce checks when the root user requests password changes. In order to 
enforce pwhistory checks on the root user, the 'enforce_for_root' parameter 
needs to be set for the pam_pwhistory.so module.

This pam update fixes the following security and non-security issues:

    * bnc#870433: Fixed pam_timestamp path injection problem
      (CVE-2014-2583)
    * bnc#848417: Fixed pam_pwhistory root password enforcement when
      resetting non-root user's password

Security Issue references:

    * CVE-2014-2583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/848417">SUSE bug 848417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579364" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579365" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579366" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579367" comment="pam-x86-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579364" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579365" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579366" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579367" comment="pam-x86-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579364" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579365" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579366" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579367" comment="pam-x86-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40842" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
This update for pam fixes the following issues:

Security issues fixed:

- CVE-2015-3238: Fixed a denial of service and information leak which could be caused by very long passwords (bsc#934920).
- CVE-2013-7041: Fixed a potential authentication bypass where password hashes weren't compared case-sensitively (bsc#854480).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579368" comment="pam-1.1.5-0.12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579369" comment="pam-32bit-1.1.5-0.12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579370" comment="pam-doc-1.1.5-0.12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40843" version="1" class="patch">
	<metadata>
		<title>Security update for pam-modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="707645" ref_url="https://bugzilla.suse.com/707645" source="BUGZILLA"/>
		<reference ref_id="839386" ref_url="https://bugzilla.suse.com/839386" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
This update for pam-modules fixes the following issue.

This security issue was fixed:

- CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage
  of locked accounts (bsc#707645, bsc#839386).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-21"/>
	<updated date="2018-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839386">SUSE bug 839386</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573128" comment="pam-modules-11-1.22.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573129" comment="pam-modules-32bit-11-1.22.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40844" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<description>
This update for pam_pkcs11 fixes the following security issues:

- It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012)
- Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012)
- Memory not cleaned properly before free() (bsc#1105012)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009573130" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573131" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40845" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579371" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579371" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40846" version="1" class="patch">
	<metadata>
		<title>Security update for perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="838333" ref_url="https://bugzilla.suse.com/838333" source="BUGZILLA"/>
		<reference ref_id="896715" ref_url="https://bugzilla.suse.com/896715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>

This update fixes a memory leak and an infinite recursion in Data::Dumper. 
(CVE-2014-4330)

Security Issues:

    * CVE-2014-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/838333">SUSE bug 838333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579372" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579373" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579374" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579375" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579376" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579377" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579378" comment="perl-x86-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579372" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579373" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579374" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579375" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579376" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579377" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579378" comment="perl-x86-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579372" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579373" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579374" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579375" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579376" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579377" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579378" comment="perl-x86-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40847" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<description>

This update for perl fixes the following issues:

- CVE-2016-6185: xsloader looking at a '(eval)' directory [bsc#988311]
  
- CVE-2016-1238: searching current directory for optional modules [bsc#987887]

- CVE-2015-8853: regex engine hanging on bad utf8 [bnc976584]

- CVE-2016-2381: environment dup handling bug [bsc#967082]

- perl panic with utf8_mg_pos_cache_update [bsc#929027]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579379" comment="perl-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579380" comment="perl-32bit-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579381" comment="perl-Module-Build-0.2808.01-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579382" comment="perl-Test-Simple-0.72-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579383" comment="perl-base-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579384" comment="perl-doc-5.10.0-64.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40848" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the
  File-Path module before 2.13 for Perl allows attackers to set the mode on
  arbitrary files via vectors involving directory-permission loosening logic.
  (bnc#1047178)

Bug fixes:
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579385" comment="perl-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579386" comment="perl-32bit-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579387" comment="perl-Module-Build-0.2808.01-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579388" comment="perl-Test-Simple-0.72-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579389" comment="perl-base-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579390" comment="perl-doc-5.10.0-64.81.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40849" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579391" comment="perl-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579392" comment="perl-32bit-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579393" comment="perl-Module-Build-0.2808.01-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579394" comment="perl-Test-Simple-0.72-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579395" comment="perl-base-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579396" comment="perl-doc-5.10.0-64.81.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40850" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579397" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579398" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579399" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579400" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579401" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579402" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579397" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579398" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579399" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579400" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579401" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579402" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40851" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573154" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40852" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Convert-ASN1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168934" ref_url="https://bugzilla.suse.com/1168934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
This update for perl-Convert-ASN1 fixes the following issue:

- CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168934">SUSE bug 1168934</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573156" comment="perl-Convert-ASN1-0.22-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40853" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573157" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40854" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573158" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40855" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573159" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40856" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573160" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40857" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573161" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40858" version="1" class="patch">
	<metadata>
		<title>Security update for perl-PlRPC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="858243" ref_url="https://bugzilla.suse.com/858243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7284" ref_url="https://www.suse.com/security/cve/CVE-2013-7284/" source="CVE"/>
		<description>
This update for perl-PlRPC fixes the following issues:

- Security notice: [bsc#858243, CVE-2013-7284]
  * Document security vulnerability on Storable and reply attack
- Add perl-PlRPC-CVE-2013-7284.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-14"/>
	<updated date="2020-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/858243">SUSE bug 858243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7284/">CVE-2013-7284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009573162" comment="perl-PlRPC-0.2019-32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40859" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00050.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579403" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579403" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40860" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3690: Fixed a privilege escalation through untrusted symlinks (bsc#1150734). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579404" comment="permissions-2013.1.7-0.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40861" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001558.html" source="SUSE-SU"/>
		<description>
PHP was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-5589: PHP could be crashed when processing an invalid file with the 'phar' extension with a segfault in Phar::convertToData, leading to Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due to a buffer overlow in phar_fix_filepath (bsc#938719)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40862" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942294" ref_url="https://bugzilla.suse.com/942294" source="BUGZILLA"/>
		<reference ref_id="942295" ref_url="https://bugzilla.suse.com/942295" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00022.html" source="SUSE-SU"/>
		<description>

This update of PHP5 brings several security fixes.

Security fixes:
* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]

It also includes a bugfix for the odbc module:
* compare with SQL_NULL_DATA correctly [bnc#935074]
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40863" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could lead to crashes. [bsc#968284]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar phar archives could potentially lead to code execution. [bsc#949961]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579495" comment="apache2-mod_php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579496" comment="php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579497" comment="php53-bcmath-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579498" comment="php53-bz2-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579499" comment="php53-calendar-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579500" comment="php53-ctype-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579501" comment="php53-curl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579502" comment="php53-dba-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579503" comment="php53-dom-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579504" comment="php53-exif-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579505" comment="php53-fastcgi-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579506" comment="php53-fileinfo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579507" comment="php53-ftp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579508" comment="php53-gd-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579509" comment="php53-gettext-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579510" comment="php53-gmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579511" comment="php53-iconv-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579512" comment="php53-intl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579513" comment="php53-json-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579514" comment="php53-ldap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579515" comment="php53-mbstring-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579516" comment="php53-mcrypt-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579517" comment="php53-mysql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579518" comment="php53-odbc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579519" comment="php53-openssl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579520" comment="php53-pcntl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579521" comment="php53-pdo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579522" comment="php53-pear-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579523" comment="php53-pgsql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579524" comment="php53-pspell-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579525" comment="php53-shmop-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579526" comment="php53-snmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579527" comment="php53-soap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579528" comment="php53-suhosin-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579529" comment="php53-sysvmsg-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579530" comment="php53-sysvsem-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579531" comment="php53-sysvshm-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579532" comment="php53-tokenizer-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579533" comment="php53-wddx-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579534" comment="php53-xmlreader-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579535" comment="php53-xmlrpc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579536" comment="php53-xmlwriter-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579537" comment="php53-xsl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579538" comment="php53-zip-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579539" comment="php53-zlib-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40864" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<description>
This update for php53 fixes the following security issues:

- CVE-2016-4073: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579540" comment="apache2-mod_php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579541" comment="php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579542" comment="php53-bcmath-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579543" comment="php53-bz2-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579544" comment="php53-calendar-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579545" comment="php53-ctype-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579546" comment="php53-curl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579547" comment="php53-dba-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579548" comment="php53-dom-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579549" comment="php53-exif-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579550" comment="php53-fastcgi-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579551" comment="php53-fileinfo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579552" comment="php53-ftp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579553" comment="php53-gd-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579554" comment="php53-gettext-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579555" comment="php53-gmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579556" comment="php53-iconv-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579557" comment="php53-intl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579558" comment="php53-json-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579559" comment="php53-ldap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579560" comment="php53-mbstring-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579561" comment="php53-mcrypt-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579562" comment="php53-mysql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579563" comment="php53-odbc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579564" comment="php53-openssl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579565" comment="php53-pcntl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579566" comment="php53-pdo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579567" comment="php53-pear-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579568" comment="php53-pgsql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579569" comment="php53-pspell-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579570" comment="php53-shmop-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579571" comment="php53-snmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579572" comment="php53-soap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579573" comment="php53-suhosin-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579574" comment="php53-sysvmsg-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579575" comment="php53-sysvsem-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579576" comment="php53-sysvshm-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579577" comment="php53-tokenizer-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579578" comment="php53-wddx-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579579" comment="php53-xmlreader-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579580" comment="php53-xmlrpc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579581" comment="php53-xmlwriter-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579582" comment="php53-xsl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579583" comment="php53-zip-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579584" comment="php53-zlib-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40865" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-5093: A get_icu_value_internal out-of-bounds read could crash the php interpreter (bsc#982010)
- CVE-2016-5094,CVE-2016-5095: Don't allow creating strings with lengths outside int range, avoids overflows (bsc#982011,bsc#982012)
- CVE-2016-5096: A int/size_t confusion in fread could corrupt memory (bsc#982013)
- CVE-2016-5114: A fpm_log.c memory leak and buffer overflow could leak information out of the php process or overwrite a buffer by 1 byte (bsc#982162)
- CVE-2016-4346: A heap overflow was fixed in ext/standard/string.c (bsc#977994)
- CVE-2016-4342: A heap corruption was fixed in tar/zip/phar parser (bsc#977991)
- CVE-2016-4537, CVE-2016-4538: bcpowmod accepted negative scale causing heap buffer overflow corrupting _one_ definition (bsc#978827)
- CVE-2016-4539: Malformed input causes segmentation fault in xml_parse_into_struct() function (bsc#978828)
- CVE-2016-4540, CVE-2016-4541: Out-of-bounds memory read in zif_grapheme_stripos when given negative offset (bsc#978829)
- CVE-2016-4542, CVE-2016-4543, CVE-2016-4544: Out-of-bounds heap memory
  read in exif_read_data() caused by malformed input (bsc#978830)
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert
  function  (bsc#980366)
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c (bsc#980373)
- CVE-2015-8874: Stack consumption vulnerability in GD (bsc#980375)
- CVE-2015-8879: odbc_bindcols function in ext/odbc/php_odbc.c mishandles
  driver behavior for SQL_WVARCHAR (bsc#981050)

Also fixed previously on SUSE Linux Enterprise 11 SP4, but not yet shipped to SUSE Linux Enterprise Server 11 SP3 LTSS:
- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion
  issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could
  lead to crashes. [bsc#968284]
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar
  phar archives could potentially lead to code execution. [bsc#949961]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
- CVE-2014-9767: A directory traversal when extracting zip files was
  fixed that could lead to overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4073: A remote attacker could have caused denial of service,
  or possibly execute arbitrary code, due to incorrect handling of string
  length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not
  return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared
  between threads, which could have resulted in XML external entity
  injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service
  due to incorrect handling of large strings in php_raw_url_encode()
  (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579585" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579586" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579587" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579588" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579589" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579590" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579591" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579592" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579593" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579594" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579595" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579596" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579597" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579598" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579599" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579600" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579601" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579602" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579603" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579604" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579605" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579606" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579607" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579608" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579609" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579610" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579611" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579612" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579613" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579614" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579615" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579616" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579617" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579618" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579619" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579620" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579621" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579622" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579623" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579624" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579625" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579626" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579627" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579628" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579629" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579585" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579586" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579587" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579588" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579589" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579590" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579591" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579592" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579593" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579594" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579595" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579596" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579597" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579598" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579599" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579600" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579601" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579602" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579603" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579604" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579605" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579606" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579607" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579608" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579609" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579610" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579611" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579612" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579613" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579614" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579615" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579616" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579617" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579618" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579619" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579620" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579621" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579622" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579623" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579624" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579625" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579626" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579627" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579628" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579629" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40866" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<description>
php53 was updated to fix five security issues.

These security issues were fixed:
- CVE-2016-5769: mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double Free Courruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579630" comment="apache2-mod_php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579631" comment="php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579632" comment="php53-bcmath-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579633" comment="php53-bz2-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579634" comment="php53-calendar-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579635" comment="php53-ctype-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579636" comment="php53-curl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579637" comment="php53-dba-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579638" comment="php53-dom-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579639" comment="php53-exif-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579640" comment="php53-fastcgi-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579641" comment="php53-fileinfo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579642" comment="php53-ftp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579643" comment="php53-gd-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579644" comment="php53-gettext-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579645" comment="php53-gmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579646" comment="php53-iconv-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579647" comment="php53-intl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579648" comment="php53-json-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579649" comment="php53-ldap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579650" comment="php53-mbstring-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579651" comment="php53-mcrypt-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579652" comment="php53-mysql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579653" comment="php53-odbc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579654" comment="php53-openssl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579655" comment="php53-pcntl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579656" comment="php53-pdo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579657" comment="php53-pear-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579658" comment="php53-pgsql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579659" comment="php53-pspell-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579660" comment="php53-shmop-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579661" comment="php53-snmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579662" comment="php53-soap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579663" comment="php53-suhosin-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579664" comment="php53-sysvmsg-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579665" comment="php53-sysvsem-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579666" comment="php53-sysvshm-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579667" comment="php53-tokenizer-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579668" comment="php53-wddx-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579669" comment="php53-xmlreader-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579670" comment="php53-xmlrpc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579671" comment="php53-xmlwriter-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579672" comment="php53-xsl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579673" comment="php53-zip-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579674" comment="php53-zlib-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40867" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

- security update:
  * CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
  * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
  * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
  * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
  * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
  * CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
  * CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
  * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-01"/>
	<updated date="2016-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579675" comment="apache2-mod_php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579676" comment="php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579677" comment="php53-bcmath-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579678" comment="php53-bz2-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579679" comment="php53-calendar-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579680" comment="php53-ctype-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579681" comment="php53-curl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579682" comment="php53-dba-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579683" comment="php53-dom-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579684" comment="php53-exif-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579685" comment="php53-fastcgi-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579686" comment="php53-fileinfo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579687" comment="php53-ftp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579688" comment="php53-gd-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579689" comment="php53-gettext-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579690" comment="php53-gmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579691" comment="php53-iconv-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579692" comment="php53-intl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579693" comment="php53-json-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579694" comment="php53-ldap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579695" comment="php53-mbstring-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579696" comment="php53-mcrypt-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579697" comment="php53-mysql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579698" comment="php53-odbc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579699" comment="php53-openssl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579700" comment="php53-pcntl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579701" comment="php53-pdo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579702" comment="php53-pear-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579703" comment="php53-pgsql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579704" comment="php53-pspell-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579705" comment="php53-shmop-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579706" comment="php53-snmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579707" comment="php53-soap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579708" comment="php53-suhosin-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579709" comment="php53-sysvmsg-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579710" comment="php53-sysvsem-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579711" comment="php53-sysvshm-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579712" comment="php53-tokenizer-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579713" comment="php53-wddx-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579714" comment="php53-xmlreader-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579715" comment="php53-xmlrpc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579716" comment="php53-xmlwriter-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579717" comment="php53-xsl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579718" comment="php53-zip-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579719" comment="php53-zlib-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40868" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00006.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579720" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579721" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579722" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579723" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579724" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579725" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579726" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579727" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579728" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579729" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579730" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579731" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579732" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579733" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579734" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579735" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579736" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579737" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579738" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579739" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579740" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579741" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579742" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579743" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579744" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579745" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579746" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579747" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579748" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579749" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579750" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579751" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579752" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579753" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579754" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579755" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579756" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579757" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579758" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579759" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579760" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579761" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579762" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579763" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579764" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579720" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579721" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579722" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579723" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579724" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579725" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579726" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579727" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579728" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579729" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579730" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579731" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579732" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579733" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579734" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579735" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579736" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579737" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579738" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579739" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579740" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579741" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579742" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579743" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579744" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579745" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579746" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579747" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579748" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579749" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579750" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579751" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579752" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579753" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579754" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579755" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579756" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579757" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579758" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579759" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579760" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579761" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579762" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579763" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579764" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40869" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-31"/>
	<updated date="2016-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579765" comment="apache2-mod_php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579766" comment="php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579767" comment="php53-bcmath-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579768" comment="php53-bz2-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579769" comment="php53-calendar-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579770" comment="php53-ctype-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579771" comment="php53-curl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579772" comment="php53-dba-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579773" comment="php53-dom-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579774" comment="php53-exif-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579775" comment="php53-fastcgi-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579776" comment="php53-fileinfo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579777" comment="php53-ftp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579778" comment="php53-gd-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579779" comment="php53-gettext-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579780" comment="php53-gmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579781" comment="php53-iconv-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579782" comment="php53-intl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579783" comment="php53-json-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579784" comment="php53-ldap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579785" comment="php53-mbstring-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579786" comment="php53-mcrypt-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579787" comment="php53-mysql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579788" comment="php53-odbc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579789" comment="php53-openssl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579790" comment="php53-pcntl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579791" comment="php53-pdo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579792" comment="php53-pear-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579793" comment="php53-pgsql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579794" comment="php53-pspell-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579795" comment="php53-shmop-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579796" comment="php53-snmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579797" comment="php53-soap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579798" comment="php53-suhosin-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579799" comment="php53-sysvmsg-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579800" comment="php53-sysvsem-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579801" comment="php53-sysvshm-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579802" comment="php53-tokenizer-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579803" comment="php53-wddx-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579804" comment="php53-xmlreader-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579805" comment="php53-xmlrpc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579806" comment="php53-xmlwriter-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579807" comment="php53-xsl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579808" comment="php53-zip-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579809" comment="php53-zlib-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40870" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1012232" ref_url="https://bugzilla.suse.com/1012232" source="BUGZILLA"/>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="974305" ref_url="https://bugzilla.suse.com/974305" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9912" ref_url="https://www.suse.com/security/cve/CVE-2014-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2014-9912: Stack-based buffer overflow in uloc_getDisplayName() [bsc#1012232]
* CVE-2016-9933: Possible stack overflow on truecolor images handling [bsc#1015187]
* CVE-2016-9934: Dereference from NULL pointer could lead to crash [bsc#1015188]
* CVE-2016-9935: Invalid read could lead to crash [bsc#1015189]
* Buffer overflow in libmagic, allowing attackers to crash the PHP interpreter [bsc#974305]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974305">SUSE bug 974305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9912/">CVE-2014-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579810" comment="apache2-mod_php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579811" comment="php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579812" comment="php53-bcmath-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579813" comment="php53-bz2-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579814" comment="php53-calendar-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579815" comment="php53-ctype-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579816" comment="php53-curl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579817" comment="php53-dba-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579818" comment="php53-dom-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579819" comment="php53-exif-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579820" comment="php53-fastcgi-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579821" comment="php53-fileinfo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579822" comment="php53-ftp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579823" comment="php53-gd-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579824" comment="php53-gettext-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579825" comment="php53-gmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579826" comment="php53-iconv-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579827" comment="php53-intl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579828" comment="php53-json-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579829" comment="php53-ldap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579830" comment="php53-mbstring-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579831" comment="php53-mcrypt-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579832" comment="php53-mysql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579833" comment="php53-odbc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579834" comment="php53-openssl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579835" comment="php53-pcntl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579836" comment="php53-pdo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579837" comment="php53-pear-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579838" comment="php53-pgsql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579839" comment="php53-pspell-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579840" comment="php53-shmop-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579841" comment="php53-snmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579842" comment="php53-soap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579843" comment="php53-suhosin-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579844" comment="php53-sysvmsg-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579845" comment="php53-sysvsem-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579846" comment="php53-sysvshm-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579847" comment="php53-tokenizer-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579848" comment="php53-wddx-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579849" comment="php53-xmlreader-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579850" comment="php53-xmlrpc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579851" comment="php53-xmlwriter-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579852" comment="php53-xsl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579853" comment="php53-zip-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579854" comment="php53-zlib-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40871" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019550" ref_url="https://bugzilla.suse.com/1019550" source="BUGZILLA"/>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022255" ref_url="https://bugzilla.suse.com/1022255" source="BUGZILLA"/>
		<reference ref_id="1022257" ref_url="https://bugzilla.suse.com/1022257" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10159" ref_url="https://www.suse.com/security/cve/CVE-2016-10159/" source="CVE"/>
		<reference ref_id="CVE-2016-10160" ref_url="https://www.suse.com/security/cve/CVE-2016-10160/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-7478" ref_url="https://www.suse.com/security/cve/CVE-2016-7478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite
  loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10159/">CVE-2016-10159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10160/">CVE-2016-10160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7478/">CVE-2016-7478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579855" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579856" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579857" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579858" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579859" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579860" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579861" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579862" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579863" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579864" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579865" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579866" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579867" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579868" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579869" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579870" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579871" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579872" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579873" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579874" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579875" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579876" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579877" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579878" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579879" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579880" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579881" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579882" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579883" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579884" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579885" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579886" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579887" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579888" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579889" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579890" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579891" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579892" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579893" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579894" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579895" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579896" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579897" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579898" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579899" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579855" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579856" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579857" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579858" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579859" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579860" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579861" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579862" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579863" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579864" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579865" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579866" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579867" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579868" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579869" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579870" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579871" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579872" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579873" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579874" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579875" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579876" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579877" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579878" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579879" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579880" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579881" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579882" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579883" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579884" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579885" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579886" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579887" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579888" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579889" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579890" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579891" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579892" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579893" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579894" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579895" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579896" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579897" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579898" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579899" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40872" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1035111" ref_url="https://bugzilla.suse.com/1035111" source="BUGZILLA"/>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6294" ref_url="https://www.suse.com/security/cve/CVE-2016-6294/" source="CVE"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<description>

This update for php53 fixes the following issues:

This security issue was fixed:

- CVE-2017-7272: PHP enabled potential SSRF in applications that accept an fsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax was recognized, fsockopen used the port number that is specified in the hostname argument, instead of the port number in the second argument of the function (bsc#1031246)
- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
- CVE-2017-9227: An issue was discovered in Oniguruma 6.2.0, as used in mbstring in PHP. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. (bsc#1040883)
- CVE-2017-9226: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. (bsc#1040889)
- CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6294/">CVE-2016-6294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579900" comment="apache2-mod_php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579901" comment="php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579902" comment="php53-bcmath-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579903" comment="php53-bz2-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579904" comment="php53-calendar-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579905" comment="php53-ctype-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579906" comment="php53-curl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579907" comment="php53-dba-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579908" comment="php53-dom-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579909" comment="php53-exif-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579910" comment="php53-fastcgi-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579911" comment="php53-fileinfo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579912" comment="php53-ftp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579913" comment="php53-gd-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579914" comment="php53-gettext-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579915" comment="php53-gmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579916" comment="php53-iconv-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579917" comment="php53-intl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579918" comment="php53-json-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579919" comment="php53-ldap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579920" comment="php53-mbstring-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579921" comment="php53-mcrypt-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579922" comment="php53-mysql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579923" comment="php53-odbc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579924" comment="php53-openssl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579925" comment="php53-pcntl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579926" comment="php53-pdo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579927" comment="php53-pear-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579928" comment="php53-pgsql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579929" comment="php53-pspell-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579930" comment="php53-shmop-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579931" comment="php53-snmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579932" comment="php53-soap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579933" comment="php53-suhosin-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579934" comment="php53-sysvmsg-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579935" comment="php53-sysvsem-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579936" comment="php53-sysvshm-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579937" comment="php53-tokenizer-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579938" comment="php53-wddx-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579939" comment="php53-xmlreader-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579940" comment="php53-xmlrpc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579941" comment="php53-xmlwriter-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579942" comment="php53-xsl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579943" comment="php53-zip-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579944" comment="php53-zlib-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40873" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1044976" ref_url="https://bugzilla.suse.com/1044976" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- The fix for CVE-2017-7272 was reverted, as it caused regressions in the mysql server connect module.  [bsc#1044976]
  The security fix tried to avoid a server side request forgery, and will be submitted when a better fix becomes available.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579945" comment="apache2-mod_php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579946" comment="php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579947" comment="php53-bcmath-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579948" comment="php53-bz2-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579949" comment="php53-calendar-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579950" comment="php53-ctype-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579951" comment="php53-curl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579952" comment="php53-dba-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579953" comment="php53-dom-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579954" comment="php53-exif-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579955" comment="php53-fastcgi-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579956" comment="php53-fileinfo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579957" comment="php53-ftp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579958" comment="php53-gd-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579959" comment="php53-gettext-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579960" comment="php53-gmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579961" comment="php53-iconv-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579962" comment="php53-intl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579963" comment="php53-json-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579964" comment="php53-ldap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579965" comment="php53-mbstring-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579966" comment="php53-mcrypt-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579967" comment="php53-mysql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579968" comment="php53-odbc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579969" comment="php53-openssl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579970" comment="php53-pcntl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579971" comment="php53-pdo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579972" comment="php53-pear-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579973" comment="php53-pgsql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579974" comment="php53-pspell-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579975" comment="php53-shmop-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579976" comment="php53-snmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579977" comment="php53-soap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579978" comment="php53-suhosin-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579979" comment="php53-sysvmsg-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579980" comment="php53-sysvsem-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579981" comment="php53-sysvshm-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579982" comment="php53-tokenizer-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579983" comment="php53-wddx-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579984" comment="php53-xmlreader-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579985" comment="php53-xmlrpc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579986" comment="php53-xmlwriter-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579987" comment="php53-xsl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579988" comment="php53-zip-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579989" comment="php53-zlib-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40874" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048094" ref_url="https://bugzilla.suse.com/1048094" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048111" ref_url="https://bugzilla.suse.com/1048111" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11146" ref_url="https://www.suse.com/security/cve/CVE-2017-11146/" source="CVE"/>
		<reference ref_id="CVE-2017-11147" ref_url="https://www.suse.com/security/cve/CVE-2017-11147/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<description>
This update for php53 fixes the several issues.

These security issues were fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
- CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
- CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
- CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
- CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
- CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
- CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
- CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
- CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11146/">CVE-2017-11146</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11147/">CVE-2017-11147</cve>
	<cve impact="low" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579990" comment="apache2-mod_php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579991" comment="php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579992" comment="php53-bcmath-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579993" comment="php53-bz2-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579994" comment="php53-calendar-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579995" comment="php53-ctype-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579996" comment="php53-curl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579997" comment="php53-dba-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579998" comment="php53-dom-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579999" comment="php53-exif-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580000" comment="php53-fastcgi-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580001" comment="php53-fileinfo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580002" comment="php53-ftp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580003" comment="php53-gd-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580004" comment="php53-gettext-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580005" comment="php53-gmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580006" comment="php53-iconv-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580007" comment="php53-intl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580008" comment="php53-json-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580009" comment="php53-ldap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580010" comment="php53-mbstring-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580011" comment="php53-mcrypt-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580012" comment="php53-mysql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580013" comment="php53-odbc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580014" comment="php53-openssl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580015" comment="php53-pcntl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580016" comment="php53-pdo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580017" comment="php53-pear-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580018" comment="php53-pgsql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580019" comment="php53-pspell-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580020" comment="php53-shmop-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580021" comment="php53-snmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580022" comment="php53-soap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580023" comment="php53-suhosin-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580024" comment="php53-sysvmsg-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580025" comment="php53-sysvsem-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580026" comment="php53-sysvshm-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580027" comment="php53-tokenizer-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580028" comment="php53-wddx-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580029" comment="php53-xmlreader-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580030" comment="php53-xmlrpc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580031" comment="php53-xmlwriter-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580032" comment="php53-xsl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580033" comment="php53-zip-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580034" comment="php53-zlib-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40875" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1067441" ref_url="https://bugzilla.suse.com/1067441" source="BUGZILLA"/>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16642" ref_url="https://www.suse.com/security/cve/CVE-2017-16642/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2017-16642: Fix timelib_meridian error that could be used to leak information from the interpreter (bsc#1067441).
- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-02"/>
	<updated date="2018-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16642/">CVE-2017-16642</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580035" comment="apache2-mod_php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580036" comment="php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580037" comment="php53-bcmath-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580038" comment="php53-bz2-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580039" comment="php53-calendar-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580040" comment="php53-ctype-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580041" comment="php53-curl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580042" comment="php53-dba-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580043" comment="php53-dom-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580044" comment="php53-exif-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580045" comment="php53-fastcgi-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580046" comment="php53-fileinfo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580047" comment="php53-ftp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580048" comment="php53-gd-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580049" comment="php53-gettext-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580050" comment="php53-gmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580051" comment="php53-iconv-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580052" comment="php53-intl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580053" comment="php53-json-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580054" comment="php53-ldap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580055" comment="php53-mbstring-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580056" comment="php53-mcrypt-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580057" comment="php53-mysql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580058" comment="php53-odbc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580059" comment="php53-openssl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580060" comment="php53-pcntl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580061" comment="php53-pdo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580062" comment="php53-pear-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580063" comment="php53-pgsql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580064" comment="php53-pspell-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580065" comment="php53-shmop-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580066" comment="php53-snmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580067" comment="php53-soap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580068" comment="php53-suhosin-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580069" comment="php53-sysvmsg-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580070" comment="php53-sysvsem-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580071" comment="php53-sysvshm-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580072" comment="php53-tokenizer-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580073" comment="php53-wddx-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580074" comment="php53-xmlreader-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580075" comment="php53-xmlrpc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580076" comment="php53-xmlwriter-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580077" comment="php53-xsl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580078" comment="php53-zip-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580079" comment="php53-zlib-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40876" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076220" ref_url="https://bugzilla.suse.com/1076220" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="986391" ref_url="https://bugzilla.suse.com/986391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2016-5771" ref_url="https://www.suse.com/security/cve/CVE-2016-5771/" source="CVE"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes several issues.

These security issues were fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data
  could be controlled if the input can be controlled (e.g., during file
  uploads).  (bsc#1080234)
- CVE-2018-5712: Prevent reflected XSS on the PHAR 404 error page via the
  URI of a request for a .phar file that allowed for information disclosure
  (bsc#1076220)
- CVE-2018-5711: Prevent integer signedness error that could have lead
  to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
- CVE-2016-5773: php_zip.c in the zip extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data containing a ZipArchive object.  (bsc#986247)
- CVE-2016-5771: spl_array.c in the SPL extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data.  (bsc#986391)
- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an
  HTTPresponse in the php_stream_url_wrap_http_ex.  (bsc#1083639)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5771/">CVE-2016-5771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580080" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580081" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580082" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580083" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580084" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580085" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580086" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580087" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580088" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580089" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580090" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580091" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580092" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580093" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580094" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580095" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580096" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580097" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580098" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580099" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580100" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580101" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580102" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580103" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580104" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580105" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580106" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580107" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580108" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580109" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580110" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580111" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580112" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580113" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580114" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580115" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580116" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580117" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580118" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580119" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580120" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580121" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580122" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580123" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580124" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580080" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580081" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580082" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580083" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580084" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580085" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580086" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580087" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580088" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580089" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580090" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580091" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580092" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580093" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580094" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580095" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580096" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580097" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580098" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580099" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580100" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580101" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580102" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580103" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580104" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580105" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580106" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580107" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580108" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580109" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580110" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580111" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580112" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580113" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580114" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580115" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580116" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580117" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580118" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580119" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580120" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580121" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580122" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580123" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580124" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40877" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091362" ref_url="https://bugzilla.suse.com/1091362" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="1091367" ref_url="https://bugzilla.suse.com/1091367" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10545" ref_url="https://www.suse.com/security/cve/CVE-2018-10545/" source="CVE"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2018-10545: Fix access controls in FPM child processes (bsc#1091367).
- CVE-2018-10547: Fix Reflected XSS on the PHAR 403 and 404 error pages (bsc#1091362).
- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10545/">CVE-2018-10545</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580125" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580126" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580127" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580128" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580129" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580130" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580131" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580132" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580133" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580134" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580135" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580136" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580137" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580138" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580139" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580140" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580141" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580142" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580143" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580144" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580145" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580146" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580147" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580148" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580149" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580150" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580151" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580152" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580153" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580154" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580155" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580156" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580157" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580158" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580159" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580160" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580161" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580162" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580163" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580164" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580165" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580166" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580167" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580168" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580169" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580125" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580126" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580127" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580128" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580129" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580130" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580131" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580132" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580133" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580134" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580135" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580136" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580137" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580138" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580139" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580140" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580141" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580142" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580143" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580144" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580145" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580146" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580147" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580148" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580149" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580150" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580151" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580152" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580153" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580154" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580155" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580156" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580157" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580158" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580159" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580160" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580161" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580162" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580163" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580164" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580165" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580166" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580167" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580168" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580169" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40878" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

The following security issue was fixed:

- An out-of-bounds read in the do_core_note function in readelf.c in libmagic.a
  allowed remote attackers to cause a denial of service via a crafted ELF file
  (CVE-2018-10360, bsc#1096984)
- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580170" comment="apache2-mod_php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580171" comment="php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580172" comment="php53-bcmath-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580173" comment="php53-bz2-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580174" comment="php53-calendar-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580175" comment="php53-ctype-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580176" comment="php53-curl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580177" comment="php53-dba-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580178" comment="php53-dom-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580179" comment="php53-exif-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580180" comment="php53-fastcgi-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580181" comment="php53-fileinfo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580182" comment="php53-ftp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580183" comment="php53-gd-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580184" comment="php53-gettext-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580185" comment="php53-gmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580186" comment="php53-iconv-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580187" comment="php53-intl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580188" comment="php53-json-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580189" comment="php53-ldap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580190" comment="php53-mbstring-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580191" comment="php53-mcrypt-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580192" comment="php53-mysql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580193" comment="php53-odbc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580194" comment="php53-openssl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580195" comment="php53-pcntl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580196" comment="php53-pdo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580197" comment="php53-pear-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580198" comment="php53-pgsql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580199" comment="php53-pspell-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580200" comment="php53-shmop-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580201" comment="php53-snmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580202" comment="php53-soap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580203" comment="php53-suhosin-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580204" comment="php53-sysvmsg-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580205" comment="php53-sysvsem-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580206" comment="php53-sysvshm-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580207" comment="php53-tokenizer-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580208" comment="php53-wddx-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580209" comment="php53-xmlreader-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580210" comment="php53-xmlrpc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580211" comment="php53-xmlwriter-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580212" comment="php53-xsl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580213" comment="php53-zip-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580214" comment="php53-zlib-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40879" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

The following security issues were fixed:

- CVE-2018-14851: Fixed an out-of-bound read in exif_process_IFD_in_MAKERNOTE,
  which could be exploited by an attacker via crafted JPG files, and could
  result in an application crash. (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow leading to a heap based buffer
  over-read in exif_thumbnail_extract of exif.c. (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580215" comment="apache2-mod_php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580216" comment="php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580217" comment="php53-bcmath-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580218" comment="php53-bz2-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580219" comment="php53-calendar-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580220" comment="php53-ctype-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580221" comment="php53-curl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580222" comment="php53-dba-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580223" comment="php53-dom-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580224" comment="php53-exif-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580225" comment="php53-fastcgi-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580226" comment="php53-fileinfo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580227" comment="php53-ftp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580228" comment="php53-gd-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580229" comment="php53-gettext-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580230" comment="php53-gmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580231" comment="php53-iconv-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580232" comment="php53-intl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580233" comment="php53-json-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580234" comment="php53-ldap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580235" comment="php53-mbstring-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580236" comment="php53-mcrypt-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580237" comment="php53-mysql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580238" comment="php53-odbc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580239" comment="php53-openssl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580240" comment="php53-pcntl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580241" comment="php53-pdo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580242" comment="php53-pear-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580243" comment="php53-pgsql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580244" comment="php53-pspell-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580245" comment="php53-shmop-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580246" comment="php53-snmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580247" comment="php53-soap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580248" comment="php53-suhosin-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580249" comment="php53-sysvmsg-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580250" comment="php53-sysvsem-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580251" comment="php53-sysvshm-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580252" comment="php53-tokenizer-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580253" comment="php53-wddx-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580254" comment="php53-xmlreader-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580255" comment="php53-xmlrpc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580256" comment="php53-xmlwriter-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580257" comment="php53-xsl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580258" comment="php53-zip-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580259" comment="php53-zlib-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40880" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580260" comment="apache2-mod_php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580261" comment="php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580262" comment="php53-bcmath-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580263" comment="php53-bz2-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580264" comment="php53-calendar-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580265" comment="php53-ctype-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580266" comment="php53-curl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580267" comment="php53-dba-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580268" comment="php53-dom-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580269" comment="php53-exif-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580270" comment="php53-fastcgi-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580271" comment="php53-fileinfo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580272" comment="php53-ftp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580273" comment="php53-gd-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580274" comment="php53-gettext-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580275" comment="php53-gmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580276" comment="php53-iconv-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580277" comment="php53-intl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580278" comment="php53-json-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580279" comment="php53-ldap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580280" comment="php53-mbstring-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580281" comment="php53-mcrypt-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580282" comment="php53-mysql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580283" comment="php53-odbc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580284" comment="php53-openssl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580285" comment="php53-pcntl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580286" comment="php53-pdo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580287" comment="php53-pear-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580288" comment="php53-pgsql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580289" comment="php53-pspell-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580290" comment="php53-shmop-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580291" comment="php53-snmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580292" comment="php53-soap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580293" comment="php53-suhosin-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580294" comment="php53-sysvmsg-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580295" comment="php53-sysvsem-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580296" comment="php53-sysvshm-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580297" comment="php53-tokenizer-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580298" comment="php53-wddx-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580299" comment="php53-xmlreader-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580300" comment="php53-xmlrpc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580301" comment="php53-xmlwriter-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580302" comment="php53-xsl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580303" comment="php53-zip-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580304" comment="php53-zlib-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40881" version="1" class="patch">
	<metadata>
		<title>Recommended update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580305" comment="apache2-mod_php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580306" comment="php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580307" comment="php53-bcmath-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580308" comment="php53-bz2-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580309" comment="php53-calendar-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580310" comment="php53-ctype-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580311" comment="php53-curl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580312" comment="php53-dba-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580313" comment="php53-dom-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580314" comment="php53-exif-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580315" comment="php53-fastcgi-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580316" comment="php53-fileinfo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580317" comment="php53-ftp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580318" comment="php53-gd-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580319" comment="php53-gettext-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580320" comment="php53-gmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580321" comment="php53-iconv-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580322" comment="php53-intl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580323" comment="php53-json-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580324" comment="php53-ldap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580325" comment="php53-mbstring-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580326" comment="php53-mcrypt-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580327" comment="php53-mysql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580328" comment="php53-odbc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580329" comment="php53-openssl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580330" comment="php53-pcntl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580331" comment="php53-pdo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580332" comment="php53-pear-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580333" comment="php53-pgsql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580334" comment="php53-pspell-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580335" comment="php53-shmop-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580336" comment="php53-snmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580337" comment="php53-soap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580338" comment="php53-suhosin-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580339" comment="php53-sysvmsg-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580340" comment="php53-sysvsem-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580341" comment="php53-sysvshm-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580342" comment="php53-tokenizer-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580343" comment="php53-wddx-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580344" comment="php53-xmlreader-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580345" comment="php53-xmlrpc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580346" comment="php53-xmlwriter-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580347" comment="php53-xsl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580348" comment="php53-zip-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580349" comment="php53-zlib-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40882" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580350" comment="apache2-mod_php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580351" comment="php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580352" comment="php53-bcmath-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580353" comment="php53-bz2-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580354" comment="php53-calendar-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580355" comment="php53-ctype-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580356" comment="php53-curl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580357" comment="php53-dba-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580358" comment="php53-dom-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580359" comment="php53-exif-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580360" comment="php53-fastcgi-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580361" comment="php53-fileinfo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580362" comment="php53-ftp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580363" comment="php53-gd-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580364" comment="php53-gettext-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580365" comment="php53-gmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580366" comment="php53-iconv-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580367" comment="php53-intl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580368" comment="php53-json-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580369" comment="php53-ldap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580370" comment="php53-mbstring-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580371" comment="php53-mcrypt-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580372" comment="php53-mysql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580373" comment="php53-odbc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580374" comment="php53-openssl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580375" comment="php53-pcntl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580376" comment="php53-pdo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580377" comment="php53-pear-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580378" comment="php53-pgsql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580379" comment="php53-pspell-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580380" comment="php53-shmop-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580381" comment="php53-snmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580382" comment="php53-soap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580383" comment="php53-suhosin-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580384" comment="php53-sysvmsg-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580385" comment="php53-sysvsem-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580386" comment="php53-sysvshm-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580387" comment="php53-tokenizer-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580388" comment="php53-wddx-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580389" comment="php53-xmlreader-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580390" comment="php53-xmlrpc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580391" comment="php53-xmlwriter-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580392" comment="php53-xsl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580393" comment="php53-zip-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580394" comment="php53-zlib-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40883" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126713" ref_url="https://bugzilla.suse.com/1126713" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1127122" ref_url="https://bugzilla.suse.com/1127122" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128886" ref_url="https://bugzilla.suse.com/1128886" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which could allow an attacker to read 
  allocated and unallocated memory when parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR reading functions which could allow an 
  attacker to read allocated and unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580395" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580396" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580397" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580398" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580399" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580400" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580401" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580402" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580403" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580404" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580405" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580406" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580407" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580408" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580409" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580410" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580411" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580412" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580413" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580414" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580415" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580416" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580417" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580418" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580419" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580420" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580421" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580422" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580423" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580424" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580425" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580426" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580427" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580428" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580429" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580430" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580431" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580432" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580433" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580434" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580435" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580436" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580437" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580438" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580439" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40884" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1132837" ref_url="https://bugzilla.suse.com/1132837" source="BUGZILLA"/>
		<reference ref_id="1132838" ref_url="https://bugzilla.suse.com/1132838" source="BUGZILLA"/>
		<reference ref_id="1134322" ref_url="https://bugzilla.suse.com/1134322" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11034: Fixed a heap-buffer overflow in php_ifd_get32si() (bsc#1132838).
- CVE-2019-11035: Fixed a heap-buffer overflow in exif_iif_add_value() (bsc#1132837).
- CVE-2019-11036: Fixed buffer over-read in exif_process_IFD_TAG function leading to information disclosure (bsc#1134322).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-22"/>
	<updated date="2019-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132837">SUSE bug 1132837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132838">SUSE bug 1132838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134322">SUSE bug 1134322</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580440" comment="apache2-mod_php53-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580441" comment="php53-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580442" comment="php53-bcmath-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580443" comment="php53-bz2-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580444" comment="php53-calendar-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580445" comment="php53-ctype-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580446" comment="php53-curl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580447" comment="php53-dba-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580448" comment="php53-dom-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580449" comment="php53-exif-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580450" comment="php53-fastcgi-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580451" comment="php53-fileinfo-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580452" comment="php53-ftp-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580453" comment="php53-gd-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580454" comment="php53-gettext-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580455" comment="php53-gmp-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580456" comment="php53-iconv-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580457" comment="php53-intl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580458" comment="php53-json-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580459" comment="php53-ldap-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580460" comment="php53-mbstring-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580461" comment="php53-mcrypt-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580462" comment="php53-mysql-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580463" comment="php53-odbc-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580464" comment="php53-openssl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580465" comment="php53-pcntl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580466" comment="php53-pdo-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580467" comment="php53-pear-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580468" comment="php53-pgsql-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580469" comment="php53-pspell-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580470" comment="php53-shmop-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580471" comment="php53-snmp-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580472" comment="php53-soap-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580473" comment="php53-suhosin-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580474" comment="php53-sysvmsg-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580475" comment="php53-sysvsem-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580476" comment="php53-sysvshm-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580477" comment="php53-tokenizer-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580478" comment="php53-wddx-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580479" comment="php53-xmlreader-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580480" comment="php53-xmlrpc-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580481" comment="php53-xmlwriter-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580482" comment="php53-xsl-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580483" comment="php53-zip-5.3.17-112.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580484" comment="php53-zlib-5.3.17-112.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40885" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138172" ref_url="https://bugzilla.suse.com/1138172" source="BUGZILLA"/>
		<reference ref_id="1138173" ref_url="https://bugzilla.suse.com/1138173" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:	  

- CVE-2019-11039: Fixed a heap-buffer-overflow on php_jpg_get16 (bsc#1138173).
- CVE-2019-11040: Fixed an out-of-bounds read due to an integer overflow in 
  iconv.c:_php_iconv_mime_decode() (bsc#1138172).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-04"/>
	<updated date="2019-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138172">SUSE bug 1138172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138173">SUSE bug 1138173</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580485" comment="apache2-mod_php53-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580486" comment="php53-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580487" comment="php53-bcmath-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580488" comment="php53-bz2-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580489" comment="php53-calendar-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580490" comment="php53-ctype-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580491" comment="php53-curl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580492" comment="php53-dba-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580493" comment="php53-dom-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580494" comment="php53-exif-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580495" comment="php53-fastcgi-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580496" comment="php53-fileinfo-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580497" comment="php53-ftp-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580498" comment="php53-gd-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580499" comment="php53-gettext-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580500" comment="php53-gmp-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580501" comment="php53-iconv-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580502" comment="php53-intl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580503" comment="php53-json-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580504" comment="php53-ldap-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580505" comment="php53-mbstring-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580506" comment="php53-mcrypt-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580507" comment="php53-mysql-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580508" comment="php53-odbc-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580509" comment="php53-openssl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580510" comment="php53-pcntl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580511" comment="php53-pdo-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580512" comment="php53-pear-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580513" comment="php53-pgsql-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580514" comment="php53-pspell-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580515" comment="php53-shmop-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580516" comment="php53-snmp-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580517" comment="php53-soap-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580518" comment="php53-suhosin-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580519" comment="php53-sysvmsg-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580520" comment="php53-sysvsem-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580521" comment="php53-sysvshm-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580522" comment="php53-tokenizer-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580523" comment="php53-wddx-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580524" comment="php53-xmlreader-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580525" comment="php53-xmlrpc-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580526" comment="php53-xmlwriter-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580527" comment="php53-xsl-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580528" comment="php53-zip-5.3.17-112.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580529" comment="php53-zlib-5.3.17-112.66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40886" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580530" comment="apache2-mod_php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580531" comment="php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580532" comment="php53-bcmath-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580533" comment="php53-bz2-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580534" comment="php53-calendar-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580535" comment="php53-ctype-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580536" comment="php53-curl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580537" comment="php53-dba-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580538" comment="php53-dom-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580539" comment="php53-exif-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580540" comment="php53-fastcgi-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580541" comment="php53-fileinfo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580542" comment="php53-ftp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580543" comment="php53-gd-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580544" comment="php53-gettext-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580545" comment="php53-gmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580546" comment="php53-iconv-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580547" comment="php53-intl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580548" comment="php53-json-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580549" comment="php53-ldap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580550" comment="php53-mbstring-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580551" comment="php53-mcrypt-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580552" comment="php53-mysql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580553" comment="php53-odbc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580554" comment="php53-openssl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580555" comment="php53-pcntl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580556" comment="php53-pdo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580557" comment="php53-pear-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580558" comment="php53-pgsql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580559" comment="php53-pspell-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580560" comment="php53-shmop-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580561" comment="php53-snmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580562" comment="php53-soap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580563" comment="php53-suhosin-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580564" comment="php53-sysvmsg-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580565" comment="php53-sysvsem-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580566" comment="php53-sysvshm-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580567" comment="php53-tokenizer-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580568" comment="php53-wddx-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580569" comment="php53-xmlreader-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580570" comment="php53-xmlrpc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580571" comment="php53-xmlwriter-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580572" comment="php53-xsl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580573" comment="php53-zip-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580574" comment="php53-zlib-5.3.17-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40887" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154999" ref_url="https://bugzilla.suse.com/1154999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:

- CVE-2019-11043: Fixed possible remote code execution via env_path_info underflow in fpm_main.c (bsc#1154999).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154999">SUSE bug 1154999</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580575" comment="apache2-mod_php53-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580576" comment="php53-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580577" comment="php53-bcmath-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580578" comment="php53-bz2-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580579" comment="php53-calendar-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580580" comment="php53-ctype-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580581" comment="php53-curl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580582" comment="php53-dba-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580583" comment="php53-dom-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580584" comment="php53-exif-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580585" comment="php53-fastcgi-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580586" comment="php53-fileinfo-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580587" comment="php53-ftp-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580588" comment="php53-gd-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580589" comment="php53-gettext-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580590" comment="php53-gmp-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580591" comment="php53-iconv-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580592" comment="php53-intl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580593" comment="php53-json-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580594" comment="php53-ldap-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580595" comment="php53-mbstring-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580596" comment="php53-mcrypt-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580597" comment="php53-mysql-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580598" comment="php53-odbc-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580599" comment="php53-openssl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580600" comment="php53-pcntl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580601" comment="php53-pdo-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580602" comment="php53-pear-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580603" comment="php53-pgsql-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580604" comment="php53-pspell-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580605" comment="php53-shmop-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580606" comment="php53-snmp-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580607" comment="php53-soap-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580608" comment="php53-suhosin-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580609" comment="php53-sysvmsg-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580610" comment="php53-sysvsem-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580611" comment="php53-sysvshm-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580612" comment="php53-tokenizer-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580613" comment="php53-wddx-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580614" comment="php53-xmlreader-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580615" comment="php53-xmlrpc-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580616" comment="php53-xmlwriter-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580617" comment="php53-xsl-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580618" comment="php53-zip-5.3.17-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580619" comment="php53-zlib-5.3.17-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40888" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580620" comment="apache2-mod_php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580621" comment="php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580622" comment="php53-bcmath-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580623" comment="php53-bz2-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580624" comment="php53-calendar-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580625" comment="php53-ctype-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580626" comment="php53-curl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580627" comment="php53-dba-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580628" comment="php53-dom-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580629" comment="php53-exif-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580630" comment="php53-fastcgi-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580631" comment="php53-fileinfo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580632" comment="php53-ftp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580633" comment="php53-gd-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580634" comment="php53-gettext-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580635" comment="php53-gmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580636" comment="php53-iconv-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580637" comment="php53-intl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580638" comment="php53-json-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580639" comment="php53-ldap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580640" comment="php53-mbstring-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580641" comment="php53-mcrypt-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580642" comment="php53-mysql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580643" comment="php53-odbc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580644" comment="php53-openssl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580645" comment="php53-pcntl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580646" comment="php53-pdo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580647" comment="php53-pear-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580648" comment="php53-pgsql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580649" comment="php53-pspell-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580650" comment="php53-shmop-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580651" comment="php53-snmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580652" comment="php53-soap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580653" comment="php53-suhosin-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580654" comment="php53-sysvmsg-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580655" comment="php53-sysvsem-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580656" comment="php53-sysvshm-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580657" comment="php53-tokenizer-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580658" comment="php53-wddx-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580659" comment="php53-xmlreader-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580660" comment="php53-xmlrpc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580661" comment="php53-xmlwriter-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580662" comment="php53-xsl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580663" comment="php53-zip-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580664" comment="php53-zlib-5.3.17-112.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40889" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1165289" ref_url="https://bugzilla.suse.com/1165289" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7063: Fixed an issue where adding files change the permissions to default (bsc#1165289).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-11"/>
	<updated date="2020-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1165289">SUSE bug 1165289</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580665" comment="apache2-mod_php53-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580666" comment="php53-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580667" comment="php53-bcmath-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580668" comment="php53-bz2-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580669" comment="php53-calendar-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580670" comment="php53-ctype-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580671" comment="php53-curl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580672" comment="php53-dba-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580673" comment="php53-dom-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580674" comment="php53-exif-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580675" comment="php53-fastcgi-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580676" comment="php53-fileinfo-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580677" comment="php53-ftp-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580678" comment="php53-gd-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580679" comment="php53-gettext-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580680" comment="php53-gmp-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580681" comment="php53-iconv-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580682" comment="php53-intl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580683" comment="php53-json-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580684" comment="php53-ldap-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580685" comment="php53-mbstring-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580686" comment="php53-mcrypt-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580687" comment="php53-mysql-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580688" comment="php53-odbc-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580689" comment="php53-openssl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580690" comment="php53-pcntl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580691" comment="php53-pdo-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580692" comment="php53-pear-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580693" comment="php53-pgsql-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580694" comment="php53-pspell-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580695" comment="php53-shmop-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580696" comment="php53-snmp-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580697" comment="php53-soap-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580698" comment="php53-suhosin-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580699" comment="php53-sysvmsg-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580700" comment="php53-sysvsem-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580701" comment="php53-sysvshm-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580702" comment="php53-tokenizer-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580703" comment="php53-wddx-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580704" comment="php53-xmlreader-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580705" comment="php53-xmlrpc-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580706" comment="php53-xmlwriter-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580707" comment="php53-xsl-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580708" comment="php53-zip-5.3.17-112.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580709" comment="php53-zlib-5.3.17-112.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40890" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168326" ref_url="https://bugzilla.suse.com/1168326" source="BUGZILLA"/>
		<reference ref_id="1168352" ref_url="https://bugzilla.suse.com/1168352" source="BUGZILLA"/>
		<reference ref_id="1171999" ref_url="https://bugzilla.suse.com/1171999" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11048" ref_url="https://www.suse.com/security/cve/CVE-2019-11048/" source="CVE"/>
		<reference ref_id="CVE-2020-7064" ref_url="https://www.suse.com/security/cve/CVE-2020-7064/" source="CVE"/>
		<reference ref_id="CVE-2020-7066" ref_url="https://www.suse.com/security/cve/CVE-2020-7066/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7064: Fixed a one byte read of uninitialized memory in exif_read_data() (bsc#1168326).
- CVE-2020-7066: Fixed URL truncation in get_headers() if the URL contains zero (\0) character (bsc#1168352).
- CVE-2019-11048: Improved the handling of overly long filenames or field names in HTTP file uploads (bsc#1171999).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168326">SUSE bug 1168326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168352">SUSE bug 1168352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171999">SUSE bug 1171999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11048/">CVE-2019-11048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7064/">CVE-2020-7064</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7066/">CVE-2020-7066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580710" comment="apache2-mod_php53-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580711" comment="php53-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580712" comment="php53-bcmath-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580713" comment="php53-bz2-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580714" comment="php53-calendar-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580715" comment="php53-ctype-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580716" comment="php53-curl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580717" comment="php53-dba-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580718" comment="php53-dom-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580719" comment="php53-exif-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580720" comment="php53-fastcgi-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580721" comment="php53-fileinfo-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580722" comment="php53-ftp-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580723" comment="php53-gd-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580724" comment="php53-gettext-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580725" comment="php53-gmp-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580726" comment="php53-iconv-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580727" comment="php53-intl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580728" comment="php53-json-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580729" comment="php53-ldap-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580730" comment="php53-mbstring-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580731" comment="php53-mcrypt-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580732" comment="php53-mysql-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580733" comment="php53-odbc-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580734" comment="php53-openssl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580735" comment="php53-pcntl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580736" comment="php53-pdo-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580737" comment="php53-pear-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580738" comment="php53-pgsql-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580739" comment="php53-pspell-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580740" comment="php53-shmop-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580741" comment="php53-snmp-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580742" comment="php53-soap-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580743" comment="php53-suhosin-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580744" comment="php53-sysvmsg-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580745" comment="php53-sysvsem-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580746" comment="php53-sysvshm-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580747" comment="php53-tokenizer-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580748" comment="php53-wddx-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580749" comment="php53-xmlreader-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580750" comment="php53-xmlrpc-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580751" comment="php53-xmlwriter-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580752" comment="php53-xsl-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580753" comment="php53-zip-5.3.17-112.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580754" comment="php53-zlib-5.3.17-112.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40891" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175223" ref_url="https://bugzilla.suse.com/1175223" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7068: Use of freed hash key in the phar_parse_zipfile function (bsc#1175223).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175223">SUSE bug 1175223</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580755" comment="apache2-mod_php53-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580756" comment="php53-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580757" comment="php53-bcmath-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580758" comment="php53-bz2-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580759" comment="php53-calendar-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580760" comment="php53-ctype-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580761" comment="php53-curl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580762" comment="php53-dba-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580763" comment="php53-dom-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580764" comment="php53-exif-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580765" comment="php53-fastcgi-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580766" comment="php53-fileinfo-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580767" comment="php53-ftp-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580768" comment="php53-gd-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580769" comment="php53-gettext-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580770" comment="php53-gmp-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580771" comment="php53-iconv-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580772" comment="php53-intl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580773" comment="php53-json-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580774" comment="php53-ldap-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580775" comment="php53-mbstring-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580776" comment="php53-mcrypt-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580777" comment="php53-mysql-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580778" comment="php53-odbc-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580779" comment="php53-openssl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580780" comment="php53-pcntl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580781" comment="php53-pdo-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580782" comment="php53-pear-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580783" comment="php53-pgsql-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580784" comment="php53-pspell-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580785" comment="php53-shmop-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580786" comment="php53-snmp-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580787" comment="php53-soap-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580788" comment="php53-suhosin-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580789" comment="php53-sysvmsg-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580790" comment="php53-sysvsem-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580791" comment="php53-sysvshm-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580792" comment="php53-tokenizer-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580793" comment="php53-wddx-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580794" comment="php53-xmlreader-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580795" comment="php53-xmlrpc-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580796" comment="php53-xmlwriter-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580797" comment="php53-xsl-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580798" comment="php53-zip-5.3.17-112.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580799" comment="php53-zlib-5.3.17-112.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40892" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580800" comment="apache2-mod_php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580801" comment="php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580802" comment="php53-bcmath-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580803" comment="php53-bz2-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580804" comment="php53-calendar-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580805" comment="php53-ctype-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580806" comment="php53-curl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580807" comment="php53-dba-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580808" comment="php53-dom-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580809" comment="php53-exif-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580810" comment="php53-fastcgi-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580811" comment="php53-fileinfo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580812" comment="php53-ftp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580813" comment="php53-gd-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580814" comment="php53-gettext-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580815" comment="php53-gmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580816" comment="php53-iconv-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580817" comment="php53-intl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580818" comment="php53-json-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580819" comment="php53-ldap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580820" comment="php53-mbstring-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580821" comment="php53-mcrypt-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580822" comment="php53-mysql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580823" comment="php53-odbc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580824" comment="php53-openssl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580825" comment="php53-pcntl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580826" comment="php53-pdo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580827" comment="php53-pear-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580828" comment="php53-pgsql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580829" comment="php53-pspell-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580830" comment="php53-shmop-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580831" comment="php53-snmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580832" comment="php53-soap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580833" comment="php53-suhosin-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580834" comment="php53-sysvmsg-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580835" comment="php53-sysvsem-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580836" comment="php53-sysvshm-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580837" comment="php53-tokenizer-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580838" comment="php53-wddx-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580839" comment="php53-xmlreader-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580840" comment="php53-xmlrpc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580841" comment="php53-xmlwriter-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580842" comment="php53-xsl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580843" comment="php53-zip-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580844" comment="php53-zlib-5.3.17-112.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40893" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180706" ref_url="https://bugzilla.suse.com/1180706" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-18"/>
	<updated date="2021-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580845" comment="apache2-mod_php53-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580846" comment="php53-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580847" comment="php53-bcmath-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580848" comment="php53-bz2-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580849" comment="php53-calendar-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580850" comment="php53-ctype-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580851" comment="php53-curl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580852" comment="php53-dba-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580853" comment="php53-dom-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580854" comment="php53-exif-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580855" comment="php53-fastcgi-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580856" comment="php53-fileinfo-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580857" comment="php53-ftp-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580858" comment="php53-gd-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580859" comment="php53-gettext-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580860" comment="php53-gmp-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580861" comment="php53-iconv-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580862" comment="php53-intl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580863" comment="php53-json-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580864" comment="php53-ldap-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580865" comment="php53-mbstring-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580866" comment="php53-mcrypt-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580867" comment="php53-mysql-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580868" comment="php53-odbc-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580869" comment="php53-openssl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580870" comment="php53-pcntl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580871" comment="php53-pdo-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580872" comment="php53-pear-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580873" comment="php53-pgsql-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580874" comment="php53-pspell-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580875" comment="php53-shmop-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580876" comment="php53-snmp-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580877" comment="php53-soap-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580878" comment="php53-suhosin-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580879" comment="php53-sysvmsg-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580880" comment="php53-sysvsem-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580881" comment="php53-sysvshm-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580882" comment="php53-tokenizer-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580883" comment="php53-wddx-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580884" comment="php53-xmlreader-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580885" comment="php53-xmlrpc-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580886" comment="php53-xmlwriter-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580887" comment="php53-xsl-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580888" comment="php53-zip-5.3.17-112.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580889" comment="php53-zlib-5.3.17-112.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40894" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580890" comment="apache2-mod_php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580891" comment="php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580892" comment="php53-bcmath-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580893" comment="php53-bz2-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580894" comment="php53-calendar-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580895" comment="php53-ctype-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580896" comment="php53-curl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580897" comment="php53-dba-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580898" comment="php53-dom-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580899" comment="php53-exif-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580900" comment="php53-fastcgi-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580901" comment="php53-fileinfo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580902" comment="php53-ftp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580903" comment="php53-gd-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580904" comment="php53-gettext-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580905" comment="php53-gmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580906" comment="php53-iconv-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580907" comment="php53-intl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580908" comment="php53-json-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580909" comment="php53-ldap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580910" comment="php53-mbstring-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580911" comment="php53-mcrypt-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580912" comment="php53-mysql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580913" comment="php53-odbc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580914" comment="php53-openssl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580915" comment="php53-pcntl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580916" comment="php53-pdo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580917" comment="php53-pear-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580918" comment="php53-pgsql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580919" comment="php53-pspell-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580920" comment="php53-shmop-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580921" comment="php53-snmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580922" comment="php53-soap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580923" comment="php53-suhosin-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580924" comment="php53-sysvmsg-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580925" comment="php53-sysvsem-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580926" comment="php53-sysvshm-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580927" comment="php53-tokenizer-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580928" comment="php53-wddx-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580929" comment="php53-xmlreader-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580930" comment="php53-xmlrpc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580931" comment="php53-xmlwriter-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580932" comment="php53-xsl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580933" comment="php53-zip-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580934" comment="php53-zlib-5.3.17-112.99.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40895" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21705 [bsc#1188037]: SSRF bypass in FILTER_VALIDATE_URL
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627089" comment="apache2-mod_php53-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627090" comment="php53-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627091" comment="php53-bcmath-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627092" comment="php53-bz2-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627093" comment="php53-calendar-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627094" comment="php53-ctype-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627095" comment="php53-curl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627096" comment="php53-dba-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627097" comment="php53-dom-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627098" comment="php53-exif-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627099" comment="php53-fastcgi-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627100" comment="php53-fileinfo-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627101" comment="php53-ftp-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627102" comment="php53-gd-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627103" comment="php53-gettext-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627104" comment="php53-gmp-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627105" comment="php53-iconv-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627106" comment="php53-intl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627107" comment="php53-json-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627108" comment="php53-ldap-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627109" comment="php53-mbstring-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627110" comment="php53-mcrypt-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627111" comment="php53-mysql-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627112" comment="php53-odbc-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627113" comment="php53-openssl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627114" comment="php53-pcntl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627115" comment="php53-pdo-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627116" comment="php53-pear-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627117" comment="php53-pgsql-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627118" comment="php53-pspell-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627119" comment="php53-shmop-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627120" comment="php53-snmp-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627121" comment="php53-soap-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627122" comment="php53-suhosin-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627123" comment="php53-sysvmsg-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627124" comment="php53-sysvsem-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627125" comment="php53-sysvshm-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627126" comment="php53-tokenizer-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627127" comment="php53-wddx-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627128" comment="php53-xmlreader-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627129" comment="php53-xmlrpc-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627130" comment="php53-xmlwriter-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627131" comment="php53-xsl-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627132" comment="php53-zip-5.3.17-112.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627133" comment="php53-zlib-5.3.17-112.102.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40896" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1189591" ref_url="https://bugzilla.suse.com/1189591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-36193: Fixed Archive_Tar directory traversal due to inadequate checking of symbolic links (bsc#1189591).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632089" comment="apache2-mod_php53-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632090" comment="php53-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632091" comment="php53-bcmath-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632092" comment="php53-bz2-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632093" comment="php53-calendar-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632094" comment="php53-ctype-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632095" comment="php53-curl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632096" comment="php53-dba-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632097" comment="php53-dom-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632098" comment="php53-exif-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632099" comment="php53-fastcgi-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632100" comment="php53-fileinfo-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632101" comment="php53-ftp-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632102" comment="php53-gd-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632103" comment="php53-gettext-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632104" comment="php53-gmp-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632105" comment="php53-iconv-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632106" comment="php53-intl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632107" comment="php53-json-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632108" comment="php53-ldap-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632109" comment="php53-mbstring-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632110" comment="php53-mcrypt-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632111" comment="php53-mysql-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632112" comment="php53-odbc-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632113" comment="php53-openssl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632114" comment="php53-pcntl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632115" comment="php53-pdo-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632116" comment="php53-pear-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632117" comment="php53-pgsql-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632118" comment="php53-pspell-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632119" comment="php53-shmop-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632120" comment="php53-snmp-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632121" comment="php53-soap-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632122" comment="php53-suhosin-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632123" comment="php53-sysvmsg-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632124" comment="php53-sysvsem-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632125" comment="php53-sysvshm-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632126" comment="php53-tokenizer-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632127" comment="php53-wddx-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632128" comment="php53-xmlreader-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632129" comment="php53-xmlrpc-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632130" comment="php53-xmlwriter-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632131" comment="php53-xsl-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632132" comment="php53-zip-5.3.17-112.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632133" comment="php53-zlib-5.3.17-112.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40897" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193041" ref_url="https://bugzilla.suse.com/1193041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21707: Fixed special character breaks path in xml parsing (bsc#1193041).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193041">SUSE bug 1193041</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658692" comment="apache2-mod_php53-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658693" comment="php53-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658694" comment="php53-bcmath-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658695" comment="php53-bz2-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658696" comment="php53-calendar-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658697" comment="php53-ctype-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658698" comment="php53-curl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658699" comment="php53-dba-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658700" comment="php53-dom-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658701" comment="php53-exif-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658702" comment="php53-fastcgi-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658703" comment="php53-fileinfo-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658704" comment="php53-ftp-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658705" comment="php53-gd-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658706" comment="php53-gettext-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658707" comment="php53-gmp-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658708" comment="php53-iconv-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658709" comment="php53-intl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658710" comment="php53-json-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658711" comment="php53-ldap-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658712" comment="php53-mbstring-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658713" comment="php53-mcrypt-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658714" comment="php53-mysql-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658715" comment="php53-odbc-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658716" comment="php53-openssl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658717" comment="php53-pcntl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658718" comment="php53-pdo-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658719" comment="php53-pear-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658720" comment="php53-pgsql-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658721" comment="php53-pspell-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658722" comment="php53-shmop-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658723" comment="php53-snmp-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658724" comment="php53-soap-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658725" comment="php53-suhosin-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658726" comment="php53-sysvmsg-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658727" comment="php53-sysvsem-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658728" comment="php53-sysvshm-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658729" comment="php53-tokenizer-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658730" comment="php53-wddx-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658731" comment="php53-xmlreader-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658732" comment="php53-xmlrpc-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658733" comment="php53-xmlwriter-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658734" comment="php53-xsl-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658735" comment="php53-zip-5.3.17-112.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658736" comment="php53-zlib-5.3.17-112.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40898" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081790" ref_url="https://bugzilla.suse.com/1081790" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9253" ref_url="https://www.suse.com/security/cve/CVE-2015-9253/" source="CVE"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2015-9253: Fixed endless loop when the master process restarts a child process using program execution functions (bsc#1081790).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081790">SUSE bug 1081790</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9253/">CVE-2015-9253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668128" comment="apache2-mod_php53-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668129" comment="php53-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668130" comment="php53-bcmath-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668131" comment="php53-bz2-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668132" comment="php53-calendar-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668133" comment="php53-ctype-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668134" comment="php53-curl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668135" comment="php53-dba-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668136" comment="php53-dom-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668137" comment="php53-exif-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668138" comment="php53-fastcgi-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668139" comment="php53-fileinfo-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668140" comment="php53-ftp-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668141" comment="php53-gd-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668142" comment="php53-gettext-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668143" comment="php53-gmp-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668144" comment="php53-iconv-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668145" comment="php53-intl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668146" comment="php53-json-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668147" comment="php53-ldap-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668148" comment="php53-mbstring-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668149" comment="php53-mcrypt-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668150" comment="php53-mysql-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668151" comment="php53-odbc-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668152" comment="php53-openssl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668153" comment="php53-pcntl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668154" comment="php53-pdo-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668155" comment="php53-pear-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668156" comment="php53-pgsql-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668157" comment="php53-pspell-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668158" comment="php53-shmop-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668159" comment="php53-snmp-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668160" comment="php53-soap-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668161" comment="php53-suhosin-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668162" comment="php53-sysvmsg-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668163" comment="php53-sysvsem-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668164" comment="php53-sysvshm-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668165" comment="php53-tokenizer-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668166" comment="php53-wddx-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668167" comment="php53-xmlreader-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668168" comment="php53-xmlrpc-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668169" comment="php53-xmlwriter-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668170" comment="php53-xsl-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668171" comment="php53-zip-5.3.17-112.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668172" comment="php53-zlib-5.3.17-112.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40899" version="1" class="patch">
	<metadata>
		<title>Security update for pixman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="968090" ref_url="https://bugzilla.suse.com/968090" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9766" ref_url="https://www.suse.com/security/cve/CVE-2014-9766/" source="CVE"/>
		<description>
This update for pixman fixes the following issues:

Security issue fixed:

- CVE-2014-9766: Fixed an integer overflow in create_bits() (bsc#968090).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968090">SUSE bug 968090</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9766/">CVE-2014-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580935" comment="libpixman-1-0-0.24.4-0.15.3.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580936" comment="libpixman-1-0-32bit-0.24.4-0.15.3.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40900" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574381" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40901" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Prevent chcon from following symlinks in /tmp, /var/tmp,
  /var/run and /var/lib/debug (bsc#1083624).  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574382" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40902" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574383" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574384" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574385" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574386" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40903" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574387" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574388" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574389" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574390" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40904" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="1131722" ref_url="https://bugzilla.suse.com/1131722" source="BUGZILLA"/>
		<reference ref_id="1142465" ref_url="https://bugzilla.suse.com/1142465" source="BUGZILLA"/>
		<reference ref_id="1179163" ref_url="https://bugzilla.suse.com/1179163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="CVE-2019-10872" ref_url="https://www.suse.com/security/cve/CVE-2019-10872/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<reference ref_id="CVE-2020-27778" ref_url="https://www.suse.com/security/cve/CVE-2020-27778/" source="CVE"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2020-27778: Fixed a buffer overflow in pdftohtml (bsc#1179163).
- CVE-2019-9959: Fixed an integer overflow in pdftocairo (bsc#1142465).
- CVE-2019-10872: Fixed an invalid memory access in pdftoppm (bsc#1131722).
- CVE-2017-9776: Prevent integer overflow that lead to a heap buffer overflow
  that allowed remote attackers to cause a denial of service (application crash)
  or possibly have unspecified other impact via a crafted PDF document
  (bsc#1045721).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-17"/>
	<updated date="2022-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131722">SUSE bug 1131722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142465">SUSE bug 1142465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179163">SUSE bug 1179163</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10872/">CVE-2019-10872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27778/">CVE-2020-27778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681124" comment="libpoppler-glib4-0.12.3-1.13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681125" comment="libpoppler-qt4-3-0.12.3-1.13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681126" comment="libpoppler5-0.12.3-1.13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681127" comment="poppler-tools-0.12.3-1.13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40905" version="1" class="patch">
	<metadata>
		<title>Security update for popt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>

This rpm update fixes the following security and non security issues.

    * bnc#908128: check for bad invalid name sizes (CVE-2014-8118)
    * bnc#906803: create files with mode 0 (CVE-2013-6435)
    * bnc#892431: honor --noglob in install mode

Security Issues:

    * CVE-2014-8118
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118&gt;
    * CVE-2013-6435
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580937" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580938" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580939" comment="popt-x86-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580940" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580937" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580938" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580939" comment="popt-x86-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580940" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580937" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580938" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580939" comment="popt-x86-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580940" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563770" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563773" comment="rpm-x86-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40906" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40907" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062722" ref_url="https://bugzilla.suse.com/1062722" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
This update for postgresql-init fixes the following issues:

- CVE-2017-14798: A race condition in the init script could be used by attackers able to access the postgresql account to escalate their privileges to root (bsc#1062722)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40908" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<description>

This update for postgresql10 brings version 10.6 to SUSE Linux Enterprise 11.


This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574413" comment="libecpg6-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574414" comment="libpq5-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574415" comment="libpq5-32bit-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574416" comment="postgresql-init-10-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574417" comment="postgresql10-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574418" comment="postgresql10-contrib-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574419" comment="postgresql10-docs-10.6-0.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574420" comment="postgresql10-server-10.6-0.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40909" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1134689" ref_url="https://bugzilla.suse.com/1134689" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10130: Prevent row-level security policies from being bypassed via selectivity estimators (bsc#1134689).

Bug fixes:

- For a complete list of fixes check the release notes.
  * https://www.postgresql.org/docs/10/release-10-8.html
  * https://www.postgresql.org/docs/10/release-10-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574421" comment="libecpg6-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574422" comment="libpq5-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574423" comment="libpq5-32bit-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574424" comment="postgresql10-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574425" comment="postgresql10-contrib-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574426" comment="postgresql10-docs-10.8-0.2.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574427" comment="postgresql10-server-10.8-0.2.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40910" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issues:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574428" comment="libecpg6-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574429" comment="libpq5-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574430" comment="libpq5-32bit-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574431" comment="postgresql10-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574432" comment="postgresql10-contrib-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574433" comment="postgresql10-docs-10.9-0.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574434" comment="postgresql10-server-10.9-0.2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40911" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-17"/>
	<updated date="2019-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574435" comment="libecpg6-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574436" comment="libpq5-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574437" comment="libpq5-32bit-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574438" comment="postgresql10-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574439" comment="postgresql10-contrib-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574440" comment="postgresql10-devel-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574441" comment="postgresql10-docs-10.10-0.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574442" comment="postgresql10-server-10.10-0.2.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40912" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-05"/>
	<updated date="2020-03-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574443" comment="libecpg6-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574444" comment="libpq5-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574445" comment="libpq5-32bit-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574446" comment="postgresql10-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574447" comment="postgresql10-contrib-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574448" comment="postgresql10-devel-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574449" comment="postgresql10-docs-10.12-0.2.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574450" comment="postgresql10-server-10.12-0.2.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40913" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- update to 10.14:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html
- update to 10.13 (bsc#1171924).
  https://www.postgresql.org/about/news/2038/
  https://www.postgresql.org/docs/10/release-10-13.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574451" comment="libecpg6-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574452" comment="libpq5-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574453" comment="libpq5-32bit-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574454" comment="postgresql10-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574455" comment="postgresql10-contrib-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574456" comment="postgresql10-devel-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574457" comment="postgresql10-docs-10.14-0.2.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574458" comment="postgresql10-server-10.14-0.2.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40914" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574459" comment="libecpg6-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574460" comment="libpq5-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574461" comment="libpq5-32bit-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574462" comment="postgresql10-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574463" comment="postgresql10-contrib-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574464" comment="postgresql10-devel-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574465" comment="postgresql10-docs-10.15-0.2.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574466" comment="postgresql10-server-10.15-0.2.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40915" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574467" comment="libecpg6-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574468" comment="libpq5-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574469" comment="libpq5-32bit-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574470" comment="postgresql10-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574471" comment="postgresql10-contrib-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574472" comment="postgresql10-devel-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574473" comment="postgresql10-docs-10.17-0.2.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574474" comment="postgresql10-server-10.17-0.2.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40916" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656585" comment="libecpg6-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656586" comment="libpq5-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656587" comment="libpq5-32bit-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656588" comment="postgresql10-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656589" comment="postgresql10-contrib-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656590" comment="postgresql10-devel-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656591" comment="postgresql10-docs-10.19-0.2.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656592" comment="postgresql10-server-10.19-0.2.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40917" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199475" ref_url="https://bugzilla.suse.com/1199475" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:
 
- CVE-2022-1552: Confine additional operations within 'security restricted operation' sandboxes (bsc#1199475).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009685712" comment="libecpg6-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685713" comment="libpq5-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685714" comment="libpq5-32bit-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685715" comment="postgresql10-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685716" comment="postgresql10-contrib-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685717" comment="postgresql10-devel-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685718" comment="postgresql10-docs-10.21-0.2.42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009685719" comment="postgresql10-server-10.21-0.2.42.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40918" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580948" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580949" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580950" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580951" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580952" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580953" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580954" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580948" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580949" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580950" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580951" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580952" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580953" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580954" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580948" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580949" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580950" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580951" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580952" comment="postgresql91-contrib-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580953" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580954" comment="postgresql91-server-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40919" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580955" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580956" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580957" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580958" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580955" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580956" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580957" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580958" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580955" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580956" comment="postgresql91-contrib-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580957" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580958" comment="postgresql91-server-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40920" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580959" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580960" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580961" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580962" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580959" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580960" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580961" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580962" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580959" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580960" comment="postgresql91-contrib-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580961" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580962" comment="postgresql91-server-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40921" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574489" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574490" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574491" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574492" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574493" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574494" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40922" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574495" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574496" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574497" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574498" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574499" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574500" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574501" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40923" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574502" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574503" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574504" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574505" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574506" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574507" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574508" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40924" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580963" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580964" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580965" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580966" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580967" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580968" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580969" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580963" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580964" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580965" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580966" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580967" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580968" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580969" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40925" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574516" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574517" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574518" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574519" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574520" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574521" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574522" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40926" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574523" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574524" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574525" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574526" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574527" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574528" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574529" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40927" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574530" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574531" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574532" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574533" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574534" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574535" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574536" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40928" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574537" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574538" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574539" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574540" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574541" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574542" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574543" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40929" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574544" comment="postgresql94-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574545" comment="postgresql94-contrib-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574546" comment="postgresql94-devel-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574547" comment="postgresql94-docs-9.4.24-0.23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574548" comment="postgresql94-server-9.4.24-0.23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40930" version="1" class="patch">
	<metadata>
		<title>Security update for powerpc-utils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="883174" ref_url="https://bugzilla.suse.com/883174" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>

The 'snap' system information collection tool of the PowerPC Utils package 
collected fstab and yaboot.conf files which might contain passwords. 
(CVE-2014-4040)

As these files are of interest, we now print a warning that the user of the 
'snap' tool should check if private passwords are in those files.

Security Issues:

    * CVE-2014-4040
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4040&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-12"/>
	<updated date="2014-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/883174">SUSE bug 883174</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580970" comment="powerpc-utils-1.2.16-0.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580970" comment="powerpc-utils-1.2.16-0.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40931" version="1" class="patch">
	<metadata>
		<title>Security update for ppc64-diag</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="882667" ref_url="https://bugzilla.suse.com/882667" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>

ppc64-diag has been updated to prevent the usage of predictable filenames 
in /tmp in various scripts and daemons (CVE-2014-4038) Also the snapshot 
tarball was previously generated world readable, which could have leaked 
sensible information, which is only visible to root, to all users. It is 
now readable for root only (CVE-2014-4039).

Security Issues:

    * CVE-2014-4038
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4038&gt;
    * CVE-2014-4039
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4039&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-21"/>
	<updated date="2014-07-21"/>
	<bugzilla href="https://bugzilla.suse.com/882667">SUSE bug 882667</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580971" comment="ppc64-diag-2.6.1-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580971" comment="ppc64-diag-2.6.1-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40932" version="1" class="patch">
	<metadata>
		<title>Security update for ppp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="891489" ref_url="https://bugzilla.suse.com/891489" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>

This ppp update fixes a potential security issue that an unprivileged 
attacker could access privileged options:

    * integer overflow in option parsing (CVE-2014-3158, bnc#891489)

Security Issues:

    * CVE-2014-3158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-26"/>
	<updated date="2014-08-26"/>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580972" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580972" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580972" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40933" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574549" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40934" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574550" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40935" version="1" class="patch">
	<metadata>
		<title>Security update for procmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="894999" ref_url="https://bugzilla.suse.com/894999" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>

procmail was updated to fix a security issue in its formail helper.

    * When formail processed specially crafted e-mail headers a heap
      corruption could be triggered, which would lead to a crash of
      formail. (CVE-2014-3618)

Security Issues:

    * CVE-2014-3618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-04"/>
	<updated date="2014-09-04"/>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580973" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580973" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580973" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40936" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
This update for procmail fixes the following issues:

Security issue fixed:

- CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574552" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40937" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580974" comment="procps-3.2.7-152.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40938" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="856843" ref_url="https://bugzilla.suse.com/856843" source="BUGZILLA"/>
		<reference ref_id="879913" ref_url="https://bugzilla.suse.com/879913" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<description>

Puppet was updated to fix the following security issues:

    * Unsafe use of temporary files. (CVE-2013-4969)
    * Arbitrary code execution with required social engineering.
      (CVE-2014-3248, CVE-2014-3250)

Security Issues references:

    * CVE-2014-3248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248&gt;
    * CVE-2013-4969
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969&gt;
    * CVE-2014-3250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580975" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580976" comment="puppet-server-2.6.18-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580975" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580976" comment="puppet-server-2.6.18-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580975" comment="puppet-2.6.18-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580976" comment="puppet-server-2.6.18-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40939" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="1077767" ref_url="https://bugzilla.suse.com/1077767" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-2295: Fixed a security vulnerability where an attacker could
  force YAML deserialization in an unsafe manner, which would lead to
  remote code execution.

In default, this update would break a backwards compatibility
with Puppet agents older than 3.2.2 as the SLE11 master doesn't
support other fact formats than pson in default anymore.
In order to allow users to continue using their SLE11 agents
a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option
'dangerous_fact_formats' was added. When it's set to true it
enables using dangerous fact formats (e.g. YAML). When it's set
to false, only PSON fact format is accepted. (bsc#1040151),
(bsc#1077767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077767">SUSE bug 1077767</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574556" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574557" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40940" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1167645" ref_url="https://bugzilla.suse.com/1167645" source="BUGZILLA"/>
		<reference ref_id="935899" ref_url="https://bugzilla.suse.com/935899" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7942" ref_url="https://www.suse.com/security/cve/CVE-2020-7942/" source="CVE"/>
		<description>
This update for puppet fixes the following issues:

Security issue fixed:

- CVE-2020-7942: Added a warning for a vulnerable configuration option, which could allow
  for information disclosure in certain setups. Disabling it my break some setups. (bsc#1167645)

Non-security issue fixed:

- Fixed deletion of puppet master file /etc/puppet/manifests/site.pp during updates (bsc#935899).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167645">SUSE bug 1167645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935899">SUSE bug 935899</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7942/">CVE-2020-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574558" comment="puppet-2.7.26-0.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574559" comment="puppet-server-2.7.26-0.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40941" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574560" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574561" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574562" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565245" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574563" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574564" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574565" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574566" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574567" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574568" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574569" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574570" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40942" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574571" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574572" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574573" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565253" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574574" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574575" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574576" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574577" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574578" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574579" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574580" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574581" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40943" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574582" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574583" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574584" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565261" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574585" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574586" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574587" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574588" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574589" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574590" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574591" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574592" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40944" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580977" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580978" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580979" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580980" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580981" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580982" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580983" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580984" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580985" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580986" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580987" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580988" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580977" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580978" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580979" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580980" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580981" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580982" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580983" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580984" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580985" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580986" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580987" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580988" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40945" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574604" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574605" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574606" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565277" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574607" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574608" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574609" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574610" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574611" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574612" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574613" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574614" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40946" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574615" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574616" comment="libpython2_6-1_0-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574617" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574618" comment="python-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574619" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574620" comment="python-base-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574621" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574622" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574623" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574624" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574625" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574626" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40947" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574627" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574628" comment="libpython2_6-1_0-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574629" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574630" comment="python-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574631" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574632" comment="python-base-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574633" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574634" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574635" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574636" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574637" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574638" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40948" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-22"/>
	<updated date="2019-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574639" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574640" comment="libpython2_6-1_0-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574641" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574642" comment="python-32bit-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574643" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574644" comment="python-base-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574645" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574646" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574647" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574648" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574649" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574650" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40949" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574651" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574652" comment="libpython2_6-1_0-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574653" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574654" comment="python-32bit-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574655" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574656" comment="python-base-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574657" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574658" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574659" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574660" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574661" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574662" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40950" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen().
                  Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574663" comment="libpython2_6-1_0-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574664" comment="libpython2_6-1_0-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574665" comment="python-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574666" comment="python-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574667" comment="python-base-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574668" comment="python-base-32bit-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574669" comment="python-curses-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574670" comment="python-demo-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574671" comment="python-doc-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574672" comment="python-doc-pdf-2.6-8.40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574673" comment="python-gdbm-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574674" comment="python-idle-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574675" comment="python-tk-2.6.9-40.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574676" comment="python-xml-2.6.9-40.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40951" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574677" comment="libpython2_6-1_0-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574678" comment="libpython2_6-1_0-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574679" comment="python-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574680" comment="python-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574681" comment="python-base-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574682" comment="python-base-32bit-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574683" comment="python-curses-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574684" comment="python-demo-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574685" comment="python-doc-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574686" comment="python-doc-pdf-2.6-8.40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574687" comment="python-gdbm-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574688" comment="python-idle-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574689" comment="python-tk-2.6.9-40.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574690" comment="python-xml-2.6.9-40.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40952" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574691" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574692" comment="libpython2_6-1_0-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574693" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574694" comment="python-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574695" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574696" comment="python-base-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574697" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574698" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574699" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574700" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574701" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574702" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40953" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-23336: which forbids use of semicolon as a query string separator (bpo#42967, bsc#1182379, CVE-2021-23336).
- Switch off -O0 non-optimization.
- CVE-2021-3177: fixing bsc#1181126 (CVE-2021-3177) buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631986" comment="libpython2_6-1_0-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631987" comment="libpython2_6-1_0-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631988" comment="python-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631989" comment="python-32bit-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631990" comment="python-base-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631991" comment="python-base-32bit-2.6.9-40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631992" comment="python-curses-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631993" comment="python-demo-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631994" comment="python-doc-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631995" comment="python-doc-pdf-2.6-8.40.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631996" comment="python-gdbm-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631997" comment="python-idle-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631998" comment="python-tk-2.6.9-40.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631999" comment="python-xml-2.6.9-40.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40954" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python fixes the following issues:


- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2019-9947: Fixed a CRLF injection that can occur if the attacker controls a url parameter. (bsc#1130840)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-25"/>
	<updated date="2021-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651289" comment="libpython2_6-1_0-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651290" comment="libpython2_6-1_0-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651291" comment="python-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651292" comment="python-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651293" comment="python-base-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651294" comment="python-base-32bit-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651295" comment="python-curses-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651296" comment="python-demo-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651297" comment="python-doc-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651298" comment="python-doc-pdf-2.6-8.40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651299" comment="python-gdbm-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651300" comment="python-idle-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651301" comment="python-tk-2.6.9-40.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651302" comment="python-xml-2.6.9-40.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40955" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576857" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576858" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576859" comment="libpython2_6-1_0-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576860" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576861" comment="python-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576862" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576863" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576864" comment="python-base-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576865" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576866" comment="python-demo-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576867" comment="python-gdbm-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576868" comment="python-idle-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576869" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576870" comment="python-x86-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576871" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40956" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python was updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 has been disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580989" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580990" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580991" comment="libpython2_6-1_0-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580992" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580993" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580994" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580995" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580996" comment="python-base-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580997" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580998" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580999" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581000" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581001" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581002" comment="python-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581003" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580989" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580990" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580991" comment="libpython2_6-1_0-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580992" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580993" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580994" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580995" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580996" comment="python-base-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580997" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580998" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580999" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581000" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581001" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581002" comment="python-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581003" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580989" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580990" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580991" comment="libpython2_6-1_0-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580992" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580993" comment="python-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580994" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580995" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580996" comment="python-base-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580997" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580998" comment="python-demo-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563784" comment="python-doc-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563785" comment="python-doc-pdf-2.6-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580999" comment="python-gdbm-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581000" comment="python-idle-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581001" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581002" comment="python-x86-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581003" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40957" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581004" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581005" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581006" comment="libpython2_6-1_0-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581007" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581008" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581009" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581010" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581011" comment="python-base-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581012" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581013" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581014" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581015" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581016" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581017" comment="python-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581018" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581004" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581005" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581006" comment="libpython2_6-1_0-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581007" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581008" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581009" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581010" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581011" comment="python-base-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581012" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581013" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581014" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581015" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581016" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581017" comment="python-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581018" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581004" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581005" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581006" comment="libpython2_6-1_0-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581007" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581008" comment="python-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581009" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581010" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581011" comment="python-base-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581012" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581013" comment="python-demo-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563792" comment="python-doc-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563793" comment="python-doc-pdf-2.6-8.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581014" comment="python-gdbm-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581015" comment="python-idle-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581016" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581017" comment="python-x86-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581018" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40958" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581019" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581020" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581021" comment="libpython2_6-1_0-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581022" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581023" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581024" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581025" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581026" comment="python-base-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581027" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581028" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581029" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581030" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581031" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581032" comment="python-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581033" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581019" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581020" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581021" comment="libpython2_6-1_0-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581022" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581023" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581024" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581025" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581026" comment="python-base-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581027" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581028" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581029" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581030" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581031" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581032" comment="python-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581033" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581019" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581020" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581021" comment="libpython2_6-1_0-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581022" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581023" comment="python-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581024" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581025" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581026" comment="python-base-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581027" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581028" comment="python-demo-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563800" comment="python-doc-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563801" comment="python-doc-pdf-2.6-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581029" comment="python-gdbm-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581030" comment="python-idle-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581031" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581032" comment="python-x86-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581033" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40959" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The 'urlparse' module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581034" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581035" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581036" comment="libpython2_6-1_0-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581037" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581038" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581039" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581040" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581041" comment="python-base-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581042" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581043" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581044" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581045" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581046" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581047" comment="python-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581048" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581034" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581035" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581036" comment="libpython2_6-1_0-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581037" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581038" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581039" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581040" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581041" comment="python-base-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581042" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581043" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581044" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581045" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581046" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581047" comment="python-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581048" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581034" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581035" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581036" comment="libpython2_6-1_0-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581037" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581038" comment="python-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581039" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581040" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581041" comment="python-base-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581042" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581043" comment="python-demo-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563808" comment="python-doc-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563809" comment="python-doc-pdf-2.6-8.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581044" comment="python-gdbm-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581045" comment="python-idle-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581046" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581047" comment="python-x86-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581048" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40960" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581049" comment="python-Jinja2-2.6-2.19.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40961" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<description>
This update for python-httplib2 fixes the following issues:

- Update to version 0.19.0 (bsc#1182053).
- CVE-2021-21240: Fixed regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed unescaped part of uri where an attacker could change request headers and body (bsc#1182053).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581050" comment="python-httplib2-0.19.0-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40962" version="1" class="patch">
	<metadata>
		<title>Security update for python-imaging</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="863541" ref_url="https://bugzilla.suse.com/863541" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<reference ref_id="CVE-2014-1933" ref_url="https://www.suse.com/security/cve/CVE-2014-1933/" source="CVE"/>
		<description>

This python-imaging update fixes the following two security issues:

    * bnc#863541: Fixed insecure temporary file creation and handling
      (CVE-2014-1932, CVE-2014-1933)

Security Issue references:

    * CVE-2014-1932
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932&gt;
    * CVE-2014-1933
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-23"/>
	<updated date="2014-04-23"/>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1933/">CVE-2014-1933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581051" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581051" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581051" comment="python-imaging-1.1.6-168.34.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40963" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="877258" ref_url="https://bugzilla.suse.com/877258" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>

This security update for python-lxml fixes a input sanitization flaw in 
clean_html. (CVE-2014-3146)

Security Issues:

    * CVE-2014-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-01"/>
	<updated date="2014-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563816" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40964" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
This update for python-numpy fixes the following issues:
	  
Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574767" comment="python-numpy-1.3.0-1.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40965" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085276" ref_url="https://bugzilla.suse.com/1085276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750/" source="CVE"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2018-7750: transport.py in the SSH server implementation of Paramiko did
  not properly check whether authentication is completed processing other
  requests. A customized SSH client could have skipped the authentication step
  (bsc#1085276)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085276">SUSE bug 1085276</bugzilla>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581052" comment="python-paramiko-1.13.1-0.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40966" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111151" ref_url="https://bugzilla.suse.com/1111151" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2018-1000805: Fixed an authentication bypass in auth_handler.py (bsc#1111151).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-19"/>
	<updated date="2020-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581053" comment="python-paramiko-1.13.1-0.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40967" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-03"/>
	<updated date="2022-01-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659259" comment="python-pip-1.4.1-0.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40968" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-09"/>
	<updated date="2018-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581054" comment="python-pycrypto-2.6-0.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40969" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1079300" ref_url="https://bugzilla.suse.com/1079300" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issues fixed:

- CVE-2017-1000158: Fixed integer overflows in PyString_DecodeEscape that could have resulted in
  heap-based buffer overflow attacks and possible arbitrary code execution (bsc#1068664).
- CVE-2018-1000030: Fixed crash inside the Python interpreter when multiple threads used the same
  I/O stream concurrently (bsc#1079300).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079300">SUSE bug 1079300</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574786" comment="libpython2_7-1_0-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574787" comment="libpython2_7-1_0-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574788" comment="python27-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574789" comment="python27-32bit-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574790" comment="python27-base-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574791" comment="python27-base-32bit-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574792" comment="python27-curses-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574793" comment="python27-demo-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574794" comment="python27-devel-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574795" comment="python27-doc-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574796" comment="python27-doc-pdf-2.7.9-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574797" comment="python27-gdbm-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574798" comment="python27-idle-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574799" comment="python27-tk-2.7.9-6.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574800" comment="python27-xml-2.7.9-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40970" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-13"/>
	<updated date="2018-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574801" comment="libpython2_7-1_0-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574802" comment="libpython2_7-1_0-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574803" comment="python27-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574804" comment="python27-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574805" comment="python27-base-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574806" comment="python27-base-32bit-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574807" comment="python27-curses-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574808" comment="python27-demo-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574809" comment="python27-devel-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574810" comment="python27-doc-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574811" comment="python27-doc-pdf-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574812" comment="python27-gdbm-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574813" comment="python27-idle-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574814" comment="python27-tk-2.7.9-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574815" comment="python27-xml-2.7.9-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40971" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<description>
This update for python27 fixes the following issue:

- CVE-2018-1000802: Prevent command injection in shutil module (make_archive
  function) via passage of unfiltered user input (bsc#1109663)
- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574816" comment="libpython2_7-1_0-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574817" comment="libpython2_7-1_0-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574818" comment="python27-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574819" comment="python27-32bit-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574820" comment="python27-base-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574821" comment="python27-base-32bit-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574822" comment="python27-curses-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574823" comment="python27-demo-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574824" comment="python27-devel-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574825" comment="python27-doc-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574826" comment="python27-doc-pdf-2.7.9-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574827" comment="python27-gdbm-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574828" comment="python27-idle-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574829" comment="python27-tk-2.7.9-6.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574830" comment="python27-xml-2.7.9-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40972" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-25"/>
	<updated date="2019-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574831" comment="libpython2_7-1_0-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574832" comment="libpython2_7-1_0-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574833" comment="python27-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574834" comment="python27-32bit-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574835" comment="python27-base-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574836" comment="python27-base-32bit-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574837" comment="python27-curses-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574838" comment="python27-demo-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574839" comment="python27-devel-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574840" comment="python27-doc-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574841" comment="python27-doc-pdf-2.7.9-6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574842" comment="python27-gdbm-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574843" comment="python27-idle-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574844" comment="python27-tk-2.7.9-6.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574845" comment="python27-xml-2.7.9-6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40973" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:
Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574846" comment="libpython2_7-1_0-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574847" comment="libpython2_7-1_0-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574848" comment="python27-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574849" comment="python27-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574850" comment="python27-base-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574851" comment="python27-base-32bit-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574852" comment="python27-curses-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574853" comment="python27-demo-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574854" comment="python27-devel-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574855" comment="python27-doc-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574856" comment="python27-doc-pdf-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574857" comment="python27-gdbm-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574858" comment="python27-idle-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574859" comment="python27-tk-2.7.9-6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574860" comment="python27-xml-2.7.9-6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40974" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574861" comment="libpython2_7-1_0-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574862" comment="libpython2_7-1_0-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574863" comment="python27-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574864" comment="python27-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574865" comment="python27-base-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574866" comment="python27-base-32bit-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574867" comment="python27-curses-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574868" comment="python27-demo-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574869" comment="python27-devel-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574870" comment="python27-doc-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574871" comment="python27-doc-pdf-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574872" comment="python27-gdbm-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574873" comment="python27-idle-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574874" comment="python27-tk-2.7.16-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574875" comment="python27-xml-2.7.16-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40975" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

python27 was updated to version 2.7.17. 

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).	  
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Changed name of idle27 icons to idle27.png (bsc#1165894).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574876" comment="libpython2_7-1_0-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574877" comment="libpython2_7-1_0-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574878" comment="python-rpm-macros-20190408.32abece-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574879" comment="python27-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574880" comment="python27-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574881" comment="python27-base-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574882" comment="python27-base-32bit-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574883" comment="python27-curses-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574884" comment="python27-demo-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574885" comment="python27-devel-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574886" comment="python27-doc-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574887" comment="python27-doc-pdf-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574888" comment="python27-gdbm-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574889" comment="python27-idle-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574890" comment="python27-tk-2.7.17-6.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574891" comment="python27-xml-2.7.17-6.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40976" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in specifically crafted tarball.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574892" comment="libpython2_7-1_0-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574893" comment="libpython2_7-1_0-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574894" comment="python27-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574895" comment="python27-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574896" comment="python27-base-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574897" comment="python27-base-32bit-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574898" comment="python27-curses-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574899" comment="python27-demo-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574900" comment="python27-devel-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574901" comment="python27-doc-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574902" comment="python27-doc-pdf-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574903" comment="python27-gdbm-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574904" comment="python27-idle-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574905" comment="python27-tk-2.7.17-6.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574906" comment="python27-xml-2.7.17-6.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40977" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

 - Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574907" comment="libpython2_7-1_0-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574908" comment="libpython2_7-1_0-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574909" comment="python27-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574910" comment="python27-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574911" comment="python27-base-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574912" comment="python27-base-32bit-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574913" comment="python27-curses-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574914" comment="python27-demo-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574915" comment="python27-devel-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574916" comment="python27-doc-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574917" comment="python27-doc-pdf-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574918" comment="python27-gdbm-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574919" comment="python27-idle-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574920" comment="python27-tk-2.7.17-6.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574921" comment="python27-xml-2.7.17-6.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40978" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574922" comment="libpython2_7-1_0-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574923" comment="libpython2_7-1_0-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574924" comment="python27-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574925" comment="python27-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574926" comment="python27-base-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574927" comment="python27-base-32bit-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574928" comment="python27-curses-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574929" comment="python27-demo-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574930" comment="python27-devel-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574931" comment="python27-doc-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574932" comment="python27-doc-pdf-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574933" comment="python27-gdbm-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574934" comment="python27-idle-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574935" comment="python27-tk-2.7.17-6.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574936" comment="python27-xml-2.7.17-6.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40979" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- python27 was upgraded to 2.7.18 	  
- CVE-2021-23336: Fixed a potential web cache poisoning by using a 
  semicolon in query parameters use of semicolon as a query string 
  separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574937" comment="libpython2_7-1_0-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574938" comment="libpython2_7-1_0-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574939" comment="python27-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574940" comment="python27-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574941" comment="python27-base-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574942" comment="python27-base-32bit-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574943" comment="python27-curses-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574944" comment="python27-demo-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574945" comment="python27-devel-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574946" comment="python27-doc-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574947" comment="python27-doc-pdf-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574948" comment="python27-gdbm-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574949" comment="python27-idle-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574950" comment="python27-tk-2.7.18-6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574951" comment="python27-xml-2.7.18-6.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40980" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2020-26116: Fixed a CRLF injection via HTTP request method in httplib/http.client. (bsc#1177211)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634733" comment="libpython2_7-1_0-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634734" comment="libpython2_7-1_0-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634735" comment="python27-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634736" comment="python27-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634737" comment="python27-base-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634738" comment="python27-base-32bit-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634739" comment="python27-curses-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634740" comment="python27-demo-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634741" comment="python27-devel-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634742" comment="python27-doc-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634743" comment="python27-doc-pdf-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634744" comment="python27-gdbm-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634745" comment="python27-idle-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634746" comment="python27-tk-2.7.18-6.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634747" comment="python27-xml-2.7.18-6.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40981" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2022-0391: Fixed newline and tabs sanitation in urllib.parse (bsc#1195396).
- CVE-2021-4189: Fixed incorrect trust of PASV response (bsc#1194146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668229" comment="libpython2_7-1_0-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668230" comment="libpython2_7-1_0-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668231" comment="python27-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668232" comment="python27-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668233" comment="python27-base-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668234" comment="python27-base-32bit-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668235" comment="python27-curses-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668236" comment="python27-demo-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668237" comment="python27-devel-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668238" comment="python27-doc-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668239" comment="python27-doc-pdf-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668240" comment="python27-gdbm-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668241" comment="python27-idle-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668242" comment="python27-tk-2.7.18-6.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668243" comment="python27-xml-2.7.18-6.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40982" version="1" class="patch">
	<metadata>
		<title>Security update for python27 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This update for python27 fixes the following issues:

- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677044" comment="libpython2_7-1_0-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677045" comment="libpython2_7-1_0-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677046" comment="python27-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677047" comment="python27-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677048" comment="python27-base-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677049" comment="python27-base-32bit-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677050" comment="python27-curses-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677051" comment="python27-demo-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677052" comment="python27-devel-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677053" comment="python27-doc-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677054" comment="python27-doc-pdf-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677055" comment="python27-gdbm-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677056" comment="python27-idle-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677057" comment="python27-tk-2.7.18-6.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677058" comment="python27-xml-2.7.18-6.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40983" version="1" class="patch">
	<metadata>
		<title>Security update for python27-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
This update for python27-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581055" comment="python27-Jinja2-2.7.2-2.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40984" version="1" class="patch">
	<metadata>
		<title>Security update for python27-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<description>
This update for python27-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581056" comment="python27-ecdsa-0.13.3-0.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40985" version="1" class="patch">
	<metadata>
		<title>Security update for python27-urllib3, python27-boto3, python27-botocore, python27-s3transfer  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074247" ref_url="https://bugzilla.suse.com/1074247" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="1132900" ref_url="https://bugzilla.suse.com/1132900" source="BUGZILLA"/>
		<reference ref_id="1149466" ref_url="https://bugzilla.suse.com/1149466" source="BUGZILLA"/>
		<reference ref_id="1150895" ref_url="https://bugzilla.suse.com/1150895" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
This update fixes the following issues:

python27-urllib3 was updated to version 1.24 (bsc#1149466).
python27-botocore was updated to version 1.12.213 (bsc#1149466).
python27-s3transfer was updated to version 0.2.1 (bsc#1149466).
python27-boto3 was updated to version 1.9.213 (bsc#1149466)

Security issues fixed in python27-urllib3:

- CVE-2019-9740: Fixed a CRLF injection (bsc#1129071).
- CVE-2019-11236: Fixed a CRLF injection (bsc#1132663).
- CVE-2019-11324: Fixed an improper validation of CA certificates (bsc#1132900).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-18"/>
	<updated date="2019-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074247">SUSE bug 1074247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149466">SUSE bug 1149466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150895">SUSE bug 1150895</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581057" comment="python27-boto3-1.9.213-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581058" comment="python27-botocore-1.12.213-3.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581059" comment="python27-s3transfer-0.2.1-3.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581060" comment="python27-urllib3-1.24-0.3.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40986" version="1" class="patch">
	<metadata>
		<title>Recommended update for python 2.7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007084" ref_url="https://bugzilla.suse.com/1007084" source="BUGZILLA"/>
		<reference ref_id="1014478" ref_url="https://bugzilla.suse.com/1014478" source="BUGZILLA"/>
		<reference ref_id="1015776" ref_url="https://bugzilla.suse.com/1015776" source="BUGZILLA"/>
		<reference ref_id="1054106" ref_url="https://bugzilla.suse.com/1054106" source="BUGZILLA"/>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1064755" ref_url="https://bugzilla.suse.com/1064755" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1075263" ref_url="https://bugzilla.suse.com/1075263" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1097455" ref_url="https://bugzilla.suse.com/1097455" source="BUGZILLA"/>
		<reference ref_id="1098681" ref_url="https://bugzilla.suse.com/1098681" source="BUGZILLA"/>
		<reference ref_id="905354" ref_url="https://bugzilla.suse.com/905354" source="BUGZILLA"/>
		<reference ref_id="962170" ref_url="https://bugzilla.suse.com/962170" source="BUGZILLA"/>
		<reference ref_id="974705" ref_url="https://bugzilla.suse.com/974705" source="BUGZILLA"/>
		<reference ref_id="974993" ref_url="https://bugzilla.suse.com/974993" source="BUGZILLA"/>
		<reference ref_id="975949" ref_url="https://bugzilla.suse.com/975949" source="BUGZILLA"/>
		<reference ref_id="998103" ref_url="https://bugzilla.suse.com/998103" source="BUGZILLA"/>
		<reference ref_id="998378" ref_url="https://bugzilla.suse.com/998378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880/" source="CVE"/>
		<description>

This update provides various modules for Python 2.7.

It also updates python 2.7 to the 2.7.16 release, fixing security issues and bugs.

The following packages are included in the update:

- cloud-init
- growpart
- python27-argparse
- python27-blinker
- python27-boto3
- python27-botocore
- python27-cffi
- python27-Cheetah
- python27-configobj
- python27-cryptography
- python27-dateutil
- python27-docutils
- python27-ecdsa
- python27-enum34
- python27-futures
- python27-httplib2
- python27-idna
- python27-ipaddress
- python27-Jinja2
- python27-jmespath
- python27-jsonpatch
- python27-jsonpointer
- python27-jsonschema
- python27-lockfile
- python27-MarkupSafe
- python27-oauthlib
- python27-oauth
- python27-paramiko
- python27-ply
- python27-PrettyTable
- python27-pyasn1-modules
- python27-pyasn1
- python27-pycparser
- python27-pycrypto
- python27-PyJWT
- python27-pyserial
- python27-pytest
- python27-python-daemon
- python27-PyYAML
- python27-requests
- python27-s3transfer
- python27-setuptools
- python27-simplejson
- python27-six
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007084">SUSE bug 1007084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014478">SUSE bug 1014478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015776">SUSE bug 1015776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064755">SUSE bug 1064755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075263">SUSE bug 1075263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097455">SUSE bug 1097455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098681">SUSE bug 1098681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905354">SUSE bug 905354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962170">SUSE bug 962170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974705">SUSE bug 974705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974993">SUSE bug 974993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975949">SUSE bug 975949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998103">SUSE bug 998103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998378">SUSE bug 998378</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581061" comment="cloud-init-18.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581062" comment="cloud-init-config-suse-18.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581063" comment="cloud-init-doc-18.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581064" comment="growpart-0.30-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574952" comment="libpython2_7-1_0-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574953" comment="libpython2_7-1_0-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574954" comment="python27-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574955" comment="python27-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581065" comment="python27-Cheetah-2.4.4-0.3.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581066" comment="python27-Jinja2-2.7.2-2.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581067" comment="python27-MarkupSafe-0.18-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581068" comment="python27-PrettyTable-0.7.2-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581069" comment="python27-PyJWT-1.4.2-3.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581070" comment="python27-PyYAML-3.10-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581071" comment="python27-argparse-1.2.1-2.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574956" comment="python27-base-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574957" comment="python27-base-32bit-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581072" comment="python27-blinker-1.4-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581073" comment="python27-boto3-1.7.42-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581074" comment="python27-botocore-1.10.57-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581075" comment="python27-cffi-1.5.2-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581076" comment="python27-configobj-5.0.6-1.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581077" comment="python27-cryptography-1.3.1-3.5.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574958" comment="python27-curses-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581078" comment="python27-dateutil-2.1-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574959" comment="python27-demo-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574960" comment="python27-devel-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574961" comment="python27-doc-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574962" comment="python27-doc-pdf-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581079" comment="python27-docutils-0.11-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581080" comment="python27-ecdsa-0.10-0.3.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581081" comment="python27-enum34-1.1.3-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581082" comment="python27-futures-3.0.2-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574963" comment="python27-gdbm-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581083" comment="python27-httplib2-0.9.2-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574964" comment="python27-idle-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581084" comment="python27-idna-2.0-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581085" comment="python27-ipaddress-1.0.18-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581086" comment="python27-jmespath-0.9.2-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581087" comment="python27-jsonpatch-1.1-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581088" comment="python27-jsonpointer-1.0-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581089" comment="python27-jsonschema-2.4.0-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581090" comment="python27-lockfile-0.9.1-2.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581091" comment="python27-oauth-1.0.1-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581092" comment="python27-oauthlib-0.7.2-3.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581093" comment="python27-paramiko-1.13.1-0.3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581094" comment="python27-ply-3.4-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581095" comment="python27-pyasn1-0.1.9-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581096" comment="python27-pyasn1-modules-0.0.5-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581097" comment="python27-pycparser-2.10-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581098" comment="python27-pycrypto-2.6-0.3.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581099" comment="python27-pyserial-2.7-3.3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581100" comment="python27-pytest-2.5.1-0.3.4.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581101" comment="python27-python-daemon-1.5.5-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581102" comment="python27-requests-2.0.1-0.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581103" comment="python27-s3transfer-0.1.13-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574965" comment="python27-setuptools-18.0.1-4.2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581104" comment="python27-simplejson-3.8.2-3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581105" comment="python27-six-1.7.2-0.3.3.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574966" comment="python27-tk-2.7.16-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574967" comment="python27-xml-2.7.16-6.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40987" version="1" class="patch">
	<metadata>
		<title>Security update for quagga</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="822572" ref_url="https://bugzilla.suse.com/822572" source="BUGZILLA"/>
		<reference ref_id="828117" ref_url="https://bugzilla.suse.com/828117" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0149" ref_url="https://www.suse.com/security/cve/CVE-2013-0149/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<description>

This update of quagga fixes two security issues:

    * CVE-2013-0149: specially-crafted OSPF packets could have caused the
      routing table to be erased (bnc#822572)
    * CVE-2013-2236: local network stack overflow (bnc#828117)

Security Issue references:

    * CVE-2013-2236
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236&gt;
    * CVE-2013-0149
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-22"/>
	<updated date="2013-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/822572">SUSE bug 822572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828117">SUSE bug 828117</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0149/">CVE-2013-0149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576872" comment="quagga-0.99.15-0.14.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40988" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574969" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40989" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574970" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40990" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574971" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40991" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574972" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40992" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581106" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581106" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40993" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="881284" ref_url="https://bugzilla.suse.com/881284" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3956" ref_url="https://www.suse.com/security/cve/CVE-2014-3956/" source="CVE"/>
		<description>

sendmail has been updated to fix the following security issue:

    * Not properly closing file descriptors before executing programs
      (CVE-2014-3956).

Security Issues:

    * CVE-2014-3956
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/881284">SUSE bug 881284</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3956/">CVE-2014-3956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581107" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581107" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581107" comment="sendmail-8.14.3-50.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40994" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40995" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40996" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
rsync was updated to fix one security issue.

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-25"/>
	<updated date="2016-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581110" comment="rsync-3.0.4-2.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40997" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<description>
This update for rsync fixes the following issues:

Security issues fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581111" comment="rsync-3.0.4-2.53.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40998" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581112" comment="rsync-3.0.4-2.53.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40999" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="890228" ref_url="https://bugzilla.suse.com/890228" source="BUGZILLA"/>
		<reference ref_id="897262" ref_url="https://bugzilla.suse.com/897262" source="BUGZILLA"/>
		<reference ref_id="899756" ref_url="https://bugzilla.suse.com/899756" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>

rsyslog has been updated to fix a remote denial of service issue:

    * Under certain configurations, a local or remote attacker able to send
      syslog messages to the server could have crashed the log server due
      to an array overread. (CVE-2014-3634, CVE-2014-3683)

Security Issues:

    * CVE-2014-3634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634&gt;
    * CVE-2014-3683
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/890228">SUSE bug 890228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581113" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581114" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581115" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581116" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581117" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581118" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581119" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581120" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581121" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581122" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581113" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581114" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581115" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581116" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581117" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581118" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581119" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581120" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581121" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581122" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581113" comment="rsyslog-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581114" comment="rsyslog-diag-tools-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581115" comment="rsyslog-doc-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581116" comment="rsyslog-module-gssapi-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581117" comment="rsyslog-module-gtls-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581118" comment="rsyslog-module-mysql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581119" comment="rsyslog-module-pgsql-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581120" comment="rsyslog-module-relp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581121" comment="rsyslog-module-snmp-5.10.1-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581122" comment="rsyslog-module-udpspoof-5.10.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41000" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153451" ref_url="https://bugzilla.suse.com/1153451" source="BUGZILLA"/>
		<reference ref_id="1153459" ref_url="https://bugzilla.suse.com/1153459" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<description>
This update for rsyslog fixes the following issues:

- CVE-2019-17041: Fixed a heap overflow in the parser for AIX log messages (bsc#1153451).
- CVE-2019-17042: Fixed a heap overflow in the parser for Cisco log messages (bsc#1153459).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581123" comment="rsyslog-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581124" comment="rsyslog-diag-tools-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581125" comment="rsyslog-doc-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581126" comment="rsyslog-module-gssapi-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581127" comment="rsyslog-module-gtls-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581128" comment="rsyslog-module-mysql-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581129" comment="rsyslog-module-pgsql-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581130" comment="rsyslog-module-relp-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581131" comment="rsyslog-module-snmp-5.10.1-0.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581132" comment="rsyslog-module-udpspoof-5.10.1-0.14.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41001" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<description>

This Ruby update fixes the following security issue:

    * bnc#808137: Fixed entity expansion DoS vulnerability in REXML
      (CVE-2013-1821).

Security Issue reference:

    * CVE-2013-1821
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581133" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581133" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581133" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563826" comment="ruby-doc-html-1.8.7.p357-0.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563830" comment="ruby-tk-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41002" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009574982" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574983" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574984" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41003" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="529899" ref_url="https://bugzilla.suse.com/529899" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
This update for rzsz fixes the following issues:

- L3: sz of rzsz segfaults in zsdata() (bsc#1086416)
- VUL-0: CVE-2018-10195: rzsz: sz can leak data to receiving side (bsc#1090051)
- rzsz-0.12.20-976.7: illegal use of freed variable (bsc#529899)
- /usr/bin/lsb segfaults [rzsz] (bsc#1076576)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529899">SUSE bug 529899</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574988" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41004" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581134" comment="ldapsmb-1.34b-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581135" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581136" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567431" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581137" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567433" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581138" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567435" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581139" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567437" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581140" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567439" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581141" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567441" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581142" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567443" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581143" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581144" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567447" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41005" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581145" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581146" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581147" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581148" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581149" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581150" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581151" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581152" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581153" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581154" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581155" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581156" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581157" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581158" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581159" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581160" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581162" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581163" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581164" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581145" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581146" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581147" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581148" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581149" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581150" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581151" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581152" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581153" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581154" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581155" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581156" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581157" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581158" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581159" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581160" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581162" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581163" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581164" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41006" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581165" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581166" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581167" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581168" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581169" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581170" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581171" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581172" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581173" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581174" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581175" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581176" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581177" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581178" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581179" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581180" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581181" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581182" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581183" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581165" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581166" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581167" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581168" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581169" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581170" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581171" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581172" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581173" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581174" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581175" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581176" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581177" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581178" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581179" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581180" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581181" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581182" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581183" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41007" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581184" comment="ldapsmb-1.34b-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581185" comment="libldb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581186" comment="libsmbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581187" comment="libsmbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581188" comment="libtalloc2-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581189" comment="libtalloc2-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581190" comment="libtdb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581191" comment="libtdb1-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581192" comment="libtevent0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581193" comment="libtevent0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581194" comment="libwbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581195" comment="libwbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581196" comment="samba-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581197" comment="samba-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581198" comment="samba-client-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581199" comment="samba-client-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581200" comment="samba-doc-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581201" comment="samba-krb-printing-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581202" comment="samba-winbind-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581203" comment="samba-winbind-32bit-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41008" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1036283" ref_url="https://bugzilla.suse.com/1036283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00017.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
  For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression
  in the fix has been addressed (bsc#1036283, bso#12721).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-08"/>
	<updated date="2017-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581204" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581205" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581206" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581207" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581208" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581209" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581210" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581211" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581212" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581213" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581214" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581215" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581216" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581217" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581218" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581219" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581220" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581221" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581222" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581204" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581205" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581206" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581207" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581208" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581209" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581210" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581211" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581212" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581213" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581214" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581215" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581216" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581217" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581218" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581219" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581220" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581221" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581222" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41009" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00064.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581223" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581224" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581225" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581226" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581227" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581228" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581229" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581230" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581231" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581232" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581233" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581234" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581235" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581236" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581237" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581238" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581239" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581240" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581241" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581223" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581224" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581225" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581226" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581227" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581228" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581229" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581230" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581231" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581232" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581233" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581234" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581235" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581236" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581237" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581238" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581239" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581240" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581241" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41010" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed: 

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)

This non-security issue was fixed: 

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581242" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581243" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581244" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581245" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581246" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581247" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581248" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581249" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581250" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581251" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581252" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581253" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581254" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581255" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581256" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581257" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581258" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581259" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581260" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581242" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581243" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581244" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581245" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581246" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581247" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581248" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581249" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581250" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581251" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581252" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581253" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581254" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581255" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581256" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581257" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581258" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581259" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581260" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41011" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016531" ref_url="https://bugzilla.suse.com/1016531" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);


- s3/libads: fix seal/signed ldap connections so they are reused;
  (bsc#1016531).		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016531">SUSE bug 1016531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581261" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581262" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581263" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581264" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581265" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581266" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581267" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581268" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581269" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581270" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581271" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581272" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581273" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581274" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581275" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581276" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581277" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581278" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581279" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581261" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581262" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581263" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581264" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581265" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581266" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581267" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581268" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581269" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581270" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581271" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581272" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581273" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581274" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581275" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581276" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581277" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581278" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581279" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41012" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581280" comment="ldapsmb-1.34b-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581281" comment="libldb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581282" comment="libsmbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581283" comment="libsmbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581284" comment="libtalloc2-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581285" comment="libtalloc2-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581286" comment="libtdb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581287" comment="libtdb1-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581288" comment="libtevent0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581289" comment="libtevent0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581290" comment="libwbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581291" comment="libwbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581292" comment="samba-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581293" comment="samba-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581294" comment="samba-client-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581295" comment="samba-client-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581296" comment="samba-doc-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581297" comment="samba-krb-printing-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581298" comment="samba-winbind-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581299" comment="samba-winbind-32bit-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41013" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1079449" ref_url="https://bugzilla.suse.com/1079449" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
  
The following other bugs were fixed:

- s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079449">SUSE bug 1079449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581300" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581301" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581302" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581303" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581304" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581305" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581306" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581307" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581308" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581309" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581310" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581311" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581312" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581313" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581314" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581315" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581316" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581317" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581318" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581300" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581301" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581302" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581303" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581304" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581305" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581306" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581307" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581308" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581309" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581310" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581311" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581312" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581313" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581314" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581315" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581316" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581317" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581318" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41014" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1101499" ref_url="https://bugzilla.suse.com/1101499" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issue fixed:

- Make init scripts create log directories before running daemons (bsc#1101499)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101499">SUSE bug 1101499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581319" comment="ldapsmb-1.34b-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581320" comment="libldb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581321" comment="libsmbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581322" comment="libsmbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581323" comment="libtalloc2-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581324" comment="libtalloc2-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581325" comment="libtdb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581326" comment="libtdb1-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581327" comment="libtevent0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581328" comment="libtevent0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581329" comment="libwbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581330" comment="libwbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581331" comment="samba-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581332" comment="samba-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581333" comment="samba-client-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581334" comment="samba-client-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569171" comment="samba-doc-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581335" comment="samba-krb-printing-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581336" comment="samba-winbind-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581337" comment="samba-winbind-32bit-3.6.3-94.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41015" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581338" comment="ldapsmb-1.34b-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581339" comment="libldb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581340" comment="libsmbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581341" comment="libsmbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581342" comment="libtalloc2-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581343" comment="libtalloc2-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581344" comment="libtdb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581345" comment="libtdb1-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581346" comment="libtevent0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581347" comment="libtevent0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581348" comment="libwbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581349" comment="libwbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581350" comment="samba-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581351" comment="samba-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581352" comment="samba-client-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581353" comment="samba-client-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569183" comment="samba-doc-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581354" comment="samba-krb-printing-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581355" comment="samba-winbind-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581356" comment="samba-winbind-32bit-3.6.3-94.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41016" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581357" comment="ldapsmb-1.34b-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581358" comment="libldb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581359" comment="libsmbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581360" comment="libsmbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581361" comment="libtalloc2-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581362" comment="libtalloc2-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581363" comment="libtdb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581364" comment="libtdb1-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581365" comment="libtevent0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581366" comment="libtevent0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581367" comment="libwbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581368" comment="libwbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581369" comment="samba-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581370" comment="samba-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581371" comment="samba-client-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581372" comment="samba-client-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569195" comment="samba-doc-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581373" comment="samba-krb-printing-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581374" comment="samba-winbind-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581375" comment="samba-winbind-32bit-3.6.3-94.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41017" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581376" comment="ldapsmb-1.34b-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581377" comment="libldb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581378" comment="libsmbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581379" comment="libsmbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581380" comment="libtalloc2-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581381" comment="libtalloc2-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581382" comment="libtdb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581383" comment="libtdb1-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581384" comment="libtevent0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581385" comment="libtevent0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581386" comment="libwbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581387" comment="libwbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581388" comment="samba-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581389" comment="samba-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581390" comment="samba-client-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581391" comment="samba-client-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569207" comment="samba-doc-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581392" comment="samba-krb-printing-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581393" comment="samba-winbind-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581394" comment="samba-winbind-32bit-3.6.3-94.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41018" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581395" comment="ldapsmb-1.34b-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581396" comment="libldb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581397" comment="libsmbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581398" comment="libsmbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581399" comment="libtalloc2-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581400" comment="libtalloc2-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581401" comment="libtdb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581402" comment="libtdb1-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581403" comment="libtevent0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581404" comment="libtevent0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581405" comment="libwbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581406" comment="libwbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581407" comment="samba-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581408" comment="samba-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581409" comment="samba-client-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581410" comment="samba-client-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569219" comment="samba-doc-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581411" comment="samba-krb-printing-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581412" comment="samba-winbind-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581413" comment="samba-winbind-32bit-3.6.3-94.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41019" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655320" comment="ldapsmb-1.34b-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655321" comment="libldb1-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655322" comment="libsmbclient0-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655323" comment="libsmbclient0-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655324" comment="libtalloc2-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655325" comment="libtalloc2-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655326" comment="libtdb1-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655327" comment="libtdb1-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655328" comment="libtevent0-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655329" comment="libtevent0-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655330" comment="libwbclient0-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655331" comment="libwbclient0-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655332" comment="samba-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655333" comment="samba-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655334" comment="samba-client-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655335" comment="samba-client-32bit-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655336" comment="samba-doc-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655337" comment="samba-krb-printing-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655338" comment="samba-winbind-3.6.3-94.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655339" comment="samba-winbind-32bit-3.6.3-94.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41020" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="899558" ref_url="https://bugzilla.suse.com/899558" source="BUGZILLA"/>
		<reference ref_id="913001" ref_url="https://bugzilla.suse.com/913001" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<description>

Samba has been updated to fix one security issue:

    * CVE-2015-0240: Don't call talloc_free on an uninitialized pointer
      (bnc#917376).

Additionally, these non-security issues have been fixed:

    * Realign the winbind request structure following require_membership_of
      field expansion (bnc#913001).
    * Reuse connections derived from DFS referrals (bso#10123,
      fate#316512).
    * Set domain/workgroup based on authentication callback value
      (bso#11059).
    * Fix spoolss error response marshalling (bso#10984).
    * Fix spoolss EnumJobs and GetJob responses (bso#10905, bnc#898031).
    * Fix handling of bad EnumJobs levels (bso#10898).
    * Fix small memory-leak in the background print process; (bnc#899558).
    * Prune idle or hung connections older than 'winbind request timeout'
      (bso#3204, bnc#872912).

Security Issues:

    * CVE-2015-0240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-17"/>
	<updated date="2015-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899558">SUSE bug 899558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913001">SUSE bug 913001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581414" comment="ldapsmb-1.34b-12.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581415" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581416" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581417" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581418" comment="libsmbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581419" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581420" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581421" comment="libtalloc2-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581422" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581423" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581424" comment="libtdb1-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581425" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581426" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581427" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581428" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581429" comment="libwbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581430" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581431" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581432" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581433" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581434" comment="samba-client-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581435" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581436" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581437" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581438" comment="samba-winbind-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581439" comment="samba-x86-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581414" comment="ldapsmb-1.34b-12.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581415" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581416" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581417" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581418" comment="libsmbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581419" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581420" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581421" comment="libtalloc2-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581422" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581423" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581424" comment="libtdb1-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581425" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581426" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581427" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581428" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581429" comment="libwbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581430" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581431" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581432" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581433" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581434" comment="samba-client-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581435" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581436" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581437" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581438" comment="samba-winbind-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581439" comment="samba-x86-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581414" comment="ldapsmb-1.34b-12.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581415" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581416" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581417" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581418" comment="libsmbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581419" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581420" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581421" comment="libtalloc2-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581422" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581423" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581424" comment="libtdb1-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581425" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581426" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581427" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581428" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581429" comment="libwbclient0-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581430" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581431" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581432" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581433" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581434" comment="samba-client-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581435" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581436" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581437" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581438" comment="samba-winbind-x86-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581439" comment="samba-x86-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41021" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41022" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575176" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41023" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41024" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1008130" ref_url="https://bugzilla.suse.com/1008130" source="BUGZILLA"/>
		<reference ref_id="1012814" ref_url="https://bugzilla.suse.com/1012814" source="BUGZILLA"/>
		<reference ref_id="923349" ref_url="https://bugzilla.suse.com/923349" source="BUGZILLA"/>
		<description>

This update for sblim-sfcb fixes the following issues:

Feature enhancements:
- A seperate sblim-sfcb-openssl1 package was added to the SECURITY Module.
  (fate#322032/bsc#1012814)

  This package can be installed additionaly, and the SysV Init script will
  pick the openssl1 variant on the next start, offering TLS 1.2 support
  on the WBEM SSL socket.

Bugfixes:
-  Add sslNoSSLv3 and sslNoTLSv1 configuration options (bsc#923349, bsc#1008130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008130">SUSE bug 1008130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012814">SUSE bug 1012814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923349">SUSE bug 923349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581467" comment="sblim-sfcb-1.3.11-0.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581468" comment="sblim-sfcb-openssl1-1.3.11-0.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41025" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="944458" ref_url="https://bugzilla.suse.com/944458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6806" ref_url="https://www.suse.com/security/cve/CVE-2015-6806/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

Security issue fixed:

- CVE-2015-6806: Fixed a stack overflow due to deep recursion (bsc#944458).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/944458">SUSE bug 944458</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-6806/">CVE-2015-6806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575178" comment="screen-4.0.2-162.19.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41026" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<description>
This update for shim fixes the following issues:

Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from or after July / August 2020 are applied.

Also fixed:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581469" comment="shim-15+git47-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41027" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary for SBAT support (bsc#1182057) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581470" comment="shim-15.4-12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41028" version="1" class="patch">
	<metadata>
		<title>Security update for shim</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="813448" ref_url="https://bugzilla.suse.com/813448" source="BUGZILLA"/>
		<reference ref_id="863205" ref_url="https://bugzilla.suse.com/863205" source="BUGZILLA"/>
		<reference ref_id="866690" ref_url="https://bugzilla.suse.com/866690" source="BUGZILLA"/>
		<reference ref_id="875385" ref_url="https://bugzilla.suse.com/875385" source="BUGZILLA"/>
		<reference ref_id="889332" ref_url="https://bugzilla.suse.com/889332" source="BUGZILLA"/>
		<reference ref_id="889765" ref_url="https://bugzilla.suse.com/889765" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>

shim has been updated to fix three security issues:

    * OOB read access when parsing DHCPv6 packets (remote DoS)
      (CVE-2014-3675).
    * Heap overflow when parsing IPv6 addresses provided by tftp:// DHCPv6
      boot option (RCE) (CVE-2014-3676).
    * Memory corruption when processing user provided MOK lists
      (CVE-2014-3677).

Security Issues:

    * CVE-2014-3675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675&gt;
    * CVE-2014-3676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676&gt;
    * CVE-2014-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/813448">SUSE bug 813448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863205">SUSE bug 863205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866690">SUSE bug 866690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875385">SUSE bug 875385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889765">SUSE bug 889765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563876" comment="gnu-efi-3.0u-0.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41029" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575180" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41030" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656593" comment="libspeex-1.1.99.91-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656594" comment="libspeex-32bit-1.1.99.91-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41031" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="987394" ref_url="https://bugzilla.suse.com/987394" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>

This update for sqlite3 fixes the following issues: 

The following security issue was fixed:
- CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581471" comment="libsqlite3-0-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581472" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581473" comment="sqlite3-3.7.6.3-1.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41032" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581474" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581475" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581476" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41033" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1085790" ref_url="https://bugzilla.suse.com/1085790" source="BUGZILLA"/>
		<reference ref_id="1132045" ref_url="https://bugzilla.suse.com/1132045" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:

- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-07"/>
	<updated date="2019-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581477" comment="libsqlite3-0-3.7.6.3-1.4.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581478" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581479" comment="sqlite3-3.7.6.3-1.4.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41034" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581480" comment="libsqlite3-0-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581481" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581482" comment="sqlite3-3.7.6.3-1.4.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41035" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:
	  
- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581483" comment="libsqlite3-0-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581484" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581485" comment="sqlite3-3.7.6.3-1.4.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41036" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2019-20218: Fixed a stack unwinding flaw in the selectExpander after a parsing error. (bsc#1160439)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626552" comment="libsqlite3-0-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626553" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626554" comment="sqlite3-3.7.6.3-1.4.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41037" version="1" class="patch">
	<metadata>
		<title>Security update for squid</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="677335" ref_url="https://bugzilla.suse.com/677335" source="BUGZILLA"/>
		<reference ref_id="829084" ref_url="https://bugzilla.suse.com/829084" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<description>

This squid update fixes a buffer overflow issue when squid attempts to 
resolve an overly long hostname. This can be triggered with specially 
crafted http requests. (bnc#829084, CVE-2013-4115)

This update also includes a correction to the last change for logrotate. 
(bnc#677335)

Security Issue reference:

    * CVE-2013-4115
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-09"/>
	<updated date="2013-09-09"/>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829084">SUSE bug 829084</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576954" comment="squid-2.7.STABLE5-2.12.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41038" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001678.html" source="SUSE-SU"/>
		<description>
squid was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-6270: Fixed an off by one in snmp subsystem (bsc#895773).
- CVE-2014-9749: Fixed a nonce replay vulnerability in Digest authentication (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-13"/>
	<updated date="2015-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41039" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-4051: backport fix buffer overflow in cachemgr.cgi (bsc#976553)
- CVE-2016-4554: backport fix for header smuggling issue in HTTP Request processing (bsc#979010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575189" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41040" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575190" comment="squid-2.7.STABLE5-2.12.30.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41041" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670261" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41042" version="1" class="patch">
	<metadata>
		<title>Security update for squid3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="893649" ref_url="https://bugzilla.suse.com/893649" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609/" source="CVE"/>
		<description>

Squid3 was updated to fix a denial of service in Range Header processing, 
which would have allowed proxy users to crash the squid proxy process. 
(CVE-2014-3609)

Security Issues:

    * CVE-2014-3609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-12"/>
	<updated date="2014-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/893649">SUSE bug 893649</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581487" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581487" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581487" comment="squid3-3.1.12-8.16.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41043" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="902197" ref_url="https://bugzilla.suse.com/902197" source="BUGZILLA"/>
		<reference ref_id="938715" ref_url="https://bugzilla.suse.com/938715" source="BUGZILLA"/>
		<reference ref_id="963539" ref_url="https://bugzilla.suse.com/963539" source="BUGZILLA"/>
		<reference ref_id="967011" ref_url="https://bugzilla.suse.com/967011" source="BUGZILLA"/>
		<reference ref_id="968392" ref_url="https://bugzilla.suse.com/968392" source="BUGZILLA"/>
		<reference ref_id="968393" ref_url="https://bugzilla.suse.com/968393" source="BUGZILLA"/>
		<reference ref_id="968394" ref_url="https://bugzilla.suse.com/968394" source="BUGZILLA"/>
		<reference ref_id="968395" ref_url="https://bugzilla.suse.com/968395" source="BUGZILLA"/>
		<reference ref_id="973782" ref_url="https://bugzilla.suse.com/973782" source="BUGZILLA"/>
		<reference ref_id="973783" ref_url="https://bugzilla.suse.com/973783" source="BUGZILLA"/>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="976556" ref_url="https://bugzilla.suse.com/976556" source="BUGZILLA"/>
		<reference ref_id="976708" ref_url="https://bugzilla.suse.com/976708" source="BUGZILLA"/>
		<reference ref_id="979008" ref_url="https://bugzilla.suse.com/979008" source="BUGZILLA"/>
		<reference ref_id="979009" ref_url="https://bugzilla.suse.com/979009" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="979011" ref_url="https://bugzilla.suse.com/979011" source="BUGZILLA"/>
		<reference ref_id="993299" ref_url="https://bugzilla.suse.com/993299" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>


This update for squid3 fixes the following issues:

- Multiple issues in pinger ICMP processing.  (CVE-2014-7141, CVE-2014-7142) 

- CVE-2016-3947: Buffer overrun issue in pinger
    ICMPv6 processing. (bsc#973782)

-  CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response processing.
    (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572,
     bsc#968392, bsc#968393, bsc#968394, bsc#968395)
- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
  * fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

- Memory leak in squid3 when using external_acl (bsc#976708)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902197">SUSE bug 902197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963539">SUSE bug 963539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976708">SUSE bug 976708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575192" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41044" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<description>

This update for squid3 fixes the following issues:

- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168)
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575193" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41045" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575194" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41046" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2018-1172: Fixed a DoS caused by incorrect handling of ESI responses. (bsc#1090089, SQUID-2018:3)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575195" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41047" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

Security issue fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575196" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41048" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575197" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41049" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575198" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41050" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671855" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41051" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<description>
squidGuard was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575199" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575200" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41052" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="876449" ref_url="https://bugzilla.suse.com/876449" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<description>

This update fixes a NULL ptr dereference (DoS) via ID_DER_ASN1_DN ID 
payloads.

Security Issue reference:

    * CVE-2014-2891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-14"/>
	<updated date="2014-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581488" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581489" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581488" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581489" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581488" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581489" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41053" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41054" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575205" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575206" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41055" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575207" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575208" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41056" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-30"/>
	<updated date="2019-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575209" comment="strongswan-4.4.0-6.36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575210" comment="strongswan-doc-4.4.0-6.36.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41057" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652840" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652841" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41058" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664947" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664948" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41059" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="863025" ref_url="https://bugzilla.suse.com/863025" source="BUGZILLA"/>
		<reference ref_id="866503" ref_url="https://bugzilla.suse.com/866503" source="BUGZILLA"/>
		<reference ref_id="868444" ref_url="https://bugzilla.suse.com/868444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<description>

This collective update for sudo provides fixes for the following issues:

    * Security policy bypass when env_reset is disabled. (CVE-2014-0106,
      bnc#866503)
    * Regression in the previous update that causes a segmentation fault
      when running 'sudo -s'. (bnc#868444)
    * Command 'who -m' prints no output when using log_input/log_output
      sudo options. (bnc#863025)

Security Issues references:

    * CVE-2014-0106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/863025">SUSE bug 863025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868444">SUSE bug 868444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581492" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581492" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581492" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41060" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="1008043" ref_url="https://bugzilla.suse.com/1008043" source="BUGZILLA"/>
		<reference ref_id="948973" ref_url="https://bugzilla.suse.com/948973" source="BUGZILLA"/>
		<reference ref_id="966755" ref_url="https://bugzilla.suse.com/966755" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<description>

This update for sudo fixes the following issues:

- Fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

- The SSSD plugin would occasionally crash sudo with an 'internal error'.
  This issue has been fixed. [bsc#948973]

- The SSSD plugin would occasionally apply @netgroups rules from LDAP to all
  users rather than the @netgroup. This issue is now fixed. [bsc#966755]

- When the SSSD plugin was used and a local user ran sudo, an e-mail used to be
  sent to administrator because SSSD did not support sudo rules for local
  users. This message did not signify an error, however, it was only noise.
  [bsc#1008043]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008043">SUSE bug 1008043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948973">SUSE bug 948973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966755">SUSE bug 966755</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581493" comment="sudo-1.7.6p2-0.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41061" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581494" comment="sudo-1.7.6p2-0.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41062" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="980670" ref_url="https://bugzilla.suse.com/980670" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
supportutils was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581495" comment="supportutils-1.20-121.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41063" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
This update for supportutils fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19636: Local root exploit via inclusion of attacker controlled shell script (bsc#1117751)
- CVE-2018-19640: Users can kill arbitrary processes (bsc#1118463)
- CVE-2018-19638: User can overwrite arbitrary log files in support tar (bsc#1118460)
- CVE-2018-19639: Code execution if run with -v (bsc#1118462)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41064" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575214" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41065" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked
  into extracting files and directories in the given destination, regardless
  of the path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575221" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41066" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575222" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41067" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575223" comment="tar-1.27.1-14.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41068" version="1" class="patch">
	<metadata>
		<title>Recommended update for tboot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057555" ref_url="https://bugzilla.suse.com/1057555" source="BUGZILLA"/>
		<reference ref_id="889339" ref_url="https://bugzilla.suse.com/889339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5118" ref_url="https://www.suse.com/security/cve/CVE-2014-5118/" source="CVE"/>
		<description>
This update for tboot provides the following fix:

Security issue fixed:

- CVE-2014-5118: tboot: bypass of measured boot (bsc#889339)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon 'Purley 8s' processors. The
  following error message showed: 'TBOOT: wait-for-sipi loop timed-out'. Booting continued
  but 'TXT measured launch' was wrongly reported as FALSE. (bsc#1057555)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-29"/>
	<updated date="2017-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057555">SUSE bug 1057555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889339">SUSE bug 889339</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5118/">CVE-2014-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581496" comment="tboot-20120115_1.7.0-0.5.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41069" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<description>

When running tcpdump, a remote unauthenticated user could have crashed the 
application or, potentially, execute arbitrary code by injecting crafted 
packages into the network.

The following vulnerabilities in protocol printers have been fixed:

    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

    * CVE-2015-0261
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261&gt;
    * CVE-2015-2154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154&gt;
    * CVE-2014-9140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581497" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581497" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581497" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41070" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>

This update for tcpdump fixes the following issues:

Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). 
- CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575225" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41071" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
- CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
- CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
- CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
- CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575226" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41072" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575227" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41073" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1178466" ref_url="https://bugzilla.suse.com/1178466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575228" comment="tcpdump-3.9.8-1.30.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41074" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668244" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41075" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41076" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575233" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575234" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41077" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575235" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575236" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575237" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41078" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575238" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575239" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575240" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41079" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575241" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575242" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575243" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41080" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575244" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575245" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575246" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41081" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575247" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575248" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575249" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41082" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575250" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575251" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575252" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41083" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575253" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575254" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575255" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41084" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575256" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575257" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575258" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41085" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575259" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575260" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575261" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41086" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666461" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666462" comment="libtiff3-32bit-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666463" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41087" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1197073" ref_url="https://bugzilla.suse.com/1197073" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file (bsc#1197073).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197073">SUSE bug 1197073</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683272" comment="libtiff3-3.8.2-141.169.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683273" comment="libtiff3-32bit-3.8.2-141.169.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683274" comment="tiff-3.8.2-141.169.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41088" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575262" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41089" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issue:

- CVE-2016-5388 Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41090" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="768772" ref_url="https://bugzilla.suse.com/768772" source="BUGZILLA"/>
		<reference ref_id="804992" ref_url="https://bugzilla.suse.com/804992" source="BUGZILLA"/>
		<reference ref_id="818948" ref_url="https://bugzilla.suse.com/818948" source="BUGZILLA"/>
		<reference ref_id="822177" ref_url="https://bugzilla.suse.com/822177" source="BUGZILLA"/>
		<reference ref_id="831119" ref_url="https://bugzilla.suse.com/831119" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0022" ref_url="https://www.suse.com/security/cve/CVE-2012-0022/" source="CVE"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001523.html" source="SUSE-SU"/>
		<description>

This update of tomcat6 fixes:

    * apache-tomcat-CVE-2012-3544.patch (bnc#831119)
    * use chown --no-dereference to prevent symlink attacks on log
      (bnc#822177#c7/prevents CVE-2013-1976)
    * Fix tomcat init scripts generating malformed classpath (
      http://youtrack.jetbrains.com/issue/JT-18545
      &lt;http://youtrack.jetbrains.com/issue/JT-18545&gt; ) bnc#804992 (patch
      from m407)
    * fix a typo in initscript (bnc#768772 )
    * copy all shell scripts (bnc#818948)

Security Issue references:

    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2013-1976
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976&gt;
    * CVE-2012-0022
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-02"/>
	<updated date="2013-08-02"/>
	<bugzilla href="https://bugzilla.suse.com/768772">SUSE bug 768772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804992">SUSE bug 804992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818948">SUSE bug 818948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831119">SUSE bug 831119</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0022/">CVE-2012-0022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576962" comment="tomcat6-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576963" comment="tomcat6-admin-webapps-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576964" comment="tomcat6-docs-webapp-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576965" comment="tomcat6-javadoc-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576966" comment="tomcat6-jsp-2_1-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576967" comment="tomcat6-lib-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576968" comment="tomcat6-servlet-2_5-api-6.0.18-20.35.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576969" comment="tomcat6-webapps-6.0.18-20.35.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41091" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="967815" ref_url="https://bugzilla.suse.com/967815" source="BUGZILLA"/>
		<reference ref_id="967964" ref_url="https://bugzilla.suse.com/967964" source="BUGZILLA"/>
		<reference ref_id="967965" ref_url="https://bugzilla.suse.com/967965" source="BUGZILLA"/>
		<reference ref_id="967967" ref_url="https://bugzilla.suse.com/967967" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<description>

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41092" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41093" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following security issues:

- : The error page mechanism of the Java Servlet Specification
  requires that, when an error occurs and an error page is configured for the
  error that occurred, the original request and response are forwarded to the
  error page. This means that the request is presented to the error page with the
  original HTTP method. If the error page is a static file, expected behaviour is
  to serve content of the file as if processing a GET request, regardless of the
  actual HTTP method. The Default Servlet in Tomcat did not do this. Depending on
  the original request this could lead to unexpected and undesirable results for
  static error pages including, if the DefaultServlet is configured to permit
  writes, the replacement or removal of the custom error page (bsc#1042910).
- : The URL pattern of '' was not correctly handled when used as
  part of a security constraint definition. This caused the constraint to be
  ignored. It was possible for unauthorised users to gain access to web
  application resources that should have been protected. Only security
  constraints with a URL pattern of the empty string were affected (bsc#1082480).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41094" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issue:

Security issue fixed:

- CVE-2018-11784: Fixed problem with specially crafted URLs that could be used to cause a redirect to any URI of an attackers choise (bsc#1110850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41095" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41096" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41097" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41098" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="844689" ref_url="https://bugzilla.suse.com/844689" source="BUGZILLA"/>
		<reference ref_id="865746" ref_url="https://bugzilla.suse.com/865746" source="BUGZILLA"/>
		<reference ref_id="880346" ref_url="https://bugzilla.suse.com/880346" source="BUGZILLA"/>
		<reference ref_id="880347" ref_url="https://bugzilla.suse.com/880347" source="BUGZILLA"/>
		<reference ref_id="880348" ref_url="https://bugzilla.suse.com/880348" source="BUGZILLA"/>
		<reference ref_id="881700" ref_url="https://bugzilla.suse.com/881700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3544" ref_url="https://www.suse.com/security/cve/CVE-2012-3544/" source="CVE"/>
		<reference ref_id="CVE-2013-4322" ref_url="https://www.suse.com/security/cve/CVE-2013-4322/" source="CVE"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>

Tomcat has been updated to version 6.0.41, which brings security and bug 
fixes.

The following security fixes have been fixed:

    * CVE-2014-0096: A XXE vulnerability via user supplied XSLTs.
    * CVE-2014-0099: Request smuggling via malicious content length header.
    * CVE-2014-0119: A XML parser hijack by malicious web application.

Bugs fixed:

    * Socket bind fails on tomcat startup when using apr (IPV6)
      (bnc#881700)
    * classpath for org/apache/juli/logging/LogFactory (bnc#844689)

Security Issues:

    * CVE-2013-4322
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322&gt;
    * CVE-2012-3544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544&gt;
    * CVE-2014-0099
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099&gt;
    * CVE-2014-0096
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096&gt;
    * CVE-2014-0119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/844689">SUSE bug 844689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880346">SUSE bug 880346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880347">SUSE bug 880347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880348">SUSE bug 880348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881700">SUSE bug 881700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3544/">CVE-2012-3544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4322/">CVE-2013-4322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581502" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581502" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581502" comment="libtcnative-1-0-1.3.3-12.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572500" comment="tomcat6-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572501" comment="tomcat6-admin-webapps-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572502" comment="tomcat6-docs-webapp-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572503" comment="tomcat6-javadoc-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572504" comment="tomcat6-jsp-2_1-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572505" comment="tomcat6-lib-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572506" comment="tomcat6-servlet-2_5-api-6.0.41-0.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572507" comment="tomcat6-webapps-6.0.41-0.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41099" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575303" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41100" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106531" ref_url="https://bugzilla.suse.com/1106531" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2018-16140: Fixed a buffer underwrite vulnerability in get_line() in
  read.c, which allowed an attacker to write prior to the beginning of the
  buffer via specially crafted .fig file (bsc#1106531)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1106531">SUSE bug 1106531</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575304" comment="transfig-3.2.5-160.6.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41101" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651176" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41102" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653706" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41103" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00000.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581503" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581503" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41104" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="513804" ref_url="https://bugzilla.suse.com/513804" source="BUGZILLA"/>
		<reference ref_id="693890" ref_url="https://bugzilla.suse.com/693890" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions 
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Added libunrar* and libunrar*-devel subpackages (bsc#513804)
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513804">SUSE bug 513804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693890">SUSE bug 693890</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575306" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41105" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1199349" ref_url="https://bugzilla.suse.com/1199349" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30333" ref_url="https://www.suse.com/security/cve/CVE-2022-30333/" source="CVE"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2022-30333: Fixed directory traversal issue that allowed writing to non-designated paths (bsc#1199349).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1199349">SUSE bug 1199349</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-30333/">CVE-2022-30333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683761" comment="unrar-5.6.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41106" version="1" class="patch">
	<metadata>
		<title>Security update for unzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

    * CVE-2014-8139: input sanitization errors (bnc#909214)
    * CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
      (bnc#914442)

Security Issues:

    * CVE-2014-9636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636&gt;
    * CVE-2014-8139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581504" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581504" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581504" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41107" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581505" comment="unzip-6.00-11.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41108" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581506" comment="unzip-6.00-11.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41109" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed a buffer overflow when listing archives (bsc#1110194)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581507" comment="unzip-6.00-11.18.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41110" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1196175" ref_url="https://bugzilla.suse.com/1196175" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4217" ref_url="https://www.suse.com/security/cve/CVE-2021-4217/" source="CVE"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2021-4217: Fixed null pointer dereference in Unicode strings code (bsc#1196175).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196175">SUSE bug 1196175</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4217/">CVE-2021-4217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670262" comment="unzip-6.00-11.18.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41111" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1040414" ref_url="https://bugzilla.suse.com/1040414" source="BUGZILLA"/>
		<reference ref_id="903440" ref_url="https://bugzilla.suse.com/903440" source="BUGZILLA"/>
		<reference ref_id="903738" ref_url="https://bugzilla.suse.com/903738" source="BUGZILLA"/>
		<reference ref_id="923777" ref_url="https://bugzilla.suse.com/923777" source="BUGZILLA"/>
		<reference ref_id="923904" ref_url="https://bugzilla.suse.com/923904" source="BUGZILLA"/>
		<reference ref_id="924994" ref_url="https://bugzilla.suse.com/924994" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="930236" ref_url="https://bugzilla.suse.com/930236" source="BUGZILLA"/>
		<reference ref_id="931607" ref_url="https://bugzilla.suse.com/931607" source="BUGZILLA"/>
		<reference ref_id="949754" ref_url="https://bugzilla.suse.com/949754" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2015-5218: Prevent colcrt buffer overflow. (bsc#949754)

These non-security issues were fixed:

- Mount crashes when trying to mount `shmfs` while `SELinux` is active. (bsc#1040414)
- Fix `lsblk -f` on `CCISS` and other devices with nodes in `/dev` subdirectory. (bsc#924994)
- Fix `script(1)` hang caused by mis-interpreted EOF on big-endian platforms. (bsc#930236)
- Do not segfault when TERM is not defined or wrong. (bsc#903440)
- Update and fix mount XFS documentation. (bsc#925705)
- Fix recognition of `/dev/dm-N` partitions names. (bsc#931607)
- Follow SUSE Linux Enterprise 11 device mapper partition names configuration. (bsc#931607)
- Fix recognition of device mapper partitions. (bsc#923904)
- Fix `fsck -C {fd}` parsing. (bsc#923777, bsc#903738)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040414">SUSE bug 1040414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903440">SUSE bug 903440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903738">SUSE bug 903738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923777">SUSE bug 923777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923904">SUSE bug 923904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924994">SUSE bug 924994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930236">SUSE bug 930236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931607">SUSE bug 931607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949754">SUSE bug 949754</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581508" comment="libblkid1-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581509" comment="libblkid1-32bit-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581510" comment="libuuid1-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581511" comment="libuuid1-32bit-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581512" comment="util-linux-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581513" comment="util-linux-lang-2.19.1-6.62.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581514" comment="uuid-runtime-2.19.1-6.62.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41112" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
  (bsc#1010685)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581515" comment="gvim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581516" comment="vim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581517" comment="vim-base-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581518" comment="vim-data-7.2-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41113" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<description>

This update for vim fixes the following issues:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581519" comment="gvim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581520" comment="vim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581521" comment="vim-base-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581522" comment="vim-data-7.2-8.20.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41114" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This update for vim fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581523" comment="gvim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581524" comment="vim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581525" comment="vim-base-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581526" comment="vim-data-7.2-8.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41115" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581527" comment="gvim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581528" comment="vim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581529" comment="vim-base-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581530" comment="vim-data-7.2-8.21.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41116" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009576970" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009576971" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41117" version="1" class="patch">
	<metadata>
		<title>Security update for vino (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
This update for vino fixes the following issues:
	  
- CVE-2019-15681: Fixed a memory leak which could have allowed to a 
  remote attacker to read stack memory (bsc#1155419).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575338" comment="vino-2.28.1-2.5.3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575339" comment="vino-lang-2.28.1-2.5.3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41118" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1011269" ref_url="https://bugzilla.suse.com/1011269" source="BUGZILLA"/>
		<reference ref_id="1011270" ref_url="https://bugzilla.suse.com/1011270" source="BUGZILLA"/>
		<reference ref_id="1011271" ref_url="https://bugzilla.suse.com/1011271" source="BUGZILLA"/>
		<reference ref_id="1011272" ref_url="https://bugzilla.suse.com/1011272" source="BUGZILLA"/>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012020" ref_url="https://bugzilla.suse.com/1012020" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2016-9422" ref_url="https://www.suse.com/security/cve/CVE-2016-9422/" source="CVE"/>
		<reference ref_id="CVE-2016-9423" ref_url="https://www.suse.com/security/cve/CVE-2016-9423/" source="CVE"/>
		<reference ref_id="CVE-2016-9424" ref_url="https://www.suse.com/security/cve/CVE-2016-9424/" source="CVE"/>
		<reference ref_id="CVE-2016-9425" ref_url="https://www.suse.com/security/cve/CVE-2016-9425/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020)
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9422/">CVE-2016-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9423/">CVE-2016-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9424/">CVE-2016-9424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9425/">CVE-2016-9425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575344" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41119" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077559" ref_url="https://bugzilla.suse.com/1077559" source="BUGZILLA"/>
		<reference ref_id="1077568" ref_url="https://bugzilla.suse.com/1077568" source="BUGZILLA"/>
		<reference ref_id="1077572" ref_url="https://bugzilla.suse.com/1077572" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
This update for w3m fixes several issues.

These security issues were fixed:

- CVE-2018-6196: Prevent infinite recursion in HTMLlineproc0 caused by the feed_table_block_tag function which did not prevent a negative indent value (bsc#1077559)
- CVE-2018-6197: Prevent NULL pointer dereference in formUpdateBuffer (bsc#1077568)
- CVE-2018-6198: w3m did not properly handle temporary files when the ~/.w3m directory is unwritable, which allowed a local attacker to craft a symlink attack to overwrite arbitrary files (bsc#1077572)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575345" comment="w3m-0.5.3.git20161120-5.3.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41120" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575346" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41121" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575347" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41122" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575348" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41123" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget has been updated to fix one security issue and two non-security 
issues.

This security issue has been fixed:

    * FTP symlink arbitrary filesystem access (CVE-2014-4877).

These non-security issues have been fixed:

    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581531" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581531" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581531" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41124" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581532" comment="wget-1.11.4-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575351" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581532" comment="wget-1.11.4-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575351" comment="wget-openssl1-1.11.4-1.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41125" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575352" comment="wget-1.11.4-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575353" comment="wget-openssl1-1.11.4-1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41126" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575354" comment="wget-1.11.4-1.41.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575355" comment="wget-openssl1-1.11.4-1.41.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41127" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="899303" ref_url="https://bugzilla.suse.com/899303" source="BUGZILLA"/>
		<reference ref_id="905245" ref_url="https://bugzilla.suse.com/905245" source="BUGZILLA"/>
		<reference ref_id="905246" ref_url="https://bugzilla.suse.com/905246" source="BUGZILLA"/>
		<reference ref_id="905247" ref_url="https://bugzilla.suse.com/905247" source="BUGZILLA"/>
		<reference ref_id="905248" ref_url="https://bugzilla.suse.com/905248" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<description>

wireshark has been updated to version 1.10.11 to fix five security issues.

These security issues have been fixed:

    * SigComp UDVM buffer overflow (CVE-2014-8710).
    * AMQP dissector crash (CVE-2014-8711).
    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
    * TN5250 infinite loops (CVE-2014-8714).

This non-security issue has been fixed:

    * enable zlib (bnc#899303).

Further bug fixes and updated protocol support as listed in:

https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html&gt;

Security Issues:

    * CVE-2014-8711
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711&gt;
    * CVE-2014-8710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710&gt;
    * CVE-2014-8714
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714&gt;
    * CVE-2014-8712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712&gt;
    * CVE-2014-8713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/899303">SUSE bug 899303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581533" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581533" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581533" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41128" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41129" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41130" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575359" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41131" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575360" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41132" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575362" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575363" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41133" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575364" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575365" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41134" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575366" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575367" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41135" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575369" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575370" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575371" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575372" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575373" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575374" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575375" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575376" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41136" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575377" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575378" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575379" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575380" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575381" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575382" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41137" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575383" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575384" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575385" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575386" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575387" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575388" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41138" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575389" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575390" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575391" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575392" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575393" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575394" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41139" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575395" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575396" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575397" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575398" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575399" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575400" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41140" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575401" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575402" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575403" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575404" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575405" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575406" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41141" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="868937" ref_url="https://bugzilla.suse.com/868937" source="BUGZILLA"/>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>

This update fixes a remote code execution vulnerability in wpa_supplicant's 
wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this 
issue.

Additionally, password based authentication with PKCS#5v2 has been enabled.

Security Issues:

    * CVE-2014-3686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-15"/>
	<updated date="2014-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/868937">SUSE bug 868937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581536" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581536" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581536" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41142" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41143" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581538" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581538" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41144" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="915323" ref_url="https://bugzilla.suse.com/915323" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

Security issue fixed:

- CVE-2015-0210: Fix broken certificate subject check (bsc#915323.)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581539" comment="wpa_supplicant-0.7.1-6.18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41145" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581540" comment="wpa_supplicant-0.7.1-6.18.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41146" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41147" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="910441" ref_url="https://bugzilla.suse.com/910441" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix two security issues and a bug:

    * CVE-2015-3456: A buffer overflow in the floppy drive emulation, which
      could be used to carry out denial of service attacks or potential
      code execution against the host. This vulnerability is also known as
      VENOM.
    * CVE-2015-3340: Xen did not initialize certain fields, which allowed
      certain remote service domains to obtain sensitive information from
      memory via a (1) XEN_DOMCTL_gettscinfo or (2)
      XEN_SYSCTL_getdomaininfolist request.
    * An exception in setCPUAffinity when restoring guests. (bsc#910441)

Security Issues:

    * CVE-2015-3456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456&gt;
    * CVE-2015-3340
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-13"/>
	<updated date="2015-05-13"/>
	<bugzilla href="https://bugzilla.suse.com/910441">SUSE bug 910441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41148" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="866902" ref_url="https://bugzilla.suse.com/866902" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="896023" ref_url="https://bugzilla.suse.com/896023" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

Xen has been updated to version 4.2.5 with additional patches to fix six 
security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).

These non-security issues have been fixed:

    * Xen save/restore of HVM guests cuts off disk and networking
      (bnc#866902).
    * Windows 2012 R2 fails to boot up with greater than 60 vcpus
      (bnc#882089).
    * Increase limit domUloader to 32MB (bnc#901317).
    * Adjust xentop column layout (bnc#896023).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-27"/>
	<updated date="2014-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/866902">SUSE bug 866902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896023">SUSE bug 896023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41149" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<description>

xen was updated to fix the following security issues:

* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140)
* CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139)
* CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127)
* CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137)
* CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136)
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41150" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="941074" ref_url="https://bugzilla.suse.com/941074" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<description>
xen was updated to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bsc#941074: Device 51728 could not be connected. Hotplug scripts not working
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941074">SUSE bug 941074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41151" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 36 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-06"/>
	<updated date="2016-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581541" comment="xen-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581542" comment="xen-doc-html-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581543" comment="xen-doc-pdf-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581544" comment="xen-kmp-default-4.2.5_20_3.0.101_0.47.79-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581545" comment="xen-kmp-pae-4.2.5_20_3.0.101_0.47.79-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581546" comment="xen-libs-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581547" comment="xen-libs-32bit-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581548" comment="xen-tools-4.2.5_20-24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581549" comment="xen-tools-domU-4.2.5_20-24.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41152" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="973631" ref_url="https://bugzilla.suse.com/973631" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="976470" ref_url="https://bugzilla.suse.com/976470" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: Unbounded memory allocation allowed a guest administrator to cause a denial of service of the host (bsc#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)

These non-security issues were fixed:
- bsc#985503: vif-route broken 
- bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host.
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) 
- bsc#961600: Poor performance when Xen HVM domU configured with max memory &gt; current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#976470: Xend fails to start 
- bsc#973631: AWS EC2 kdump issue
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973631">SUSE bug 973631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976470">SUSE bug 976470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581550" comment="xen-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581551" comment="xen-doc-html-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581552" comment="xen-doc-pdf-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581553" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.86-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569288" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.86-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581554" comment="xen-libs-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581555" comment="xen-libs-32bit-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581556" comment="xen-tools-4.2.5_21-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581557" comment="xen-tools-domU-4.2.5_21-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41153" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)

This non-security issue was fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581558" comment="xen-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581559" comment="xen-doc-html-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581560" comment="xen-doc-pdf-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581561" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.90-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569292" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.90-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581562" comment="xen-libs-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581563" comment="xen-libs-32bit-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581564" comment="xen-tools-4.2.5_21-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581565" comment="xen-tools-domU-4.2.5_21-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41154" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958493" ref_url="https://bugzilla.suse.com/958493" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="959006" ref_url="https://bugzilla.suse.com/959006" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960726" ref_url="https://bugzilla.suse.com/960726" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="961692" ref_url="https://bugzilla.suse.com/961692" source="BUGZILLA"/>
		<reference ref_id="962335" ref_url="https://bugzilla.suse.com/962335" source="BUGZILLA"/>
		<reference ref_id="962360" ref_url="https://bugzilla.suse.com/962360" source="BUGZILLA"/>
		<reference ref_id="962611" ref_url="https://bugzilla.suse.com/962611" source="BUGZILLA"/>
		<reference ref_id="962627" ref_url="https://bugzilla.suse.com/962627" source="BUGZILLA"/>
		<reference ref_id="962642" ref_url="https://bugzilla.suse.com/962642" source="BUGZILLA"/>
		<reference ref_id="962758" ref_url="https://bugzilla.suse.com/962758" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="963783" ref_url="https://bugzilla.suse.com/963783" source="BUGZILLA"/>
		<reference ref_id="964431" ref_url="https://bugzilla.suse.com/964431" source="BUGZILLA"/>
		<reference ref_id="964452" ref_url="https://bugzilla.suse.com/964452" source="BUGZILLA"/>
		<reference ref_id="964644" ref_url="https://bugzilla.suse.com/964644" source="BUGZILLA"/>
		<reference ref_id="964746" ref_url="https://bugzilla.suse.com/964746" source="BUGZILLA"/>
		<reference ref_id="964925" ref_url="https://bugzilla.suse.com/964925" source="BUGZILLA"/>
		<reference ref_id="964929" ref_url="https://bugzilla.suse.com/964929" source="BUGZILLA"/>
		<reference ref_id="964947" ref_url="https://bugzilla.suse.com/964947" source="BUGZILLA"/>
		<reference ref_id="964950" ref_url="https://bugzilla.suse.com/964950" source="BUGZILLA"/>
		<reference ref_id="965112" ref_url="https://bugzilla.suse.com/965112" source="BUGZILLA"/>
		<reference ref_id="965156" ref_url="https://bugzilla.suse.com/965156" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967090" ref_url="https://bugzilla.suse.com/967090" source="BUGZILLA"/>
		<reference ref_id="967101" ref_url="https://bugzilla.suse.com/967101" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="968004" ref_url="https://bugzilla.suse.com/968004" source="BUGZILLA"/>
		<reference ref_id="969351" ref_url="https://bugzilla.suse.com/969351" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="973631" ref_url="https://bugzilla.suse.com/973631" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="976470" ref_url="https://bugzilla.suse.com/976470" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2016-3712: Integer overflow in the VGA module allowed local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode (bsc#978160).
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)

- CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (boo#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716)
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164)
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038)
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188)
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130)
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138)
- CVE-2016-2841: The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control (bsc#969351)
- CVE-2016-2538: Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) allowed local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function (bsc#968004).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967101)
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967090)
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315)
- CVE-2016-2271: VMX in Xen, when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317)
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#965156).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#965112)
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bsc#964929).
- CVE-2015-5278: Infinite loop in ne2000_receive() function allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#964947)
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bsc#964950).
- CVE-2015-8345: The i8255x (PRO100) emulation support was vulnerable to an infinite loop issue that allowed a privileged (CAP_SYS_RAWIO) user inside guest to crash the Qemu instance resulting in DoS (bsc#956832)
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#964644)
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bsc#964746).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#964925)
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#964431).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#964452)
- CVE-2016-1981: A:infinite loop in start_xmit and e1000_receive_iov routines allowed a privileged user inside the guest to crash the Qemu instance resulting in DoS (bsc#963783)
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#962758)
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#962642)
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#962627)
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#962611)
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#962335)
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#962360)
- CVE-2016-1714: The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c when built with the Firmware Configuration device emulation support, allowed guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration (bsc#961692)
- CVE-2016-1568: Use-after-free vulnerability in hw/ide/ahci.c, when built with IDE AHCI Emulation support, allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command (bsc#961332).
- CVE-2016-1571: The paging_invlpg function in include/asm-x86/paging.h in Xen when using shadow mode paging or nested virtualization is enabled, allowed local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check (bsc#960862)
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2015-8743: A OOB memory access in ioport r/w functions allowed a privileged (CAP_SYS_RAWIO) user/process to use this flaw to leak or corrupt Qemu memory bytes (bsc#960726)
- CVE-2015-8550: Xen, when used on a system providing PV backends, allowed local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability (bsc#957988)
- CVE-2015-8558: The ehci_process_itd function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list (bsc#959006).
- CVE-2015-8504: The VNC display driver support was vulnerable to an arithmetic exception flaw that allowed a privileged remote client to crash the guest resulting in DoS (bsc#958493)
- CVE-2015-8554: Buffer overflow in hw/pt-msi.c in Xen, when using the qemu-xen-traditional (aka qemu-dm) device model, allowed local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a 'write path.' (bsc#958007)
- CVE-2015-8555: Xen did not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allowed local guest domains to obtain sensitive information from other domains via unspecified vectors (bsc#958009)
- CVE-2016-9932: CMPXCHG8B emulation failed to ignore operand size override which could have lead to information disclosure.
- CVE-2016-10013: A Mishandling of SYSCALL singlestep during emulation which could have lead to privilege escalation.
- bsc#958523: ioreq handling possibly susceptible to multiple read issue leading to DoS or worse, depending on the configuration
- CVE-2016-10024: bsc#1014298: PV guests may have been able to mask interrupts causing a Denial of Service.

These non-security issues were fixed:

- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit
- bsc#954872: script block-dmmd not working as expected 
- bsc#959928: xm domstate - when DomU is in state running xm domstate returned nothing
- bsc#959695: Added missing docs for xen
- bsc#967630: Fixed discrepancy in reported memory size with correction XSA-153 for xend
- bsc#963161: Windows VM was getting stuck during load while a VF was assigned to it 
- bsc#976470: Xend failed to start 
- bsc#961600: Fixed poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#978413: PV guest upgrade from SLES11SP4 to SLES12SP2 alpha3 failed on SLES11SP4 xen host.
- bsc#985503: vif-route broken

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-09"/>
	<updated date="2017-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964431">SUSE bug 964431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973631">SUSE bug 973631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976470">SUSE bug 976470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581566" comment="xen-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581567" comment="xen-doc-html-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581568" comment="xen-doc-pdf-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581569" comment="xen-kmp-default-4.2.5_21_3.0.101_0.113.TDC-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581570" comment="xen-libs-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581571" comment="xen-tools-4.2.5_21-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581572" comment="xen-tools-domU-4.2.5_21-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41155" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-10013: Xen allowed local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation (bsc#1016340).
- CVE-2016-9932: CMPXCHG8B emulation on x86 systems allowed local HVM guest OS users to obtain sensitive information from host stack memory via a 'supposedly-ignored' operand size prefix (bsc#1012651).
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-10024: Xen allowed local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations (bsc#1014298)

This non-security issue was fixed:

- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581573" comment="xen-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581574" comment="xen-doc-html-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581575" comment="xen-doc-pdf-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581576" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.96-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569296" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.96-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581577" comment="xen-libs-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581578" comment="xen-libs-32bit-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581579" comment="xen-tools-4.2.5_21-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581580" comment="xen-tools-domU-4.2.5_21-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41156" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)

This non-security issue was fixed:

- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581581" comment="xen-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581582" comment="xen-doc-html-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581583" comment="xen-doc-pdf-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581584" comment="xen-kmp-default-4.2.5_21_3.0.101_0.116.TDC-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581585" comment="xen-libs-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581586" comment="xen-tools-4.2.5_21-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581587" comment="xen-tools-domU-4.2.5_21-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41157" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581588" comment="xen-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581589" comment="xen-doc-html-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581590" comment="xen-doc-pdf-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581591" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569300" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581592" comment="xen-libs-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581593" comment="xen-libs-32bit-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581594" comment="xen-tools-4.2.5_21-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581595" comment="xen-tools-domU-4.2.5_21-38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41158" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581596" comment="xen-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581597" comment="xen-doc-html-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581598" comment="xen-doc-pdf-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581599" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581600" comment="xen-libs-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581601" comment="xen-tools-4.2.5_21-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581602" comment="xen-tools-domU-4.2.5_21-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41159" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<description>

This update for xen fixes the following security issues:

- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035483).
- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- Incorrect checks when handling exceptions allowed a malicious or buggy 64-bit PV guest to modify part of a physical memory page not belonging to it, potentially allowing for all of privilege escalation, host or other guest crashes, and information leaks (XSA-215, bsc#1034845)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2017-7995: Incorrect address range validation potentially allowing PV guests to access MMIO memory with read side effects (bsc#1033948).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581603" comment="xen-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581604" comment="xen-doc-html-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581605" comment="xen-doc-pdf-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581606" comment="xen-kmp-default-4.2.5_21_3.0.101_0.119.TDC-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581607" comment="xen-libs-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581608" comment="xen-tools-4.2.5_21-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581609" comment="xen-tools-domU-4.2.5_21-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41160" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1033948" ref_url="https://bugzilla.suse.com/1033948" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several security issues:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581610" comment="xen-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581611" comment="xen-doc-html-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581612" comment="xen-doc-pdf-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581613" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569304" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581614" comment="xen-libs-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581615" comment="xen-libs-32bit-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581616" comment="xen-tools-4.2.5_21-41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581617" comment="xen-tools-domU-4.2.5_21-41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41161" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581618" comment="xen-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581619" comment="xen-doc-html-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581620" comment="xen-doc-pdf-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581621" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.102-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569308" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.102-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581622" comment="xen-libs-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581623" comment="xen-libs-32bit-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581624" comment="xen-tools-4.2.5_21-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581625" comment="xen-tools-domU-4.2.5_21-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41162" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<description>
This update for xen fixes the following security issues:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581626" comment="xen-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581627" comment="xen-doc-html-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581628" comment="xen-doc-pdf-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581629" comment="xen-kmp-default-4.2.5_21_3.0.101_0.122.TDC-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581630" comment="xen-libs-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581631" comment="xen-tools-4.2.5_21-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581632" comment="xen-tools-domU-4.2.5_21-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41163" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-8905: Fixed a memory corruption via a failsafe callback, which might
  have allowed PV guest OS users to execute arbitrary code on the host OS
  (XSA-215, bsc#1034845).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581633" comment="xen-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581634" comment="xen-doc-html-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581635" comment="xen-doc-pdf-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581636" comment="xen-kmp-default-4.2.5_21_3.0.101_0.125.TDC-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581637" comment="xen-libs-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581638" comment="xen-tools-4.2.5_21-47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581639" comment="xen-tools-domU-4.2.5_21-47.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41164" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-04"/>
	<updated date="2017-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581640" comment="xen-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581641" comment="xen-doc-html-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581642" comment="xen-doc-pdf-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581643" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569312" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581644" comment="xen-libs-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581645" comment="xen-libs-32bit-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581646" comment="xen-tools-4.2.5_21-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581647" comment="xen-tools-domU-4.2.5_21-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41165" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581648" comment="xen-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581649" comment="xen-doc-html-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581650" comment="xen-doc-pdf-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581651" comment="xen-kmp-default-4.2.5_21_3.0.101_0.126.5.TDC-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581652" comment="xen-libs-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581653" comment="xen-tools-4.2.5_21-47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581654" comment="xen-tools-domU-4.2.5_21-47.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41166" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581655" comment="xen-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581656" comment="xen-doc-html-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581657" comment="xen-doc-pdf-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581658" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.105-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569316" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.105-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581659" comment="xen-libs-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581660" comment="xen-libs-32bit-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581661" comment="xen-tools-4.2.5_21-45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581662" comment="xen-tools-domU-4.2.5_21-45.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41167" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-20"/>
	<updated date="2017-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581663" comment="xen-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581664" comment="xen-doc-html-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581665" comment="xen-doc-pdf-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581666" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.5-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569320" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.5-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581667" comment="xen-libs-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581668" comment="xen-libs-32bit-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581669" comment="xen-tools-4.2.5_21-45.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581670" comment="xen-tools-domU-4.2.5_21-45.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41168" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581671" comment="xen-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581672" comment="xen-doc-html-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581673" comment="xen-doc-pdf-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581674" comment="xen-kmp-default-4.2.5_21_3.0.101_0.132.TDC-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581675" comment="xen-libs-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581676" comment="xen-tools-4.2.5_21-47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581677" comment="xen-tools-domU-4.2.5_21-47.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41169" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581678" comment="xen-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581679" comment="xen-doc-html-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581680" comment="xen-doc-pdf-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581681" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.8-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569324" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.8-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581682" comment="xen-libs-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581683" comment="xen-libs-32bit-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581684" comment="xen-tools-4.2.5_21-45.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581685" comment="xen-tools-domU-4.2.5_21-45.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41170" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581686" comment="xen-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581687" comment="xen-doc-html-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581688" comment="xen-doc-pdf-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581689" comment="xen-kmp-default-4.2.5_21_3.0.101_0.139.TDC-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581690" comment="xen-libs-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581691" comment="xen-tools-4.2.5_21-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581692" comment="xen-tools-domU-4.2.5_21-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41171" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an
  integer overflow flaw allowing a privileged user to crash the Qemu process on
  the host resulting in DoS (bsc#1024307)
- Unprivileged domains could have issued well-timed writes to xenstore which
  conflict with transactions to stall progress of the control domain or driver
  domain, possibly leading to DoS (bsc#1030144, XSA-206).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581693" comment="xen-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581694" comment="xen-doc-html-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581695" comment="xen-doc-pdf-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581696" comment="xen-kmp-default-4.2.5_21_3.0.101_0.150.TDC-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581697" comment="xen-libs-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581698" comment="xen-tools-4.2.5_21-47.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581699" comment="xen-tools-domU-4.2.5_21-47.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41172" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an
  integer overflow flaw allowing a privileged user to crash the Qemu process on
  the host resulting in DoS (bsc#1024307)
- Unprivileged domains could have issued well-timed writes to xenstore which
  conflict with transactions to stall progress of the control domain or driver
  domain, possibly leading to DoS (bsc#1030144, XSA-206).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581700" comment="xen-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581701" comment="xen-doc-html-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581702" comment="xen-doc-pdf-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581703" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.14-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569328" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.14-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581704" comment="xen-libs-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581705" comment="xen-libs-32bit-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581706" comment="xen-tools-4.2.5_21-45.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581707" comment="xen-tools-domU-4.2.5_21-45.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41173" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-10"/>
	<updated date="2018-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581708" comment="xen-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581709" comment="xen-doc-html-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581710" comment="xen-doc-pdf-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581711" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569332" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581712" comment="xen-libs-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581713" comment="xen-libs-32bit-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581714" comment="xen-tools-4.2.5_21-45.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581715" comment="xen-tools-domU-4.2.5_21-45.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41174" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581716" comment="xen-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581717" comment="xen-doc-html-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581718" comment="xen-doc-pdf-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581719" comment="xen-kmp-default-4.2.5_21_3.0.101_0.156.TDC-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581720" comment="xen-libs-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581721" comment="xen-tools-4.2.5_21-47.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581722" comment="xen-tools-domU-4.2.5_21-47.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41175" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097206" ref_url="https://bugzilla.suse.com/1097206" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<description>

This update for xen fixes the following issues:

These security issue were fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- CVE-2018-12617: An integer overflow that could cause a segmentation
  fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was
  fixed (bsc#1098744)
- CVE-2018-3665: System software utilizing Lazy FP state restore technique
  on systems using Intel Core-based microprocessors may potentially allow
  a local process to infer data from another process through a speculative
  execution side channel. (bsc#1095242)
- CVE-2018-3639: Systems with microprocessors utilizing speculative
  execution and speculative execution of memory reads before the addresses
  of all prior memory writes are known may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)
- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5753: Systems with microprocessors utilizing speculative
  execution and branch prediction may allow unauthorized disclosure of
  information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5754: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis of the data cache. (bsc#1074562)
- CVE-2018-12891: Certain PV MMU operations may take a long time to
  process. For that reason Xen explicitly checks for the need to preempt
  the current vCPU at certain points. A few rarely taken code paths did
  bypass such checks. By suitably enforcing the conditions through its own
  page table contents, a malicious guest may cause such bypasses to be used
  for an unbounded number of iterations. A malicious or buggy PV guest may
  cause a Denial of Service (DoS) affecting the entire host. Specifically,
  it may prevent use of a physical CPU for an indeterminate period of
  time. (bsc#1097521)
- CVE-2018-12893:  One of the fixes in XSA-260 added some safety checks
  to help prevent Xen livelocking with debug exceptions. Unfortunately,
  due to an oversight, at least one of these safety checks can be
  triggered by a guest. A malicious PV guest can crash Xen, leading to
  a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86
  HVM and PVH guests cannot exploit the vulnerability. An attacker
  needs to be able to control hardware debugging facilities to exploit
  the vulnerability, but such permissions are typically available to
  unprivileged users. (bsc#1097522)
- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer
  overflow via incoming fragmented datagrams. (bsc#1096224)
- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest
  OS users to cause a denial of service (unexpectedly high interrupt
  number, array overrun, and hypervisor crash) or possibly gain hypervisor
  privileges by setting up an HPET timer to deliver interrupts in IO-APIC
  mode, aka vHPET interrupt injection. (bsc#1090822)
- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM
  guest OS users to cause a denial of service (host OS infinite loop) in
  situations where a QEMU device model attempts to make invalid transitions
  between states of a request. (bsc#1090823)

Following bugs were fixed:

- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)
- bsc#1079730 - in xen-kmp, unplug emulated devices after migration
  This is required since xen-4.10 and/or qemu-2.10 because the state
  of unplug is not propagated from one dom0 to another. Without
  this unplug qemu's block-backend will be unable to open qcow2
  disks on the receiving dom0
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-24"/>
	<updated date="2018-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097206">SUSE bug 1097206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581723" comment="xen-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581724" comment="xen-doc-html-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581725" comment="xen-doc-pdf-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581726" comment="xen-kmp-default-4.2.5_21_3.0.101_0.181.TDC-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581727" comment="xen-libs-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581728" comment="xen-tools-4.2.5_21-47.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581729" comment="xen-tools-domU-4.2.5_21-47.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41176" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097206" ref_url="https://bugzilla.suse.com/1097206" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

These security issue were fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- CVE-2018-12617: An integer overflow that could cause a segmentation
  fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was
  fixed (bsc#1098744)
- CVE-2018-3665: System software utilizing Lazy FP state restore technique
  on systems using Intel Core-based microprocessors may potentially allow
  a local process to infer data from another process through a speculative
  execution side channel. (bsc#1095242)
- CVE-2018-3639: Systems with microprocessors utilizing speculative
  execution and speculative execution of memory reads before the addresses
  of all prior memory writes are known may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)
- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5753: Systems with microprocessors utilizing speculative
  execution and branch prediction may allow unauthorized disclosure of
  information to an attacker with local user access via a side-channel
  analysis. (bsc#1074562)
- CVE-2017-5754: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis of the data cache. (bsc#1074562)
- CVE-2018-12891: Certain PV MMU operations may take a long time to
  process. For that reason Xen explicitly checks for the need to preempt
  the current vCPU at certain points. A few rarely taken code paths did
  bypass such checks. By suitably enforcing the conditions through its own
  page table contents, a malicious guest may cause such bypasses to be used
  for an unbounded number of iterations. A malicious or buggy PV guest may
  cause a Denial of Service (DoS) affecting the entire host. Specifically,
  it may prevent use of a physical CPU for an indeterminate period of
  time. (bsc#1097521)
- CVE-2018-12893:  One of the fixes in XSA-260 added some safety checks
  to help prevent Xen livelocking with debug exceptions. Unfortunately,
  due to an oversight, at least one of these safety checks can be
  triggered by a guest. A malicious PV guest can crash Xen, leading to
  a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86
  HVM and PVH guests cannot exploit the vulnerability. An attacker
  needs to be able to control hardware debugging facilities to exploit
  the vulnerability, but such permissions are typically available to
  unprivileged users. (bsc#1097522)
- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer
  overflow via incoming fragmented datagrams. (bsc#1096224)
- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest
  OS users to cause a denial of service (unexpectedly high interrupt
  number, array overrun, and hypervisor crash) or possibly gain hypervisor
  privileges by setting up an HPET timer to deliver interrupts in IO-APIC
  mode, aka vHPET interrupt injection. (bsc#1090822)
- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)

Following bugs were fixed:

- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)
- bsc#1079730 - in xen-kmp, unplug emulated devices after migration
  This is required since xen-4.10 and/or qemu-2.10 because the state
  of unplug is not propagated from one dom0 to another. Without
  this unplug qemu's block-backend will be unable to open qcow2
  disks on the receiving dom0
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097206">SUSE bug 1097206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581730" comment="xen-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581731" comment="xen-doc-html-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581732" comment="xen-doc-pdf-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581733" comment="xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569336" comment="xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581734" comment="xen-libs-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581735" comment="xen-libs-32bit-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581736" comment="xen-tools-4.2.5_21-45.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581737" comment="xen-tools-domU-4.2.5_21-45.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41177" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1110924" ref_url="https://bugzilla.suse.com/1110924" source="BUGZILLA"/>
		<reference ref_id="1111007" ref_url="https://bugzilla.suse.com/1111007" source="BUGZILLA"/>
		<reference ref_id="1111011" ref_url="https://bugzilla.suse.com/1111011" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1112188" ref_url="https://bugzilla.suse.com/1112188" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 	  

- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-18849: Fixed an out of bounds memory access issue was found in the 
  LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin (bsc#1114423).
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18438: Fixed an integer overflow in ccid_card_vscard_read function which could allow memory corruption (bsc#1112188).
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
  pcnet component (bsc#1111011).
- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040).
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
  leading to a denial of service (DoS) (bsc#1111014).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2018-17958: Fixed an integer overflow  which could lead to buffer overflow (bsc#1111007).
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
  the ne2000 component (bsc#1110924).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- CVE-2018-19966: Fixed issue introduced by XSA-240 that could have caused conflicts with shadow paging (XSA-280)(bsc#1115047).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581738" comment="xen-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581739" comment="xen-doc-html-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581740" comment="xen-doc-pdf-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581741" comment="xen-kmp-default-4.2.5_21_3.0.101_0.190.TDC-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581742" comment="xen-libs-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581743" comment="xen-tools-4.2.5_21-47.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581744" comment="xen-tools-domU-4.2.5_21-47.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41178" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047675" ref_url="https://bugzilla.suse.com/1047675" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1135905" ref_url="https://bugzilla.suse.com/1135905" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1145652" ref_url="https://bugzilla.suse.com/1145652" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
- CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652).
- CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which
  could have led to denial of service (bsc#1135905).
- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- CVE-2017-10806: Fixed a stack buffer overflow in debug logging (bsc#1047675).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581745" comment="xen-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581746" comment="xen-doc-html-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581747" comment="xen-doc-pdf-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581748" comment="xen-kmp-default-4.2.5_21_3.0.101_0.219.TDC-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581749" comment="xen-libs-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581750" comment="xen-tools-4.2.5_21-47.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581751" comment="xen-tools-domU-4.2.5_21-47.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41179" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues
- bsc#1161181 - CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host
- bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation
- bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change operations
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581752" comment="xen-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581753" comment="xen-doc-html-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581754" comment="xen-doc-pdf-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581755" comment="xen-kmp-default-4.2.5_22_3.0.101_0.238.TDC-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581756" comment="xen-libs-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581757" comment="xen-tools-4.2.5_22-47.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581758" comment="xen-tools-domU-4.2.5_22-47.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41180" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178935 - CVE-2020-25723: xen: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- bsc#1177409 - CVE-2020-27674: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1111331 -  CPU issues Q2 2019 aka 'Group 4' CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
- bsc#1154461 - CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment
- bsc#1155945 - CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue)
- bsc#1157888 - CVE-2019-19579: Device quarantine for alternate pci assignment methods
- bsc#1158004 - CVE-2019-19583: VMX: VMentry failure with debug exceptions and blocked states
- bsc#1158005 - CVE-2019-19578: Linear pagetable use / entry miscounts
- bsc#1158006 - CVE-2019-19580: Further issues with restartable PV type change operations
- bsc#1158007 - CVE-2019-19577: dynamic height for the IOMMU pagetables 
- bsc#1172205 - CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (XSA-320)
- bsc#1173378 - CVE-2020-15565: insufficient cache write- back under VT-d
- bsc#1173380 - CVE-2020-15567: non-atomic modification of live EPT PTE
- bsc#1176343 - CVE-2020-25604: race when migrating timers between x86 HVM vCPU-s (XSA-336)
- bsc#1176344 - CVE-2020-25595: PCI passthrough code reading back hardware registers (XSA-337)
- bsc#1176345 - CVE-2020-25596: x86 pv guest kernel DoS via SYSENTER (XSA-339)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel
- bsc#1175534 - CVE-2020-14364: usb: out-of-bounds r/w access issue while processing usb packets
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581759" comment="xen-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581760" comment="xen-doc-html-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581761" comment="xen-doc-pdf-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581762" comment="xen-kmp-default-4.2.5_24_3.0.101_0.238.TDC-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581763" comment="xen-libs-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581764" comment="xen-tools-4.2.5_24-47.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581765" comment="xen-tools-domU-4.2.5_24-47.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41181" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#1179496 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324).
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477).

Non-security issues fixed:

- bsc#1022555 - L3: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827 - Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581766" comment="xen-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581767" comment="xen-doc-html-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581768" comment="xen-doc-pdf-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581769" comment="xen-kmp-default-4.2.5_26_3.0.101_0.241.TDC-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581770" comment="xen-libs-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581771" comment="xen-tools-4.2.5_26-47.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581772" comment="xen-tools-domU-4.2.5_26-47.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41182" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="808085" ref_url="https://bugzilla.suse.com/808085" source="BUGZILLA"/>
		<reference ref_id="808269" ref_url="https://bugzilla.suse.com/808269" source="BUGZILLA"/>
		<reference ref_id="817210" ref_url="https://bugzilla.suse.com/817210" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<description>

The Xen hypervisor and toolset has been updated to 4.2.2_06 to fix various 
bugs and security issues:

The following security issues have been addressed:

    * CVE-2013-2194: Various integer overflows in the ELF loader were
      fixed. (XSA-55)
    * CVE-2013-2195: Various pointer dereferences issues in the ELF loader
      were fixed. (XSA-55)
    * CVE-2013-2196: Various other problems in the ELF loader were fixed.
      (XSA-55)
    * CVE-2013-2078: A Hypervisor crash due to missing exception recovery
      on XSETBV was fixed. (XSA-54)
    * CVE-2013-2077: A Hypervisor crash due to missing exception recovery
      on XRSTOR was fixed. (XSA-53)
    * CVE-2013-2211: libxl allowed guest write access to sensitive console
      related xenstore keys. (XSA-57)
    * CVE-2013-2076: An information leak on XSAVE/XRSTOR capable AMD CPUs
      (XSA-52) was fixed, where parts of this state could leak to other
      VMs.

Also the following bugs have been fixed:

    * performance issues in mirror lvm (bnc#801663)
    * aacraid driver panics mapping INT A when booting kernel-xen
      (bnc#808085)
    * Fully Virtualized Windows VM install failed on Ivy Bridge platforms
      with Xen kernel (bnc#808269)
    * Did not boot with i915 graphics controller with VT-d enabled
      (bnc#817210)

Security Issue references:

    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-15"/>
	<updated date="2013-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808085">SUSE bug 808085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808269">SUSE bug 808269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817210">SUSE bug 817210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41183" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="817799" ref_url="https://bugzilla.suse.com/817799" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="835896" ref_url="https://bugzilla.suse.com/835896" source="BUGZILLA"/>
		<reference ref_id="836239" ref_url="https://bugzilla.suse.com/836239" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="842512" ref_url="https://bugzilla.suse.com/842512" source="BUGZILLA"/>
		<reference ref_id="842513" ref_url="https://bugzilla.suse.com/842513" source="BUGZILLA"/>
		<reference ref_id="842514" ref_url="https://bugzilla.suse.com/842514" source="BUGZILLA"/>
		<reference ref_id="842515" ref_url="https://bugzilla.suse.com/842515" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.2.3 c/s 26170, fixing various bugs and 
security issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-4369: XSA-68: Fixed possible null dereference when parsing
      vif ratelimiting info
    * CVE-2013-4370: XSA-69: Fixed misplaced free in ocaml
      xc_vcpu_getaffinity stub
    * CVE-2013-4371: XSA-70: Fixed use-after-free in libxl_list_cpupool
      under memory pressure
    * CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-1432: XSA-58: Page reference counting error due to
      XSA-45/CVE-2013-1918 fixes.

Various bugs have also been fixed:

    * Boot failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage, xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform with xen environment, xen hypervisor
      will panic on multiple blades nPar. (bnc#839600)
    * vcpus not started after upgrading Dom0 from SLES 11 SP2 to SP3
      (bnc#835896)
    * SLES 11 SP3 Xen security patch does not automatically update UEFI
      boot binary (bnc#836239)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * SLES 9 SP4 guest fails to start after upgrading to SLES 11 SP3
      (bnc#817799)
    * Various upstream fixes have been included.

Security Issues:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4369
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369&gt;
    * CVE-2013-4370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370&gt;
    * CVE-2013-4371
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/817799">SUSE bug 817799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835896">SUSE bug 835896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836239">SUSE bug 836239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41184" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849665" ref_url="https://bugzilla.suse.com/849665" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="851386" ref_url="https://bugzilla.suse.com/851386" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<description>

The Xen hypervisor and tool-suite have been updated to fix security issues 
and bugs:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.
    * CVE-2013-4553: XSA-74: A lock order reversal between page_alloc_lock
      and mm_rwlock could lead to deadlocks.
    * CVE-2013-4554: XSA-76: Hypercalls exposed to privilege rings 1 and 2
      of HVM guests which might lead to Hypervisor escalation under
      specific circumstances.
    * CVE-2013-6375: XSA-78: Insufficient TLB flushing in VT-d (iommu) code
      could lead to access of memory that was revoked.
    * CVE-2013-4551: XSA-75: A host crash due to guest VMX instruction
      execution was fixed.

Non-security bugs have also been fixed:

    * bnc#840997: It is possible to start a VM twice on the same node.
    * bnc#842417: In HP's UEFI x86_64 platform and SLES 11-SP3, dom0 will
      could lock-up on multiple blades nPar.
    * bnc#848014: Xen Hypervisor panics on 8-blades nPar with 46-bit memory
      addressing.
    * bnc#846849: Soft lock-up with PCI pass-through and many VCPUs.
    * bnc#833483: Boot Failure with Xen kernel in UEFI mode with error 'No
      memory for trampoline'.
    * Increase the maximum supported CPUs in the Hypervisor to 512.

Security Issues:

    * CVE-2013-1922
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922&gt;
    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4551
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-27"/>
	<updated date="2013-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851386">SUSE bug 851386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41185" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="853048" ref_url="https://bugzilla.suse.com/853048" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="858311" ref_url="https://bugzilla.suse.com/858311" source="BUGZILLA"/>
		<reference ref_id="860092" ref_url="https://bugzilla.suse.com/860092" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860165" ref_url="https://bugzilla.suse.com/860165" source="BUGZILLA"/>
		<reference ref_id="860300" ref_url="https://bugzilla.suse.com/860300" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="863297" ref_url="https://bugzilla.suse.com/863297" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1642" ref_url="https://www.suse.com/security/cve/CVE-2014-1642/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1895" ref_url="https://www.suse.com/security/cve/CVE-2014-1895/" source="CVE"/>
		<reference ref_id="CVE-2014-1896" ref_url="https://www.suse.com/security/cve/CVE-2014-1896/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 3 Xen hypervisor and 
toolset has been updated to 4.2.4 to fix various bugs and security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when using Intel VT-d and
      a PCI device has been assigned, does not clear the flag that
      suppresses IOMMU TLB flushes when unspecified errors occur, which
      causes the TLB entries to not be flushed and allows local guest
      administrators to cause a denial of service (host crash) or gain
      privileges via unspecified vectors. (bnc#853048)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and 4.3.x, when
      using device passthrough and configured to support a large number of
      CPUs, frees certain memory that may still be intended for use, which
      allows local guest administrators to cause a denial of service
      (memory corruption and hypervisor crash) and possibly execute
      arbitrary code via vectors related to an out-of-memory error that
      triggers a (1) use-after-free or (2) double free. (bnc#860092)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-85: CVE-2014-1895: The FLASK_AVC_CACHESTAT hypercall, which
      provides access to per-cpu statistics on the Flask security policy,
      incorrectly validates the CPU for which statistics are being
      requested. (bnc#860165)

    * 

      XSA-86: CVE-2014-1896: libvchan (a library for inter-domain
      communication) does not correctly handle unusual or malicious
      contents in the xenstore ring. A malicious guest can exploit this to
      cause a libvchan-using facility to read or write past the end of the
      ring. (bnc#860300)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

Also the following non-security bugs have been fixed:

    * Fixed boot problems with Xen kernel. '(XEN) setup 0000:00:18.0 for d0
      failed (-19)' (bnc#858311)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * Fixed Xen hypervisor panic in HP's UEFI x86_64 platform and with xen
      environment, in booting stage. (bnc#833251)
    * xend/pvscsi: recognize also SCSI CDROM devices (bnc#863297)
    * pygrub: Support (/dev/xvda) style disk specifications

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-6400
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895&gt;
    * CVE-2014-1896
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-27"/>
	<updated date="2014-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858311">SUSE bug 858311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863297">SUSE bug 863297</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1642/">CVE-2014-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1895/">CVE-2014-1895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1896/">CVE-2014-1896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41186" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="798770" ref_url="https://bugzilla.suse.com/798770" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842006" ref_url="https://bugzilla.suse.com/842006" source="BUGZILLA"/>
		<reference ref_id="858178" ref_url="https://bugzilla.suse.com/858178" source="BUGZILLA"/>
		<reference ref_id="862608" ref_url="https://bugzilla.suse.com/862608" source="BUGZILLA"/>
		<reference ref_id="864801" ref_url="https://bugzilla.suse.com/864801" source="BUGZILLA"/>
		<reference ref_id="865682" ref_url="https://bugzilla.suse.com/865682" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="878841" ref_url="https://bugzilla.suse.com/878841" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="881900" ref_url="https://bugzilla.suse.com/881900" source="BUGZILLA"/>
		<reference ref_id="882092" ref_url="https://bugzilla.suse.com/882092" source="BUGZILLA"/>
		<reference ref_id="891539" ref_url="https://bugzilla.suse.com/891539" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to fix 
various bugs and security issues.

The following security issues have been fixed:

    * XSA-108: CVE-2014-7188: Improper MSR range used for x2APIC emulation
      (bnc#897657)
    * XSA-106: CVE-2014-7156: Missing privilege level checks in x86
      emulation of software interrupts (bnc#895802)
    * XSA-105: CVE-2014-7155: Missing privilege level checks in x86 HLT,
      LGDT, LIDT, and LMSW emulation (bnc#895799)
    * XSA-104: CVE-2014-7154: Race condition in HVMOP_track_dirty_vram
      (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)
    * XSA-96: CVE-2014-3967, CVE-2014-3968: Vulnerabilities in HVM MSI
      injection (bnc#878841)
    * XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not preemptible
      (bnc#867910)
    * XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer overflow
      (bnc#842006)
    * CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load
      (bnc#864801)

The following non-security issues have been fixed:

    * xend: Fix netif convertToDeviceNumber for running domains
      (bnc#891539)
    * Installing SLES12 as a VM on SLES11 SP3 fails because of btrfs in the
      VM (bnc#882092)
    * XEN kernel panic do_device_not_available() (bnc#881900)
    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * SLES 11 SP3 vm-install should get RHEL 7 support when released
      (bnc#862608)
    * SLES 11 SP3 XEN kiso version cause softlockup on 8 blades npar(480
      cpu) (bnc#858178)
    * Local attach support for PHY backends using scripts
      local_attach_support_for_phy.patch (bnc#865682)
    * Improve multipath support for npiv devices block-npiv (bnc#798770)

Security Issues:

    * CVE-2013-4344
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344&gt;
    * CVE-2013-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-3967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967&gt;
    * CVE-2014-3968
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/798770">SUSE bug 798770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858178">SUSE bug 858178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862608">SUSE bug 862608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865682">SUSE bug 865682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881900">SUSE bug 881900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882092">SUSE bug 882092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891539">SUSE bug 891539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41187" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919341" ref_url="https://bugzilla.suse.com/919341" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Fully virtualized guest install from network source failed with
      'cannot find guest domain' in XEN. (bsc#919341)

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919341">SUSE bug 919341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41188" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932790" ref_url="https://bugzilla.suse.com/932790" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix seven security vulnerabilities:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bnc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bnc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bnc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bnc#931628)
    * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
      (XSA-134, bnc#932790)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bnc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bnc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41189" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:
      
- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41190" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41191" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41192" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41193" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="855685" ref_url="https://bugzilla.suse.com/855685" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

The multiplexing system xinetd was updated to fix security issues and a 
bug.

Security issues fixed:

    * CVE-2013-4342: xinetd ignores user and group directives for tcpmux
      services.
    * CVE-2012-0862: xinetd enables all services when tcp multiplexing is
      used.

Bug fixed:

    * Services started by xinetd were limited to 1024 open file
      descriptors. (bnc#855685)

Security Issues references:

    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;
    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581774" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581774" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581774" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41194" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581775" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581776" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581777" comment="xorg-x11-libs-x86-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581775" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581776" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581777" comment="xorg-x11-libs-x86-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581775" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581776" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581777" comment="xorg-x11-libs-x86-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41195" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575662" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575663" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41196" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues.

Bug 815451/821664

CVE-2013-1981 CVE-2013-1997 CVE-2013-2004

Security Issues:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577080" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577081" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577082" comment="xorg-x11-libX11-x86-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41197" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41198" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575666" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575667" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41199" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575668" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575669" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41200" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581781" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581782" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581781" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581782" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41201" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575672" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575673" comment="xorg-x11-libX11-32bit-7.4-5.11.72.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41202" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575674" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575675" comment="xorg-x11-libX11-32bit-7.4-5.11.72.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41203" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575676" comment="xorg-x11-libX11-7.4-5.11.72.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575677" comment="xorg-x11-libX11-32bit-7.4-5.11.72.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41204" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182506" ref_url="https://bugzilla.suse.com/1182506" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575678" comment="xorg-x11-libX11-7.4-5.11.72.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575679" comment="xorg-x11-libX11-32bit-7.4-5.11.72.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41205" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575680" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575681" comment="xorg-x11-libX11-32bit-7.4-5.11.72.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41206" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575682" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565566" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41207" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues.

Bug 815451/821665 CVE-2013-1982

Security Issues:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581783" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581784" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581785" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581783" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581784" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581785" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581783" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581784" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581785" comment="xorg-x11-libXext-x86-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41208" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixed a integer overflow issue.

Bug 815451/821667 CVE-2013-1983

Security Issues:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581786" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581787" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581788" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581786" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581787" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581788" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581786" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581787" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581788" comment="xorg-x11-libXfixes-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41209" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575687" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575688" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41210" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues.

Bug 815451/821668 CVE-2013-2062

Security Issues:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577089" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577090" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577091" comment="xorg-x11-libXp-x86-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41211" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575691" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575692" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41212" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues.

Bug 815451/821669 CVE-2013-1987

Security Issues:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581789" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581790" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581791" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581789" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581790" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581791" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581789" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581790" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581791" comment="xorg-x11-libXrender-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41213" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575695" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575696" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41214" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues.

Bug 815451/821670 CVE-2013-2002/CVE-2013-2005

Security Issues:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581792" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581793" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581794" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581792" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581793" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581794" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581792" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581793" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581794" comment="xorg-x11-libXt-x86-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41215" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues.

Bug 815451/821671 CVE-2013-1989/CVE-2013-2066

Security Issues:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581795" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581796" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581797" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581795" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581796" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581797" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581795" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581796" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581797" comment="xorg-x11-libXv-x86-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41216" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575701" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575702" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41217" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575703" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575704" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41218" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575705" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575706" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41219" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575707" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575708" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41220" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="981044" ref_url="https://bugzilla.suse.com/981044" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)

Non security issues:

- Use arc4random to generate cookies. (bsc#1025084)
- XDrawArc performance improvement (bsc#1019649)
- Fix byte swapping for gradeint stops (bsc#981044).
- Remove unused function with use-after-free issue. (bsc#1025035)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981044">SUSE bug 981044</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581798" comment="xorg-x11-Xvnc-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581799" comment="xorg-x11-server-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581800" comment="xorg-x11-server-extra-7.4-27.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41221" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581801" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581802" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581803" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581801" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581802" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581803" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41222" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<description>
This update for xorg-x11-server provides several fixes.

These security issues were fixed:

- CVE-2017-13723: Prevent local DoS via unusual characters in XkbAtomText and
  XkbStringText (bsc#1051150).
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581804" comment="xorg-x11-Xvnc-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581805" comment="xorg-x11-server-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581806" comment="xorg-x11-server-extra-7.4-27.122.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41223" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-LTSS</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1078383" ref_url="https://bugzilla.suse.com/1078383" source="BUGZILLA"/>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fix:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

Non security issues fixed:

- Do not write past the allocated buffer. (bsc#1078383)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078383">SUSE bug 1078383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581807" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581808" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581809" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581807" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581808" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581809" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41224" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581810" comment="xorg-x11-Xvnc-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581811" comment="xorg-x11-server-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581812" comment="xorg-x11-server-extra-7.4-27.122.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41225" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581813" comment="xorg-x11-Xvnc-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581814" comment="xorg-x11-server-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581815" comment="xorg-x11-server-extra-7.4-27.122.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41226" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581816" comment="xorg-x11-Xvnc-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581817" comment="xorg-x11-server-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581818" comment="xorg-x11-server-extra-7.4-27.122.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41227" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581819" comment="xorg-x11-Xvnc-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581820" comment="xorg-x11-server-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581821" comment="xorg-x11-server-extra-7.4-27.122.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41228" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659912" comment="xorg-x11-Xvnc-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659913" comment="xorg-x11-server-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659914" comment="xorg-x11-server-extra-7.4-27.122.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41229" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660947" comment="xorg-x11-Xvnc-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660948" comment="xorg-x11-server-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660949" comment="xorg-x11-server-extra-7.4-27.122.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41230" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP3</platform>
			<platform>SUSE Linux Enterprise Server for VMWare 11 SP3</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
		<cpe>cpe:/o:suse:sles:11:sp3:vmware</cpe>
		<cpe>cpe:/o:suse:sles_sap:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258810" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41231" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575745" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41232" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679343" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679344" comment="liblzma5-32bit-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679345" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679346" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41233" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="888838" ref_url="https://bugzilla.suse.com/888838" source="BUGZILLA"/>
		<reference ref_id="898525" ref_url="https://bugzilla.suse.com/898525" source="BUGZILLA"/>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<description>


This update for yast2-storage to version 2.17.147.1 fixes the following issues:

- Use stdin, not tmp files for passwords (bsc#986971, CVE-2016-5746)
- fixed setting disk label on multipath devices (bsc#898525)
- fixed used-by information for multipath with LVM (bsc#888838)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-14"/>
	<updated date="2016-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/888838">SUSE bug 888838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898525">SUSE bug 898525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581823" comment="yast2-storage-2.17.147.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581824" comment="yast2-storage-lib-2.17.147.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41234" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>

This update for zlib fixes the following issues:

  * Incompatible declarations for external linkage function deflate (bnc#1003577)
  * CVE-2016-9842: Undefined Left Shift of Negative Number (bnc#1003580) 
  * CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bnc#1003579)
  * CVE-2016-9843: Big-endian out-of-bounds pointer
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581825" comment="zlib-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581826" comment="zlib-32bit-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41235" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677179" comment="zlib-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677180" comment="zlib-32bit-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677951" comment="zlib-devel-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677952" comment="zlib-devel-32bit-1.2.7-0.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41236" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-1100: Fixed a buffer overflow in
  utils.c:checkmailpath() that could lead to local arbitrary code
  execution ( bsc#1089030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575752" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41237" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP3-TERADATA</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:11:sp3:teradata</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077550" comment="SUSE Linux Enterprise Server 11 SP3-TERADATA is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671293" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41238" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:
- Several coders were vulnerable to remote code execution attacks,
  these coders have now been disabled. They can be re-enabled by
  exporting the following environment variable
  MAGICK_CODER_MODULE_PATH=/usr/lib64/ImageMagick-6.4.3/modules-Q16/coders/vulnerable/
  (bsc#978061)
- CVE-2016-3714: Insufficient shell characters filtering leads to
  (potentially remote) code execution
- CVE-2016-3715: Possible file deletion by using ImageMagick's
  'ephemeral' pseudo protocol which deletes files after reading.
- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl'
  pseudo protocol with any extension in any folder.
- CVE-2016-3717: Possible local file read by using ImageMagick's 
  'label' pseudo protocol to get content of the files from the server.
- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make
  HTTP GET or FTP request.

Bugs fixed:
- Use external svg loader (rsvg)		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581827" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581828" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581827" comment="libMagickCore1-6.4.3.6-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581828" comment="libMagickCore1-32bit-6.4.3.6-7.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41239" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="978061" ref_url="https://bugzilla.suse.com/978061" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- bsc#978061: A vulnerability in ImageMagick's 'https' module allowed users to
execute arbitrary shell commands on the host performing the image conversion.
The issue had the potential for remote command injection. This update mitigates
the vulnerability by disabling all access to the 'https' module in the
'delegates.xml' config file. (CVE-2016-3714)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581829" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581830" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581829" comment="libMagickCore1-6.4.3.6-7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581830" comment="libMagickCore1-32bit-6.4.3.6-7.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41240" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="982178" ref_url="https://bugzilla.suse.com/982178" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues: 

- CVE-2016-5118: popen() shell vulnerability via filenames (bsc#982178)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581831" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581832" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581831" comment="libMagickCore1-6.4.3.6-7.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581832" comment="libMagickCore1-32bit-6.4.3.6-7.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41241" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983234" ref_url="https://bugzilla.suse.com/983234" source="BUGZILLA"/>
		<reference ref_id="983253" ref_url="https://bugzilla.suse.com/983253" source="BUGZILLA"/>
		<reference ref_id="983259" ref_url="https://bugzilla.suse.com/983259" source="BUGZILLA"/>
		<reference ref_id="983292" ref_url="https://bugzilla.suse.com/983292" source="BUGZILLA"/>
		<reference ref_id="983305" ref_url="https://bugzilla.suse.com/983305" source="BUGZILLA"/>
		<reference ref_id="983308" ref_url="https://bugzilla.suse.com/983308" source="BUGZILLA"/>
		<reference ref_id="983521" ref_url="https://bugzilla.suse.com/983521" source="BUGZILLA"/>
		<reference ref_id="983523" ref_url="https://bugzilla.suse.com/983523" source="BUGZILLA"/>
		<reference ref_id="983533" ref_url="https://bugzilla.suse.com/983533" source="BUGZILLA"/>
		<reference ref_id="983739" ref_url="https://bugzilla.suse.com/983739" source="BUGZILLA"/>
		<reference ref_id="983746" ref_url="https://bugzilla.suse.com/983746" source="BUGZILLA"/>
		<reference ref_id="983752" ref_url="https://bugzilla.suse.com/983752" source="BUGZILLA"/>
		<reference ref_id="983774" ref_url="https://bugzilla.suse.com/983774" source="BUGZILLA"/>
		<reference ref_id="983794" ref_url="https://bugzilla.suse.com/983794" source="BUGZILLA"/>
		<reference ref_id="983796" ref_url="https://bugzilla.suse.com/983796" source="BUGZILLA"/>
		<reference ref_id="983799" ref_url="https://bugzilla.suse.com/983799" source="BUGZILLA"/>
		<reference ref_id="983803" ref_url="https://bugzilla.suse.com/983803" source="BUGZILLA"/>
		<reference ref_id="984018" ref_url="https://bugzilla.suse.com/984018" source="BUGZILLA"/>
		<reference ref_id="984023" ref_url="https://bugzilla.suse.com/984023" source="BUGZILLA"/>
		<reference ref_id="984028" ref_url="https://bugzilla.suse.com/984028" source="BUGZILLA"/>
		<reference ref_id="984032" ref_url="https://bugzilla.suse.com/984032" source="BUGZILLA"/>
		<reference ref_id="984035" ref_url="https://bugzilla.suse.com/984035" source="BUGZILLA"/>
		<reference ref_id="984135" ref_url="https://bugzilla.suse.com/984135" source="BUGZILLA"/>
		<reference ref_id="984137" ref_url="https://bugzilla.suse.com/984137" source="BUGZILLA"/>
		<reference ref_id="984142" ref_url="https://bugzilla.suse.com/984142" source="BUGZILLA"/>
		<reference ref_id="984144" ref_url="https://bugzilla.suse.com/984144" source="BUGZILLA"/>
		<reference ref_id="984145" ref_url="https://bugzilla.suse.com/984145" source="BUGZILLA"/>
		<reference ref_id="984150" ref_url="https://bugzilla.suse.com/984150" source="BUGZILLA"/>
		<reference ref_id="984160" ref_url="https://bugzilla.suse.com/984160" source="BUGZILLA"/>
		<reference ref_id="984166" ref_url="https://bugzilla.suse.com/984166" source="BUGZILLA"/>
		<reference ref_id="984181" ref_url="https://bugzilla.suse.com/984181" source="BUGZILLA"/>
		<reference ref_id="984184" ref_url="https://bugzilla.suse.com/984184" source="BUGZILLA"/>
		<reference ref_id="984185" ref_url="https://bugzilla.suse.com/984185" source="BUGZILLA"/>
		<reference ref_id="984186" ref_url="https://bugzilla.suse.com/984186" source="BUGZILLA"/>
		<reference ref_id="984187" ref_url="https://bugzilla.suse.com/984187" source="BUGZILLA"/>
		<reference ref_id="984193" ref_url="https://bugzilla.suse.com/984193" source="BUGZILLA"/>
		<reference ref_id="984370" ref_url="https://bugzilla.suse.com/984370" source="BUGZILLA"/>
		<reference ref_id="984372" ref_url="https://bugzilla.suse.com/984372" source="BUGZILLA"/>
		<reference ref_id="984373" ref_url="https://bugzilla.suse.com/984373" source="BUGZILLA"/>
		<reference ref_id="984374" ref_url="https://bugzilla.suse.com/984374" source="BUGZILLA"/>
		<reference ref_id="984375" ref_url="https://bugzilla.suse.com/984375" source="BUGZILLA"/>
		<reference ref_id="984379" ref_url="https://bugzilla.suse.com/984379" source="BUGZILLA"/>
		<reference ref_id="984394" ref_url="https://bugzilla.suse.com/984394" source="BUGZILLA"/>
		<reference ref_id="984398" ref_url="https://bugzilla.suse.com/984398" source="BUGZILLA"/>
		<reference ref_id="984400" ref_url="https://bugzilla.suse.com/984400" source="BUGZILLA"/>
		<reference ref_id="984401" ref_url="https://bugzilla.suse.com/984401" source="BUGZILLA"/>
		<reference ref_id="984408" ref_url="https://bugzilla.suse.com/984408" source="BUGZILLA"/>
		<reference ref_id="984409" ref_url="https://bugzilla.suse.com/984409" source="BUGZILLA"/>
		<reference ref_id="984433" ref_url="https://bugzilla.suse.com/984433" source="BUGZILLA"/>
		<reference ref_id="984436" ref_url="https://bugzilla.suse.com/984436" source="BUGZILLA"/>
		<reference ref_id="985442" ref_url="https://bugzilla.suse.com/985442" source="BUGZILLA"/>
		<reference ref_id="985448" ref_url="https://bugzilla.suse.com/985448" source="BUGZILLA"/>
		<reference ref_id="985451" ref_url="https://bugzilla.suse.com/985451" source="BUGZILLA"/>
		<reference ref_id="985456" ref_url="https://bugzilla.suse.com/985456" source="BUGZILLA"/>
		<reference ref_id="985460" ref_url="https://bugzilla.suse.com/985460" source="BUGZILLA"/>
		<reference ref_id="986608" ref_url="https://bugzilla.suse.com/986608" source="BUGZILLA"/>
		<reference ref_id="986609" ref_url="https://bugzilla.suse.com/986609" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<description>
ImageMagick was updated to fix 55 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9820: heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: heap overflow in palm file (bsc#984401).
- CVE-2014-9822: heap overflow in quantum file (bsc#984187).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581833" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581834" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581833" comment="libMagickCore1-6.4.3.6-7.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581834" comment="libMagickCore1-32bit-6.4.3.6-7.45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41242" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="991445" ref_url="https://bugzilla.suse.com/991445" source="BUGZILLA"/>
		<reference ref_id="991872" ref_url="https://bugzilla.suse.com/991872" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- security update:
  * CVE-2016-6520: buffer overflow [bsc#991872]
  * CVE-2016-6491: Out-of-bounds read in CopyMagickMemory [bsc#991445]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-15"/>
	<updated date="2016-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581835" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581836" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581835" comment="libMagickCore1-6.4.3.6-7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581836" comment="libMagickCore1-32bit-6.4.3.6-7.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41243" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000399" ref_url="https://bugzilla.suse.com/1000399" source="BUGZILLA"/>
		<reference ref_id="1000434" ref_url="https://bugzilla.suse.com/1000434" source="BUGZILLA"/>
		<reference ref_id="1000436" ref_url="https://bugzilla.suse.com/1000436" source="BUGZILLA"/>
		<reference ref_id="1000688" ref_url="https://bugzilla.suse.com/1000688" source="BUGZILLA"/>
		<reference ref_id="1000689" ref_url="https://bugzilla.suse.com/1000689" source="BUGZILLA"/>
		<reference ref_id="1000690" ref_url="https://bugzilla.suse.com/1000690" source="BUGZILLA"/>
		<reference ref_id="1000691" ref_url="https://bugzilla.suse.com/1000691" source="BUGZILLA"/>
		<reference ref_id="1000692" ref_url="https://bugzilla.suse.com/1000692" source="BUGZILLA"/>
		<reference ref_id="1000693" ref_url="https://bugzilla.suse.com/1000693" source="BUGZILLA"/>
		<reference ref_id="1000694" ref_url="https://bugzilla.suse.com/1000694" source="BUGZILLA"/>
		<reference ref_id="1000695" ref_url="https://bugzilla.suse.com/1000695" source="BUGZILLA"/>
		<reference ref_id="1000698" ref_url="https://bugzilla.suse.com/1000698" source="BUGZILLA"/>
		<reference ref_id="1000699" ref_url="https://bugzilla.suse.com/1000699" source="BUGZILLA"/>
		<reference ref_id="1000700" ref_url="https://bugzilla.suse.com/1000700" source="BUGZILLA"/>
		<reference ref_id="1000701" ref_url="https://bugzilla.suse.com/1000701" source="BUGZILLA"/>
		<reference ref_id="1000703" ref_url="https://bugzilla.suse.com/1000703" source="BUGZILLA"/>
		<reference ref_id="1000704" ref_url="https://bugzilla.suse.com/1000704" source="BUGZILLA"/>
		<reference ref_id="1000707" ref_url="https://bugzilla.suse.com/1000707" source="BUGZILLA"/>
		<reference ref_id="1000709" ref_url="https://bugzilla.suse.com/1000709" source="BUGZILLA"/>
		<reference ref_id="1000711" ref_url="https://bugzilla.suse.com/1000711" source="BUGZILLA"/>
		<reference ref_id="1000713" ref_url="https://bugzilla.suse.com/1000713" source="BUGZILLA"/>
		<reference ref_id="1000714" ref_url="https://bugzilla.suse.com/1000714" source="BUGZILLA"/>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1001221" ref_url="https://bugzilla.suse.com/1001221" source="BUGZILLA"/>
		<reference ref_id="1002209" ref_url="https://bugzilla.suse.com/1002209" source="BUGZILLA"/>
		<reference ref_id="1002421" ref_url="https://bugzilla.suse.com/1002421" source="BUGZILLA"/>
		<reference ref_id="1002422" ref_url="https://bugzilla.suse.com/1002422" source="BUGZILLA"/>
		<reference ref_id="1003629" ref_url="https://bugzilla.suse.com/1003629" source="BUGZILLA"/>
		<reference ref_id="1005123" ref_url="https://bugzilla.suse.com/1005123" source="BUGZILLA"/>
		<reference ref_id="1005125" ref_url="https://bugzilla.suse.com/1005125" source="BUGZILLA"/>
		<reference ref_id="1005127" ref_url="https://bugzilla.suse.com/1005127" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9907" ref_url="https://www.suse.com/security/cve/CVE-2014-9907/" source="CVE"/>
		<reference ref_id="CVE-2015-8957" ref_url="https://www.suse.com/security/cve/CVE-2015-8957/" source="CVE"/>
		<reference ref_id="CVE-2015-8958" ref_url="https://www.suse.com/security/cve/CVE-2015-8958/" source="CVE"/>
		<reference ref_id="CVE-2015-8959" ref_url="https://www.suse.com/security/cve/CVE-2015-8959/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-7101" ref_url="https://www.suse.com/security/cve/CVE-2016-7101/" source="CVE"/>
		<reference ref_id="CVE-2016-7514" ref_url="https://www.suse.com/security/cve/CVE-2016-7514/" source="CVE"/>
		<reference ref_id="CVE-2016-7515" ref_url="https://www.suse.com/security/cve/CVE-2016-7515/" source="CVE"/>
		<reference ref_id="CVE-2016-7516" ref_url="https://www.suse.com/security/cve/CVE-2016-7516/" source="CVE"/>
		<reference ref_id="CVE-2016-7517" ref_url="https://www.suse.com/security/cve/CVE-2016-7517/" source="CVE"/>
		<reference ref_id="CVE-2016-7518" ref_url="https://www.suse.com/security/cve/CVE-2016-7518/" source="CVE"/>
		<reference ref_id="CVE-2016-7519" ref_url="https://www.suse.com/security/cve/CVE-2016-7519/" source="CVE"/>
		<reference ref_id="CVE-2016-7522" ref_url="https://www.suse.com/security/cve/CVE-2016-7522/" source="CVE"/>
		<reference ref_id="CVE-2016-7523" ref_url="https://www.suse.com/security/cve/CVE-2016-7523/" source="CVE"/>
		<reference ref_id="CVE-2016-7524" ref_url="https://www.suse.com/security/cve/CVE-2016-7524/" source="CVE"/>
		<reference ref_id="CVE-2016-7525" ref_url="https://www.suse.com/security/cve/CVE-2016-7525/" source="CVE"/>
		<reference ref_id="CVE-2016-7526" ref_url="https://www.suse.com/security/cve/CVE-2016-7526/" source="CVE"/>
		<reference ref_id="CVE-2016-7527" ref_url="https://www.suse.com/security/cve/CVE-2016-7527/" source="CVE"/>
		<reference ref_id="CVE-2016-7528" ref_url="https://www.suse.com/security/cve/CVE-2016-7528/" source="CVE"/>
		<reference ref_id="CVE-2016-7529" ref_url="https://www.suse.com/security/cve/CVE-2016-7529/" source="CVE"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-7531" ref_url="https://www.suse.com/security/cve/CVE-2016-7531/" source="CVE"/>
		<reference ref_id="CVE-2016-7533" ref_url="https://www.suse.com/security/cve/CVE-2016-7533/" source="CVE"/>
		<reference ref_id="CVE-2016-7535" ref_url="https://www.suse.com/security/cve/CVE-2016-7535/" source="CVE"/>
		<reference ref_id="CVE-2016-7537" ref_url="https://www.suse.com/security/cve/CVE-2016-7537/" source="CVE"/>
		<reference ref_id="CVE-2016-7799" ref_url="https://www.suse.com/security/cve/CVE-2016-7799/" source="CVE"/>
		<reference ref_id="CVE-2016-7800" ref_url="https://www.suse.com/security/cve/CVE-2016-7800/" source="CVE"/>
		<reference ref_id="CVE-2016-7996" ref_url="https://www.suse.com/security/cve/CVE-2016-7996/" source="CVE"/>
		<reference ref_id="CVE-2016-7997" ref_url="https://www.suse.com/security/cve/CVE-2016-7997/" source="CVE"/>
		<reference ref_id="CVE-2016-8682" ref_url="https://www.suse.com/security/cve/CVE-2016-8682/" source="CVE"/>
		<reference ref_id="CVE-2016-8683" ref_url="https://www.suse.com/security/cve/CVE-2016-8683/" source="CVE"/>
		<reference ref_id="CVE-2016-8684" ref_url="https://www.suse.com/security/cve/CVE-2016-8684/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8862: Memory allocation failure in AcquireMagickMemory (bsc#1007245)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7529: out of bound in quantum handling (bsc#1000399)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-7527:  out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7528: out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7517: out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2016-7519: out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000434">SUSE bug 1000434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000436">SUSE bug 1000436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000688">SUSE bug 1000688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000689">SUSE bug 1000689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000691">SUSE bug 1000691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000692">SUSE bug 1000692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000693">SUSE bug 1000693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000694">SUSE bug 1000694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000695">SUSE bug 1000695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000698">SUSE bug 1000698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000699">SUSE bug 1000699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000700">SUSE bug 1000700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000701">SUSE bug 1000701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000704">SUSE bug 1000704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000707">SUSE bug 1000707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000709">SUSE bug 1000709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000711">SUSE bug 1000711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001221">SUSE bug 1001221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002421">SUSE bug 1002421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002422">SUSE bug 1002422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003629">SUSE bug 1003629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005123">SUSE bug 1005123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005125">SUSE bug 1005125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005127">SUSE bug 1005127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9907/">CVE-2014-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8957/">CVE-2015-8957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8958/">CVE-2015-8958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8959/">CVE-2015-8959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7101/">CVE-2016-7101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7514/">CVE-2016-7514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7515/">CVE-2016-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7516/">CVE-2016-7516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7517/">CVE-2016-7517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7518/">CVE-2016-7518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7519/">CVE-2016-7519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7522/">CVE-2016-7522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7523/">CVE-2016-7523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7524/">CVE-2016-7524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7525/">CVE-2016-7525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7526/">CVE-2016-7526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7527/">CVE-2016-7527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7528/">CVE-2016-7528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7529/">CVE-2016-7529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7531/">CVE-2016-7531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7533/">CVE-2016-7533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7535/">CVE-2016-7535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7537/">CVE-2016-7537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7799/">CVE-2016-7799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7800/">CVE-2016-7800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7996/">CVE-2016-7996</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7997/">CVE-2016-7997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8682/">CVE-2016-8682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8683/">CVE-2016-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8684/">CVE-2016-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581837" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581838" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581837" comment="libMagickCore1-6.4.3.6-7.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581838" comment="libMagickCore1-32bit-6.4.3.6-7.54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41244" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581839" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581840" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581839" comment="libMagickCore1-6.4.3.6-7.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581840" comment="libMagickCore1-32bit-6.4.3.6-7.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41245" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581841" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581842" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581841" comment="libMagickCore1-6.4.3.6-7.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581842" comment="libMagickCore1-32bit-6.4.3.6-7.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41246" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581843" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581844" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581843" comment="libMagickCore1-6.4.3.6-7.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581844" comment="libMagickCore1-32bit-6.4.3.6-7.77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41247" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581845" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581846" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581845" comment="libMagickCore1-6.4.3.6-7.78.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581846" comment="libMagickCore1-32bit-6.4.3.6-7.78.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41248" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-11534: Processing a crafted file in convert could have lead to a
  Memory Leak in the lite_font_map() function in coders/wmf.c (bsc#1050135).
- CVE-2017-13133: The load_level function in coders/xcf.c lacked offset
  validation, which allowed attackers to cause a denial of service (load_tile
  memory exhaustion) via a crafted file (bsc#1055219).
- CVE-2017-13139: The ReadOneMNGImage function in coders/png.c had an
  out-of-bounds read with the MNG CLIP chunk (bsc#1055430).
- CVE-2017-15033: Fixed a memory leak in ReadYUVImage in coders/yuv.c
  (bsc#1061873).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581847" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581848" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581847" comment="libMagickCore1-6.4.3.6-7.78.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581848" comment="libMagickCore1-32bit-6.4.3.6-7.78.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41249" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  
    could possibly disclose potentially sensitive memory [bsc#1059778]
  
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage 
    in coders/wpg.c could lead to denial of service [bsc#1058485]

  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]

  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c 
    could lead to denial of service [bsc#1067181]

  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  
    validation problems could lead to denial of service [bsc#1067184]

  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]

  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan 
    in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]

  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]

  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]

  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c 
    allows remote attackers to cause a denial of service [bsc#1054757]

  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]

  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, 
    which allows attackers to cause denial of service [bsc#1052553]

  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]

  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]

  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 

  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]

  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 

  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 

  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]

  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]

  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]

  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]

  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581849" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581850" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581849" comment="libMagickCore1-6.4.3.6-7.78.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581850" comment="libMagickCore1-32bit-6.4.3.6-7.78.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41250" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.
  
These security issues were fixed:

- CVE-2017-14343: Fixed a memory leak vulnerability in ReadXCFImage in
  coders/xcf.c via a crafted xcf image file (bsc#1058422).
- CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allowed remote
  attackers to cause a denial of service (memory consumption) via a crafted file
  (bsc#1058422).
- CVE-2017-14042: Prevent memory allocation failure in the ReadPNMImage
  function in coders/pnm.c. The vulnerability caused a big memory allocation,
  which may have lead to remote denial of service in the MagickRealloc function
  in magick/memory.c (bsc#1056550).
- CVE-2017-15281: ReadPSDImage in coders/psd.c allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact via a crafted file (bsc#1063049).
- CVE-2017-13061: A length-validation vulnerability in the function
  ReadPSDLayersInternal in coders/psd.c allowed attackers to cause a denial of
  service (ReadPSDImage memory exhaustion) via a crafted file (bsc#1055063).
- CVE-2017-12563: A memory exhaustion vulnerability in the function
  ReadPSDImage in coders/psd.c allowed attackers to cause a denial of service
  (bsc#1052460).
- CVE-2017-14174: coders/psd.c allowed for DoS in ReadPSDLayersInternal() due
  to lack of an EOF (End of File) check might have caused huge CPU consumption.
  When a crafted PSD file, which claims a large 'length' field in the header but
  did not contain sufficient backing data, is provided, the loop over 'length'
  would consume huge CPU resources, since there is no EOF check inside the loop
  (bsc#1057723).
- CVE-2017-13062: A memory leak vulnerability in the function formatIPTC in
  coders/meta.c allowed attackers to cause a denial of service (WriteMETAImage
  memory consumption) via a crafted file (bsc#1055053).
- CVE-2017-15277: ReadGIFImage in coders/gif.c left the palette uninitialized
  when processing a GIF file that has neither a global nor local palette. If this
  functionality was used as a library loaded into a process that operates on
  interesting data, this data sometimes could have been leaked via the
  uninitialized palette (bsc#1063050).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581851" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581852" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581851" comment="libMagickCore1-6.4.3.6-7.78.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581852" comment="libMagickCore1-32bit-6.4.3.6-7.78.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41251" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052720).
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1055065).
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info data
  structures (bsc#1051446).
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which allowed
  attackers to cause a denial of service (bsc#1052731).
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732).
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323).
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a MAT
  Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434).
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion via a
  crafted MAT file, related to incorrect ordering of a SetImageExtent call
  (bsc#1047898).
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120).
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service (bsc#1052468).
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service (assertion
  failure) in DestroyImageInfo in image.c (bsc#1052550).
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of service
  (bsc#1052710).
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted file (bsc#1058640).
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c (bsc#1050606).
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion failure
  and application exit) in the DestroyImageInfo function in MagickCore/image.c
  (bsc#1055855).
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751).
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123).
- CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
  coders/dds.c, which allowed attackers to cause a denial of service
  (bsc#1074610).
- CVE-2017-9409: Fixed a memory leak vulnerability in the function ReadMPCImage
  in mpc.c, which allowed attackers to cause a denial of service via a crafted
  file (bsc#1042948).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via an image
  received from stdin (bsc#1049373)
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082)
- CVE-2017-1000445: Added a NUL pointer check in the MagickCore component that
  might have lead to denial of service  (bsc#1074425).
- CVE-2017-11751: Fixed a memory leak vulnerability in the function
  WritePICONImage in coders/xpm.c that allowed remote attackers to cause a denial
  of service via a crafted file (bsc#1051412).
- CVE-2017-17680: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted xpm image file (bsc#1072902).
- CVE-2017-17882: Fixed a memory leak vulnerability in the function
  ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of
  service via a crafted XPM image file (bsc#1074122).
- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973).
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581853" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581854" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581853" comment="libMagickCore1-6.4.3.6-7.78.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581854" comment="libMagickCore1-32bit-6.4.3.6-7.78.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41252" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635).
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098).
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353)
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed
  attackers to cause a denial of service (memory leak) via a crafted file (bsc#1043354)
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908)
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037)
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via
  a crafted file (bsc#1050072)
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100)
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442)
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052470)
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052708)
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service (bsc#1052717)
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721)
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768)
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777)
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781)
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600)
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374)
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455)
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456)
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000)
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162)
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752)
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362)
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125)
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185)
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120)
- Prevent memory leak in svg.c, which allowed attackers to cause a denial of
  service via a crafted SVG image file (bsc#1074120)
- Prevent small memory leak when processing PWP image files (bsc#1074309)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which allowed
  remote attackers to cause a denial of service via a crafted file (bsc#1076021)
- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581855" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581856" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581855" comment="libMagickCore1-6.4.3.6-7.78.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581856" comment="libMagickCore1-32bit-6.4.3.6-7.78.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41253" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1050669" ref_url="https://bugzilla.suse.com/1050669" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-20"/>
	<updated date="2018-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581857" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581858" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581857" comment="libMagickCore1-6.4.3.6-7.78.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581858" comment="libMagickCore1-32bit-6.4.3.6-7.78.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41254" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581859" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581860" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581859" comment="libMagickCore1-6.4.3.6-7.78.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581860" comment="libMagickCore1-32bit-6.4.3.6-7.78.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41255" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1084060" ref_url="https://bugzilla.suse.com/1084060" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,
  which allowed attackers to cause a denial of service via a crafted file that
  triggers an attempt at a large png_pixels array allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581861" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581862" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581861" comment="libMagickCore1-6.4.3.6-78.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581862" comment="libMagickCore1-32bit-6.4.3.6-78.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41256" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047356" ref_url="https://bugzilla.suse.com/1047356" source="BUGZILLA"/>
		<reference ref_id="1086773" ref_url="https://bugzilla.suse.com/1086773" source="BUGZILLA"/>
		<reference ref_id="1086782" ref_url="https://bugzilla.suse.com/1086782" source="BUGZILLA"/>
		<reference ref_id="1087027" ref_url="https://bugzilla.suse.com/1087027" source="BUGZILLA"/>
		<reference ref_id="1087033" ref_url="https://bugzilla.suse.com/1087033" source="BUGZILLA"/>
		<reference ref_id="1087037" ref_url="https://bugzilla.suse.com/1087037" source="BUGZILLA"/>
		<reference ref_id="1089781" ref_url="https://bugzilla.suse.com/1089781" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960/" source="CVE"/>
		<reference ref_id="CVE-2018-9018" ref_url="https://www.suse.com/security/cve/CVE-2018-9018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:


- security update (png.c)
  * CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
    Attackers could leverage this vulnerability to cause a crash and denial of service 
    via a crafted mng file. [bsc#1086773]
  * CVE-2018-10177: there is an infinite loop in the ReadOneMNGImagefunction of the coders/png.c file. Remote attackers could leverage thisvulnerability to cause a denial of service (bsc#1089781)

- security update (wand)
  * CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
    attackers to cause a denial of service via a crafted file. [bsc#1087033]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
    which could lead to  denial of service via a crafted file. [bsc#1087027]

- security update (core)
  * CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
    could allow attackers to obtain sensitive information from process memory or possibly have 
    unspecified other impact via a crafted SVG document that is mishandled in the 
    GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]

- security update (pcd.c)
  * CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
    which could lead to a denial of service via a crafted file. [bsc#1087037]

- security update (gif.c)
  * CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which could lead to denial of service via a crafted file. [bsc#1087027]

- security update (tiff.c)
  * CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in ImageMagick memory allocation issue could lead to denial of service (bsc#1086782)



		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-02"/>
	<updated date="2018-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086773">SUSE bug 1086773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9018/">CVE-2018-9018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581863" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581864" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581863" comment="libMagickCore1-6.4.3.6-78.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581864" comment="libMagickCore1-32bit-6.4.3.6-78.45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41257" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056277" ref_url="https://bugzilla.suse.com/1056277" source="BUGZILLA"/>
		<reference ref_id="1094204" ref_url="https://bugzilla.suse.com/1094204" source="BUGZILLA"/>
		<reference ref_id="1094237" ref_url="https://bugzilla.suse.com/1094237" source="BUGZILLA"/>
		<reference ref_id="1095812" ref_url="https://bugzilla.suse.com/1095812" source="BUGZILLA"/>
		<reference ref_id="1098545" ref_url="https://bugzilla.suse.com/1098545" source="BUGZILLA"/>
		<reference ref_id="1098546" ref_url="https://bugzilla.suse.com/1098546" source="BUGZILLA"/>
		<reference ref_id="1102003" ref_url="https://bugzilla.suse.com/1102003" source="BUGZILLA"/>
		<reference ref_id="1102004" ref_url="https://bugzilla.suse.com/1102004" source="BUGZILLA"/>
		<reference ref_id="1102005" ref_url="https://bugzilla.suse.com/1102005" source="BUGZILLA"/>
		<reference ref_id="1102007" ref_url="https://bugzilla.suse.com/1102007" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11251" ref_url="https://www.suse.com/security/cve/CVE-2018-11251/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2018-11251: Heap-based buffer over-read in ReadSUNImage in coders/sun.c,
  which allows attackers to cause denial of service (bsc#1094237)
- CVE-2017-18271: Infinite loop in the function ReadMIFFImage in coders/miff.c,
  which allows attackers to cause a denial of service (bsc#1094204)
- CVE-2017-13758: Heap-based buffer overflow in the TracePoint() in
  MagickCore/draw.c, which allows attackers to cause a denial of
  service(bsc#1056277)
- CVE-2018-10805: Fixed several memory leaks in rgb.c, cmyk.c, gray.c, and
  ycbcr.c (bsc#1095812)
- CVE-2018-12600: The ReadDIBImage and WriteDIBImage functions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098545)
- CVE-2018-12599: The ReadBMPImage and WriteBMPImage fucntions allowed
  attackers to cause an out of bounds write via a crafted file (bsc#1098546)
- CVE-2018-14434: Fixed a memory leak for a colormap in WriteMPCImage in coders/mpc.c (bsc#1102003)
- CVE-2018-14435: Fixed a memory leak in DecodeImage in coders/pcd.c (bsc#1102007) 
- CVE-2018-14436: Fixed a memory leak in ReadMIFFImage in coders/miff.c (bsc#1102005)
- CVE-2018-14437: Fixed a memory leak in parse8BIM in coders/meta.c (bsc#1102004)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094237">SUSE bug 1094237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11251/">CVE-2018-11251</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581865" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581866" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581865" comment="libMagickCore1-6.4.3.6-78.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581866" comment="libMagickCore1-32bit-6.4.3.6-78.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41258" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1105592" ref_url="https://bugzilla.suse.com/1105592" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004508.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issue fixed:

- Hide PS, XPS and PDF coders into */vulnerable (bsc#1105592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-29"/>
	<updated date="2018-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581867" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581868" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581867" comment="libMagickCore1-6.4.3.6-78.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581868" comment="libMagickCore1-32bit-6.4.3.6-78.59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41259" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1106855" ref_url="https://bugzilla.suse.com/1106855" source="BUGZILLA"/>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1107604" ref_url="https://bugzilla.suse.com/1107604" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1107612" ref_url="https://bugzilla.suse.com/1107612" source="BUGZILLA"/>
		<reference ref_id="1107616" ref_url="https://bugzilla.suse.com/1107616" source="BUGZILLA"/>
		<reference ref_id="1108282" ref_url="https://bugzilla.suse.com/1108282" source="BUGZILLA"/>
		<reference ref_id="1108283" ref_url="https://bugzilla.suse.com/1108283" source="BUGZILLA"/>
		<reference ref_id="1110746" ref_url="https://bugzilla.suse.com/1110746" source="BUGZILLA"/>
		<reference ref_id="1110747" ref_url="https://bugzilla.suse.com/1110747" source="BUGZILLA"/>
		<reference ref_id="1111069" ref_url="https://bugzilla.suse.com/1111069" source="BUGZILLA"/>
		<reference ref_id="1111072" ref_url="https://bugzilla.suse.com/1111072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17965" ref_url="https://www.suse.com/security/cve/CVE-2018-17965/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following security issue:

- CVE-2017-17934: Prevent memory leaks, related to MSLPopImage and
  ProcessMSLScript, and associated with mishandling of MSLPushImage calls
  (bsc#1074170).
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function
  (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an
  attacker to cause a denial of service (WriteBlob assertion failure and
  application exit) via a crafted file (bsc#1108282)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16323: ReadXBMImage left data uninitialized when processing an XBM
  file that has a negative pixel value. If the affected code was used as a
  library loaded into a process that includes sensitive information, that
  information sometimes can be leaked via the image data (bsc#1106855)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a
  denial of service via a crafted image file due to an out-of-bounds write
  (bsc#1107616)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and
  ReadPICTImage did check the return value of the fputc function, which allowed
  remote attackers to cause a denial of service via a crafted image file
  (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage
  and ReadPICTImage, which allowed remote attackers to cause a denial of service
  via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions
  ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial
  of service via a crafted image file (bsc#1107604)
- CVE-2018-18024: Fixed an infinite loop in the ReadBMPImage function of
  the coders/bmp.c file. Remote attackers could leverage this vulnerability
  to cause a denial of service via a crafted bmp file (bsc#1111069)
- CVE-2018-18016: Fixed a memory leak in WritePCXImage (bsc#1111072)
- CVE-2018-17965: Fixed a memory leak in WriteSGIImage (bsc#1110747)
- CVE-2018-17966: Fixed a memory leak in WritePDBImage (bsc#1110746)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106855">SUSE bug 1106855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110747">SUSE bug 1110747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17965/">CVE-2018-17965</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581869" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581870" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581869" comment="libMagickCore1-6.4.3.6-78.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581870" comment="libMagickCore1-32bit-6.4.3.6-78.74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41260" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1050129" ref_url="https://bugzilla.suse.com/1050129" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1112399" ref_url="https://bugzilla.suse.com/1112399" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-14997" ref_url="https://www.suse.com/security/cve/CVE-2017-14997/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:


- CVE-2017-14997: ImageMagick allowed remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.  (bsc#1112399)
- CVE-2018-16644: A regression in the security fix for the pict coder was fixed (bsc#1107609)
- CVE-2017-11532: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c. (bsc#1050129)
- CVE-2017-11639: A regression in the security fix in the cip coder was fixed (bsc#1050635)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-19"/>
	<updated date="2018-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112399">SUSE bug 1112399</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14997/">CVE-2017-14997</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581871" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581872" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581871" comment="libMagickCore1-6.4.3.6-78.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581872" comment="libMagickCore1-32bit-6.4.3.6-78.79.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41261" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1113064" ref_url="https://bugzilla.suse.com/1113064" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-18544: Fixed memory leak in the function WriteMSLImage (bsc#1113064).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel
  function leading to DoS (bsc#1106989).
- CVE-2018-16412: Prevent heap-based buffer over-read in the ParseImageResourceBlocks
  function leading to DOS (bsc#1106996).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).


		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581873" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581874" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581873" comment="libMagickCore1-6.4.3.6-78.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581874" comment="libMagickCore1-32bit-6.4.3.6-78.92.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41262" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581875" comment="libMagickCore1-6.4.3.6-78.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581876" comment="libMagickCore1-32bit-6.4.3.6-78.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41263" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00011.html" source="SUSE-SU"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711)
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581877" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581877" comment="LibVNCServer-0.9.1-159.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41264" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003871.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581878" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581878" comment="LibVNCServer-0.9.1-160.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41265" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581879" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581879" comment="LibVNCServer-0.9.1-160.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41266" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581880" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581880" comment="LibVNCServer-0.9.1-160.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41267" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581881" comment="LibVNCServer-0.9.1-160.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41268" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581882" comment="LibVNCServer-0.9.1-160.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41269" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007873.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581883" comment="LibVNCServer-0.9.1-160.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41270" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577129" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577130" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41271" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577131" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577132" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41272" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581884" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581885" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581884" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581885" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41273" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="977333" ref_url="https://bugzilla.suse.com/977333" source="BUGZILLA"/>
		<reference ref_id="977374" ref_url="https://bugzilla.suse.com/977374" source="BUGZILLA"/>
		<reference ref_id="977376" ref_url="https://bugzilla.suse.com/977376" source="BUGZILLA"/>
		<reference ref_id="977381" ref_url="https://bugzilla.suse.com/977381" source="BUGZILLA"/>
		<reference ref_id="977386" ref_url="https://bugzilla.suse.com/977386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<description>
This update to MozillaFirefox 38.8.0 ESR fixes the following security issues (bsc#977333):

- CVE-2016-2805: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977374)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (bsc#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (bsc#977386)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (bsc#977381)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-20"/>
	<updated date="2016-05-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581886" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581887" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581888" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581889" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581890" comment="libfreebl3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581891" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581892" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581893" comment="libsoftokn3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581894" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581895" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581896" comment="mozilla-nspr-x86-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581897" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581898" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581899" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581900" comment="mozilla-nss-x86-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581886" comment="MozillaFirefox-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581887" comment="MozillaFirefox-translations-38.8.0esr-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581888" comment="libfreebl3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581889" comment="libfreebl3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581890" comment="libfreebl3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581891" comment="libsoftokn3-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581892" comment="libsoftokn3-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581893" comment="libsoftokn3-x86-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581894" comment="mozilla-nspr-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581895" comment="mozilla-nspr-32bit-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581896" comment="mozilla-nspr-x86-4.12-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581897" comment="mozilla-nss-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581898" comment="mozilla-nss-32bit-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581899" comment="mozilla-nss-tools-3.20.2-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581900" comment="mozilla-nss-x86-3.20.2-30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41274" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983549" ref_url="https://bugzilla.suse.com/983549" source="BUGZILLA"/>
		<reference ref_id="983638" ref_url="https://bugzilla.suse.com/983638" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="983643" ref_url="https://bugzilla.suse.com/983643" source="BUGZILLA"/>
		<reference ref_id="983646" ref_url="https://bugzilla.suse.com/983646" source="BUGZILLA"/>
		<reference ref_id="983651" ref_url="https://bugzilla.suse.com/983651" source="BUGZILLA"/>
		<reference ref_id="983652" ref_url="https://bugzilla.suse.com/983652" source="BUGZILLA"/>
		<reference ref_id="983653" ref_url="https://bugzilla.suse.com/983653" source="BUGZILLA"/>
		<reference ref_id="983655" ref_url="https://bugzilla.suse.com/983655" source="BUGZILLA"/>
		<reference ref_id="984006" ref_url="https://bugzilla.suse.com/984006" source="BUGZILLA"/>
		<reference ref_id="985659" ref_url="https://bugzilla.suse.com/985659" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, MozillaFirefox-branding-SLE and  mozilla-nss were updated to fix nine security issues.

MozillaFirefox was updated to version 45.2.0 ESR. mozilla-nss was updated to version 3.21.1.

These security issues were fixed:
- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).
- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).
- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).
- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).
- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).
- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).
- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).
- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)

These non-security issues were fixed:
- Fix crashes on aarch64
  * Determine page size at runtime (bsc#984006)
  * Allow aarch64 to work in safe mode (bsc#985659)
- Fix crashes on mainframes

All extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-14"/>
	<updated date="2016-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984006">SUSE bug 984006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985659">SUSE bug 985659</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581901" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581902" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581903" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581904" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581905" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581906" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581907" comment="libfreebl3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581908" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581909" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581910" comment="libsoftokn3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581911" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581912" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581913" comment="mozilla-nspr-x86-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581914" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581915" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581916" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581917" comment="mozilla-nss-x86-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581901" comment="MozillaFirefox-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581902" comment="MozillaFirefox-branding-SLED-45.0-23.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581903" comment="MozillaFirefox-translations-45.2.0esr-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581904" comment="firefox-fontconfig-2.11.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581905" comment="libfreebl3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581906" comment="libfreebl3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581907" comment="libfreebl3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581908" comment="libsoftokn3-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581909" comment="libsoftokn3-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581910" comment="libsoftokn3-x86-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581911" comment="mozilla-nspr-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581912" comment="mozilla-nspr-32bit-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581913" comment="mozilla-nspr-x86-4.12-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581914" comment="mozilla-nss-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581915" comment="mozilla-nss-32bit-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581916" comment="mozilla-nss-tools-3.21.1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581917" comment="mozilla-nss-x86-3.21.1-35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41275" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="989196" ref_url="https://bugzilla.suse.com/989196" source="BUGZILLA"/>
		<reference ref_id="990628" ref_url="https://bugzilla.suse.com/990628" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="991809" ref_url="https://bugzilla.suse.com/991809" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/989196">SUSE bug 989196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990628">SUSE bug 990628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581918" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581919" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581918" comment="MozillaFirefox-45.3.0esr-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581919" comment="MozillaFirefox-translations-45.3.0esr-50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41276" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="999701" ref_url="https://bugzilla.suse.com/999701" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to 45.4.0 ESR to fix the following issues (bsc#999701):

The following security issue were fixed:
* MFSA 2016-86/CVE-2016-5270: Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
* MFSA 2016-86/CVE-2016-5272: Bad cast in nsImageGeometryMixin
* MFSA 2016-86/CVE-2016-5276: Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList
* MFSA 2016-86/CVE-2016-5274: use-after-free in nsFrameManager::CaptureFrameState
* MFSA 2016-86/CVE-2016-5277: Heap-use-after-free in nsRefreshDriver::Tick
* MFSA 2016-86/CVE-2016-5278: Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
* MFSA 2016-86/CVE-2016-5280: Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
* MFSA 2016-86/CVE-2016-5281: use-after-free in DOMSVGLength
* MFSA 2016-86/CVE-2016-5284: Add-on update site certificate pin expiration
* MFSA 2016-86/CVE-2016-5250: Resource Timing API is storing resources sent by the previous page
* MFSA 2016-86/CVE-2016-5261: Integer overflow and memory corruption in WebSocketChannel
* MFSA 2016-86/CVE-2016-5257: Various memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581920" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581921" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581920" comment="MozillaFirefox-45.4.0esr-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581921" comment="MozillaFirefox-translations-45.4.0esr-53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41277" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581922" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581923" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581922" comment="MozillaFirefox-45.6.0esr-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581923" comment="MozillaFirefox-translations-45.6.0esr-62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41278" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581924" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581925" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581924" comment="MozillaFirefox-45.7.0esr-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581925" comment="MozillaFirefox-translations-45.7.0esr-65.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41279" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027527" ref_url="https://bugzilla.suse.com/1027527" source="BUGZILLA"/>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8

Bugfixes:
- fix crashes on Itanium (bsc#1027527)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027527">SUSE bug 1027527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581926" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581927" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581926" comment="MozillaFirefox-45.8.0esr-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581927" comment="MozillaFirefox-translations-45.8.0esr-68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41280" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581928" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581929" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581930" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581931" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581932" comment="libfreebl3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581933" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581934" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581935" comment="libsoftokn3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581936" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581937" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581938" comment="mozilla-nspr-x86-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581939" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581940" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581941" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581942" comment="mozilla-nss-x86-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581928" comment="MozillaFirefox-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581929" comment="MozillaFirefox-translations-45.9.0esr-71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581930" comment="libfreebl3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581931" comment="libfreebl3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581932" comment="libfreebl3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581933" comment="libsoftokn3-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581934" comment="libsoftokn3-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581935" comment="libsoftokn3-x86-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581936" comment="mozilla-nspr-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581937" comment="mozilla-nspr-32bit-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581938" comment="mozilla-nspr-x86-4.13.1-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581939" comment="mozilla-nss-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581940" comment="mozilla-nss-32bit-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581941" comment="mozilla-nss-tools-3.29.5-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581942" comment="mozilla-nss-x86-3.29.5-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41281" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="930392" ref_url="https://bugzilla.suse.com/930392" source="BUGZILLA"/>
		<reference ref_id="930496" ref_url="https://bugzilla.suse.com/930496" source="BUGZILLA"/>
		<reference ref_id="935510" ref_url="https://bugzilla.suse.com/935510" source="BUGZILLA"/>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="954002" ref_url="https://bugzilla.suse.com/954002" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox and mozilla-nss fixes the following issues:

Security issues fixed:
- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)
  - CVE-2017-7758: Out-of-bounds read in Opus encoder
  - CVE-2017-7749: Use-after-free during docshell reloading
  - CVE-2017-7751: Use-after-free with content viewer listeners
  - CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
  - CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
  - CVE-2017-7752: Use-after-free with IME input
  - CVE-2017-7750: Use-after-free with track elements
  - CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service
  - CVE-2017-7778: Vulnerabilities in the Graphite 2 library
  - CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
  - CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files
  - CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
  - CVE-2017-7757: Use-after-free in IndexedDB
  - CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application
  - CVE-2017-7763: Mac fonts render some unicode characters as spaces
  - CVE-2017-7765: Mark of the Web bypass when saving executable files
  - CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)
  - CVE-2016-10196: Vulnerabilities in Libevent library
  - CVE-2017-5443: Out-of-bounds write during BinHex decoding
  - CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
  - CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
  - CVE-2017-5465: Out-of-bounds read in ConvolvePixel
  - CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL
  - CVE-2017-5467: Memory corruption when drawing Skia content
  - CVE-2017-5460: Use-after-free in frame selection
  - CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
  - CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
  - CVE-2017-5449: Crash during bidirectional unicode manipulation with animation
  - CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
  - CVE-2017-5447: Out-of-bounds read during glyph processing
  - CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
  - CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content
  - CVE-2017-5442: Use-after-free during style changes
  - CVE-2017-5469: Potential Buffer overflow in flex-generated code
  - CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
  - CVE-2017-5441: Use-after-free with selection during scroll events
  - CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
  - CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
  - CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
  - CVE-2017-5435: Use-after-free during transaction processing in the editor
  - CVE-2017-5434: Use-after-free during focus handling
  - CVE-2017-5433: Use-after-free in SMIL animation functions
  - CVE-2017-5432: Use-after-free in text input selection
  - CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
  - CVE-2017-5459: Buffer overflow in WebGL
  - CVE-2017-5462: DRBG flaw in NSS
  - CVE-2017-5455: Sandbox escape through internal feed reader APIs
  - CVE-2017-5454: Sandbox escape allowing file system read access through file picker
  - CVE-2017-5456: Sandbox escape allowing local file system access
  - CVE-2017-5451: Addressbar spoofing with onblur event

- General
  - CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842)

Bugfixes:
- workaround for Firefox hangs (bsc#1031485, bsc#1025108)
- Update to gcc-5-branch head.
  * Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460),
    (bsc#930496), (bsc#930392) and (bsc#955382).
- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)
- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)
- Fix libffi include install.  (bsc#935510)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-22"/>
	<updated date="2017-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930392">SUSE bug 930392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930496">SUSE bug 930496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935510">SUSE bug 935510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954002">SUSE bug 954002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581943" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581944" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581945" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581946" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581947" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581948" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581949" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581950" comment="libfreebl3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581951" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581952" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581953" comment="libsoftokn3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581954" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581955" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581956" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581957" comment="mozilla-nss-x86-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581943" comment="MozillaFirefox-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581944" comment="MozillaFirefox-branding-SLED-52-24.3.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581945" comment="MozillaFirefox-translations-52.2.0esr-72.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581946" comment="firefox-libffi4-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581947" comment="firefox-libstdc++6-5.3.1+r233831-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581948" comment="libfreebl3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581949" comment="libfreebl3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581950" comment="libfreebl3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581951" comment="libsoftokn3-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581952" comment="libsoftokn3-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581953" comment="libsoftokn3-x86-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581954" comment="mozilla-nss-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581955" comment="mozilla-nss-32bit-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581956" comment="mozilla-nss-tools-3.29.5-47.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581957" comment="mozilla-nss-x86-3.29.5-47.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41282" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031485" ref_url="https://bugzilla.suse.com/1031485" source="BUGZILLA"/>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<description>


Mozilla Firefox was updated to the ESR 52.3 release (bsc#1052829)

Following security issues were fixed:

* MFSA 2017-19/CVE-2017-7807: Domain hijacking through AppCache fallback
* MFSA 2017-19/CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts
* MFSA 2017-19/CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID
* MFSA 2017-19/CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections
* MFSA 2017-19/CVE-2017-7787: Same-origin policy bypass with iframes through page reloads
* MFSA 2017-19/CVE-2017-7786: Buffer overflow while painting non-displayable SVG
* MFSA 2017-19/CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM
* MFSA 2017-19/CVE-2017-7784: Use-after-free with image observers
* MFSA 2017-19/CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements
* MFSA 2017-19/CVE-2017-7798: XUL injection in the style editor in devtools
* MFSA 2017-19/CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher
* MFSA 2017-19/CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3
* MFSA 2017-19/CVE-2017-7800: Use-after-free in WebSockets during disconnection
* MFSA 2017-19/CVE-2017-7801: Use-after-free with marquee during window resizing
* MFSA 2017-19/CVE-2017-7802: Use-after-free resizing image elements
* MFSA 2017-19/CVE-2017-7803: CSP containing 'sandbox' improperly applied

This update also fixes:

-  fixed firefox hangs after a while in FUTEX_WAIT_PRIVATE if
   cgroups enabled and running on cpu &gt;=1 (bsc#1031485)
-  The Itanium ia64 build was fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031485">SUSE bug 1031485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581958" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581959" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581960" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581958" comment="MozillaFirefox-52.3.0esr-72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581959" comment="MozillaFirefox-branding-SLED-52-24.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581960" comment="MozillaFirefox-translations-52.3.0esr-72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41283" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581961" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581962" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581961" comment="MozillaFirefox-52.5.0esr-72.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581962" comment="MozillaFirefox-translations-52.5.0esr-72.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41284" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581963" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581964" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581963" comment="MozillaFirefox-52.6.0esr-72.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581964" comment="MozillaFirefox-translations-52.6.0esr-72.20.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41285" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581965" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581966" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581965" comment="MozillaFirefox-52.7.3esr-72.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581966" comment="MozillaFirefox-translations-52.7.3esr-72.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41286" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 52.8 release fixes the following issues:

Update to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581967" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581968" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581967" comment="MozillaFirefox-52.8.0esr-72.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581968" comment="MozillaFirefox-translations-52.8.0esr-72.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41287" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581969" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581970" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581969" comment="MozillaFirefox-52.8.1esr-72.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581970" comment="MozillaFirefox-translations-52.8.1esr-72.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41288" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581971" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581972" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581971" comment="MozillaFirefox-52.9.0esr-72.38.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581972" comment="MozillaFirefox-translations-52.9.0esr-72.38.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41289" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137792" ref_url="https://bugzilla.suse.com/1137792" source="BUGZILLA"/>
		<reference ref_id="1138614" ref_url="https://bugzilla.suse.com/1138614" source="BUGZILLA"/>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 60.8 fixes the following issues:

Security issues fixed:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).
- CVE-2019-11708: Fix sandbox escape using Prompt:Open (bsc#1138872).
- CVE-2019-11707: Fixed a type confusion vulnerability in Arrary.pop (bsc#1138614)    

Non-security issues fixed:

- Fix broken language plugins (bsc#1137792)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137792">SUSE bug 1137792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570564" comment="MozillaFirefox-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570565" comment="MozillaFirefox-translations-common-60.8.0esr-78.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570566" comment="MozillaFirefox-translations-other-60.8.0esr-78.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41290" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).

Update mozilla-nss to version 3.47.1 (bsc#1158527):

Security issues fixed:

- CVE-2019-11745: EncryptUpdate should use maxout, not block size.

Bug fixes:

- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)

Update mozilla-nspr to version 4.23:

Bug fixes:

- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-20"/>
	<updated date="2019-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570567" comment="MozillaFirefox-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570568" comment="MozillaFirefox-translations-common-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570569" comment="MozillaFirefox-translations-other-68.3.0-78.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570570" comment="libfreebl3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570571" comment="libfreebl3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570572" comment="libsoftokn3-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570573" comment="libsoftokn3-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570574" comment="mozilla-nspr-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570575" comment="mozilla-nspr-32bit-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581973" comment="mozilla-nspr-devel-4.23-29.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570576" comment="mozilla-nss-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570577" comment="mozilla-nss-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570578" comment="mozilla-nss-certs-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570579" comment="mozilla-nss-certs-32bit-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581974" comment="mozilla-nss-devel-3.47.1-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570580" comment="mozilla-nss-tools-3.47.1-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41291" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570581" comment="MozillaFirefox-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570582" comment="MozillaFirefox-translations-common-68.4.1-78.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570583" comment="MozillaFirefox-translations-other-68.4.1-78.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41292" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="1163368" ref_url="https://bugzilla.suse.com/1163368" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to version 68.5.0 ESR (bsc#1163368).


Security issues fixed:

- CVE-2020-6796: Fixed a missing bounds check on shared memory in the parent process (bsc#1163368).
- CVE-2020-6798: Fixed a JavaScript code injection issue caused by the incorrect parsing of template tags (bsc#1163368).
- CVE-2020-6799: Fixed a local arbitrary code execution issue when handling PDF links from other applications (bsc#1163368).
- CVE-2020-6800: Fixed several memory safety bugs (bsc#1163368).


Non-security issues fixed:

- Fixed various issues opening files with spaces in their path (bmo#1601905, bmo#1602726).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570584" comment="MozillaFirefox-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570585" comment="MozillaFirefox-translations-common-68.5.0-78.61.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570586" comment="MozillaFirefox-translations-other-68.5.0-78.61.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41293" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665)

- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully
  escape website-controlled data potentially leading to command injection
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally
  identifiable information were exposed to websites with camera or microphone
  permission
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570587" comment="MozillaFirefox-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570588" comment="MozillaFirefox-translations-common-68.6.0-78.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570589" comment="MozillaFirefox-translations-other-68.6.0-78.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41294" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.6.1 ESR
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570590" comment="MozillaFirefox-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570591" comment="MozillaFirefox-translations-common-68.6.1-78.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570592" comment="MozillaFirefox-translations-other-68.6.1-78.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41295" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570593" comment="MozillaFirefox-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570594" comment="MozillaFirefox-translations-common-68.7.0-78.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570595" comment="MozillaFirefox-translations-other-68.7.0-78.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41296" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1162828" ref_url="https://bugzilla.suse.com/1162828" source="BUGZILLA"/>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:


- Firefox Extended Support Release 68.8.0 ESR
  MFSA 2020-17 (bsc#1171186)
  * CVE-2020-12387 (bmo#1545345)
    Use-after-free during worker shutdown
  * CVE-2020-12388 (bmo#1618911)
    Sandbox escape with improperly guarded Access Tokens
  * CVE-2020-12389 (bmo#1554110)
    Sandbox escape with improperly separated process types
  * CVE-2020-6831 (bmo#1632241)
    Buffer overflow in SCTP chunk input validation
  * CVE-2020-12392 (bmo#1614468)
    Arbitrary local file access with 'Copy as cURL'
  * CVE-2020-12393 (bmo#1615471)
    Devtools' 'Copy as cURL' feature did not fully escape
    website-controlled data, potentially leading to command
    injection
  * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704,
    bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076,
    bmo#1631508)
    Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8

- Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
  and firefox-libgcc_s1, those packages don't provide some capabilities,
  we have to disable AutoReqProv in MozillaFirefox too so they're not added as
  automatic requirements. (bsc#1162828)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162828">SUSE bug 1162828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570596" comment="MozillaFirefox-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570597" comment="MozillaFirefox-translations-common-68.8.0-78.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570598" comment="MozillaFirefox-translations-other-68.8.0-78.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41297" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570599" comment="MozillaFirefox-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570600" comment="MozillaFirefox-translations-common-68.9.0-78.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570601" comment="MozillaFirefox-translations-other-68.9.0-78.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41298" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570602" comment="MozillaFirefox-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570603" comment="MozillaFirefox-branding-SLED-78-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570604" comment="MozillaFirefox-translations-common-78.0.1-78.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570605" comment="MozillaFirefox-translations-other-78.0.1-78.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41299" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Fix broken translation-loading (boo#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more

- Mozilla Firefox 78.1 ESR
  * Fixed: Various stability, functionality, and security fixe
    (MFSA 2020-32) (bsc#1174538).
  * CVE-2020-15652 (bmo#1634872)
    Potential leak of redirect targets when loading scripts in a
    worker
  * CVE-2020-6514 (bmo#1642792)
    WebRTC data channel leaks internal address to peer
  * CVE-2020-15655 (bmo#1645204)
    Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653 (bmo#1521542)
    Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463 (bmo#1635293)
    Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656 (bmo#1647293)
    Type confusion for special arguments in IonMonkey
  * CVE-2020-15658 (bmo#1637745)
    Overriding file type when saving to disk
  * CVE-2020-15657 (bmo#1644954)
    DLL hijacking due to incorrect loading path
  * CVE-2020-15654 (bmo#1648333)
    Custom cursor can overlay user interface
  * CVE-2020-15659 (bmo#1550133, bmo#1633880, bmo#1643613,
    bmo#1644839, bmo#1645835, bmo#1646006, bmo#1646787,
    bmo#1649347, bmo#1650811, bmo#1651678)
    Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

- Add sle11-icu-generation-python3.patch to fix icu-generation
  on big endian platforms 

- Mozilla Firefox 78.0.2 ESR
  * MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570606" comment="MozillaFirefox-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570607" comment="MozillaFirefox-translations-common-78.1.0-78.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570608" comment="MozillaFirefox-translations-other-78.1.0-78.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41300" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570609" comment="MozillaFirefox-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570610" comment="MozillaFirefox-translations-common-78.2.0-78.90.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570611" comment="MozillaFirefox-translations-other-78.2.0-78.90.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41301" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1175046" ref_url="https://bugzilla.suse.com/1175046" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
- Fixed problems with compiler builtins on SLE-11 (bsc#1175046)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175046">SUSE bug 1175046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570612" comment="MozillaFirefox-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570613" comment="MozillaFirefox-translations-common-78.3.0-78.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570614" comment="MozillaFirefox-translations-other-78.3.0-78.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41302" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570615" comment="MozillaFirefox-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570616" comment="MozillaFirefox-translations-common-78.4.0-78.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570617" comment="MozillaFirefox-translations-other-78.4.0-78.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41303" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007762.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570618" comment="MozillaFirefox-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570619" comment="MozillaFirefox-translations-common-78.4.1-78.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570620" comment="MozillaFirefox-translations-other-78.4.1-78.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41304" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570621" comment="MozillaFirefox-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570622" comment="MozillaFirefox-translations-common-78.5.0-78.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570623" comment="MozillaFirefox-translations-other-78.5.0-78.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41305" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570624" comment="MozillaFirefox-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570625" comment="MozillaFirefox-translations-common-78.6.0-78.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570626" comment="MozillaFirefox-translations-other-78.6.0-78.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41306" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008172.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570627" comment="MozillaFirefox-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570628" comment="MozillaFirefox-translations-common-78.6.1-78.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570629" comment="MozillaFirefox-translations-other-78.6.1-78.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41307" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570630" comment="MozillaFirefox-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570631" comment="MozillaFirefox-translations-common-78.7.0-78.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570632" comment="MozillaFirefox-translations-other-78.7.0-78.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41308" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570636" comment="MozillaFirefox-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570637" comment="MozillaFirefox-translations-common-78.8.0-78.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570638" comment="MozillaFirefox-translations-other-78.8.0-78.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41309" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570639" comment="MozillaFirefox-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570640" comment="MozillaFirefox-translations-common-78.9.0-78.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570641" comment="MozillaFirefox-translations-other-78.9.0-78.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41310" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570642" comment="MozillaFirefox-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570643" comment="MozillaFirefox-translations-common-78.10.0-78.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570644" comment="MozillaFirefox-translations-other-78.10.0-78.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41311" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009570645" comment="MozillaFirefox-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570646" comment="MozillaFirefox-translations-common-78.11.0-78.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570647" comment="MozillaFirefox-translations-other-78.11.0-78.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41312" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625243" comment="MozillaFirefox-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625244" comment="MozillaFirefox-translations-common-78.12.0-78.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625245" comment="MozillaFirefox-translations-other-78.12.0-78.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41313" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630646" comment="MozillaFirefox-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630647" comment="MozillaFirefox-translations-common-78.13.0-78.137.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630648" comment="MozillaFirefox-translations-other-78.13.0-78.137.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41314" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-01"/>
	<updated date="2021-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634730" comment="MozillaFirefox-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634731" comment="MozillaFirefox-translations-common-78.14.0-78.140.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634732" comment="MozillaFirefox-translations-other-78.14.0-78.140.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41315" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659367" comment="MozillaFirefox-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659368" comment="MozillaFirefox-translations-common-91.4.0-78.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659369" comment="MozillaFirefox-translations-other-91.4.0-78.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41316" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663814" comment="MozillaFirefox-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663815" comment="MozillaFirefox-translations-common-91.5.0-78.159.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663816" comment="MozillaFirefox-translations-other-91.5.0-78.159.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41317" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668898" comment="MozillaFirefox-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668899" comment="MozillaFirefox-translations-common-91.6.0-78.162.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668900" comment="MozillaFirefox-translations-other-91.6.0-78.162.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41318" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672457" comment="MozillaFirefox-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672458" comment="MozillaFirefox-translations-common-91.7.0-78.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672459" comment="MozillaFirefox-translations-other-91.7.0-78.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41319" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577225" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577226" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577227" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577228" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577229" comment="libfreebl3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577230" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577231" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577232" comment="libsoftokn3-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577233" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577234" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577235" comment="mozilla-nspr-x86-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577236" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577237" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577238" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577239" comment="mozilla-nss-x86-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41320" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581975" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581976" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581977" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581978" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581979" comment="libfreebl3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581980" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581981" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581982" comment="libsoftokn3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581983" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581984" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581985" comment="mozilla-nspr-x86-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581986" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581987" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581988" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581989" comment="mozilla-nss-x86-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581975" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581976" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581977" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581978" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581979" comment="libfreebl3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581980" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581981" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581982" comment="libsoftokn3-x86-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581983" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581984" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581985" comment="mozilla-nspr-x86-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581986" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581987" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581988" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581989" comment="mozilla-nss-x86-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41321" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, rust-cbindgen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652557" comment="MozillaFirefox-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652558" comment="MozillaFirefox-branding-SLED-91-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652559" comment="MozillaFirefox-translations-common-91.2.0-78.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652560" comment="MozillaFirefox-translations-other-91.2.0-78.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41322" version="1" class="patch">
	<metadata>
		<title>Recommended update for NetworkManager-kde4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="663413" ref_url="https://bugzilla.suse.com/663413" source="BUGZILLA"/>
		<reference ref_id="726349" ref_url="https://bugzilla.suse.com/726349" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002088.html" source="SUSE-SU"/>
		<description>
This NetworkManager-kde4 update fixes the following security and non security issues: 

- Fixed a long standing security issue. This makes knetworkmanager probe the RADIUS server for a CA certificate subject and hash if no CA certificate is specified. knetworkmanager then stores this data and send it to NetworkManager for it to do a network validation in the absence of a real certificate (bsc#726349)

- Disabled the loading by default of the NetworkManager plasma applet since it doesn't work.
- Fixed a crash due to the use of an uninitialized variable in the plasma applet in case someone runs it manually (bsc#663413)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/663413">SUSE bug 663413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726349">SUSE bug 726349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581990" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581991" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581992" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581993" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581994" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581995" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581990" comment="NetworkManager-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581991" comment="NetworkManager-kde4-lang-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581992" comment="NetworkManager-kde4-libs-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581993" comment="NetworkManager-openvpn-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581994" comment="NetworkManager-pptp-kde4-0.9.svn1043876-1.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581995" comment="plasmoid-networkmanagement-0.9.svn1043876-1.3.15 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41323" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581996" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581997" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581998" comment="OpenEXR-x86-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581996" comment="OpenEXR-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581997" comment="OpenEXR-32bit-1.6.1-83.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581998" comment="OpenEXR-x86-1.6.1-83.17.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41324" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581999" comment="OpenEXR-1.6.1-83.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582000" comment="OpenEXR-32bit-1.6.1-83.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41325" version="1" class="patch">
	<metadata>
		<title>Security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<description>
This update for OpenEXR fixes the following issues:

- CVE-2021-20298: Fixed out-of-memory in B44Compressor (bsc#1188460).
- CVE-2021-20300: Fixed integer-overflow in Imf_2_5:hufUncompress (bsc#1188458).
- CVE-2021-20303: Fixed heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffe (bsc#1188457).
- CVE-2021-20304: Fixed undefined-shift in Imf_2_5:hufDecode (bsc#1188461).
- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657137" comment="OpenEXR-1.6.1-83.17.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657138" comment="OpenEXR-32bit-1.6.1-83.17.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41326" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1124799" ref_url="https://bugzilla.suse.com/1124799" source="BUGZILLA"/>
		<reference ref_id="1124800" ref_url="https://bugzilla.suse.com/1124800" source="BUGZILLA"/>
		<reference ref_id="1124802" ref_url="https://bugzilla.suse.com/1124802" source="BUGZILLA"/>
		<reference ref_id="1124803" ref_url="https://bugzilla.suse.com/1124803" source="BUGZILLA"/>
		<reference ref_id="1124805" ref_url="https://bugzilla.suse.com/1124805" source="BUGZILLA"/>
		<reference ref_id="1124806" ref_url="https://bugzilla.suse.com/1124806" source="BUGZILLA"/>
		<reference ref_id="1124824" ref_url="https://bugzilla.suse.com/1124824" source="BUGZILLA"/>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1124826" ref_url="https://bugzilla.suse.com/1124826" source="BUGZILLA"/>
		<reference ref_id="1124827" ref_url="https://bugzilla.suse.com/1124827" source="BUGZILLA"/>
		<reference ref_id="1125099" ref_url="https://bugzilla.suse.com/1125099" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

Security issues fixed:	  

- CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(bsc#1124806).
- CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (bsc#1125099).
- CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124799).
- CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (bsc#1124805).
- CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. (bsc#1124827).
- CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (bsc#1124826).
- CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in video/SDL_pixels.c (bsc#1124824).
- CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (bsc#1124803).
- CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (bsc#1124802).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect function in SDL_surface.c (bsc#1124825).	  
- CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in audio/SDL_wave.c (bsc#1124800).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582001" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582002" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582003" comment="SDL-x86-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582001" comment="SDL-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582002" comment="SDL-32bit-1.2.13-106.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582003" comment="SDL-x86-1.2.13-106.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41327" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1124825" ref_url="https://bugzilla.suse.com/1124825" source="BUGZILLA"/>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c (bsc#1181201).
- CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (bsc#1124825).
- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c (bsc#1181202).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679745" comment="SDL-1.2.13-106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679746" comment="SDL-32bit-1.2.13-106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41328" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003370.html" source="SUSE-SU"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-02"/>
	<updated date="2017-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009570690" comment="SuSEfirewall2-3.6_SVNr208-2.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41329" version="1" class="patch">
	<metadata>
		<title>security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<description>


This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#939709 (XSA-139):  Use after free in QEMU/Xen
  block unplug protocol (CVE-2015-5166)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41330" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582004" comment="libadns1-1.4-75.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41331" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010061.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664251" comment="aide-0.13.1-40.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41332" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1112916" ref_url="https://bugzilla.suse.com/1112916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10729" ref_url="https://www.suse.com/security/cve/CVE-2016-10729/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004963.html" source="SUSE-SU"/>
		<description>
This update for amanda fixes the following issues:

Security issue fixed:

- CVE-2016-10729: Fixed a local privilege escalation from amanda to root via unsafe tar command options (bsc#1112916).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112916">SUSE bug 1112916</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10729/">CVE-2016-10729</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582005" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582005" comment="amanda-2.5.2.1-188.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41333" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1100053" ref_url="https://bugzilla.suse.com/1100053" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004578.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

Security issue fixed:

- CVE-2018-10886: Fixed a path traversal vulnerability in malformed zip file
  paths, which allowed arbitrary file writes and could potentially lead to
  code execution (bsc#1100053)

Other changes made:

- Removed support for javadoc
- Default value for stripAbsolutePathSpec changed to 'true'
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100053">SUSE bug 1100053</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564215" comment="ant-1.7.1-20.11.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564232" comment="ant-trax-1.7.1-16.11.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41334" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="444878" ref_url="https://bugzilla.suse.com/444878" source="BUGZILLA"/>
		<reference ref_id="931002" ref_url="https://bugzilla.suse.com/931002" source="BUGZILLA"/>
		<reference ref_id="938728" ref_url="https://bugzilla.suse.com/938728" source="BUGZILLA"/>
		<reference ref_id="941676" ref_url="https://bugzilla.suse.com/941676" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001657.html" source="SUSE-SU"/>
		<description>
Apache was updated to fix one security vulnerability and two bugs.

Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)

Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-01"/>
	<updated date="2015-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/444878">SUSE bug 444878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931002">SUSE bug 931002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941676">SUSE bug 941676</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577267" comment="apache2-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577268" comment="apache2-doc-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577269" comment="apache2-example-pages-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577270" comment="apache2-prefork-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577271" comment="apache2-utils-2.2.12-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577272" comment="apache2-worker-2.2.12-59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41335" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="988488" ref_url="https://bugzilla.suse.com/988488" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002158.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

* It used to be possible to set an arbitrary $HTTP_PROXY environment variable
  for request handlers -- like CGI scripts -- by including a specially crafted
  HTTP header in the request (CVE-2016-5387). As a result, these server
  components would potentially direct all their outgoing HTTP traffic through a
  malicious proxy server. This patch fixes the issue: the updated Apache server
  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes
  (unless a value has been explicitly configured by the administrator in the
  configuration file). (bsc#988488)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-18"/>
	<updated date="2016-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582006" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582007" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582008" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582009" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582010" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582011" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582006" comment="apache2-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582007" comment="apache2-doc-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582008" comment="apache2-example-pages-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582009" comment="apache2-prefork-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582010" comment="apache2-utils-2.2.12-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582011" comment="apache2-worker-2.2.12-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41336" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

Security issues fixed:
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash,
  resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain
  misinterpretation (bsc#1016715).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582012" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582013" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582014" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582015" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582016" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582017" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582012" comment="apache2-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582013" comment="apache2-doc-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582014" comment="apache2-example-pages-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582015" comment="apache2-prefork-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582016" comment="apache2-utils-2.2.12-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582017" comment="apache2-worker-2.2.12-69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41337" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="951692" ref_url="https://bugzilla.suse.com/951692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003074.html" source="SUSE-SU"/>
		<description>
This update provides apache2 2.2.34, which brings many fixes and enhancements:

Security issues fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)
- Don't put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)
- Allow single-char field names inadvertently disallowed in 2.2.32.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951692">SUSE bug 951692</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582018" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582019" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582020" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582021" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582022" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582023" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582018" comment="apache2-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582019" comment="apache2-doc-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582020" comment="apache2-example-pages-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582021" comment="apache2-prefork-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582022" comment="apache2-utils-2.2.34-70.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582023" comment="apache2-worker-2.2.34-70.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41338" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045061" ref_url="https://bugzilla.suse.com/1045061" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="1052830" ref_url="https://bugzilla.suse.com/1052830" source="BUGZILLA"/>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="1064561" ref_url="https://bugzilla.suse.com/1064561" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- Allow disabling SNI on proxy connections using 'SetEnv proxy-disable-sni 1' in the configuration files. (bsc#1052830)
- Allow ECDH again in mod_ssl, it had been incorrectly disabled with the 2.2.34 update. (bsc#1064561)

Following security issue has been fixed:

- CVE-2017-9798: A use-after-free in the OPTIONS command could be used by attackers to disclose memory of the apache server process, when htaccess uses incorrect Limit statement. (bsc#1058058)

Additionally, references to the following security issues, fixed by the previous version-update of apache2
to Apache HTTPD 2.2.34 have been added:

- CVE-2017-7668: The HTTP strict parsing introduced a bug in token list parsing, which allowed ap_find_token() to
  search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may
  have be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. (bsc#1045061)
- CVE-2017-3169: mod_ssl may have de-referenced a NULL pointer when third-party modules call 
  ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS. (bsc#1045062)
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have
  lead to authentication requirements being bypassed. (bsc#1045065)
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type
  response header. (bsc#1045060)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-30"/>
	<updated date="2017-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052830">SUSE bug 1052830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064561">SUSE bug 1064561</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582024" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582025" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582026" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582027" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582028" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582029" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582024" comment="apache2-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582025" comment="apache2-doc-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582026" comment="apache2-example-pages-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582027" comment="apache2-prefork-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582028" comment="apache2-utils-2.2.34-70.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582029" comment="apache2-worker-2.2.34-70.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41339" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086776" ref_url="https://bugzilla.suse.com/1086776" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- security update:
  * CVE-2018-1301: Specially crafted requests, in debug mode, could lead to denial of service. [bsc#1086817]
  * CVE-2017-15710: failure in the language fallback handling could lead to denial of service.  [bsc#1086776]
  * CVE-2018-1312: Seed wrongly generated could lead to replay attack in cluster environments. [bsc#1086775]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582030" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582031" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582032" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582033" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582034" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582035" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582030" comment="apache2-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582031" comment="apache2-doc-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582032" comment="apache2-example-pages-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582033" comment="apache2-prefork-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582034" comment="apache2-utils-2.2.34-70.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582035" comment="apache2-worker-2.2.34-70.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41340" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582036" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582037" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582038" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582039" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582040" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582041" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582036" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582037" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582038" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582039" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582040" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582041" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582036" comment="apache2-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582037" comment="apache2-doc-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582038" comment="apache2-example-pages-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582039" comment="apache2-prefork-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582040" comment="apache2-utils-2.2.34-70.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582041" comment="apache2-worker-2.2.34-70.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41341" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-21"/>
	<updated date="2020-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582042" comment="apache2-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582043" comment="apache2-doc-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582044" comment="apache2-example-pages-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582045" comment="apache2-prefork-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582046" comment="apache2-utils-2.2.34-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582047" comment="apache2-worker-2.2.34-70.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41342" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582048" comment="apache2-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582049" comment="apache2-doc-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582050" comment="apache2-example-pages-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582051" comment="apache2-prefork-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582052" comment="apache2-utils-2.2.34-70.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582053" comment="apache2-worker-2.2.34-70.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41343" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633957" comment="apache2-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633958" comment="apache2-doc-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633959" comment="apache2-example-pages-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633960" comment="apache2-prefork-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633961" comment="apache2-utils-2.2.34-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633962" comment="apache2-worker-2.2.34-70.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41344" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673638" comment="apache2-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673639" comment="apache2-doc-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673640" comment="apache2-example-pages-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673641" comment="apache2-prefork-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673642" comment="apache2-utils-2.2.34-70.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673643" comment="apache2-worker-2.2.34-70.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41345" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="927845" ref_url="https://bugzilla.suse.com/927845" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3970-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183970-1.html" source="SUSE-SU"/>
		<description>

This update for apache2-mod_jk fixes the following issues:

Security issues fixed:

- CVE-2018-11759: Fixed connector path traversal due to mishandled HTTP requests in httpd (bsc#1114612).
- CVE-2014-8111: Apache Tomcat Connectors (mod_jk) ignored JkUnmount rules for subtrees of previous JkMount rules, which allowed remote attackers to access otherwise restricted artifacts via unspecified vectors (bsc#927845).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582054" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582054" comment="apache2-mod_jk-1.2.40-0.2.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41346" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="975394" ref_url="https://bugzilla.suse.com/975394" source="BUGZILLA"/>
		<reference ref_id="979688" ref_url="https://bugzilla.suse.com/979688" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<description>

This update provides apache2-mod_nss 1.0.14, which brings several fixes and
enhancements:

- SHA256 cipher names change spelling from *_sha256 to *_sha_256.
- Drop mod_nss_migrate.pl and use upstream migrate script instead.
- Check for Apache user owner/group read permissions of NSS database at startup.
- Update default ciphers to something more modern and secure.
- Check for host and netstat commands in gencert before trying to use them.
- Don't ignore NSSProtocol when NSSFIPS is enabled.
- Use proper shell syntax to avoid creating /0 in gencert.
- Add server support for DHE ciphers.
- Extract SAN from server/client certificates into env.
- Fix memory leaks and other coding issues caught by clang analyzer.
- Add support for Server Name Indication (SNI)
- Add support for SNI for reverse proxy connections.
- Add RenegBufferSize? option.
- Add support for TLS Session Tickets (RFC 5077).
- Implement a slew more OpenSSL cipher macros.
- Fix a number of illegal memory accesses and memory leaks.
- Support for SHA384 ciphers if they are available in the version of NSS mod_nss is built against.
- Add the SECURE_RENEG environment variable.
- Add some hints when NSS database cannot be initialized.
- Code cleanup including trailing whitespace and compiler warnings.
- Modernize autotools configuration slightly, add config.h.
- Add small test suite for SNI.
- Add compatibility for mod_ssl-style cipher definitions.
- Add Camelia ciphers.
- Remove Fortezza ciphers.
- Add TLSv1.2-specific ciphers.
- Initialize cipher list when re-negotiating handshake.
- Completely remove support for SSLv2.
- Add support for sqlite NSS databases.
- Compare subject CN and VS hostname during server start up.
- Add support for enabling TLS v1.2.
- Don't enable SSL 3 by default. (CVE-2014-3566)
- Improve protocol testing.
- Add nss_pcache man page.
- Fix argument handling in nss_pcache.
- Support httpd 2.4+.
- Allow users to configure a helper to ask for certificate passphrases via
  NSSPassPhraseDialog. (bsc#975394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-16"/>
	<updated date="2016-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/975394">SUSE bug 975394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979688">SUSE bug 979688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582055" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582055" comment="apache2-mod_nss-1.0.14-0.4.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41347" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1156944" ref_url="https://bugzilla.suse.com/1156944" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2767" ref_url="https://www.suse.com/security/cve/CVE-2011-2767/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14266-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-202014266-1.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_perl fixes the following issues:

- CVE-2011-2767: Fixed a vulnerability which could have allowed 
  perl code execution in the context of user account (bsc#1156944).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156944">SUSE bug 1156944</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2011-2767/">CVE-2011-2767</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582056" comment="apache2-mod_perl-2.0.4-40.63.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41348" version="1" class="patch">
	<metadata>
		<title>Security update for apport (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947731" ref_url="https://bugzilla.suse.com/947731" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1338" ref_url="https://www.suse.com/security/cve/CVE-2015-1338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003060.html" source="SUSE-SU"/>
		<description>
This update for apport fixes the following issues:

Security issue fixed:
- CVE-2015-1338: Insecurely created crash dumps could lead to a DoS or privilege escalation through
  malicious symlinks. (bsc#947731)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-24"/>
	<updated date="2017-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947731">SUSE bug 947731</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1338/">CVE-2015-1338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582057" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582058" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582059" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582057" comment="apport-0.114-12.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582058" comment="apport-crashdb-sle-0.114-0.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582059" comment="apport-gtk-0.114-12.8.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41349" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009093.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009616452" comment="arpwatch-2.1a15-131.23.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41350" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009287.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627837" comment="aspell-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627838" comment="aspell-32bit-0.60.6-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627839" comment="aspell-ispell-0.60.6-26.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41351" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582060" comment="atftp-0.7.0-135.23.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41352" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<description>

This update for audiofile fixes the following issues:

Security issues fixed:
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582061" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582062" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582063" comment="audiofile-x86-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582061" comment="audiofile-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582062" comment="audiofile-32bit-0.2.6-142.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582063" comment="audiofile-x86-0.2.6-142.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41353" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577330" comment="augeas-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577331" comment="augeas-lenses-0.9.0-3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577332" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41354" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issues fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
- CVE-2014-8119: Fix improper handling of escaped strings leading to memory corruption (bsc#925225).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582064" comment="augeas-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582065" comment="augeas-lenses-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582066" comment="libaugeas0-0.9.0-3.21.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582064" comment="augeas-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582065" comment="augeas-lenses-0.9.0-3.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582066" comment="libaugeas0-0.9.0-3.21.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41355" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1120281" ref_url="https://bugzilla.suse.com/1120281" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005098.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

Security issue fixed:

- CVE-2018-1000845: Fixed DNS amplification and reflection to spoofed addresses (DOS) (bsc#1120281)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120281">SUSE bug 1120281</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582067" comment="avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582068" comment="avahi-lang-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582069" comment="avahi-utils-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582070" comment="libavahi-client3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582071" comment="libavahi-client3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582072" comment="libavahi-client3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582073" comment="libavahi-common3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582074" comment="libavahi-common3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582075" comment="libavahi-common3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582076" comment="libavahi-core5-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582077" comment="libavahi-glib1-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582078" comment="libavahi-glib1-32bit-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582079" comment="libavahi-glib1-x86-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582080" comment="libdns_sd-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582081" comment="libdns_sd-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582082" comment="libdns_sd-x86-0.6.23-35.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582067" comment="avahi-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582068" comment="avahi-lang-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582069" comment="avahi-utils-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582070" comment="libavahi-client3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582071" comment="libavahi-client3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582072" comment="libavahi-client3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582073" comment="libavahi-common3-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582074" comment="libavahi-common3-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582075" comment="libavahi-common3-x86-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582076" comment="libavahi-core5-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582077" comment="libavahi-glib1-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582078" comment="libavahi-glib1-32bit-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582079" comment="libavahi-glib1-x86-0.6.23-35.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582080" comment="libdns_sd-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582081" comment="libdns_sd-32bit-0.6.23-35.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582082" comment="libdns_sd-x86-0.6.23-35.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41356" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103658" ref_url="https://bugzilla.suse.com/1103658" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004667.html" source="SUSE-SU"/>
		<description>
This update for axis fixes the following security issue:

- CVE-2018-8032: Prevent cross-site scripting (XSS) attack in the default
  servlet/services (bsc#1103658).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-12"/>
	<updated date="2018-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577384" comment="axis-1.4-236.236.44.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577384" comment="axis-1.4-236.236.44.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41357" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="959755" ref_url="https://bugzilla.suse.com/959755" source="BUGZILLA"/>
		<reference ref_id="971410" ref_url="https://bugzilla.suse.com/971410" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially
  crafted SHELLOPTS+PS4 variables. (bsc#1001299)
- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when
  $HOSTNAME was expanded in the prompt. (bsc#1000396)

The following bugs were fixed:

- bsc#971410: Scripts could terminate unexpectedly due to mishandled recursive traps.
- bsc#959755: Clarify that the files /etc/profile as well as /etc/bash.bashrc may source
  other files as well even if the bash does not.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959755">SUSE bug 959755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971410">SUSE bug 971410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582083" comment="bash-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582084" comment="bash-doc-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582085" comment="bash-x86-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582086" comment="libreadline5-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582087" comment="libreadline5-32bit-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582088" comment="libreadline5-x86-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582089" comment="readline-doc-5.2-147.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582083" comment="bash-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582084" comment="bash-doc-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582085" comment="bash-x86-3.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582086" comment="libreadline5-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582087" comment="libreadline5-32bit-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582088" comment="libreadline5-x86-5.2-147.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582089" comment="readline-doc-5.2-147.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41358" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1031729" ref_url="https://bugzilla.suse.com/1031729" source="BUGZILLA"/>
		<reference ref_id="976776" ref_url="https://bugzilla.suse.com/976776" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<description>

This update for bash fixed several issues

This security issue was fixed:

- CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845).

This non-security issue was fixed:

- Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031729">SUSE bug 1031729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976776">SUSE bug 976776</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582090" comment="bash-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582091" comment="bash-doc-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582092" comment="bash-x86-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582093" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582094" comment="libreadline5-32bit-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582095" comment="libreadline5-x86-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582096" comment="readline-doc-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582090" comment="bash-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582091" comment="bash-doc-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582092" comment="bash-x86-3.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582093" comment="libreadline5-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582094" comment="libreadline5-32bit-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582095" comment="libreadline5-x86-5.2-147.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582096" comment="readline-doc-5.2-147.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41359" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577403" comment="bind-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577404" comment="bind-chrootenv-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577405" comment="bind-doc-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577406" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577407" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577408" comment="bind-libs-x86-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577409" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41360" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577410" comment="bind-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577411" comment="bind-chrootenv-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577412" comment="bind-doc-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577413" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577414" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577415" comment="bind-libs-x86-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577416" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41361" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577417" comment="bind-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577418" comment="bind-chrootenv-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577419" comment="bind-doc-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577420" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577421" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577422" comment="bind-libs-x86-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577423" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41362" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577424" comment="bind-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577425" comment="bind-chrootenv-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577426" comment="bind-doc-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577427" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577428" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577429" comment="bind-libs-x86-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577430" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41363" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582097" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582098" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582099" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582100" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582101" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582102" comment="bind-libs-x86-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582103" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582097" comment="bind-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582098" comment="bind-chrootenv-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582099" comment="bind-doc-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582100" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582101" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582102" comment="bind-libs-x86-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582103" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41364" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000362" ref_url="https://bugzilla.suse.com/1000362" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service
vulnerability, where a crafted packet could cause the nameserver to abort. (CVE-2016-2776, bsc#1000362)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-27"/>
	<updated date="2016-09-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582104" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582105" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582106" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582107" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582108" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582109" comment="bind-libs-x86-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582110" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582104" comment="bind-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582105" comment="bind-chrootenv-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582106" comment="bind-doc-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582107" comment="bind-libs-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582108" comment="bind-libs-32bit-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582109" comment="bind-libs-x86-9.9.6P1-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582110" comment="bind-utils-9.9.6P1-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41365" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582111" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582112" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582113" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582114" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582115" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582116" comment="bind-libs-x86-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582117" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582111" comment="bind-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582112" comment="bind-chrootenv-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582113" comment="bind-doc-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582114" comment="bind-libs-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582115" comment="bind-libs-32bit-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582116" comment="bind-libs-x86-9.9.6P1-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582117" comment="bind-utils-9.9.6P1-0.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41366" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582118" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582119" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582120" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582121" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582122" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582123" comment="bind-libs-x86-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582124" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582118" comment="bind-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582119" comment="bind-chrootenv-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582120" comment="bind-doc-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582121" comment="bind-libs-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582122" comment="bind-libs-32bit-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582123" comment="bind-libs-x86-9.9.6P1-0.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582124" comment="bind-utils-9.9.6P1-0.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41367" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582125" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582126" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582127" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582128" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582129" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582130" comment="bind-libs-x86-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582131" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582125" comment="bind-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582126" comment="bind-chrootenv-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582127" comment="bind-doc-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582128" comment="bind-libs-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582129" comment="bind-libs-32bit-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582130" comment="bind-libs-x86-9.9.6P1-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582131" comment="bind-utils-9.9.6P1-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41368" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following security issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service
(daemon crash) via a long request that uses the lightweight resolver protocol.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582132" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582133" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582134" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582135" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582136" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582137" comment="bind-libs-x86-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582138" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582132" comment="bind-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582133" comment="bind-chrootenv-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582134" comment="bind-doc-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582135" comment="bind-libs-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582136" comment="bind-libs-32bit-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582137" comment="bind-libs-x86-9.9.6P1-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582138" comment="bind-utils-9.9.6P1-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41369" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034162" ref_url="https://bugzilla.suse.com/1034162" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00018.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A regression in the fix for CVE-2017-3137 caused an assert in name.c (bsc#1034162)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582139" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582140" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582141" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582142" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582143" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582144" comment="bind-libs-x86-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582145" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582139" comment="bind-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582140" comment="bind-chrootenv-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582141" comment="bind-doc-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582142" comment="bind-libs-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582143" comment="bind-libs-32bit-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582144" comment="bind-libs-x86-9.9.6P1-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582145" comment="bind-utils-9.9.6P1-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41370" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582146" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582147" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582148" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582149" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582150" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582151" comment="bind-libs-x86-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582152" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582146" comment="bind-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582147" comment="bind-chrootenv-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582148" comment="bind-doc-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582149" comment="bind-libs-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582150" comment="bind-libs-32bit-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582151" comment="bind-libs-x86-9.9.6P1-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582152" comment="bind-utils-9.9.6P1-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41371" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00006.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-05"/>
	<updated date="2018-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582153" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582154" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582155" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582156" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582157" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582158" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582153" comment="bind-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582154" comment="bind-chrootenv-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582155" comment="bind-doc-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582156" comment="bind-libs-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582157" comment="bind-libs-32bit-9.9.6P1-0.51.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582158" comment="bind-utils-9.9.6P1-0.51.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41372" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582159" comment="bind-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582160" comment="bind-chrootenv-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582161" comment="bind-doc-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582162" comment="bind-libs-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582163" comment="bind-libs-32bit-9.9.6P1-0.51.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582164" comment="bind-utils-9.9.6P1-0.51.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41373" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1033843" ref_url="https://bugzilla.suse.com/1033843" source="BUGZILLA"/>
		<reference ref_id="1092283" ref_url="https://bugzilla.suse.com/1092283" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172220" ref_url="https://bugzilla.suse.com/1172220" source="BUGZILLA"/>
		<reference ref_id="1172680" ref_url="https://bugzilla.suse.com/1172680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals (bsc#1171740).
- CVE-2020-8617: Fixed a logic error in code which checks TSIG validity (bsc#1171740).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- Removed rndc.key generation from bind.spec file (bsc#1092283, bsc#1033843)
  bind should create the key on first boot or if it went missing.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1033843">SUSE bug 1033843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092283">SUSE bug 1092283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172220">SUSE bug 1172220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172680">SUSE bug 1172680</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582165" comment="bind-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582166" comment="bind-chrootenv-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582167" comment="bind-doc-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582168" comment="bind-libs-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582169" comment="bind-libs-32bit-9.9.6P1-0.51.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582170" comment="bind-utils-9.9.6P1-0.51.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41374" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008341.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582171" comment="bind-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582172" comment="bind-chrootenv-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582173" comment="bind-doc-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582174" comment="bind-libs-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582175" comment="bind-libs-32bit-9.9.6P1-0.51.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582176" comment="bind-utils-9.9.6P1-0.51.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41375" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582177" comment="bind-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582178" comment="bind-chrootenv-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582179" comment="bind-doc-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582180" comment="bind-libs-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582181" comment="bind-libs-32bit-9.9.6P1-0.51.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582182" comment="bind-utils-9.9.6P1-0.51.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41376" version="1" class="patch">
	<metadata>
		<title>Security update for bsdtar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920870" ref_url="https://bugzilla.suse.com/920870" source="BUGZILLA"/>
		<reference ref_id="984990" ref_url="https://bugzilla.suse.com/984990" source="BUGZILLA"/>
		<reference ref_id="985609" ref_url="https://bugzilla.suse.com/985609" source="BUGZILLA"/>
		<reference ref_id="985669" ref_url="https://bugzilla.suse.com/985669" source="BUGZILLA"/>
		<reference ref_id="985675" ref_url="https://bugzilla.suse.com/985675" source="BUGZILLA"/>
		<reference ref_id="985682" ref_url="https://bugzilla.suse.com/985682" source="BUGZILLA"/>
		<reference ref_id="985698" ref_url="https://bugzilla.suse.com/985698" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<description>
bsdtar was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-02"/>
	<updated date="2016-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582183" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582183" comment="libarchive2-2.5.5-9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41377" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-15"/>
	<updated date="2019-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582184" comment="bzip2-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582185" comment="bzip2-doc-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582186" comment="libbz2-1-1.0.5-34.256.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582187" comment="libbz2-1-32bit-1.0.5-34.256.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41378" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582188" comment="bzip2-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582189" comment="bzip2-doc-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582190" comment="libbz2-1-1.0.5-34.256.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582191" comment="libbz2-1-32bit-1.0.5-34.256.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41379" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="1049092" ref_url="https://bugzilla.suse.com/1049092" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2016-9082: Fixed a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).
- CVE-2017-9814: Replace malloc with _cairo_malloc and check cmap size before
  allocating to prevent DoS (bsc#1049092).
- CVE-2017-7475: Fix a segfault in get_bitmap_surface due to malformed font (bsc#1036789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582192" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582193" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582194" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582195" comment="cairo-x86-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582192" comment="cairo-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582193" comment="cairo-32bit-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582194" comment="cairo-doc-1.8.8-2.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582195" comment="cairo-x86-1.8.8-2.3.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41380" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010847.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681250" comment="cifs-utils-5.1-0.16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41381" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="815106" ref_url="https://bugzilla.suse.com/815106" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issue fixed:

- Fix permissions of /var/spool/amavis. (bsc#815106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815106">SUSE bug 815106</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582196" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582196" comment="clamav-0.99.2-0.19.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41382" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582197" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582197" comment="clamav-0.99.3-0.20.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41383" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582198" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582198" comment="clamav-0.99.4-0.20.7.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41384" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
  (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse
  relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table
  initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582199" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582199" comment="clamav-0.100.1-0.20.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41385" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW
  unpacking feature that could allow an unauthenticated, remote
  attacker to cause a denial of service (DoS) condition on an
  affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
  more fixes for embedded libmspack. (bsc#1103040)

* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582200" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582200" comment="clamav-0.100.2-0.20.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41386" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582201" comment="clamav-0.100.3-0.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41387" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issue fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582202" comment="clamav-0.100.3-0.20.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41388" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582203" comment="clamav-0.100.3-0.20.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41389" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459
- This update incorporates incompatible changes that were introduced
  in version 0.101.0.
- Accumulated security fixes:
  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc. (bsc#1174255)
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability. (bsc#1174250)
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash. (bsc#1171981)
  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582204" comment="clamav-0.103.0-0.20.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41390" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582205" comment="clamav-0.103.2-0.20.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41391" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1187509" ref_url="https://bugzilla.suse.com/1187509" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Add documentation about max file size purpose and side effect in the 'clamscan' and 'clamdscan' manpages (bsc#1187509).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187509">SUSE bug 1187509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657139" comment="clamav-0.103.4-0.20.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41392" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010086.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664015" comment="clamav-0.103.5-0.20.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41393" version="1" class="patch">
	<metadata>
		<title>Recommended udpate for SUSE Manager Client Tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="970550" ref_url="https://bugzilla.suse.com/970550" source="BUGZILLA"/>
		<reference ref_id="970989" ref_url="https://bugzilla.suse.com/970989" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002075.html" source="SUSE-SU"/>
		<description>

This update for SUSE Manager Client Tools provides the following fixes and enhancements:

rhnlib:

- Use TLSv1_METHOD in SSL Context (bsc#970989)

suseRegisterInfo:

- Fix file permissions (bsc#970550)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-19"/>
	<updated date="2016-05-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/970550">SUSE bug 970550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970989">SUSE bug 970989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582206" comment="rhnlib-2.5.69.8-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582207" comment="suseRegisterInfo-2.1.12-14.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582206" comment="rhnlib-2.5.69.8-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582207" comment="suseRegisterInfo-2.1.12-14.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41394" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00002.html" source="SUSE-SU"/>
		<description>
This update for coreutils fixes one issue.

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send
  SIGKILL to selected other processes with root privileges (bsc#1023041)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582208" comment="coreutils-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582209" comment="coreutils-lang-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582210" comment="coreutils-x86-8.12-6.25.33.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582208" comment="coreutils-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582209" comment="coreutils-lang-8.12-6.25.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582210" comment="coreutils-x86-8.12-6.25.33.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41395" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009282.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630758" comment="cpio-2.9-75.81.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630759" comment="cpio-lang-2.9-75.81.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41396" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009331.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631550" comment="cpio-2.9-75.81.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631551" comment="cpio-lang-2.9-75.81.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41397" version="1" class="patch">
	<metadata>
		<title>Security update for cracklib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="928923" ref_url="https://bugzilla.suse.com/928923" source="BUGZILLA"/>
		<reference ref_id="992966" ref_url="https://bugzilla.suse.com/992966" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002248.html" source="SUSE-SU"/>
		<description>

This update for cracklib fixes a security issue and a bug:

Security issue fixed:
- Add patch to fix a stack buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)

The following non security issue was fixed:
- Call textdomain in cracklib-check main function so that program
  output is translated accordingly. (bsc#928923)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928923">SUSE bug 928923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582211" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582212" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582213" comment="cracklib-x86-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582211" comment="cracklib-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582212" comment="cracklib-32bit-2.8.12-56.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582213" comment="cracklib-x86-2.8.12-56.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41398" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1075785" ref_url="https://bugzilla.suse.com/1075785" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004977.html" source="SUSE-SU"/>
		<description>
This update for crash provides the following fix:

- Update crash to support -bigmem kernel dumps for PPC64, including the ones that have
  extended process virtual address space support to 128TB (bsc#1075785, bsc#1032471).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075785">SUSE bug 1075785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582214" comment="crash-7.0.9-30.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582215" comment="crash-eppic-7.0.9-30.3.28 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582214" comment="crash-7.0.9-30.3.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582215" comment="crash-eppic-7.0.9-30.3.28 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41399" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096405" ref_url="https://bugzilla.suse.com/1096405" source="BUGZILLA"/>
		<reference ref_id="1096406" ref_url="https://bugzilla.suse.com/1096406" source="BUGZILLA"/>
		<reference ref_id="1096407" ref_url="https://bugzilla.suse.com/1096407" source="BUGZILLA"/>
		<reference ref_id="1096408" ref_url="https://bugzilla.suse.com/1096408" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2018-4180: Fix local privilege escalation to root in dnssd backend (bsc#1096405).
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include directive (bsc#1096406).
- CVE-2018-4182: Fix cups-exec sandbox bypass due to insecure error handling (bsc#1096407).
- CVE-2018-4183: Fix cups-exec sandbox bypass due to profile misconfiguration (bsc#1096408).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-07"/>
	<updated date="2018-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096407">SUSE bug 1096407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582216" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582217" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582218" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582219" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582220" comment="cups-libs-x86-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582216" comment="cups-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582217" comment="cups-client-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582218" comment="cups-libs-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582219" comment="cups-libs-32bit-1.3.9-8.46.56.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582220" comment="cups-libs-x86-1.3.9-8.46.56.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41400" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="959478" ref_url="https://bugzilla.suse.com/959478" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).	  
- Fixed a double free which was triggered by Java application (bsc#959478).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959478">SUSE bug 959478</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582221" comment="cups-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582222" comment="cups-client-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582223" comment="cups-libs-1.3.9-8.46.56.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582224" comment="cups-libs-32bit-1.3.9-8.46.56.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41401" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006729.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed heap buffer overflow in libcups ppdFindOption() function (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582225" comment="cups-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582226" comment="cups-client-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582227" comment="cups-libs-1.3.9-8.46.56.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582228" comment="cups-libs-32bit-1.3.9-8.46.56.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41402" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582229" comment="cups-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582230" comment="cups-client-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582231" comment="cups-libs-1.3.9-8.46.56.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582232" comment="cups-libs-32bit-1.3.9-8.46.56.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41403" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577528" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577529" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577530" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577531" comment="libcurl4-x86-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41404" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="991389" ref_url="https://bugzilla.suse.com/991389" source="BUGZILLA"/>
		<reference ref_id="991390" ref_url="https://bugzilla.suse.com/991390" source="BUGZILLA"/>
		<reference ref_id="997420" ref_url="https://bugzilla.suse.com/997420" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-7141: Fixed incorrect reuse of client certificates (bsc#997420).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-04"/>
	<updated date="2016-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582233" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582234" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582235" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582236" comment="libcurl4-x86-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582233" comment="curl-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582234" comment="libcurl4-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582235" comment="libcurl4-32bit-7.19.7-1.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582236" comment="libcurl4-x86-7.19.7-1.61.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41405" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005633" ref_url="https://bugzilla.suse.com/1005633" source="BUGZILLA"/>
		<reference ref_id="1005634" ref_url="https://bugzilla.suse.com/1005634" source="BUGZILLA"/>
		<reference ref_id="1005635" ref_url="https://bugzilla.suse.com/1005635" source="BUGZILLA"/>
		<reference ref_id="1005637" ref_url="https://bugzilla.suse.com/1005637" source="BUGZILLA"/>
		<reference ref_id="1005638" ref_url="https://bugzilla.suse.com/1005638" source="BUGZILLA"/>
		<reference ref_id="1005642" ref_url="https://bugzilla.suse.com/1005642" source="BUGZILLA"/>
		<reference ref_id="1005645" ref_url="https://bugzilla.suse.com/1005645" source="BUGZILLA"/>
		<reference ref_id="1005646" ref_url="https://bugzilla.suse.com/1005646" source="BUGZILLA"/>
		<reference ref_id="998760" ref_url="https://bugzilla.suse.com/998760" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-03"/>
	<updated date="2016-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582237" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582238" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582239" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582240" comment="libcurl4-x86-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582237" comment="curl-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582238" comment="libcurl4-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582239" comment="libcurl4-32bit-7.19.7-1.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582240" comment="libcurl4-x86-7.19.7-1.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41406" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

These security issues were fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582241" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582242" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582243" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582244" comment="libcurl4-x86-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582241" comment="curl-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582242" comment="libcurl4-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582243" comment="libcurl4-32bit-7.19.7-1.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582244" comment="libcurl4-x86-7.19.7-1.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41407" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)

- CVE-2017-7407: ourWriteOut function problem could lead to a heap buffer over-read (bsc#1032309)

- CVE-2016-9586: libcurl printf issue could lead to buffer overflow (bsc#1015332)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582245" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582246" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582247" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582248" comment="libcurl4-x86-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582245" comment="curl-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582246" comment="libcurl4-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582247" comment="libcurl4-32bit-7.19.7-1.70.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582248" comment="libcurl4-x86-7.19.7-1.70.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41408" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following security issues:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582249" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582250" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582251" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582252" comment="libcurl4-x86-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582249" comment="curl-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582250" comment="libcurl4-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582251" comment="libcurl4-32bit-7.19.7-1.70.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582252" comment="libcurl4-x86-7.19.7-1.70.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41409" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<description>
This update for curl several issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)

This non-security issue was fixed:

- Set DEFAULT_SUSE as the default cipher list (bsc#1027712]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582253" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582254" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582255" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582253" comment="curl-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582254" comment="libcurl4-7.19.7-1.70.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582255" comment="libcurl4-32bit-7.19.7-1.70.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41410" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081056" ref_url="https://bugzilla.suse.com/1081056" source="BUGZILLA"/>
		<reference ref_id="1083463" ref_url="https://bugzilla.suse.com/1083463" source="BUGZILLA"/>
		<reference ref_id="1084137" ref_url="https://bugzilla.suse.com/1084137" source="BUGZILLA"/>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="1085124" ref_url="https://bugzilla.suse.com/1085124" source="BUGZILLA"/>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1087922" ref_url="https://bugzilla.suse.com/1087922" source="BUGZILLA"/>
		<reference ref_id="1090194" ref_url="https://bugzilla.suse.com/1090194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<description>


This update for curl fixes the following issues:

curl was updated to version 7.37.0 (fate#325339 bsc#1084137)

This update syncs the curl version to the one in SUSE Linux Enterprise 12
and is full binary compatible to the previous version.

This update is done to allow other third party software like 'R' to 
be able to be used on the SUSE Linux Enterprise 11 codebase.

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).

The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081056">SUSE bug 1081056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083463">SUSE bug 1083463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084137">SUSE bug 1084137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085124">SUSE bug 1085124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087922">SUSE bug 1087922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090194">SUSE bug 1090194</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582256" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582257" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582258" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582259" comment="libcurl4-x86-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582256" comment="curl-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582257" comment="libcurl4-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582258" comment="libcurl4-32bit-7.37.0-70.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582259" comment="libcurl4-x86-7.37.0-70.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41411" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-1000301: Fixed a buffer over-read caused by bad RTSP headers (bsc#1092098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582260" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582261" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582262" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582263" comment="libcurl4-x86-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582260" comment="curl-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582261" comment="libcurl4-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582262" comment="libcurl4-32bit-7.37.0-70.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582263" comment="libcurl4-x86-7.37.0-70.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41412" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106019" ref_url="https://bugzilla.suse.com/1106019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
  (bsc#1106019).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582264" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582265" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582266" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582267" comment="libcurl4-x86-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582264" comment="curl-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582265" comment="libcurl4-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582266" comment="libcurl4-32bit-7.37.0-70.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582267" comment="libcurl4-x86-7.37.0-70.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41413" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1113660" ref_url="https://bugzilla.suse.com/1113660" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2018-16840: A use-after-free in SASL handle close was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-08"/>
	<updated date="2018-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582268" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582269" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582270" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582271" comment="libcurl4-x86-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582268" comment="curl-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582269" comment="libcurl4-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582270" comment="libcurl4-32bit-7.37.0-70.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582271" comment="libcurl4-x86-7.37.0-70.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41414" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582272" comment="curl-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582273" comment="libcurl4-7.37.0-70.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582274" comment="libcurl4-32bit-7.37.0-70.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41415" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed a TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582275" comment="curl-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582276" comment="libcurl4-7.37.0-70.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582277" comment="libcurl4-32bit-7.37.0-70.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41416" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027). 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582278" comment="curl-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582279" comment="libcurl4-7.37.0-70.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582280" comment="libcurl4-32bit-7.37.0-70.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41417" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582281" comment="curl-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582282" comment="libcurl4-7.37.0-70.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582283" comment="libcurl4-32bit-7.37.0-70.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41418" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003198.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582284" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582285" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582284" comment="cvs-1.12.12-144.23.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582285" comment="cvs-doc-1.12.12-144.23.5.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41419" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="860611" ref_url="https://bugzilla.suse.com/860611" source="BUGZILLA"/>
		<reference ref_id="901748" ref_url="https://bugzilla.suse.com/901748" source="BUGZILLA"/>
		<reference ref_id="954200" ref_url="https://bugzilla.suse.com/954200" source="BUGZILLA"/>
		<reference ref_id="954201" ref_url="https://bugzilla.suse.com/954201" source="BUGZILLA"/>
		<reference ref_id="981670" ref_url="https://bugzilla.suse.com/981670" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-8076" ref_url="https://www.suse.com/security/cve/CVE-2015-8076/" source="CVE"/>
		<reference ref_id="CVE-2015-8077" ref_url="https://www.suse.com/security/cve/CVE-2015-8077/" source="CVE"/>
		<reference ref_id="CVE-2015-8078" ref_url="https://www.suse.com/security/cve/CVE-2015-8078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html" source="SUSE-SU"/>
		<description>

This update for cyrus-imapd fixes the following issues:

- Previous versions of cyrus-imapd would not allow its users to disable old SSL
  variants that are vulnerable to attacks like BEAST and POODLE. This patch
  adds the configuration option 'tls_versions' to remedy that issue. Note that
  users who upgrade an existing installation will *not* have their imapd.conf
  file overwritten, i.e. their IMAP server will continue to support SSLv2 and
  SSLv3 like before. To disable support for those protocols, edit imapd.conf
  manually to include 'tls_versions: tls1_0 tls1_1 tls1_2'. New installations,
  however, will have an imapd.conf file that contains these settings already,
  i.e. newly installed IMAP servers do *not* support unsafe versions of SSL
  unless that support is explicitly enabled by the user. (bsc#901748)

- An integer overflow vulnerability in cyrus-imapd's urlfetch range checking
  code was fixed. (CVE-2015-8076, CVE-2015-8077, CVE-2015-8078, bsc#981670,
  bsc#954200, bsc#954201)

- Support for Elliptic Curve Diffie–Hellman (ECDH) has been added to
  cyrus-imapd. (bsc#860611)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-01"/>
	<updated date="2016-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/860611">SUSE bug 860611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954200">SUSE bug 954200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954201">SUSE bug 954201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981670">SUSE bug 981670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8076/">CVE-2015-8076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8077/">CVE-2015-8077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8078/">CVE-2015-8078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582286" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582287" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582288" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582286" comment="cyrus-imapd-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582287" comment="perl-Cyrus-IMAP-2.3.11-60.65.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582288" comment="perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.67.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41420" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008085.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582289" comment="cyrus-sasl-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582290" comment="cyrus-sasl-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582291" comment="cyrus-sasl-crammd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582292" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582293" comment="cyrus-sasl-digestmd5-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582294" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582295" comment="cyrus-sasl-gssapi-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582296" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582297" comment="cyrus-sasl-otp-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582298" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582299" comment="cyrus-sasl-plain-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582300" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582301" comment="cyrus-sasl-saslauthd-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582302" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582303" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41421" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-23"/>
	<updated date="2022-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669501" comment="cyrus-sasl-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669502" comment="cyrus-sasl-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669503" comment="cyrus-sasl-crammd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669504" comment="cyrus-sasl-crammd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669505" comment="cyrus-sasl-digestmd5-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669506" comment="cyrus-sasl-digestmd5-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669507" comment="cyrus-sasl-gssapi-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669508" comment="cyrus-sasl-gssapi-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669509" comment="cyrus-sasl-otp-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669510" comment="cyrus-sasl-otp-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669511" comment="cyrus-sasl-plain-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669512" comment="cyrus-sasl-plain-32bit-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669513" comment="cyrus-sasl-saslauthd-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669514" comment="cyrus-sasl-sqlauxprop-2.1.22-182.26.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669515" comment="cyrus-sasl-sqlauxprop-32bit-2.1.22-182.26.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41422" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which
  could have allowed local attackers to bypass authentication (bsc#1137832).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582304" comment="dbus-1-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582305" comment="dbus-1-32bit-1.2.10-3.34.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582306" comment="dbus-1-x11-1.2.10-3.34.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41423" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577570" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577571" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577572" comment="dhcp-relay-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577573" comment="dhcp-server-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41424" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="969820" ref_url="https://bugzilla.suse.com/969820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2016-2774: Fixed a denial of service attack against the DHCP server over the OMAPI TCP socket, which could be used
  by network adjacent attackers to make the DHCP server non-functional (bsc#969820).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582307" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582308" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582309" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582310" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582307" comment="dhcp-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582308" comment="dhcp-client-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582309" comment="dhcp-relay-4.2.4.P2-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582310" comment="dhcp-server-4.2.4.P2-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41425" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003731.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes several issues.
 
This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119)

This non-security issue was fixed:

- Enhance dhclient-script to handle static route updates. (bsc#1023415)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-14"/>
	<updated date="2018-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582311" comment="dhcp-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582312" comment="dhcp-client-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582313" comment="dhcp-relay-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582314" comment="dhcp-server-4.2.4.P2-0.28.5.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582311" comment="dhcp-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582312" comment="dhcp-client-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582313" comment="dhcp-relay-4.2.4.P2-0.28.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582314" comment="dhcp-server-4.2.4.P2-0.28.5.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41426" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582315" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582316" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582317" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582318" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582315" comment="dhcp-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582316" comment="dhcp-client-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582317" comment="dhcp-relay-4.2.4.P2-0.28.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582318" comment="dhcp-server-4.2.4.P2-0.28.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41427" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008905.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582319" comment="dhcp-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582320" comment="dhcp-client-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582321" comment="dhcp-relay-4.2.4.P2-0.28.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582322" comment="dhcp-server-4.2.4.P2-0.28.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41428" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577590" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41429" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582323" comment="libdjvulibre21-3.5.21-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41430" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008890.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582324" comment="libdjvulibre21-3.5.21-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41431" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009112.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624089" comment="libdjvulibre21-3.5.21-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41432" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009248.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- Extend CVE-2021-3630 fix (bsc#1187869).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-04"/>
	<updated date="2021-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627840" comment="libdjvulibre21-3.5.21-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41433" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00074.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582325" comment="dnsmasq-2.71-0.16.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582325" comment="dnsmasq-2.71-0.16.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41434" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]

This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582326" comment="dnsmasq-2.78-0.17.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582326" comment="dnsmasq-2.78-0.17.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41435" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005998.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Removed cache size limit. (bsc#1138743)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582327" comment="dnsmasq-2.78-0.17.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41436" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)
- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.
- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582328" comment="dnsmasq-2.78-0.17.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41437" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679570" comment="dnsmasq-2.78-0.17.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41438" version="1" class="patch">
	<metadata>
		<title>Security update for dosfstools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="980364" ref_url="https://bugzilla.suse.com/980364" source="BUGZILLA"/>
		<reference ref_id="980377" ref_url="https://bugzilla.suse.com/980377" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
		<description>
dosfstools was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-8872: The set_fat function in fat.c in dosfstools might have allowed attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an 'off-by-two error (bsc#980364).
- CVE-2016-4804: The read_boot function in boot.c in dosfstools allowed attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function (bsc#980377).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582329" comment="dosfstools-3.0.26-3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582329" comment="dosfstools-3.0.26-3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41439" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577613" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577614" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577615" comment="ecryptfs-utils-x86-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41440" version="1" class="patch">
	<metadata>
		<title>Security update for ed (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019807" ref_url="https://bugzilla.suse.com/1019807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005279.html" source="SUSE-SU"/>
		<description>

This update for ed fixes the following security issues:

- CVE-2017-5357: An invalid free in the regular expression handling
  of the 'ed' command processing could allow local users to crash ed. (bsc#1019807)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582330" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582330" comment="ed-0.2-1001.30.3.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41441" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00075.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582331" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582332" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582333" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582334" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582335" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582331" comment="emacs-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582332" comment="emacs-el-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582333" comment="emacs-info-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582334" comment="emacs-nox-22.3-42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582335" comment="emacs-x11-22.3-42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41442" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1070046" ref_url="https://bugzilla.suse.com/1070046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003796.html" source="SUSE-SU"/>
		<description>
This update for evince provides the following fix:

- CVE-2017-1000159: Prevent command line injections via filenames when printing to a file. (bsc#1070046)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582336" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582337" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582338" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582336" comment="evince-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582337" comment="evince-doc-2.28.2-0.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582338" comment="evince-lang-2.28.2-0.7.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41443" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).	  
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582339" comment="evince-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582340" comment="evince-doc-2.28.2-0.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582341" comment="evince-lang-2.28.2-0.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41444" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085295" ref_url="https://bugzilla.suse.com/1085295" source="BUGZILLA"/>
		<reference ref_id="1085585" ref_url="https://bugzilla.suse.com/1085585" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following issues:

Security issue fixed:

- CVE-2018-7730: Fix heap-based buffer overflow in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp (bsc#1085295).
- CVE-2017-18234: Fix use-after-free issue that allows remote attackers to cause a denial of service via a .pdf file (bsc#1085585).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582342" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582342" comment="libexempi3-2.0.2-4.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41445" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979441" ref_url="https://bugzilla.suse.com/979441" source="BUGZILLA"/>
		<reference ref_id="980391" ref_url="https://bugzilla.suse.com/980391" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following issues: 

Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582343" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582344" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582345" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582346" comment="libexpat1-x86-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582343" comment="expat-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582344" comment="libexpat1-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582345" comment="libexpat1-32bit-2.0.1-88.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582346" comment="libexpat1-x86-2.0.1-88.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41446" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022037" ref_url="https://bugzilla.suse.com/1022037" source="BUGZILLA"/>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022037">SUSE bug 1022037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582347" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582348" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582349" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582350" comment="libexpat1-x86-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582347" comment="expat-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582348" comment="libexpat1-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582349" comment="libexpat1-32bit-2.0.1-88.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582350" comment="libexpat1-x86-2.0.1-88.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41447" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582351" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582352" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582353" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582354" comment="libexpat1-x86-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582351" comment="expat-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582352" comment="libexpat1-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582353" comment="libexpat1-32bit-2.0.1-88.42.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582354" comment="libexpat1-x86-2.0.1-88.42.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41448" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664123" comment="expat-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664124" comment="libexpat1-2.0.1-88.42.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664125" comment="libexpat1-32bit-2.0.1-88.42.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41449" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666464" comment="expat-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666465" comment="libexpat1-2.0.1-88.42.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666466" comment="libexpat1-32bit-2.0.1-88.42.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41450" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669850" comment="expat-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669851" comment="libexpat1-2.0.1-88.42.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669852" comment="libexpat1-32bit-2.0.1-88.42.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41451" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010614.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-31"/>
	<updated date="2022-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671294" comment="expat-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671295" comment="libexpat1-2.0.1-88.42.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671296" comment="libexpat1-32bit-2.0.1-88.42.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41452" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582355" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582356" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582355" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582356" comment="fetchmailconf-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41453" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577726" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577727" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577728" comment="mozilla-nspr-x86-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41454" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577729" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577730" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41455" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577731" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577732" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577734" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577735" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577736" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577737" comment="libfreebl3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577738" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577739" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577740" comment="libsoftokn3-x86-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577741" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577742" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577743" comment="mozilla-nspr-x86-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577744" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577745" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577746" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577747" comment="mozilla-nss-x86-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41456" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<description>


This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes (bsc#1061005, bsc#1060445)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582357" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582358" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582359" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582360" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582361" comment="libfreebl3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582362" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582363" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582364" comment="libsoftokn3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582365" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582366" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582367" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582368" comment="mozilla-nss-x86-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582357" comment="MozillaFirefox-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582358" comment="MozillaFirefox-translations-52.4.0esr-72.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582359" comment="libfreebl3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582360" comment="libfreebl3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582361" comment="libfreebl3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582362" comment="libsoftokn3-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582363" comment="libsoftokn3-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582364" comment="libsoftokn3-x86-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582365" comment="mozilla-nss-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582366" comment="mozilla-nss-32bit-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582367" comment="mozilla-nss-tools-3.29.5-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582368" comment="mozilla-nss-x86-3.29.5-47.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41457" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, firefox-glib2, firefox-gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1145550" ref_url="https://bugzilla.suse.com/1145550" source="BUGZILLA"/>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, firefox-glib2, firefox-gtk3 fixes the following issues:

Mozilla Firefox was updated to the 60.9.0esr release:

Security Advisory MFSA 2019-27:

* Use-after-free while manipulating video
  CVE-2019-11746 (bmo#1564449, bsc#1149297)
* XSS by breaking out of title and textarea elements using innerHTML
  CVE-2019-11744 (bmo#1562033, bsc#1149297)
* Same-origin policy violation with SVG filters and canvas to steal
  cross-origin images
  CVE-2019-11742 (bmo#1559715, bsc#1149303)
* Privilege escalation with Mozilla Maintenance Service in custom
  Firefox installation location
  CVE-2019-11753 (bmo#1574980, bsc#1149295)
* Use-after-free while extracting a key value in IndexedDB
  CVE-2019-11752 (bmo#1501152, bsc#1149296)
* Sandbox escape through Firefox Sync
  CVE-2019-9812 (bmo#1538008, bmo#1538015, bsc#1149294)
* Cross-origin access to unload event attributes
  CVE-2019-11743 (bmo#1560495, bsc#1149298)
  Navigation-Timing Level 2 specification
* Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
  CVE-2019-11740 (bmo#1563133, bmo#1573160, bsc#1149299)

- Rebuild glib2 schemas on SLE-11 (bsc#1145550)

Changes in firefox-glib2:

- Fix the rpm macros %glib2_gsettings_schema_* which were replaced with
  %nil in Factory because they're no longer needed, but we still need
  them in SLE11 (bsc#1145550)

Changes in firefox-gtk3:

- Rebuild so %glib2_gsettings_schema_post gets called with fixed 
  rpm macros %glib2_gsettings_schema_* in firefox-glib2 package
  which were replaced with %nil in Factory because they're no 
  longer needed, but we still need them in SLE11 (bsc#1145550)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145550">SUSE bug 1145550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571463" comment="MozillaFirefox-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571464" comment="MozillaFirefox-translations-common-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571465" comment="MozillaFirefox-translations-other-60.9.0esr-78.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582369" comment="firefox-gio-branding-upstream-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582370" comment="firefox-glib2-lang-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582371" comment="firefox-glib2-tools-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582372" comment="firefox-gtk3-branding-upstream-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582373" comment="firefox-gtk3-data-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582374" comment="firefox-gtk3-immodule-amharic-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582375" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582376" comment="firefox-gtk3-immodule-multipress-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582377" comment="firefox-gtk3-immodule-thai-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582378" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582379" comment="firefox-gtk3-immodule-xim-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582380" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582381" comment="firefox-gtk3-lang-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582382" comment="firefox-gtk3-tools-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582383" comment="firefox-libgtk-3-0-3.10.9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582384" comment="libfirefox-gio-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582385" comment="libfirefox-glib-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582386" comment="libfirefox-gmodule-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582387" comment="libfirefox-gobject-2_0-0-2.54.3-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582388" comment="libfirefox-gthread-2_0-0-2.54.3-2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41458" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1000036" ref_url="https://bugzilla.suse.com/1000036" source="BUGZILLA"/>
		<reference ref_id="1001652" ref_url="https://bugzilla.suse.com/1001652" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1029377" ref_url="https://bugzilla.suse.com/1029377" source="BUGZILLA"/>
		<reference ref_id="1029902" ref_url="https://bugzilla.suse.com/1029902" source="BUGZILLA"/>
		<reference ref_id="1040164" ref_url="https://bugzilla.suse.com/1040164" source="BUGZILLA"/>
		<reference ref_id="104105" ref_url="https://bugzilla.suse.com/104105" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1047925" ref_url="https://bugzilla.suse.com/1047925" source="BUGZILLA"/>
		<reference ref_id="1047936" ref_url="https://bugzilla.suse.com/1047936" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="1049186" ref_url="https://bugzilla.suse.com/1049186" source="BUGZILLA"/>
		<reference ref_id="1050653" ref_url="https://bugzilla.suse.com/1050653" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1058013" ref_url="https://bugzilla.suse.com/1058013" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1066953" ref_url="https://bugzilla.suse.com/1066953" source="BUGZILLA"/>
		<reference ref_id="1070738" ref_url="https://bugzilla.suse.com/1070738" source="BUGZILLA"/>
		<reference ref_id="1070853" ref_url="https://bugzilla.suse.com/1070853" source="BUGZILLA"/>
		<reference ref_id="1072320" ref_url="https://bugzilla.suse.com/1072320" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="1073796" ref_url="https://bugzilla.suse.com/1073796" source="BUGZILLA"/>
		<reference ref_id="1073798" ref_url="https://bugzilla.suse.com/1073798" source="BUGZILLA"/>
		<reference ref_id="1073799" ref_url="https://bugzilla.suse.com/1073799" source="BUGZILLA"/>
		<reference ref_id="1073803" ref_url="https://bugzilla.suse.com/1073803" source="BUGZILLA"/>
		<reference ref_id="1073808" ref_url="https://bugzilla.suse.com/1073808" source="BUGZILLA"/>
		<reference ref_id="1073818" ref_url="https://bugzilla.suse.com/1073818" source="BUGZILLA"/>
		<reference ref_id="1073823" ref_url="https://bugzilla.suse.com/1073823" source="BUGZILLA"/>
		<reference ref_id="1073829" ref_url="https://bugzilla.suse.com/1073829" source="BUGZILLA"/>
		<reference ref_id="1073830" ref_url="https://bugzilla.suse.com/1073830" source="BUGZILLA"/>
		<reference ref_id="1073832" ref_url="https://bugzilla.suse.com/1073832" source="BUGZILLA"/>
		<reference ref_id="1073846" ref_url="https://bugzilla.suse.com/1073846" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1077230" ref_url="https://bugzilla.suse.com/1077230" source="BUGZILLA"/>
		<reference ref_id="1079761" ref_url="https://bugzilla.suse.com/1079761" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="1088573" ref_url="https://bugzilla.suse.com/1088573" source="BUGZILLA"/>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1094814" ref_url="https://bugzilla.suse.com/1094814" source="BUGZILLA"/>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="1097401" ref_url="https://bugzilla.suse.com/1097401" source="BUGZILLA"/>
		<reference ref_id="1097404" ref_url="https://bugzilla.suse.com/1097404" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1104841" ref_url="https://bugzilla.suse.com/1104841" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="1107030" ref_url="https://bugzilla.suse.com/1107030" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130694" ref_url="https://bugzilla.suse.com/1130694" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1133452" ref_url="https://bugzilla.suse.com/1133452" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1134209" ref_url="https://bugzilla.suse.com/1134209" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1144919" ref_url="https://bugzilla.suse.com/1144919" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1146090" ref_url="https://bugzilla.suse.com/1146090" source="BUGZILLA"/>
		<reference ref_id="1146091" ref_url="https://bugzilla.suse.com/1146091" source="BUGZILLA"/>
		<reference ref_id="1146093" ref_url="https://bugzilla.suse.com/1146093" source="BUGZILLA"/>
		<reference ref_id="1146094" ref_url="https://bugzilla.suse.com/1146094" source="BUGZILLA"/>
		<reference ref_id="1146095" ref_url="https://bugzilla.suse.com/1146095" source="BUGZILLA"/>
		<reference ref_id="1146097" ref_url="https://bugzilla.suse.com/1146097" source="BUGZILLA"/>
		<reference ref_id="1146099" ref_url="https://bugzilla.suse.com/1146099" source="BUGZILLA"/>
		<reference ref_id="1146100" ref_url="https://bugzilla.suse.com/1146100" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="1153423" ref_url="https://bugzilla.suse.com/1153423" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="1447070" ref_url="https://bugzilla.suse.com/1447070" source="BUGZILLA"/>
		<reference ref_id="1447409" ref_url="https://bugzilla.suse.com/1447409" source="BUGZILLA"/>
		<reference ref_id="744625" ref_url="https://bugzilla.suse.com/744625" source="BUGZILLA"/>
		<reference ref_id="744629" ref_url="https://bugzilla.suse.com/744629" source="BUGZILLA"/>
		<reference ref_id="845955" ref_url="https://bugzilla.suse.com/845955" source="BUGZILLA"/>
		<reference ref_id="865853" ref_url="https://bugzilla.suse.com/865853" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="917607" ref_url="https://bugzilla.suse.com/917607" source="BUGZILLA"/>
		<reference ref_id="935856" ref_url="https://bugzilla.suse.com/935856" source="BUGZILLA"/>
		<reference ref_id="937414" ref_url="https://bugzilla.suse.com/937414" source="BUGZILLA"/>
		<reference ref_id="947747" ref_url="https://bugzilla.suse.com/947747" source="BUGZILLA"/>
		<reference ref_id="948045" ref_url="https://bugzilla.suse.com/948045" source="BUGZILLA"/>
		<reference ref_id="948602" ref_url="https://bugzilla.suse.com/948602" source="BUGZILLA"/>
		<reference ref_id="955142" ref_url="https://bugzilla.suse.com/955142" source="BUGZILLA"/>
		<reference ref_id="957814" ref_url="https://bugzilla.suse.com/957814" source="BUGZILLA"/>
		<reference ref_id="957815" ref_url="https://bugzilla.suse.com/957815" source="BUGZILLA"/>
		<reference ref_id="961254" ref_url="https://bugzilla.suse.com/961254" source="BUGZILLA"/>
		<reference ref_id="962297" ref_url="https://bugzilla.suse.com/962297" source="BUGZILLA"/>
		<reference ref_id="966076" ref_url="https://bugzilla.suse.com/966076" source="BUGZILLA"/>
		<reference ref_id="966077" ref_url="https://bugzilla.suse.com/966077" source="BUGZILLA"/>
		<reference ref_id="985201" ref_url="https://bugzilla.suse.com/985201" source="BUGZILLA"/>
		<reference ref_id="986541" ref_url="https://bugzilla.suse.com/986541" source="BUGZILLA"/>
		<reference ref_id="991344" ref_url="https://bugzilla.suse.com/991344" source="BUGZILLA"/>
		<reference ref_id="998743" ref_url="https://bugzilla.suse.com/998743" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2882" ref_url="https://www.suse.com/security/cve/CVE-2013-2882/" source="CVE"/>
		<reference ref_id="CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639/" source="CVE"/>
		<reference ref_id="CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640/" source="CVE"/>
		<reference ref_id="CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<description>

This update contains the Mozilla Firefox ESR 68.2 release.

Mozilla Firefox was updated to ESR 68.2 release:

* Enterprise: New administrative policies were added. More
  information and templates are available at the Policy
  Templates page.

* Various security fixes:
  MFSA 2019-33 (bsc#1154738)
  * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
  * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
  * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
  * CVE-2019-11759: Stack buffer overflow in HKDF output
  * CVE-2019-11760: Stack buffer overflow in WebRTC networking
  * CVE-2019-11761: Unintended access to a privileged JSONView object
  * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
  * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
  * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2

Other Issues resolved:

* [bsc#1104841] Newer versions of firefox have a dependency on
                GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
                inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
                scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528]  Firefox malfunctions due to broken omni.ja
                archives

		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-17"/>
	<updated date="2020-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000036">SUSE bug 1000036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029377">SUSE bug 1029377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029902">SUSE bug 1029902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040164">SUSE bug 1040164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104105">SUSE bug 104105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047925">SUSE bug 1047925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047936">SUSE bug 1047936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049186">SUSE bug 1049186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050653">SUSE bug 1050653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058013">SUSE bug 1058013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066953">SUSE bug 1066953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070738">SUSE bug 1070738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070853">SUSE bug 1070853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073796">SUSE bug 1073796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073798">SUSE bug 1073798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073799">SUSE bug 1073799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073803">SUSE bug 1073803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073808">SUSE bug 1073808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073818">SUSE bug 1073818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073823">SUSE bug 1073823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073829">SUSE bug 1073829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073830">SUSE bug 1073830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073832">SUSE bug 1073832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073846">SUSE bug 1073846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077230">SUSE bug 1077230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079761">SUSE bug 1079761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088573">SUSE bug 1088573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094814">SUSE bug 1094814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104841">SUSE bug 1104841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107030">SUSE bug 1107030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130694">SUSE bug 1130694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133452">SUSE bug 1133452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134209">SUSE bug 1134209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144919">SUSE bug 1144919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146090">SUSE bug 1146090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146095">SUSE bug 1146095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153423">SUSE bug 1153423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447070">SUSE bug 1447070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1447409">SUSE bug 1447409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744625">SUSE bug 744625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744629">SUSE bug 744629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845955">SUSE bug 845955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865853">SUSE bug 865853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917607">SUSE bug 917607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935856">SUSE bug 935856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947747">SUSE bug 947747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948045">SUSE bug 948045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948602">SUSE bug 948602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955142">SUSE bug 955142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961254">SUSE bug 961254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962297">SUSE bug 962297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966076">SUSE bug 966076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966077">SUSE bug 966077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986541">SUSE bug 986541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991344">SUSE bug 991344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998743">SUSE bug 998743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2882/">CVE-2013-2882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571486" comment="MozillaFirefox-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571487" comment="MozillaFirefox-branding-SLED-68-21.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571488" comment="MozillaFirefox-translations-common-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571489" comment="MozillaFirefox-translations-other-68.2.0-78.51.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571490" comment="firefox-atk-lang-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571491" comment="firefox-gdk-pixbuf-lang-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571492" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571493" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571494" comment="firefox-gio-branding-upstream-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571495" comment="firefox-glib2-lang-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571496" comment="firefox-glib2-tools-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571497" comment="firefox-gtk3-branding-upstream-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571498" comment="firefox-gtk3-data-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571499" comment="firefox-gtk3-immodule-amharic-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571500" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571501" comment="firefox-gtk3-immodule-multipress-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571502" comment="firefox-gtk3-immodule-thai-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571503" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571504" comment="firefox-gtk3-immodule-xim-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571505" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571506" comment="firefox-gtk3-lang-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571507" comment="firefox-gtk3-tools-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571508" comment="firefox-libatk-1_0-0-2.26.1-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571509" comment="firefox-libcairo-gobject2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571510" comment="firefox-libcairo2-1.15.10-2.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571511" comment="firefox-libffi4-5.3.1+r233831-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571512" comment="firefox-libffi7-3.2.1.git259-2.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571513" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571514" comment="firefox-libgtk-3-0-3.10.9-2.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571515" comment="firefox-libharfbuzz0-1.7.5-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571516" comment="firefox-libpango-1_0-0-1.40.14-2.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571517" comment="libfirefox-gio-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571518" comment="libfirefox-glib-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571519" comment="libfirefox-gmodule-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571520" comment="libfirefox-gobject-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571521" comment="libfirefox-gthread-2_0-0-2.54.3-2.14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571522" comment="libfreebl3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571523" comment="libfreebl3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571524" comment="libsoftokn3-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571525" comment="libsoftokn3-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571526" comment="mozilla-nspr-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571527" comment="mozilla-nspr-32bit-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582389" comment="mozilla-nspr-devel-4.21-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571528" comment="mozilla-nss-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571529" comment="mozilla-nss-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571530" comment="mozilla-nss-certs-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571531" comment="mozilla-nss-certs-32bit-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582390" comment="mozilla-nss-devel-3.45-38.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571532" comment="mozilla-nss-tools-3.45-38.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41459" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137338" ref_url="https://bugzilla.suse.com/1137338" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:14114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005661.html" source="SUSE-SU"/>
		<description>

This update contains Mozilla Firefox 60.7ESR.

It brings lots of security fixes and other improvements.

It also includes new additional helper libraries to allow Firefox to run on SUSE Linux Enterprise 11.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137338">SUSE bug 1137338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571533" comment="MozillaFirefox-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571534" comment="MozillaFirefox-branding-SLED-60-21.6.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571535" comment="MozillaFirefox-translations-common-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571536" comment="MozillaFirefox-translations-other-60.7.0esr-78.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582391" comment="firefox-at-spi2-core-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582392" comment="firefox-at-spi2-core-lang-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582393" comment="firefox-atk-lang-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582394" comment="firefox-dbus-1-glib-0.76-34.2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582395" comment="firefox-gdk-pixbuf-lang-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582396" comment="firefox-gdk-pixbuf-query-loaders-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582397" comment="firefox-gdk-pixbuf-thumbnailer-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582398" comment="firefox-gio-branding-upstream-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582399" comment="firefox-glib2-lang-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582400" comment="firefox-glib2-tools-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582401" comment="firefox-gtk3-branding-upstream-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582402" comment="firefox-gtk3-data-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582403" comment="firefox-gtk3-immodule-amharic-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582404" comment="firefox-gtk3-immodule-inuktitut-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582405" comment="firefox-gtk3-immodule-multipress-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582406" comment="firefox-gtk3-immodule-thai-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582407" comment="firefox-gtk3-immodule-vietnamese-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582408" comment="firefox-gtk3-immodule-xim-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582409" comment="firefox-gtk3-immodules-tigrigna-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582410" comment="firefox-gtk3-lang-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582411" comment="firefox-gtk3-tools-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582412" comment="firefox-libatk-1_0-0-2.26.1-2.5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582413" comment="firefox-libatk-bridge-2_0-0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582414" comment="firefox-libatspi0-2.10.2-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582415" comment="firefox-libcairo-gobject2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582416" comment="firefox-libcairo2-1.15.10-2.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582417" comment="firefox-libfreetype6-2.9-2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582418" comment="firefox-libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582419" comment="firefox-libgdk_pixbuf-2_0-0-2.36.11-2.5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582420" comment="firefox-libgtk-3-0-3.10.9-2.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582421" comment="firefox-libharfbuzz0-1.7.5-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582422" comment="firefox-libpango-1_0-0-1.40.14-2.4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582423" comment="firefox-libpixman-1-0-0.34.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582424" comment="firefox-libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582425" comment="libfirefox-gio-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582426" comment="libfirefox-glib-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582427" comment="libfirefox-gmodule-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582428" comment="libfirefox-gobject-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582429" comment="libfirefox-gthread-2_0-0-2.54.3-2.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582430" comment="libfreebl3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582431" comment="libfreebl3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582432" comment="libsoftokn3-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582433" comment="libsoftokn3-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582434" comment="mozilla-nspr-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582435" comment="mozilla-nspr-32bit-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582436" comment="mozilla-nspr-devel-4.20-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582437" comment="mozilla-nss-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582438" comment="mozilla-nss-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582439" comment="mozilla-nss-certs-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582440" comment="mozilla-nss-certs-32bit-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582441" comment="mozilla-nss-devel-3.41.1-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582442" comment="mozilla-nss-tools-3.41.1-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41460" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577787" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577788" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577790" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577791" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577792" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577793" comment="libfreebl3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577794" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577795" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577796" comment="libsoftokn3-x86-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577797" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577798" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577799" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577800" comment="mozilla-nss-x86-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41461" version="1" class="patch">
	<metadata>
		<title>Security update for fontconfig (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="992534" ref_url="https://bugzilla.suse.com/992534" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html" source="SUSE-SU"/>
		<description>

This update for fontconfig fixes the following issues:

- security update:
  * CVE-2016-5384: Possible double free due to insufficiently validated cache files [bsc#992534]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-30"/>
	<updated date="2016-08-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582443" comment="fontconfig-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582444" comment="fontconfig-32bit-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582445" comment="fontconfig-x86-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582443" comment="fontconfig-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582444" comment="fontconfig-32bit-2.6.0-10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582445" comment="fontconfig-x86-2.6.0-10.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41462" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577807" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41463" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="912873" ref_url="https://bugzilla.suse.com/912873" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003008.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bnc#1041445)
- CVE-2015-4680: Add a configuration option to allow checking of all
  intermediate certificates for revocations. (bnc#935573)

The following non security issue was fixed:

- Cannot create table radpostauth because of deprecated TIMESTAMP(14) syntax. (bsc#912873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912873">SUSE bug 912873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582446" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582447" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582448" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582449" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582450" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582446" comment="freeradius-server-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582447" comment="freeradius-server-dialupadmin-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582448" comment="freeradius-server-doc-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582449" comment="freeradius-server-libs-2.1.1-7.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582450" comment="freeradius-server-utils-2.1.1-7.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41464" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10979" ref_url="https://www.suse.com/security/cve/CVE-2017-10979/" source="CVE"/>
		<reference ref_id="CVE-2017-10981" ref_url="https://www.suse.com/security/cve/CVE-2017-10981/" source="CVE"/>
		<reference ref_id="CVE-2017-10982" ref_url="https://www.suse.com/security/cve/CVE-2017-10982/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:
- CVE-2017-10981: DHCP - Fix memory leak in fr_dhcp_decode(). (bnc#1049086)
- CVE-2017-10982: Fix buffer over-read in fr_dhcp_decode_options(). (bsc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)
- CVE-2017-10979: Fix write overflow in rad_coalesce(). (bsc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10979/">CVE-2017-10979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10981/">CVE-2017-10981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10982/">CVE-2017-10982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582451" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582452" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582453" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582454" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582455" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582451" comment="freeradius-server-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582452" comment="freeradius-server-dialupadmin-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582453" comment="freeradius-server-doc-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582454" comment="freeradius-server-libs-2.1.1-7.25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582455" comment="freeradius-server-utils-2.1.1-7.25.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41465" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="945849" ref_url="https://bugzilla.suse.com/945849" source="BUGZILLA"/>
		<reference ref_id="947966" ref_url="https://bugzilla.suse.com/947966" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9745" ref_url="https://www.suse.com/security/cve/CVE-2014-9745/" source="CVE"/>
		<reference ref_id="CVE-2014-9747" ref_url="https://www.suse.com/security/cve/CVE-2014-9747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002028.html" source="SUSE-SU"/>
		<description>

This update of the freetype2 library fixes two security issues:

- An infinite loop in parse_encoding in t1load.c (CVE-2014-9745, bsc#945849)
- Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix (CVE-2014-9747, bsc#947966)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945849">SUSE bug 945849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947966">SUSE bug 947966</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9745/">CVE-2014-9745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9747/">CVE-2014-9747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582456" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582457" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582458" comment="freetype2-x86-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582459" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582456" comment="freetype2-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582457" comment="freetype2-32bit-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582458" comment="freetype2-x86-2.3.7-25.41.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582459" comment="ft2demos-2.3.7-25.41.4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41466" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<description>

This update for freetype2 fixes the following issues:

Security issue fixed:
- CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
  ensure that a font contains a glyph name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read) or possibly
  have unspecified other impact via a crafted file (bsc#1028103).

- CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582460" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582461" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582462" comment="freetype2-x86-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582463" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582460" comment="freetype2-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582461" comment="freetype2-32bit-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582462" comment="freetype2-x86-2.3.7-25.45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582463" comment="ft2demos-2.3.7-25.45.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41467" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034191" ref_url="https://bugzilla.suse.com/1034191" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10328" ref_url="https://www.suse.com/security/cve/CVE-2016-10328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003851.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

Security issue fixed:

- CVE-2016-10328: Fixed heap-based buffer overflow in cff_parser_run function in cff/cffparse.c (bsc#1034191).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034191">SUSE bug 1034191</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10328/">CVE-2016-10328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582464" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582465" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582466" comment="freetype2-x86-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582467" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582464" comment="freetype2-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582465" comment="freetype2-32bit-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582466" comment="freetype2-x86-2.3.7-25.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582467" comment="ft2demos-2.3.7-25.45.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41468" version="1" class="patch">
	<metadata>
		<title>Security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101797" ref_url="https://bugzilla.suse.com/1101797" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005097.html" source="SUSE-SU"/>
		<description>
This update for fuse fixes the following issues:

Security issue fixed:

- CVE-2018-10906: Fix a bypass of the user_allow_other restriction (bsc#1101797)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-08"/>
	<updated date="2019-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582468" comment="fuse-2.8.7-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582469" comment="libfuse2-2.8.7-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582468" comment="fuse-2.8.7-0.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582469" comment="libfuse2-2.8.7-0.11.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41469" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1045091" ref_url="https://bugzilla.suse.com/1045091" source="BUGZILLA"/>
		<reference ref_id="1059075" ref_url="https://bugzilla.suse.com/1059075" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="938159" ref_url="https://bugzilla.suse.com/938159" source="BUGZILLA"/>
		<reference ref_id="977654" ref_url="https://bugzilla.suse.com/977654" source="BUGZILLA"/>
		<reference ref_id="999596" ref_url="https://bugzilla.suse.com/999596" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
		<description>

  
This update for gcc43 fixes the following issues:

Security issue fixed:

- CVE-2017-1000376: Don't request excutable stack from libffi.  [bnc#1045091]

New features:

- Add support for retpolines to mitigate the Spectre Variant 2 attack. [bnc#1074621]
- Add support for zero-sized VLAs and allocas with -fstack-clash-protection.  [bnc#1059075]
- Add support for -fstack-clash-protection to mitigate the Stack Clash attack.  [bnc#1039513]

Non security bugs fixed:

- Fixed build of 32bit libgcov.a with LFS support.  [bsc#1044016]
- Fixed issue with libstdc++ functional when an exception is thrown during construction.  [bsc#999596]
- Fixed issue with using gcov and #pragma pack.  [bsc#977654]
- Fixed ICE compiling AFS modules for the s390x kernel.  [bsc#938159]
- Backport large file support from GCC 4.6.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059075">SUSE bug 1059075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938159">SUSE bug 938159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977654">SUSE bug 977654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999596">SUSE bug 999596</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564367" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582470" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582471" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582472" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582473" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582474" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582475" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582476" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564367" comment="cpp43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582470" comment="gcc43-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582471" comment="gcc43-32bit-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582472" comment="gcc43-c++-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582473" comment="gcc43-info-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582474" comment="gcc43-locale-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582475" comment="libstdc++43-devel-4.3.4_20091019-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582476" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41470" version="1" class="patch">
	<metadata>
		<title>Security update for gcc43 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1086069" ref_url="https://bugzilla.suse.com/1086069" source="BUGZILLA"/>
		<reference ref_id="1092807" ref_url="https://bugzilla.suse.com/1092807" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<description>
This update for gcc43 fixes the following issues:

This update adds support for 'expolines' on s390x, allowing fixing CVE-2017-5715 in a more lightweight fashion. (bsc#1086069)

The option flags are the same as for the x86 retpolines.

A compiler crash when building userland packages with x86 retpolines was fixed. (bsc#1092807)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086069">SUSE bug 1086069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092807">SUSE bug 1092807</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564377" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582477" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582478" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582479" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582480" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582481" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582482" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582483" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564377" comment="cpp43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582477" comment="gcc43-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582478" comment="gcc43-32bit-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582479" comment="gcc43-c++-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582480" comment="gcc43-info-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582481" comment="gcc43-locale-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582482" comment="libstdc++43-devel-4.3.4_20091019-37.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582483" comment="libstdc++43-devel-32bit-4.3.4_20091019-37.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41471" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582484" comment="libatomic1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582485" comment="libatomic1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582486" comment="libffi4-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582487" comment="libffi4-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582488" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582489" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582490" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582491" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582492" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582493" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582494" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582495" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582496" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582497" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582484" comment="libatomic1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582485" comment="libatomic1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582486" comment="libffi4-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582487" comment="libffi4-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582488" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582489" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582490" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582491" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582492" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582493" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582494" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582495" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582496" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582497" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41472" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="988032" ref_url="https://bugzilla.suse.com/988032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002270.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

- security update:
  * CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-14"/>
	<updated date="2016-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582498" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582498" comment="gd-2.0.36.RC1-52.22.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41473" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002375.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-28"/>
	<updated date="2016-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582499" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582499" comment="gd-2.0.36.RC1-52.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41474" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002518.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

  * CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582500" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582500" comment="gd-2.0.36.RC1-52.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41475" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582501" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582501" comment="gd-2.0.36.RC1-52.32.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41476" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025223" ref_url="https://bugzilla.suse.com/1025223" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003638.html" source="SUSE-SU"/>
		<description>
This update for gd fixes several issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)

This non-security issue was fixed:

- Fixed gd2togif error message (bsc#1025223)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025223">SUSE bug 1025223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582502" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582502" comment="gd-2.0.36.RC1-52.33.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41477" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004237" ref_url="https://bugzilla.suse.com/1004237" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002392.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2016-8602: Insufficient parameter check in .sethalftone5 (bsc#1004237)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-04"/>
	<updated date="2016-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582503" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582504" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582505" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582506" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582507" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582508" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582509" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582503" comment="ghostscript-fonts-other-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582504" comment="ghostscript-fonts-rus-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582505" comment="ghostscript-fonts-std-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582506" comment="ghostscript-library-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582507" comment="ghostscript-omni-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582508" comment="ghostscript-x11-8.62-32.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582509" comment="libgimpprint-4.2.7-32.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41478" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1001951" ref_url="https://bugzilla.suse.com/1001951" source="BUGZILLA"/>
		<reference ref_id="939342" ref_url="https://bugzilla.suse.com/939342" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<description>

This update for ghostscript-library fixes the following issues:

- Multiple security vulnerabilities have been discovered where ghostscript's
  '-dsafer' flag did not provide sufficient protection against unintended
  access to the file system. Thus, a machine that would process a specially
  crafted Postscript file would potentially leak sensitive information to an
  attacker. (CVE-2013-5653, CVE-2016-7977, bsc#1001951)

- Insufficient validation of the type of input in .initialize_dsc_parser used
  to allow remote code execution. (CVE-2016-7979, bsc#1001951)

- An integer overflow in the gs_heap_alloc_bytes function used to allow remote
  attackers to cause a denial of service (crash) via specially  crafted
  Postscript files. (CVE-2015-3228, boo#939342)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-11"/>
	<updated date="2016-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582510" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582511" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582512" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582513" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582514" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582515" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582516" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582510" comment="ghostscript-fonts-other-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582511" comment="ghostscript-fonts-rus-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582512" comment="ghostscript-fonts-std-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582513" comment="ghostscript-library-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582514" comment="ghostscript-omni-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582515" comment="ghostscript-x11-8.62-32.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582516" comment="libgimpprint-4.2.7-32.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41479" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00009.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582517" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582518" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582519" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582520" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582521" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582522" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582523" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582517" comment="ghostscript-fonts-other-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582518" comment="ghostscript-fonts-rus-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582519" comment="ghostscript-fonts-std-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582520" comment="ghostscript-library-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582521" comment="ghostscript-omni-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582522" comment="ghostscript-x11-8.62-32.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582523" comment="libgimpprint-4.2.7-32.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41480" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00052.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3 product.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-17"/>
	<updated date="2017-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582524" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582525" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582526" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582527" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582528" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582529" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582530" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582524" comment="ghostscript-fonts-other-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582525" comment="ghostscript-fonts-rus-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582526" comment="ghostscript-fonts-std-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582527" comment="ghostscript-library-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582528" comment="ghostscript-omni-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582529" comment="ghostscript-x11-8.62-32.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582530" comment="libgimpprint-4.2.7-32.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41481" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes several issues.
 
These security issues were fixed:

- CVE-2017-7207: The mem_get_bits_rectangle function allowed remote attackers
  to cause a denial of service (NULL pointer dereference) via a crafted
  PostScript document (bsc#1030263).
- CVE-2016-9601: Prevent heap-buffer overflow by checking for an integer
  overflow in jbig2_image_new function (bsc#1018128).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891)
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889)
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888)
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887)
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184)
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879)
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138)
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-03"/>
	<updated date="2018-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582531" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582532" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582533" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582534" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582535" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582536" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582537" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582531" comment="ghostscript-fonts-other-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582532" comment="ghostscript-fonts-rus-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582533" comment="ghostscript-fonts-std-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582534" comment="ghostscript-library-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582535" comment="ghostscript-omni-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582536" comment="ghostscript-x11-8.62-32.47.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582537" comment="libgimpprint-4.2.7-32.47.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41482" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1090099" ref_url="https://bugzilla.suse.com/1090099" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-10194: Fixed a stack-based buffer overflow in gdevpdts.c (bsc#1090099)
- Fixed a crash in the fix for CVE-2016-9601.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582538" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582539" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582540" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582541" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582542" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582543" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582544" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582538" comment="ghostscript-fonts-other-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582539" comment="ghostscript-fonts-rus-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582540" comment="ghostscript-fonts-std-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582541" comment="ghostscript-library-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582542" comment="ghostscript-omni-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582543" comment="ghostscript-x11-8.62-32.47.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582544" comment="libgimpprint-4.2.7-32.47.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41483" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1050893" ref_url="https://bugzilla.suse.com/1050893" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

- CVE-2018-16511: A type confusion in 'ztype' could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. (bsc#1107426)
- CVE-2018-16540: Attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact. (bsc#1107420)
- CVE-2018-16541: Attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. (bsc#1107421)
- CVE-2018-16542: Attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter. (bsc#1107413)
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the 'pipe' instruction. (bsc#1107410
- CVE-2018-16513: Attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. (bsc#1107412)
- CVE-2018-15910: Attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code. (bsc#1106173)
- CVE-2017-9611: The Ins_MIRP function allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. (bsc#1050893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582545" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582546" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582547" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582548" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582549" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582550" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582551" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582545" comment="ghostscript-fonts-other-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582546" comment="ghostscript-fonts-rus-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582547" comment="ghostscript-fonts-std-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582548" comment="ghostscript-library-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582549" comment="ghostscript-omni-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582550" comment="ghostscript-x11-8.62-32.47.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582551" comment="libgimpprint-4.2.7-32.47.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41484" version="1" class="patch">
	<metadata>
		<title>Recommended update for ghostscript-library (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005853.html" source="SUSE-SU"/>
		<description>
This update for ghostscript-library fixes the following issues:

Security issue fixed:

- CVE-2019-3838: Fixed various bugs which allows to reenable and misuse system Postscript operators to read files from within Postscript files and send them with the help of e.g. the %pipe% to the attacker (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582552" comment="ghostscript-fonts-other-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582553" comment="ghostscript-fonts-rus-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582554" comment="ghostscript-fonts-std-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582555" comment="ghostscript-library-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582556" comment="ghostscript-omni-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582557" comment="ghostscript-x11-8.62-47.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582558" comment="libgimpprint-4.2.7-47.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41485" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577858" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577859" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577860" comment="giflib-progs-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577861" comment="giflib-x86-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41486" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002024.html" source="SUSE-SU"/>
		<description>
giflib was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-3977: Heap buffer overflow in gif2rgb (bsc#974847).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582559" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582560" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582561" comment="giflib-progs-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582562" comment="giflib-x86-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582559" comment="giflib-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582560" comment="giflib-32bit-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582561" comment="giflib-progs-4.1.6-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582562" comment="giflib-x86-4.1.6-21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41487" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1111499" ref_url="https://bugzilla.suse.com/1111499" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3966-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183966-1.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Fixing potentially exploitable bugs in UTF-8 validation in Variant and DBUS message parsing (bsc#1111499).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-03"/>
	<updated date="2018-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111499">SUSE bug 1111499</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582563" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582564" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582565" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582566" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582567" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582568" comment="libgio-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582569" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582570" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582571" comment="libglib-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582572" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582573" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582574" comment="libgmodule-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582575" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582576" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582577" comment="libgobject-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582578" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582579" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582580" comment="libgthread-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582563" comment="glib2-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582564" comment="glib2-doc-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582565" comment="glib2-lang-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582566" comment="libgio-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582567" comment="libgio-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582568" comment="libgio-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582569" comment="libglib-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582570" comment="libglib-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582571" comment="libglib-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582572" comment="libgmodule-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582573" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582574" comment="libgmodule-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582575" comment="libgobject-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582576" comment="libgobject-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582577" comment="libgobject-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582578" comment="libgthread-2_0-0-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582579" comment="libgthread-2_0-0-32bit-2.22.5-0.8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582580" comment="libgthread-2_0-0-x86-2.22.5-0.8.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41488" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed: 	  

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-24"/>
	<updated date="2019-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582581" comment="glib2-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582582" comment="glib2-doc-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582583" comment="glib2-lang-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582584" comment="libgio-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582585" comment="libgio-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582586" comment="libglib-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582587" comment="libglib-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582588" comment="libgmodule-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582589" comment="libgmodule-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582590" comment="libgobject-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582591" comment="libgobject-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582592" comment="libgthread-2_0-0-2.22.5-0.8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582593" comment="libgthread-2_0-0-32bit-2.22.5-0.8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41489" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577877" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577878" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577879" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577880" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577881" comment="glibc-html-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577882" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577883" comment="glibc-info-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577884" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577885" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577886" comment="glibc-locale-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577887" comment="glibc-profile-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577888" comment="glibc-profile-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577889" comment="glibc-profile-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577890" comment="glibc-x86-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577891" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41490" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009577892" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577893" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577894" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577895" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577896" comment="glibc-html-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577897" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577898" comment="glibc-info-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577899" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577900" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577901" comment="glibc-locale-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577902" comment="glibc-profile-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577903" comment="glibc-profile-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577904" comment="glibc-profile-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577905" comment="glibc-x86-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009577906" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41491" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="931399" ref_url="https://bugzilla.suse.com/931399" source="BUGZILLA"/>
		<reference ref_id="965699" ref_url="https://bugzilla.suse.com/965699" source="BUGZILLA"/>
		<reference ref_id="969727" ref_url="https://bugzilla.suse.com/969727" source="BUGZILLA"/>
		<reference ref_id="973010" ref_url="https://bugzilla.suse.com/973010" source="BUGZILLA"/>
		<reference ref_id="973164" ref_url="https://bugzilla.suse.com/973164" source="BUGZILLA"/>
		<reference ref_id="973179" ref_url="https://bugzilla.suse.com/973179" source="BUGZILLA"/>
		<reference ref_id="980483" ref_url="https://bugzilla.suse.com/980483" source="BUGZILLA"/>
		<reference ref_id="980854" ref_url="https://bugzilla.suse.com/980854" source="BUGZILLA"/>
		<reference ref_id="986302" ref_url="https://bugzilla.suse.com/986302" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- Drop old fix that could break services that start before IPv6 is up. (bsc#931399)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Relocate DSOs in dependency order, fixing a potential crash during symbol
  relocation phase. (bsc#986302)
- Fix nscd assertion failure in gc. (bsc#965699)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-25"/>
	<updated date="2016-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931399">SUSE bug 931399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965699">SUSE bug 965699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973010">SUSE bug 973010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973179">SUSE bug 973179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986302">SUSE bug 986302</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582594" comment="glibc-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582595" comment="glibc-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582596" comment="glibc-devel-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582597" comment="glibc-devel-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582598" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582599" comment="glibc-i18ndata-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582600" comment="glibc-info-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582601" comment="glibc-locale-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582602" comment="glibc-locale-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582603" comment="glibc-locale-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582604" comment="glibc-profile-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582605" comment="glibc-profile-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582606" comment="glibc-profile-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582607" comment="glibc-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582608" comment="nscd-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582594" comment="glibc-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582595" comment="glibc-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582596" comment="glibc-devel-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582597" comment="glibc-devel-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582598" comment="glibc-html-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582599" comment="glibc-i18ndata-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582600" comment="glibc-info-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582601" comment="glibc-locale-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582602" comment="glibc-locale-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582603" comment="glibc-locale-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582604" comment="glibc-profile-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582605" comment="glibc-profile-32bit-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582606" comment="glibc-profile-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582607" comment="glibc-x86-2.11.3-17.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582608" comment="nscd-2.11.3-17.102.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41492" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00018.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582609" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582610" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582611" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582612" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582613" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582614" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582615" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582616" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582617" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582618" comment="glibc-locale-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582619" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582620" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582621" comment="glibc-profile-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582622" comment="glibc-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582623" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582609" comment="glibc-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582610" comment="glibc-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582611" comment="glibc-devel-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582612" comment="glibc-devel-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582613" comment="glibc-html-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582614" comment="glibc-i18ndata-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582615" comment="glibc-info-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582616" comment="glibc-locale-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582617" comment="glibc-locale-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582618" comment="glibc-locale-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582619" comment="glibc-profile-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582620" comment="glibc-profile-32bit-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582621" comment="glibc-profile-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582622" comment="glibc-x86-2.11.3-17.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582623" comment="nscd-2.11.3-17.109.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41493" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00038.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582624" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582625" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582626" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582627" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582628" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582629" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582630" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582631" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582632" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582633" comment="glibc-locale-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582634" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582635" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582636" comment="glibc-profile-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582637" comment="glibc-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582638" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582624" comment="glibc-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582625" comment="glibc-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582626" comment="glibc-devel-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582627" comment="glibc-devel-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582628" comment="glibc-html-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582629" comment="glibc-i18ndata-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582630" comment="glibc-info-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582631" comment="glibc-locale-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582632" comment="glibc-locale-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582633" comment="glibc-locale-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582634" comment="glibc-profile-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582635" comment="glibc-profile-32bit-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582636" comment="glibc-profile-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582637" comment="glibc-x86-2.11.3-17.110.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582638" comment="nscd-2.11.3-17.110.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41494" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="978209" ref_url="https://bugzilla.suse.com/978209" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)

Also a non security issue was fixed:

- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-28"/>
	<updated date="2018-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978209">SUSE bug 978209</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582639" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582640" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582641" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582642" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582643" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582644" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582645" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582646" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582647" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582648" comment="glibc-locale-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582649" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582650" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582651" comment="glibc-profile-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582652" comment="glibc-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582653" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582639" comment="glibc-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582640" comment="glibc-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582641" comment="glibc-devel-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582642" comment="glibc-devel-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582643" comment="glibc-html-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582644" comment="glibc-i18ndata-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582645" comment="glibc-info-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582646" comment="glibc-locale-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582647" comment="glibc-locale-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582648" comment="glibc-locale-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582649" comment="glibc-profile-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582650" comment="glibc-profile-32bit-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582651" comment="glibc-profile-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582652" comment="glibc-x86-2.11.3-17.110.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582653" comment="nscd-2.11.3-17.110.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41495" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076871" ref_url="https://bugzilla.suse.com/1076871" source="BUGZILLA"/>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003870.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

Non security issue fixed:

- Fix incorrect getaddrinfo assertion trigger (bsc#1076871)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076871">SUSE bug 1076871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582654" comment="glibc-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582655" comment="glibc-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582656" comment="glibc-devel-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582657" comment="glibc-devel-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582658" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582659" comment="glibc-i18ndata-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582660" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582661" comment="glibc-locale-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582662" comment="glibc-locale-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582663" comment="glibc-locale-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582664" comment="glibc-profile-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582665" comment="glibc-profile-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582666" comment="glibc-profile-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582667" comment="glibc-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582668" comment="nscd-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582654" comment="glibc-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582655" comment="glibc-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582656" comment="glibc-devel-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582657" comment="glibc-devel-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582658" comment="glibc-html-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582659" comment="glibc-i18ndata-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582660" comment="glibc-info-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582661" comment="glibc-locale-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582662" comment="glibc-locale-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582663" comment="glibc-locale-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582664" comment="glibc-profile-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582665" comment="glibc-profile-32bit-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582666" comment="glibc-profile-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582667" comment="glibc-x86-2.11.3-17.110.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582668" comment="nscd-2.11.3-17.110.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41496" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077763" ref_url="https://bugzilla.suse.com/1077763" source="BUGZILLA"/>
		<reference ref_id="1079625" ref_url="https://bugzilla.suse.com/1079625" source="BUGZILLA"/>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments (bsc#1094161).

Bug fixes:

- bsc#1086690: Fix crash in resolver on memory allocation failure.
- bsc#1077763: Fix allocation in in6ailist_add.
- bsc#1079625: Fix allocation in nss_compat for large number of memberships to a group.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-10"/>
	<updated date="2018-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077763">SUSE bug 1077763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079625">SUSE bug 1079625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582669" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582670" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582671" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582672" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582673" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582674" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582675" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582676" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582677" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582678" comment="glibc-locale-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582679" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582680" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582681" comment="glibc-profile-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582682" comment="glibc-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582683" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582669" comment="glibc-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582670" comment="glibc-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582671" comment="glibc-devel-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582672" comment="glibc-devel-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582673" comment="glibc-html-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582674" comment="glibc-i18ndata-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582675" comment="glibc-info-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582676" comment="glibc-locale-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582677" comment="glibc-locale-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582678" comment="glibc-locale-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582679" comment="glibc-profile-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582680" comment="glibc-profile-32bit-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582681" comment="glibc-profile-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582682" comment="glibc-x86-2.11.3-17.110.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582683" comment="nscd-2.11.3-17.110.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41497" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1058774" ref_url="https://bugzilla.suse.com/1058774" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="941234" ref_url="https://bugzilla.suse.com/941234" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following security issues:

- CVE-2017-15670: Prevent off-by-one error that lead to a heap-based buffer
  overflow in the glob function, related to the processing of home directories
  using the ~ operator followed by a long string (bsc#1064583)
- CVE-2017-15804: The glob function contained a buffer overflow during
  unescaping of user names with the ~ operator (bsc#1064580)
- CVE-2015-5180: res_query in libresolv allowed remote attackers to cause a
  denial of service (NULL pointer dereference and process crash) (bsc#941234).

This non-security issue was fixed:

- Fix inaccuracies in casin, cacos, casinh, cacosh (bsc#1058774)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058774">SUSE bug 1058774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582684" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582685" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582686" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582687" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582688" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582689" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582690" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582691" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582692" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582693" comment="glibc-locale-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582694" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582695" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582696" comment="glibc-profile-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582697" comment="glibc-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582698" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582684" comment="glibc-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582685" comment="glibc-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582686" comment="glibc-devel-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582687" comment="glibc-devel-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582688" comment="glibc-html-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582689" comment="glibc-i18ndata-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582690" comment="glibc-info-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582691" comment="glibc-locale-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582692" comment="glibc-locale-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582693" comment="glibc-locale-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582694" comment="glibc-profile-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582695" comment="glibc-profile-32bit-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582696" comment="glibc-profile-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582697" comment="glibc-x86-2.11.3-17.110.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582698" comment="nscd-2.11.3-17.110.19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41498" version="1" class="patch">
	<metadata>
		<title>Recommended update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1110170" ref_url="https://bugzilla.suse.com/1110170" source="BUGZILLA"/>
		<reference ref_id="1110174" ref_url="https://bugzilla.suse.com/1110174" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2017-15671: Fixed memory leak in glob with GLOB_TILDE (bsc#1064569, BZ #22325).

Non-security issue fixed:

- Avoid access beyond memory bounds in pthread_attr_getaffinity_np (bsc#1110170, BZ #15618).
- Remove improper assert in dlclose (bsc#1110174, BZ #11941).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110170">SUSE bug 1110170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110174">SUSE bug 1110174</bugzilla>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582699" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582700" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582701" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582702" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582703" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582704" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582705" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582706" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582707" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582708" comment="glibc-locale-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582709" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582710" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582711" comment="glibc-profile-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582712" comment="glibc-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582713" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582699" comment="glibc-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582700" comment="glibc-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582701" comment="glibc-devel-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582702" comment="glibc-devel-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582703" comment="glibc-html-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582704" comment="glibc-i18ndata-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582705" comment="glibc-info-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582706" comment="glibc-locale-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582707" comment="glibc-locale-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582708" comment="glibc-locale-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582709" comment="glibc-profile-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582710" comment="glibc-profile-32bit-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582711" comment="glibc-profile-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582712" comment="glibc-x86-2.11.3-17.110.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582713" comment="nscd-2.11.3-17.110.24.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41499" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005564.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2019-9169: Fixed heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-20"/>
	<updated date="2019-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582714" comment="glibc-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582715" comment="glibc-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582716" comment="glibc-devel-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582717" comment="glibc-devel-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582718" comment="glibc-html-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582719" comment="glibc-i18ndata-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582720" comment="glibc-info-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582721" comment="glibc-locale-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582722" comment="glibc-locale-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582723" comment="glibc-profile-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582724" comment="glibc-profile-32bit-2.11.3-17.110.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582725" comment="nscd-2.11.3-17.110.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41500" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-04"/>
	<updated date="2021-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634760" comment="glibc-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634761" comment="glibc-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634762" comment="glibc-devel-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634763" comment="glibc-devel-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634764" comment="glibc-html-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634765" comment="glibc-i18ndata-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634766" comment="glibc-info-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634767" comment="glibc-locale-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634768" comment="glibc-locale-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634769" comment="glibc-profile-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634770" comment="glibc-profile-32bit-2.11.3-17.110.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634771" comment="nscd-2.11.3-17.110.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41501" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193615" ref_url="https://bugzilla.suse.com/1193615" source="BUGZILLA"/>
		<reference ref_id="1193616" ref_url="https://bugzilla.suse.com/1193616" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982/" source="CVE"/>
		<reference ref_id="CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed in getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673424" comment="glibc-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673425" comment="glibc-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673426" comment="glibc-devel-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673427" comment="glibc-devel-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673428" comment="glibc-html-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673429" comment="glibc-i18ndata-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673430" comment="glibc-info-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673431" comment="glibc-locale-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673432" comment="glibc-locale-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673433" comment="glibc-profile-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673434" comment="glibc-profile-32bit-2.11.3-17.110.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673435" comment="nscd-2.11.3-17.110.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41502" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-session (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1048274" ref_url="https://bugzilla.suse.com/1048274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003137.html" source="SUSE-SU"/>
		<description>


This update for gnome-session fixes the following issues:

- CVE-2017-11171: Fix a denial of service condition. an unauthenticated local user
  can create ICE connections, causing a file descriptor leak in
  gnome-session (bsc#1048274).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582726" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582727" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582726" comment="gnome-session-2.28.0-3.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582727" comment="gnome-session-lang-2.28.0-3.11.12.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41503" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578031" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563359" comment="libgnutls-extra26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578032" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578033" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578034" comment="libgnutls26-x86-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41504" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578035" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563362" comment="libgnutls-extra26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578036" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578037" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578038" comment="libgnutls26-x86-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41505" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following issues:

- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-27"/>
	<updated date="2017-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582728" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564541" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582729" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582730" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582731" comment="libgnutls26-x86-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582728" comment="gnutls-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564541" comment="libgnutls-extra26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582729" comment="libgnutls26-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582730" comment="libgnutls26-32bit-2.4.1-24.39.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582731" comment="libgnutls26-x86-2.4.1-24.39.67.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41506" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1040621" ref_url="https://bugzilla.suse.com/1040621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-3 / CVE-2017-7869: An out-of-bounds write in OpenPGP certificate decoding was fixed (bsc#1034173)
- CVE-2017-6891: A potential stack buffer overflow in the bundled libtasn1 was fixed (bsc#1040621)
- An address read of 4 bytes past the end of buffer in OpenPGP certificate parsing was fixed (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-15"/>
	<updated date="2017-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582732" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564544" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582733" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582734" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582735" comment="libgnutls26-x86-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582732" comment="gnutls-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564544" comment="libgnutls-extra26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582733" comment="libgnutls26-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582734" comment="libgnutls26-32bit-2.4.1-24.39.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582735" comment="libgnutls26-x86-2.4.1-24.39.70.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41507" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578044" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578045" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41508" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582736" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582737" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582736" comment="gpg2-2.0.9-25.33.42.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582737" comment="gpg2-lang-2.0.9-25.33.42.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41509" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Also following bugs were fixed:
- Fix buffer overflows when reading username and password. (bsc#956631, CVE-2015-8370)
- Expand list of grub.cfg search path in PV Xen guests for systems installed
  on btrfs snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41510" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045063" ref_url="https://bugzilla.suse.com/1045063" source="BUGZILLA"/>
		<reference ref_id="1124662" ref_url="https://bugzilla.suse.com/1124662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005250.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security issue fixed:

- CVE-2017-9763: Fixed a memory leak in grub_ext2_read_block (bsc#1045063)

Other issues addressed: 

- Added support for  tftp block counter roll-over and backported support for efinetSNP open (bsc#1124662).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045063">SUSE bug 1045063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124662">SUSE bug 1124662</bugzilla>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582738" comment="grub2-x86_64-efi-2.00-0.66.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582739" comment="grub2-x86_64-xen-2.00-0.66.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582738" comment="grub2-x86_64-efi-2.00-0.66.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582739" comment="grub2-x86_64-xen-2.00-0.66.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41511" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582740" comment="grub2-x86_64-efi-2.00-0.66.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582741" comment="grub2-x86_64-xen-2.00-0.66.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41512" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007297.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582742" comment="grub2-x86_64-efi-2.00-0.66.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582743" comment="grub2-x86_64-xen-2.00-0.66.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41513" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9763" ref_url="https://www.suse.com/security/cve/CVE-2017-9763/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

grub2 was updated to the 2.02 version (same as SUSE Linux Enterprise 12 SP3).

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9763/">CVE-2017-9763</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582744" comment="grub2-x86_64-efi-2.02-0.66.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582745" comment="grub2-x86_64-xen-2.02-0.66.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41514" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002598.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: Out of bounds memory read in windows_icon_typefind (bsc#1013669).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582746" comment="gstreamer-0_10-plugins-base-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582747" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582748" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582749" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582750" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582751" comment="libgstapp-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582752" comment="libgstapp-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582753" comment="libgstapp-0_10-0-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582754" comment="libgstinterfaces-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582755" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582756" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582746" comment="gstreamer-0_10-plugins-base-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582747" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582748" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582749" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582750" comment="gstreamer-0_10-plugins-base-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582751" comment="libgstapp-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582752" comment="libgstapp-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582753" comment="libgstapp-0_10-0-x86-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582754" comment="libgstinterfaces-0_10-0-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582755" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582756" comment="libgstinterfaces-0_10-0-x86-0.10.35-5.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41515" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issues fixed:

- CVE-2017-5837: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024076).
- CVE-2017-5844: Fixed a floating point exception in gst_riff_create_audio_caps (bsc#1024079).
- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582757" comment="gstreamer-0_10-plugins-base-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582758" comment="gstreamer-0_10-plugins-base-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582759" comment="gstreamer-0_10-plugins-base-doc-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582760" comment="gstreamer-0_10-plugins-base-lang-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582761" comment="libgstapp-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582762" comment="libgstapp-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582763" comment="libgstinterfaces-0_10-0-0.10.35-5.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582764" comment="libgstinterfaces-0_10-0-32bit-0.10.35-5.18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41516" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-good was updated to fix six security issues.

These security issues were fixed:

- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102)
- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103)
- CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104).
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655)
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653)
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582765" comment="gstreamer-0_10-plugins-good-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582766" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582767" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582765" comment="gstreamer-0_10-plugins-good-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582766" comment="gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582767" comment="gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41517" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578075" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578076" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578077" comment="gtk2-doc-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578078" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578079" comment="gtk2-x86-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41518" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578080" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578081" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578082" comment="gtk2-doc-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578083" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578084" comment="gtk2-x86-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41519" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="966682" ref_url="https://bugzilla.suse.com/966682" source="BUGZILLA"/>
		<reference ref_id="988745" ref_url="https://bugzilla.suse.com/988745" source="BUGZILLA"/>
		<reference ref_id="991450" ref_url="https://bugzilla.suse.com/991450" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<description>

This update for gtk2 fixes the following security issues:

- CVE-2016-6352: Some crashes were fixed, including a out of bounds
  write in the OneLine32() function that could be used by attackers to
  crash GTK/GDK programs.
- CVE-2013-7447: Avoid overflow when allocating a cairo pixbuf (bsc#966682).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988745">SUSE bug 988745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582768" comment="gtk2-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582769" comment="gtk2-32bit-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582770" comment="gtk2-doc-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582771" comment="gtk2-lang-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582772" comment="gtk2-x86-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582768" comment="gtk2-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582769" comment="gtk2-32bit-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582770" comment="gtk2-doc-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582771" comment="gtk2-lang-2.18.9-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582772" comment="gtk2-x86-2.18.9-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41520" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003740.html" source="SUSE-SU"/>
		<description>
This update for gtk2 fixes the following issues:

This security issue was fixed:

- Add checks for multiplications at several locations to avoid mishandling
  memory. This allowed attackers to cause DoS or potentially RCE (bsc#1053417).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582773" comment="gtk2-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582774" comment="gtk2-32bit-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582775" comment="gtk2-doc-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582776" comment="gtk2-lang-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582777" comment="gtk2-x86-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582773" comment="gtk2-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582774" comment="gtk2-32bit-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582775" comment="gtk2-doc-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582776" comment="gtk2-lang-2.18.9-0.45.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582777" comment="gtk2-x86-2.18.9-0.45.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41521" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1039465" ref_url="https://bugzilla.suse.com/1039465" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<description>
This update for gtk2 provides the following fixes:

These security issues were fixed:

- CVE-2017-6312: Prevent integer overflow that allowed context-dependent
  attackers to cause a denial of service (segmentation fault and application
  crash) via a crafted image entry offset in an ICO file (bsc#1027026).
- CVE-2017-6314: The make_available_at_least function allowed context-dependent
  attackers to cause a denial of service (infinite loop) via a large TIFF file
  (bsc#1027025).
- CVE-2017-6313: Prevent integer underflow in the load_resources function that
  allowed context-dependent attackers to cause a denial of service (out-of-bounds
  read and program crash) via a crafted image entry size in an ICO file
  (bsc#1027024).
- CVE-2017-2862: Prevent heap overflow in the
  gdk_pixbuf__jpeg_image_load_increment function. A specially crafted jpeg file
  could have caused a heap overflow resulting in remote code execution
  (bsc#1048289)
- CVE-2017-2870: Prevent integer overflow in the tiff_image_parse
  functionality. A specially crafted tiff file could have caused a heap-overflow
  resulting in remote code execution (bsc#1048544).

This non-security issue was fixed:

- Prevent an infinite loop when a window is destroyed while traversed (bsc#1039465).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-21"/>
	<updated date="2018-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039465">SUSE bug 1039465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582778" comment="gtk2-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582779" comment="gtk2-32bit-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582780" comment="gtk2-doc-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582781" comment="gtk2-lang-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582782" comment="gtk2-x86-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582778" comment="gtk2-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582779" comment="gtk2-32bit-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582780" comment="gtk2-doc-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582781" comment="gtk2-lang-2.18.9-0.45.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582782" comment="gtk2-x86-2.18.9-0.45.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41522" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002622.html" source="SUSE-SU"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582783" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582783" comment="guile-1.8.5-24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41523" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<description>
icu was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-15"/>
	<updated date="2015-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582784" comment="libicu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582785" comment="libicu-32bit-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582786" comment="libicu-doc-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582787" comment="libicu-x86-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582784" comment="libicu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582785" comment="libicu-32bit-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582786" comment="libicu-doc-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582787" comment="libicu-x86-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41524" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952260" ref_url="https://bugzilla.suse.com/952260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002018.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following issue:

The previous patch for CVE-2014-9654 was incorrect and lead
to non-working regular expressions. This update fixes this 
problem (bsc#952260)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582788" comment="libicu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582789" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582790" comment="libicu-doc-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582791" comment="libicu-x86-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582788" comment="libicu-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582789" comment="libicu-32bit-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582790" comment="libicu-doc-4.0-38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582791" comment="libicu-x86-4.0-38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41525" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012224" ref_url="https://bugzilla.suse.com/1012224" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002590.html" source="SUSE-SU"/>
		<description>

This update for icu fixes the following security issues:

- Passing a locale string longer than 255 characters to uloc_getDisplayName()
  could have caused a buffer overflow resulting in denial of service or
  possible code execution (bsc#1012224, CVE-2014-9911).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012224">SUSE bug 1012224</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582792" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582793" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582794" comment="libicu-doc-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582795" comment="libicu-x86-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582792" comment="libicu-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582793" comment="libicu-32bit-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582794" comment="libicu-doc-4.0-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582795" comment="libicu-x86-4.0-43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41526" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023033" ref_url="https://bugzilla.suse.com/1023033" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9911" ref_url="https://www.suse.com/security/cve/CVE-2014-9911/" source="CVE"/>
		<description>

This update for icu fixes the following issues:

- CVE-2014-9911: The fix was updated to not crash (NULL ptr deref) when resPath is NULL (bsc#1023033). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023033">SUSE bug 1023033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9911/">CVE-2014-9911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582796" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582797" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582798" comment="libicu-doc-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582799" comment="libicu-x86-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582796" comment="libicu-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582797" comment="libicu-32bit-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582798" comment="libicu-doc-4.0-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582799" comment="libicu-x86-4.0-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41527" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in common/uloc.cpp did not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument. (bsc#990636)
- CVE-2017-7868: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. (bsc#1034674)
- CVE-2017-7867: ICU had an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp allowed remote attackers to execute arbitrary code via a crafted string, aka a 'redundant UVector entry clean up function call' issue. (bsc#1067203)
- CVE-2017-17484:The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp mishandled ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC. (bsc#1072193)
- CVE-2017-15422: An integer overflow in persian calendar calculation was fixed, which could show wrong years. (bsc#1077999)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582800" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582801" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582802" comment="libicu-doc-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582803" comment="libicu-x86-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582800" comment="libicu-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582801" comment="libicu-32bit-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582802" comment="libicu-doc-4.0-47.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582803" comment="libicu-x86-4.0-47.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41528" version="1" class="patch">
	<metadata>
		<title>Security update for inn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182321" ref_url="https://bugzilla.suse.com/1182321" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31998" ref_url="https://www.suse.com/security/cve/CVE-2021-31998/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009022.html" source="SUSE-SU"/>
		<description>
This update for inn fixes the following issues:

- CVE-2021-31998: Fixed locale privialge escalation during the update of inn (bsc#1182321).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182321">SUSE bug 1182321</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31998/">CVE-2021-31998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582804" comment="inn-2.4.2-170.21.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41529" version="1" class="patch">
	<metadata>
		<title>Security update for intel-SINIT (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1069754" ref_url="https://bugzilla.suse.com/1069754" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5174" ref_url="https://www.suse.com/security/cve/CVE-2011-5174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00029.html" source="SUSE-SU"/>
		<description>
This update for intel-SINIT fixes the following issues:

Security issue fixed:

- CVE-2011-5174: Fixed security issue in old SINIT files which allowed local users to bypass the TXT protection mechanism (bsc#1069754). 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-13"/>
	<updated date="2017-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069754">SUSE bug 1069754</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-5174/">CVE-2011-5174</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578107" comment="intel-SINIT-1-0.81.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578107" comment="intel-SINIT-1-0.81.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41530" version="1" class="patch">
	<metadata>
		<title>Security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1038508" ref_url="https://bugzilla.suse.com/1038508" source="BUGZILLA"/>
		<reference ref_id="1163026" ref_url="https://bugzilla.suse.com/1163026" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006600.html" source="SUSE-SU"/>
		<description>
This update for ipmitool fixes the following issues:

- CVE-2020-5208: Fixed several buffer overflows (bsc#1163026).
- Added a missing patch for DDR4 support (bsc#1038508).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038508">SUSE bug 1038508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582805" comment="ipmitool-1.8.15-0.30.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41531" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="931989" ref_url="https://bugzilla.suse.com/931989" source="BUGZILLA"/>
		<reference ref_id="939810" ref_url="https://bugzilla.suse.com/939810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001531.html" source="SUSE-SU"/>
		<description>
ipsec-tools was updated to fix one security issue and a bug.

This security issue was fixed:

- CVE-2015-4047: racoon/gssapi.c in ipsec-tools allowed remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests (bsc#931989).

Due to a packaging error, the racoonf.conf config file was symlinked to /usr/share/doc/packages/ipsec-tools/examples/racoon/samples/racoon.conf
on some processor platforms, edits might have happened only in this example file.

Before upgrading, please check if /etc/racoon/racoon.conf is a symlink to this example file and backup the content. (bsc#939810)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-06"/>
	<updated date="2015-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939810">SUSE bug 939810</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578108" comment="ipsec-tools-0.7.3-1.13.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41532" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003723.html" source="SUSE-SU"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582806" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582806" comment="ipsec-tools-0.7.3-1.38.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41533" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954102" ref_url="https://bugzilla.suse.com/954102" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001828.html" source="SUSE-SU"/>
		<description>

This update to jakarta-commons-collections 3.2.2 fixes the following security issues:

* bsc#954102 code-execution by unserialization
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954102">SUSE bug 954102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009571995" comment="jakarta-commons-collections-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571996" comment="jakarta-commons-collections-javadoc-3.2.2-88.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009571997" comment="jakarta-commons-collections-tomcat5-3.2.2-88.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41534" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14044-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914044-1.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567995" comment="jakarta-commons-fileupload-1.1.1-1.37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567996" comment="jakarta-commons-fileupload-javadoc-1.1.1-1.37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41535" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00035.html" source="SUSE-SU"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009572001" comment="jakarta-taglibs-standard-1.1.1-234.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572002" comment="jakarta-taglibs-standard-javadoc-1.1.1-234.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41536" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security fixes:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2016-1577, CVE-2016-2116: double free vulnerability in the jas_iccattrval_destroy function (bsc#968373)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: multiple integer overflows (bsc#392410)
- bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582807" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582808" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582809" comment="libjasper-x86-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582807" comment="libjasper-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582808" comment="libjasper-32bit-1.900.14-134.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582809" comment="libjasper-x86-1.900.14-134.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41537" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec (bsc#1012530)
- CVE-2016-9395: Missing sanity checks on the data in a SIZ marker segment (bsc#1010977).
- CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x &gt; 0' failed. (bsc#1010979)
- CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c) (bsc#1011830)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy (bsc#1015993)
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582810" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582811" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582812" comment="libjasper-x86-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582810" comment="libjasper-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582811" comment="libjasper-32bit-1.900.14-134.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582812" comment="libjasper-x86-1.900.14-134.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41538" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582813" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582814" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582815" comment="libjasper-x86-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582813" comment="libjasper-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582814" comment="libjasper-32bit-1.900.14-134.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582815" comment="libjasper-x86-1.900.14-134.33.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41539" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582816" comment="libjasper-1.900.14-134.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582817" comment="libjasper-32bit-1.900.14-134.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41540" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935540" ref_url="https://bugzilla.suse.com/935540" source="BUGZILLA"/>
		<reference ref_id="938895" ref_url="https://bugzilla.suse.com/938895" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<description>
IBM Java was updated to 7.1-3.10 to fix several security issues.

The following vulnerabilities were fixed:
  
* CVE-2015-1931: IBM Java Security Components store plain text data in memory dumps, which could allow a local attacker to obtain information to aid in further attacks against the system.
* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data.
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.  
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582818" comment="java-1_7_1-ibm-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582819" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582820" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582821" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.10-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582818" comment="java-1_7_1-ibm-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582819" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582820" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582821" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.10-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41541" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="941939" ref_url="https://bugzilla.suse.com/941939" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<description>
The java-1_7_1-ibm package was updated to version 7.1-3.20 to fix several security and non security issues:

- bnc#955131: Version update to 7.1-3.20:
  CVE-2015-4734 CVE-2015-4803 CVE-2015-4805 CVE-2015-4806 CVE-2015-4810
  CVE-2015-4835 CVE-2015-4840 CVE-2015-4842 CVE-2015-4843 CVE-2015-4844
  CVE-2015-4860 CVE-2015-4871 CVE-2015-4872 CVE-2015-4882 CVE-2015-4883
  CVE-2015-4893 CVE-2015-4902 CVE-2015-4903 CVE-2015-4911 CVE-2015-5006
- Add backcompat symlinks for sdkdir
- bnc#941939: Fix to provide %{name} instead of %{sdklnk} only in _jvmprivdir
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/941939">SUSE bug 941939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582822" comment="java-1_7_1-ibm-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582823" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582824" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582825" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.20-6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582822" comment="java-1_7_1-ibm-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582823" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582824" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.20-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582825" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.20-6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41542" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960402" ref_url="https://bugzilla.suse.com/960402" source="BUGZILLA"/>
		<reference ref_id="963937" ref_url="https://bugzilla.suse.com/963937" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues by updating to 7.1-3.30 (bsc#963937):

- CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances
- CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials
- CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information
- CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions
- CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
- CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact
- CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information
- CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service
- CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact
- CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact

The following bugs were fixed:

- bsc#960402: resolve package conflicts in devel package
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582826" comment="java-1_7_1-ibm-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582827" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582828" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582829" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.30-9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582826" comment="java-1_7_1-ibm-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582827" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582828" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.30-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582829" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.30-9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41543" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="977646" ref_url="https://bugzilla.suse.com/977646" source="BUGZILLA"/>
		<reference ref_id="977648" ref_url="https://bugzilla.suse.com/977648" source="BUGZILLA"/>
		<reference ref_id="977650" ref_url="https://bugzilla.suse.com/977650" source="BUGZILLA"/>
		<reference ref_id="979252" ref_url="https://bugzilla.suse.com/979252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<description>

This IBM Java 1.7.1 SR3 FP40 relese fixes the following issues: 

Security issues fixed:
- CVE-2016-0264: buffer overflow vulnerability in the IBM JVM (bsc#977648)
- CVE-2016-0363: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix (bsc#977650)
- CVE-2016-0376: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix (bsc#977646)
- The following CVEs got also fixed during this update. (bsc#979252)
  CVE-2016-3443, CVE-2016-0687, CVE-2016-0686, CVE-2016-3427, CVE-2016-3449, CVE-2016-3422, CVE-2016-3426
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-13"/>
	<updated date="2016-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582830" comment="java-1_7_1-ibm-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582831" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582832" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582833" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.40-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582830" comment="java-1_7_1-ibm-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582831" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582832" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.40-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582833" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.40-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41544" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-3.60 (bsc#1009280) fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582834" comment="java-1_7_1-ibm-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582835" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582836" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582837" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-19.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582834" comment="java-1_7_1-ibm-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582835" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582836" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582837" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-19.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41545" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582838" comment="java-1_7_1-ibm-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582839" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582840" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582841" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.1-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582838" comment="java-1_7_1-ibm-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582839" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582840" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.1-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582841" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.1-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41546" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Version update to 7.1-4.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client


		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582842" comment="java-1_7_1-ibm-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582843" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582844" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582845" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582842" comment="java-1_7_1-ibm-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582843" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582844" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582845" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41547" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582846" comment="java-1_7_1-ibm-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582847" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582848" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582849" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-26.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582846" comment="java-1_7_1-ibm-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582847" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582848" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582849" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-26.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41548" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

* CVE-2017-10349: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10348: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10388: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2016-9841:  'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10293: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10345: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10350: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10356: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10357: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10347: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10355: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10285: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10281: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10295: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2017-10346: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

* CVE-2016-10165: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582850" comment="java-1_7_1-ibm-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582851" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582852" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582853" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-26.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582850" comment="java-1_7_1-ibm-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582851" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582852" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-26.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582853" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-26.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41549" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm provides the following fix:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
             apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
           trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
            converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
            policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
            internally
  - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
            internally
  - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
            specification attribute
  - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
            stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler
  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-07"/>
	<updated date="2018-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582854" comment="java-1_7_1-ibm-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582855" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582856" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582857" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-26.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582854" comment="java-1_7_1-ibm-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582855" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582856" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582857" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-26.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41550" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]

Security fixes:

-   CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
    CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
    CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582858" comment="java-1_7_1-ibm-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582859" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582860" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582861" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-26.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582858" comment="java-1_7_1-ibm-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582859" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582860" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-26.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582861" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-26.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41551" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.30 fixes the following issues:

Security issues fixed:

- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582862" comment="java-1_7_1-ibm-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582863" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582864" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582865" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-26.29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582862" comment="java-1_7_1-ibm-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582863" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582864" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-26.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582865" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-26.29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41552" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582866" comment="java-1_7_1-ibm-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582867" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-26.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582866" comment="java-1_7_1-ibm-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582867" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-26.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-26.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41553" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-14"/>
	<updated date="2019-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582870" comment="java-1_7_1-ibm-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582871" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582872" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582873" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582870" comment="java-1_7_1-ibm-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582871" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582872" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582873" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41554" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.
                                                                                     
Security issues fixed:                                                                   
                                                                        
- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).                                              
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).                                                                   
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).                                                                   
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).                                                                                                                 
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).                                                                                                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582874" comment="java-1_7_1-ibm-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582875" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582876" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582877" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582878" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-26.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41555" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-04"/>
	<updated date="2019-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582879" comment="java-1_7_1-ibm-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582880" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582881" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582882" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-26.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582883" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-26.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41556" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-08"/>
	<updated date="2020-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582884" comment="java-1_7_1-ibm-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582885" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582886" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582887" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-26.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582888" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-26.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41557" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-21"/>
	<updated date="2020-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582889" comment="java-1_7_1-ibm-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582890" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582891" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582892" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-26.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582893" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-26.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41558" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-17"/>
	<updated date="2020-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582894" comment="java-1_7_1-ibm-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582895" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582896" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582897" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-26.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582898" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-26.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41559" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582899" comment="java-1_7_1-ibm-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582900" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582901" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582902" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-26.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582903" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-26.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41560" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582904" comment="java-1_7_1-ibm-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582905" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582906" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582907" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582908" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41561" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582909" comment="java-1_7_1-ibm-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41562" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662529" comment="java-1_7_1-ibm-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662530" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662531" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662532" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-26.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662533" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-26.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41563" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-23"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674107" comment="java-1_7_1-ibm-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674108" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674109" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674110" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-26.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674111" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-26.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41564" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="992537" ref_url="https://bugzilla.suse.com/992537" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<description>

IBM Java 7.1 was updated to version 7.1-3.50 to fix the following security issues:

CVE-2016-3485 CVE-2016-3511 CVE-2016-3598

Please see https://www.ibm.com/developerworks/java/jdk/alerts/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-07"/>
	<updated date="2016-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/992537">SUSE bug 992537</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582914" comment="java-1_7_1-ibm-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582915" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582916" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582917" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582914" comment="java-1_7_1-ibm-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582915" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582916" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582917" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41565" version="1" class="patch">
	<metadata>
		<title>Security update for jpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="1096209" ref_url="https://bugzilla.suse.com/1096209" source="BUGZILLA"/>
		<reference ref_id="1098155" ref_url="https://bugzilla.suse.com/1098155" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<description>
This update for jpeg fixes the following issues:

* CVE-2017-15232: NULL pointer dereferences in jdpostct.c and jquant1.c could
  lead to denial of service (crash) when processing images [bsc#1062937]
* CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in rdtarga.c,
  which allowed remote attackers to cause a denial-of-service via crafted JPG
  files due to a large loop [bsc#1096209]
* CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c caused
  by a divide by zero when processing a crafted BMP image [bsc#1098155]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582918" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582919" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582920" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582921" comment="libjpeg-x86-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582918" comment="jpeg-6b-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582919" comment="libjpeg-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582920" comment="libjpeg-32bit-6.2.0-879.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582921" comment="libjpeg-x86-6.2.0-879.12.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41566" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578238" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578239" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578240" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578241" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578242" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41567" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958347" ref_url="https://bugzilla.suse.com/958347" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7543" ref_url="https://www.suse.com/security/cve/CVE-2015-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004799.html" source="SUSE-SU"/>
		<description>
This update for kdelibs3 fixes the following issues:

- CVE-2015-7543: Insecure creation of temporary directories allowed local users
  to hijack the IPC by pre-creating the temporary directory (bsc#958347).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-26"/>
	<updated date="2018-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958347">SUSE bug 958347</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7543/">CVE-2015-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582922" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582923" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582924" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582925" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582926" comment="kdelibs3-default-style-x86-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582927" comment="kdelibs3-x86-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582922" comment="kdelibs3-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582923" comment="kdelibs3-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582924" comment="kdelibs3-default-style-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582925" comment="kdelibs3-default-style-32bit-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582926" comment="kdelibs3-default-style-x86-3.5.10-23.30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582927" comment="kdelibs3-x86-3.5.10-23.30.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41568" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="909589" ref_url="https://bugzilla.suse.com/909589" source="BUGZILLA"/>
		<reference ref_id="954847" ref_url="https://bugzilla.suse.com/954847" source="BUGZILLA"/>
		<reference ref_id="971030" ref_url="https://bugzilla.suse.com/971030" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="979915" ref_url="https://bugzilla.suse.com/979915" source="BUGZILLA"/>
		<reference ref_id="982544" ref_url="https://bugzilla.suse.com/982544" source="BUGZILLA"/>
		<reference ref_id="983721" ref_url="https://bugzilla.suse.com/983721" source="BUGZILLA"/>
		<reference ref_id="984755" ref_url="https://bugzilla.suse.com/984755" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986572" ref_url="https://bugzilla.suse.com/986572" source="BUGZILLA"/>
		<reference ref_id="988498" ref_url="https://bugzilla.suse.com/988498" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).

The following non-security bugs were fixed:
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- bridge: superfluous skb-&gt;nfct check in br_nf_dev_queue_xmit (bsc#982544).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/909589">SUSE bug 909589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954847">SUSE bug 954847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971030">SUSE bug 971030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979915">SUSE bug 979915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982544">SUSE bug 982544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983721">SUSE bug 983721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988498">SUSE bug 988498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582928" comment="kernel-default-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582929" comment="kernel-default-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582930" comment="kernel-default-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582931" comment="kernel-default-man-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582932" comment="kernel-ec2-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582933" comment="kernel-ec2-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582934" comment="kernel-ec2-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582935" comment="kernel-pae-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582936" comment="kernel-pae-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582937" comment="kernel-pae-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582938" comment="kernel-ppc64-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582939" comment="kernel-ppc64-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582940" comment="kernel-ppc64-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582941" comment="kernel-source-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582942" comment="kernel-syms-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582943" comment="kernel-trace-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582944" comment="kernel-trace-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582945" comment="kernel-trace-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582946" comment="kernel-xen-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582947" comment="kernel-xen-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582948" comment="kernel-xen-devel-3.0.101-80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582928" comment="kernel-default-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582929" comment="kernel-default-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582930" comment="kernel-default-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582931" comment="kernel-default-man-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582932" comment="kernel-ec2-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582933" comment="kernel-ec2-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582934" comment="kernel-ec2-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582935" comment="kernel-pae-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582936" comment="kernel-pae-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582937" comment="kernel-pae-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582938" comment="kernel-ppc64-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582939" comment="kernel-ppc64-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582940" comment="kernel-ppc64-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582941" comment="kernel-source-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582942" comment="kernel-syms-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582943" comment="kernel-trace-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582944" comment="kernel-trace-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582945" comment="kernel-trace-devel-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582946" comment="kernel-xen-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582947" comment="kernel-xen-base-3.0.101-80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582948" comment="kernel-xen-devel-3.0.101-80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41569" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1001419" ref_url="https://bugzilla.suse.com/1001419" source="BUGZILLA"/>
		<reference ref_id="1002165" ref_url="https://bugzilla.suse.com/1002165" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1003344" ref_url="https://bugzilla.suse.com/1003344" source="BUGZILLA"/>
		<reference ref_id="1003568" ref_url="https://bugzilla.suse.com/1003568" source="BUGZILLA"/>
		<reference ref_id="1003677" ref_url="https://bugzilla.suse.com/1003677" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003925" ref_url="https://bugzilla.suse.com/1003925" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1004520" ref_url="https://bugzilla.suse.com/1004520" source="BUGZILLA"/>
		<reference ref_id="1005857" ref_url="https://bugzilla.suse.com/1005857" source="BUGZILLA"/>
		<reference ref_id="1005896" ref_url="https://bugzilla.suse.com/1005896" source="BUGZILLA"/>
		<reference ref_id="1005903" ref_url="https://bugzilla.suse.com/1005903" source="BUGZILLA"/>
		<reference ref_id="1006917" ref_url="https://bugzilla.suse.com/1006917" source="BUGZILLA"/>
		<reference ref_id="1006919" ref_url="https://bugzilla.suse.com/1006919" source="BUGZILLA"/>
		<reference ref_id="1007944" ref_url="https://bugzilla.suse.com/1007944" source="BUGZILLA"/>
		<reference ref_id="763198" ref_url="https://bugzilla.suse.com/763198" source="BUGZILLA"/>
		<reference ref_id="771065" ref_url="https://bugzilla.suse.com/771065" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="803320" ref_url="https://bugzilla.suse.com/803320" source="BUGZILLA"/>
		<reference ref_id="839104" ref_url="https://bugzilla.suse.com/839104" source="BUGZILLA"/>
		<reference ref_id="843236" ref_url="https://bugzilla.suse.com/843236" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="863873" ref_url="https://bugzilla.suse.com/863873" source="BUGZILLA"/>
		<reference ref_id="865783" ref_url="https://bugzilla.suse.com/865783" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="907611" ref_url="https://bugzilla.suse.com/907611" source="BUGZILLA"/>
		<reference ref_id="908458" ref_url="https://bugzilla.suse.com/908458" source="BUGZILLA"/>
		<reference ref_id="908684" ref_url="https://bugzilla.suse.com/908684" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="909994" ref_url="https://bugzilla.suse.com/909994" source="BUGZILLA"/>
		<reference ref_id="911687" ref_url="https://bugzilla.suse.com/911687" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="922947" ref_url="https://bugzilla.suse.com/922947" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="929141" ref_url="https://bugzilla.suse.com/929141" source="BUGZILLA"/>
		<reference ref_id="934760" ref_url="https://bugzilla.suse.com/934760" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="960689" ref_url="https://bugzilla.suse.com/960689" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="967716" ref_url="https://bugzilla.suse.com/967716" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968014" ref_url="https://bugzilla.suse.com/968014" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="973203" ref_url="https://bugzilla.suse.com/973203" source="BUGZILLA"/>
		<reference ref_id="974620" ref_url="https://bugzilla.suse.com/974620" source="BUGZILLA"/>
		<reference ref_id="976867" ref_url="https://bugzilla.suse.com/976867" source="BUGZILLA"/>
		<reference ref_id="977687" ref_url="https://bugzilla.suse.com/977687" source="BUGZILLA"/>
		<reference ref_id="979514" ref_url="https://bugzilla.suse.com/979514" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="982218" ref_url="https://bugzilla.suse.com/982218" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983535" ref_url="https://bugzilla.suse.com/983535" source="BUGZILLA"/>
		<reference ref_id="983619" ref_url="https://bugzilla.suse.com/983619" source="BUGZILLA"/>
		<reference ref_id="984102" ref_url="https://bugzilla.suse.com/984102" source="BUGZILLA"/>
		<reference ref_id="984194" ref_url="https://bugzilla.suse.com/984194" source="BUGZILLA"/>
		<reference ref_id="984992" ref_url="https://bugzilla.suse.com/984992" source="BUGZILLA"/>
		<reference ref_id="985206" ref_url="https://bugzilla.suse.com/985206" source="BUGZILLA"/>
		<reference ref_id="986337" ref_url="https://bugzilla.suse.com/986337" source="BUGZILLA"/>
		<reference ref_id="986362" ref_url="https://bugzilla.suse.com/986362" source="BUGZILLA"/>
		<reference ref_id="986365" ref_url="https://bugzilla.suse.com/986365" source="BUGZILLA"/>
		<reference ref_id="986445" ref_url="https://bugzilla.suse.com/986445" source="BUGZILLA"/>
		<reference ref_id="987565" ref_url="https://bugzilla.suse.com/987565" source="BUGZILLA"/>
		<reference ref_id="988440" ref_url="https://bugzilla.suse.com/988440" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="989764" ref_url="https://bugzilla.suse.com/989764" source="BUGZILLA"/>
		<reference ref_id="989779" ref_url="https://bugzilla.suse.com/989779" source="BUGZILLA"/>
		<reference ref_id="991608" ref_url="https://bugzilla.suse.com/991608" source="BUGZILLA"/>
		<reference ref_id="991665" ref_url="https://bugzilla.suse.com/991665" source="BUGZILLA"/>
		<reference ref_id="991923" ref_url="https://bugzilla.suse.com/991923" source="BUGZILLA"/>
		<reference ref_id="992566" ref_url="https://bugzilla.suse.com/992566" source="BUGZILLA"/>
		<reference ref_id="993127" ref_url="https://bugzilla.suse.com/993127" source="BUGZILLA"/>
		<reference ref_id="993890" ref_url="https://bugzilla.suse.com/993890" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994296" ref_url="https://bugzilla.suse.com/994296" source="BUGZILLA"/>
		<reference ref_id="994436" ref_url="https://bugzilla.suse.com/994436" source="BUGZILLA"/>
		<reference ref_id="994618" ref_url="https://bugzilla.suse.com/994618" source="BUGZILLA"/>
		<reference ref_id="994759" ref_url="https://bugzilla.suse.com/994759" source="BUGZILLA"/>
		<reference ref_id="994926" ref_url="https://bugzilla.suse.com/994926" source="BUGZILLA"/>
		<reference ref_id="995968" ref_url="https://bugzilla.suse.com/995968" source="BUGZILLA"/>
		<reference ref_id="996329" ref_url="https://bugzilla.suse.com/996329" source="BUGZILLA"/>
		<reference ref_id="996664" ref_url="https://bugzilla.suse.com/996664" source="BUGZILLA"/>
		<reference ref_id="997708" ref_url="https://bugzilla.suse.com/997708" source="BUGZILLA"/>
		<reference ref_id="998399" ref_url="https://bugzilla.suse.com/998399" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999584" ref_url="https://bugzilla.suse.com/999584" source="BUGZILLA"/>
		<reference ref_id="999600" ref_url="https://bugzilla.suse.com/999600" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-0823" ref_url="https://www.suse.com/security/cve/CVE-2016-0823/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

For the PowerPC64 a new 'bigmem' flavor has been added to support big Power machines. (FATE#319026)

The following security bugs were fixed:

- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).

The following non-security bugs were fixed:

- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).
- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).
- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- avoid dentry crash triggered by NFS (bsc#984194).
- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).
- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).
- drivers: hv: vss: run only on supported host versions (bnc#986337).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- i2c: i801: add Intel Lewisburg device IDs (fate#319286).
- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -&gt; 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- introduce SIZE_MAX (bsc#1000189).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi: Import kabi files from 3.0.101-80
- kabi-fix for flock_owner addition (bsc#998689).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).
- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- oom: print nodemask in the oom report (bnc#1003866).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- pciback: return proper values during BAR sizing.
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC' obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS &amp; cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils &lt; 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)
- random32: add prandom_u32_max (bsc#989152).
- remove problematic preprocessor constructs (bsc#928138,fate#319026).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- rpm/package-descriptions: add -bigmem description
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: make executable
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).
- sort hyperv patches properly in series.conf
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).
- x86/gart: Check for GART support before accessing GART registers (fate#321400).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).
- zfcp: fix ELS/GS request&amp;response length for hardware data router (bnc#1003677, LTC#144308).
- zfcp: fix payload trace length for SAN request&amp;response (bnc#1003677, LTC#144312).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).
- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001419">SUSE bug 1001419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002165">SUSE bug 1002165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003344">SUSE bug 1003344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003568">SUSE bug 1003568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003677">SUSE bug 1003677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004520">SUSE bug 1004520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005857">SUSE bug 1005857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005896">SUSE bug 1005896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005903">SUSE bug 1005903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006917">SUSE bug 1006917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006919">SUSE bug 1006919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007944">SUSE bug 1007944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763198">SUSE bug 763198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/771065">SUSE bug 771065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803320">SUSE bug 803320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/843236">SUSE bug 843236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863873">SUSE bug 863873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865783">SUSE bug 865783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907611">SUSE bug 907611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908458">SUSE bug 908458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908684">SUSE bug 908684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909994">SUSE bug 909994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911687">SUSE bug 911687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929141">SUSE bug 929141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934760">SUSE bug 934760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967716">SUSE bug 967716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973203">SUSE bug 973203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974620">SUSE bug 974620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976867">SUSE bug 976867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977687">SUSE bug 977687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979514">SUSE bug 979514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982218">SUSE bug 982218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983535">SUSE bug 983535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983619">SUSE bug 983619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984102">SUSE bug 984102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984194">SUSE bug 984194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984992">SUSE bug 984992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985206">SUSE bug 985206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986337">SUSE bug 986337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987565">SUSE bug 987565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988440">SUSE bug 988440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989764">SUSE bug 989764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989779">SUSE bug 989779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991665">SUSE bug 991665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991923">SUSE bug 991923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993127">SUSE bug 993127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993890">SUSE bug 993890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994436">SUSE bug 994436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994759">SUSE bug 994759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994926">SUSE bug 994926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996329">SUSE bug 996329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996664">SUSE bug 996664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997708">SUSE bug 997708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998399">SUSE bug 998399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999584">SUSE bug 999584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999600">SUSE bug 999600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0823/">CVE-2016-0823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582949" comment="kernel-bigmem-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582950" comment="kernel-bigmem-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582951" comment="kernel-bigmem-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582952" comment="kernel-default-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582953" comment="kernel-default-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582954" comment="kernel-default-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582955" comment="kernel-default-man-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582956" comment="kernel-ec2-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582957" comment="kernel-ec2-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582958" comment="kernel-ec2-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582959" comment="kernel-pae-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582960" comment="kernel-pae-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582961" comment="kernel-pae-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582962" comment="kernel-ppc64-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582963" comment="kernel-ppc64-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582964" comment="kernel-ppc64-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582965" comment="kernel-source-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582966" comment="kernel-syms-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582967" comment="kernel-trace-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582968" comment="kernel-trace-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582969" comment="kernel-trace-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582970" comment="kernel-xen-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582971" comment="kernel-xen-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582972" comment="kernel-xen-devel-3.0.101-88.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582949" comment="kernel-bigmem-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582950" comment="kernel-bigmem-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582951" comment="kernel-bigmem-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582952" comment="kernel-default-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582953" comment="kernel-default-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582954" comment="kernel-default-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582955" comment="kernel-default-man-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582956" comment="kernel-ec2-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582957" comment="kernel-ec2-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582958" comment="kernel-ec2-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582959" comment="kernel-pae-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582960" comment="kernel-pae-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582961" comment="kernel-pae-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582962" comment="kernel-ppc64-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582963" comment="kernel-ppc64-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582964" comment="kernel-ppc64-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582965" comment="kernel-source-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582966" comment="kernel-syms-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582967" comment="kernel-trace-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582968" comment="kernel-trace-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582969" comment="kernel-trace-devel-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582970" comment="kernel-xen-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582971" comment="kernel-xen-base-3.0.101-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582972" comment="kernel-xen-devel-3.0.101-88.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41570" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1005877" ref_url="https://bugzilla.suse.com/1005877" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008645" ref_url="https://bugzilla.suse.com/1008645" source="BUGZILLA"/>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1008833" ref_url="https://bugzilla.suse.com/1008833" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1009875" ref_url="https://bugzilla.suse.com/1009875" source="BUGZILLA"/>
		<reference ref_id="1010150" ref_url="https://bugzilla.suse.com/1010150" source="BUGZILLA"/>
		<reference ref_id="1010175" ref_url="https://bugzilla.suse.com/1010175" source="BUGZILLA"/>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1010467" ref_url="https://bugzilla.suse.com/1010467" source="BUGZILLA"/>
		<reference ref_id="1010501" ref_url="https://bugzilla.suse.com/1010501" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010711" ref_url="https://bugzilla.suse.com/1010711" source="BUGZILLA"/>
		<reference ref_id="1010713" ref_url="https://bugzilla.suse.com/1010713" source="BUGZILLA"/>
		<reference ref_id="1010716" ref_url="https://bugzilla.suse.com/1010716" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1011820" ref_url="https://bugzilla.suse.com/1011820" source="BUGZILLA"/>
		<reference ref_id="1012183" ref_url="https://bugzilla.suse.com/1012183" source="BUGZILLA"/>
		<reference ref_id="1012411" ref_url="https://bugzilla.suse.com/1012411" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012832" ref_url="https://bugzilla.suse.com/1012832" source="BUGZILLA"/>
		<reference ref_id="1012851" ref_url="https://bugzilla.suse.com/1012851" source="BUGZILLA"/>
		<reference ref_id="1012852" ref_url="https://bugzilla.suse.com/1012852" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013038" ref_url="https://bugzilla.suse.com/1013038" source="BUGZILLA"/>
		<reference ref_id="1013042" ref_url="https://bugzilla.suse.com/1013042" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013542" ref_url="https://bugzilla.suse.com/1013542" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1014454" ref_url="https://bugzilla.suse.com/1014454" source="BUGZILLA"/>
		<reference ref_id="1014746" ref_url="https://bugzilla.suse.com/1014746" source="BUGZILLA"/>
		<reference ref_id="1015561" ref_url="https://bugzilla.suse.com/1015561" source="BUGZILLA"/>
		<reference ref_id="1015752" ref_url="https://bugzilla.suse.com/1015752" source="BUGZILLA"/>
		<reference ref_id="1015760" ref_url="https://bugzilla.suse.com/1015760" source="BUGZILLA"/>
		<reference ref_id="1015796" ref_url="https://bugzilla.suse.com/1015796" source="BUGZILLA"/>
		<reference ref_id="1015803" ref_url="https://bugzilla.suse.com/1015803" source="BUGZILLA"/>
		<reference ref_id="1015817" ref_url="https://bugzilla.suse.com/1015817" source="BUGZILLA"/>
		<reference ref_id="1015828" ref_url="https://bugzilla.suse.com/1015828" source="BUGZILLA"/>
		<reference ref_id="1015844" ref_url="https://bugzilla.suse.com/1015844" source="BUGZILLA"/>
		<reference ref_id="1015848" ref_url="https://bugzilla.suse.com/1015848" source="BUGZILLA"/>
		<reference ref_id="1015878" ref_url="https://bugzilla.suse.com/1015878" source="BUGZILLA"/>
		<reference ref_id="1015932" ref_url="https://bugzilla.suse.com/1015932" source="BUGZILLA"/>
		<reference ref_id="1016320" ref_url="https://bugzilla.suse.com/1016320" source="BUGZILLA"/>
		<reference ref_id="1016505" ref_url="https://bugzilla.suse.com/1016505" source="BUGZILLA"/>
		<reference ref_id="1016520" ref_url="https://bugzilla.suse.com/1016520" source="BUGZILLA"/>
		<reference ref_id="1016668" ref_url="https://bugzilla.suse.com/1016668" source="BUGZILLA"/>
		<reference ref_id="1016688" ref_url="https://bugzilla.suse.com/1016688" source="BUGZILLA"/>
		<reference ref_id="1016824" ref_url="https://bugzilla.suse.com/1016824" source="BUGZILLA"/>
		<reference ref_id="1016831" ref_url="https://bugzilla.suse.com/1016831" source="BUGZILLA"/>
		<reference ref_id="1017686" ref_url="https://bugzilla.suse.com/1017686" source="BUGZILLA"/>
		<reference ref_id="1017710" ref_url="https://bugzilla.suse.com/1017710" source="BUGZILLA"/>
		<reference ref_id="1019079" ref_url="https://bugzilla.suse.com/1019079" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019165" ref_url="https://bugzilla.suse.com/1019165" source="BUGZILLA"/>
		<reference ref_id="1019348" ref_url="https://bugzilla.suse.com/1019348" source="BUGZILLA"/>
		<reference ref_id="1019783" ref_url="https://bugzilla.suse.com/1019783" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="748806" ref_url="https://bugzilla.suse.com/748806" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795297" ref_url="https://bugzilla.suse.com/795297" source="BUGZILLA"/>
		<reference ref_id="800999" ref_url="https://bugzilla.suse.com/800999" source="BUGZILLA"/>
		<reference ref_id="821612" ref_url="https://bugzilla.suse.com/821612" source="BUGZILLA"/>
		<reference ref_id="824171" ref_url="https://bugzilla.suse.com/824171" source="BUGZILLA"/>
		<reference ref_id="851603" ref_url="https://bugzilla.suse.com/851603" source="BUGZILLA"/>
		<reference ref_id="853052" ref_url="https://bugzilla.suse.com/853052" source="BUGZILLA"/>
		<reference ref_id="871728" ref_url="https://bugzilla.suse.com/871728" source="BUGZILLA"/>
		<reference ref_id="901809" ref_url="https://bugzilla.suse.com/901809" source="BUGZILLA"/>
		<reference ref_id="909350" ref_url="https://bugzilla.suse.com/909350" source="BUGZILLA"/>
		<reference ref_id="909491" ref_url="https://bugzilla.suse.com/909491" source="BUGZILLA"/>
		<reference ref_id="913387" ref_url="https://bugzilla.suse.com/913387" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="924708" ref_url="https://bugzilla.suse.com/924708" source="BUGZILLA"/>
		<reference ref_id="925065" ref_url="https://bugzilla.suse.com/925065" source="BUGZILLA"/>
		<reference ref_id="953233" ref_url="https://bugzilla.suse.com/953233" source="BUGZILLA"/>
		<reference ref_id="961589" ref_url="https://bugzilla.suse.com/961589" source="BUGZILLA"/>
		<reference ref_id="962846" ref_url="https://bugzilla.suse.com/962846" source="BUGZILLA"/>
		<reference ref_id="969340" ref_url="https://bugzilla.suse.com/969340" source="BUGZILLA"/>
		<reference ref_id="973691" ref_url="https://bugzilla.suse.com/973691" source="BUGZILLA"/>
		<reference ref_id="987333" ref_url="https://bugzilla.suse.com/987333" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989152" ref_url="https://bugzilla.suse.com/989152" source="BUGZILLA"/>
		<reference ref_id="989680" ref_url="https://bugzilla.suse.com/989680" source="BUGZILLA"/>
		<reference ref_id="989896" ref_url="https://bugzilla.suse.com/989896" source="BUGZILLA"/>
		<reference ref_id="990245" ref_url="https://bugzilla.suse.com/990245" source="BUGZILLA"/>
		<reference ref_id="992991" ref_url="https://bugzilla.suse.com/992991" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="996541" ref_url="https://bugzilla.suse.com/996541" source="BUGZILLA"/>
		<reference ref_id="996557" ref_url="https://bugzilla.suse.com/996557" source="BUGZILLA"/>
		<reference ref_id="997401" ref_url="https://bugzilla.suse.com/997401" source="BUGZILLA"/>
		<reference ref_id="999101" ref_url="https://bugzilla.suse.com/999101" source="BUGZILLA"/>
		<reference ref_id="CVE-2004-0230" ref_url="https://www.suse.com/security/cve/CVE-2004-0230/" source="CVE"/>
		<reference ref_id="CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704/" source="CVE"/>
		<reference ref_id="CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368/" source="CVE"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-7911" ref_url="https://www.suse.com/security/cve/CVE-2016-7911/" source="CVE"/>
		<reference ref_id="CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916/" source="CVE"/>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
  where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations
  or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device
  NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers
  and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST
  packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr
  operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial
  of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove
  a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
  between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or
  cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability
  (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local
  malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
  because it first requires compromising a privileged process and current compiler optimizations restrict access to the
  vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
  sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
  or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
  call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain
  error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted
  application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users
  to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel
  allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching
  a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking
  for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or
  possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel
  allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the
  corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local
  users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call
  (bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of
  service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time
  interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a
  denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero
  bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote
  attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).

The following non-security bugs were fixed:

- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 &amp; 256 bit keys to AESNI RFC4106 (bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host-&gt;n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata-&gt;rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-09"/>
	<updated date="2017-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005877">SUSE bug 1005877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008645">SUSE bug 1008645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009875">SUSE bug 1009875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010175">SUSE bug 1010175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010711">SUSE bug 1010711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010713">SUSE bug 1010713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012411">SUSE bug 1012411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012851">SUSE bug 1012851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013042">SUSE bug 1013042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014454">SUSE bug 1014454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015561">SUSE bug 1015561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015752">SUSE bug 1015752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015760">SUSE bug 1015760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015796">SUSE bug 1015796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015803">SUSE bug 1015803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015817">SUSE bug 1015817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015828">SUSE bug 1015828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015844">SUSE bug 1015844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015848">SUSE bug 1015848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015878">SUSE bug 1015878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015932">SUSE bug 1015932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016320">SUSE bug 1016320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016505">SUSE bug 1016505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016520">SUSE bug 1016520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016668">SUSE bug 1016668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016688">SUSE bug 1016688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016824">SUSE bug 1016824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016831">SUSE bug 1016831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017686">SUSE bug 1017686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019165">SUSE bug 1019165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019348">SUSE bug 1019348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019783">SUSE bug 1019783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748806">SUSE bug 748806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795297">SUSE bug 795297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800999">SUSE bug 800999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821612">SUSE bug 821612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824171">SUSE bug 824171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851603">SUSE bug 851603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871728">SUSE bug 871728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901809">SUSE bug 901809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909350">SUSE bug 909350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909491">SUSE bug 909491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913387">SUSE bug 913387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924708">SUSE bug 924708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925065">SUSE bug 925065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953233">SUSE bug 953233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961589">SUSE bug 961589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962846">SUSE bug 962846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969340">SUSE bug 969340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973691">SUSE bug 973691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987333">SUSE bug 987333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989680">SUSE bug 989680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989896">SUSE bug 989896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990245">SUSE bug 990245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996541">SUSE bug 996541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996557">SUSE bug 996557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997401">SUSE bug 997401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999101">SUSE bug 999101</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-0230/">CVE-2004-0230</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7911/">CVE-2016-7911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582973" comment="kernel-bigmem-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582974" comment="kernel-bigmem-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582975" comment="kernel-bigmem-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582976" comment="kernel-default-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582977" comment="kernel-default-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582978" comment="kernel-default-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582979" comment="kernel-default-man-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582980" comment="kernel-ec2-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582981" comment="kernel-ec2-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582982" comment="kernel-ec2-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582983" comment="kernel-pae-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582984" comment="kernel-pae-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582985" comment="kernel-pae-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582986" comment="kernel-ppc64-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582987" comment="kernel-ppc64-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582988" comment="kernel-ppc64-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582989" comment="kernel-source-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582990" comment="kernel-syms-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582991" comment="kernel-trace-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582992" comment="kernel-trace-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582993" comment="kernel-trace-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582994" comment="kernel-xen-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582995" comment="kernel-xen-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582996" comment="kernel-xen-devel-3.0.101-94.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582973" comment="kernel-bigmem-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582974" comment="kernel-bigmem-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582975" comment="kernel-bigmem-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582976" comment="kernel-default-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582977" comment="kernel-default-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582978" comment="kernel-default-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582979" comment="kernel-default-man-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582980" comment="kernel-ec2-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582981" comment="kernel-ec2-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582982" comment="kernel-ec2-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582983" comment="kernel-pae-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582984" comment="kernel-pae-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582985" comment="kernel-pae-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582986" comment="kernel-ppc64-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582987" comment="kernel-ppc64-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582988" comment="kernel-ppc64-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582989" comment="kernel-source-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582990" comment="kernel-syms-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582991" comment="kernel-trace-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582992" comment="kernel-trace-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582993" comment="kernel-trace-devel-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582994" comment="kernel-xen-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582995" comment="kernel-xen-base-3.0.101-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582996" comment="kernel-xen-devel-3.0.101-94.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41571" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00004.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following security bug:

CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver (drivers/tty/n_hdlc.c)
could have been exploited to gain a local privilege escalation (bnc#1027565)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-03"/>
	<updated date="2017-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582997" comment="kernel-bigmem-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582998" comment="kernel-bigmem-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582999" comment="kernel-bigmem-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583000" comment="kernel-default-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583001" comment="kernel-default-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583002" comment="kernel-default-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583003" comment="kernel-default-man-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583004" comment="kernel-ec2-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583005" comment="kernel-ec2-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583006" comment="kernel-ec2-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583007" comment="kernel-pae-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583008" comment="kernel-pae-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583009" comment="kernel-pae-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583010" comment="kernel-ppc64-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583011" comment="kernel-ppc64-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583012" comment="kernel-ppc64-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583013" comment="kernel-source-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583014" comment="kernel-syms-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583015" comment="kernel-trace-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583016" comment="kernel-trace-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583017" comment="kernel-trace-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583018" comment="kernel-xen-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583019" comment="kernel-xen-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583020" comment="kernel-xen-devel-3.0.101-97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009582997" comment="kernel-bigmem-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582998" comment="kernel-bigmem-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009582999" comment="kernel-bigmem-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583000" comment="kernel-default-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583001" comment="kernel-default-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583002" comment="kernel-default-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583003" comment="kernel-default-man-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583004" comment="kernel-ec2-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583005" comment="kernel-ec2-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583006" comment="kernel-ec2-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583007" comment="kernel-pae-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583008" comment="kernel-pae-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583009" comment="kernel-pae-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583010" comment="kernel-ppc64-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583011" comment="kernel-ppc64-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583012" comment="kernel-ppc64-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583013" comment="kernel-source-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583014" comment="kernel-syms-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583015" comment="kernel-trace-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583016" comment="kernel-trace-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583017" comment="kernel-trace-devel-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583018" comment="kernel-xen-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583019" comment="kernel-xen-base-3.0.101-97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583020" comment="kernel-xen-devel-3.0.101-97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41572" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1018074" ref_url="https://bugzilla.suse.com/1018074" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1042921" ref_url="https://bugzilla.suse.com/1042921" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00023.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be
  'jumped over' by userland programs using more than one page of stack in
  functions and so lead to memory corruption. This update extends the stack
  guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this
  attack vector. This is not a kernel bugfix, but a hardening measure against
  this kind of userland attack.(bsc#1039348)

The following non-security bugs were fixed:

- fnic now returns 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic is now using rport-&gt;dd_data to check if rport is online instead of rport_lookup (bsc#1035920).
- The rport check location in fnic_queuecommand_lck was corrected (bsc#1035920).
- xfs: remove patches that caused regression (bsc#1043234).
- mm: enlarge stack guard gap (bnc#1039348, CVE-2017-1000364, bnc#1042921).
- PCI: Allow access to VPD attributes with size 0 (bsc#1018074).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1018074">SUSE bug 1018074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042921">SUSE bug 1042921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583021" comment="kernel-bigmem-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583022" comment="kernel-bigmem-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583023" comment="kernel-bigmem-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583024" comment="kernel-default-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583025" comment="kernel-default-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583026" comment="kernel-default-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583027" comment="kernel-default-man-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583028" comment="kernel-ec2-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583029" comment="kernel-ec2-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583030" comment="kernel-ec2-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583031" comment="kernel-pae-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583032" comment="kernel-pae-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583033" comment="kernel-pae-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583034" comment="kernel-ppc64-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583035" comment="kernel-ppc64-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583036" comment="kernel-ppc64-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583037" comment="kernel-source-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583038" comment="kernel-syms-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583039" comment="kernel-trace-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583040" comment="kernel-trace-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583041" comment="kernel-trace-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583042" comment="kernel-xen-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583043" comment="kernel-xen-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583044" comment="kernel-xen-devel-3.0.101-104.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583021" comment="kernel-bigmem-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583022" comment="kernel-bigmem-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583023" comment="kernel-bigmem-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583024" comment="kernel-default-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583025" comment="kernel-default-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583026" comment="kernel-default-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583027" comment="kernel-default-man-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583028" comment="kernel-ec2-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583029" comment="kernel-ec2-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583030" comment="kernel-ec2-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583031" comment="kernel-pae-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583032" comment="kernel-pae-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583033" comment="kernel-pae-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583034" comment="kernel-ppc64-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583035" comment="kernel-ppc64-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583036" comment="kernel-ppc64-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583037" comment="kernel-source-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583038" comment="kernel-syms-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583039" comment="kernel-trace-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583040" comment="kernel-trace-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583041" comment="kernel-trace-devel-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583042" comment="kernel-xen-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583043" comment="kernel-xen-base-3.0.101-104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583044" comment="kernel-xen-devel-3.0.101-104.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41573" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000365" ref_url="https://bugzilla.suse.com/1000365" source="BUGZILLA"/>
		<reference ref_id="1000380" ref_url="https://bugzilla.suse.com/1000380" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1029140" ref_url="https://bugzilla.suse.com/1029140" source="BUGZILLA"/>
		<reference ref_id="1029850" ref_url="https://bugzilla.suse.com/1029850" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030593" ref_url="https://bugzilla.suse.com/1030593" source="BUGZILLA"/>
		<reference ref_id="1030814" ref_url="https://bugzilla.suse.com/1030814" source="BUGZILLA"/>
		<reference ref_id="1032340" ref_url="https://bugzilla.suse.com/1032340" source="BUGZILLA"/>
		<reference ref_id="1032471" ref_url="https://bugzilla.suse.com/1032471" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1035576" ref_url="https://bugzilla.suse.com/1035576" source="BUGZILLA"/>
		<reference ref_id="1035721" ref_url="https://bugzilla.suse.com/1035721" source="BUGZILLA"/>
		<reference ref_id="1035777" ref_url="https://bugzilla.suse.com/1035777" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1036056" ref_url="https://bugzilla.suse.com/1036056" source="BUGZILLA"/>
		<reference ref_id="1036288" ref_url="https://bugzilla.suse.com/1036288" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037191" ref_url="https://bugzilla.suse.com/1037191" source="BUGZILLA"/>
		<reference ref_id="1037193" ref_url="https://bugzilla.suse.com/1037193" source="BUGZILLA"/>
		<reference ref_id="1037227" ref_url="https://bugzilla.suse.com/1037227" source="BUGZILLA"/>
		<reference ref_id="1037232" ref_url="https://bugzilla.suse.com/1037232" source="BUGZILLA"/>
		<reference ref_id="1037233" ref_url="https://bugzilla.suse.com/1037233" source="BUGZILLA"/>
		<reference ref_id="1037356" ref_url="https://bugzilla.suse.com/1037356" source="BUGZILLA"/>
		<reference ref_id="1037358" ref_url="https://bugzilla.suse.com/1037358" source="BUGZILLA"/>
		<reference ref_id="1037359" ref_url="https://bugzilla.suse.com/1037359" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039258" ref_url="https://bugzilla.suse.com/1039258" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039456" ref_url="https://bugzilla.suse.com/1039456" source="BUGZILLA"/>
		<reference ref_id="1039594" ref_url="https://bugzilla.suse.com/1039594" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041762" ref_url="https://bugzilla.suse.com/1041762" source="BUGZILLA"/>
		<reference ref_id="1041975" ref_url="https://bugzilla.suse.com/1041975" source="BUGZILLA"/>
		<reference ref_id="1042045" ref_url="https://bugzilla.suse.com/1042045" source="BUGZILLA"/>
		<reference ref_id="1042615" ref_url="https://bugzilla.suse.com/1042615" source="BUGZILLA"/>
		<reference ref_id="1042633" ref_url="https://bugzilla.suse.com/1042633" source="BUGZILLA"/>
		<reference ref_id="1042687" ref_url="https://bugzilla.suse.com/1042687" source="BUGZILLA"/>
		<reference ref_id="1042832" ref_url="https://bugzilla.suse.com/1042832" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043234" ref_url="https://bugzilla.suse.com/1043234" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044216" ref_url="https://bugzilla.suse.com/1044216" source="BUGZILLA"/>
		<reference ref_id="1044230" ref_url="https://bugzilla.suse.com/1044230" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044882" ref_url="https://bugzilla.suse.com/1044882" source="BUGZILLA"/>
		<reference ref_id="1044913" ref_url="https://bugzilla.suse.com/1044913" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045356" ref_url="https://bugzilla.suse.com/1045356" source="BUGZILLA"/>
		<reference ref_id="1045416" ref_url="https://bugzilla.suse.com/1045416" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045487" ref_url="https://bugzilla.suse.com/1045487" source="BUGZILLA"/>
		<reference ref_id="1045525" ref_url="https://bugzilla.suse.com/1045525" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1045547" ref_url="https://bugzilla.suse.com/1045547" source="BUGZILLA"/>
		<reference ref_id="1045615" ref_url="https://bugzilla.suse.com/1045615" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1046192" ref_url="https://bugzilla.suse.com/1046192" source="BUGZILLA"/>
		<reference ref_id="1046715" ref_url="https://bugzilla.suse.com/1046715" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047053" ref_url="https://bugzilla.suse.com/1047053" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048232" ref_url="https://bugzilla.suse.com/1048232" source="BUGZILLA"/>
		<reference ref_id="1048275" ref_url="https://bugzilla.suse.com/1048275" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049688" ref_url="https://bugzilla.suse.com/1049688" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050154" ref_url="https://bugzilla.suse.com/1050154" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051515" ref_url="https://bugzilla.suse.com/1051515" source="BUGZILLA"/>
		<reference ref_id="1051770" ref_url="https://bugzilla.suse.com/1051770" source="BUGZILLA"/>
		<reference ref_id="1055680" ref_url="https://bugzilla.suse.com/1055680" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="792863" ref_url="https://bugzilla.suse.com/792863" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="909618" ref_url="https://bugzilla.suse.com/909618" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="928138" ref_url="https://bugzilla.suse.com/928138" source="BUGZILLA"/>
		<reference ref_id="938352" ref_url="https://bugzilla.suse.com/938352" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="948562" ref_url="https://bugzilla.suse.com/948562" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="972891" ref_url="https://bugzilla.suse.com/972891" source="BUGZILLA"/>
		<reference ref_id="986924" ref_url="https://bugzilla.suse.com/986924" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-10277" ref_url="https://www.suse.com/security/cve/CVE-2016-10277/" source="CVE"/>
		<reference ref_id="CVE-2017-1000363" ref_url="https://www.suse.com/security/cve/CVE-2017-1000363/" source="CVE"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-7482: Several missing length checks ticket decode allowing for information leak or potentially code execution (bsc#1046107).
- CVE-2016-10277: Potential privilege escalation due to a missing bounds check in the lp driver. A kernel command-line adversary can overflow the parport_nr array to execute code (bsc#1039456).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7533: Bug in inotify code allowing privilege escalation (bsc#1049483).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bsc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-1000365: The Linux Kernel imposed a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354)
- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bnc#1032340)
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1038981).
- CVE-2017-1000380: sound/core/timer.c was vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents could have bene disclosed when a read and an ioctl happen at the same time (bnc#1044125)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431)
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used by local console attackers to bypass certain secure boot settings. (bnc#1039456)
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885)
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069)
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883)
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879)
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544)
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593)
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850)

The following non-security bugs were fixed:

- 8250: use callbacks to access UART_DLL/UART_DLM.
- ALSA: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- ALSA: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- ALSA: hda - using uninitialized data (bsc#1045538).
- ALSA: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- ALSA: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- ALSA: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- ALSA: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- Add CVE tag to references
- CIFS: backport prepath matching fix (bsc#799133).
- Drop CONFIG_PPC_CELL from bigmem (bsc#1049128).
- EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr().
- Fix scripts/bigmem-generate-ifdef-guard to work on all branches
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- IB/mlx4: Demote mcg message from warning to debug (bsc#919382).
- IB/mlx4: Fix ib device initialization error flow (bsc#919382).
- IB/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- IB/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- IB/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- IB/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- Input: cm109 - validate number of endpoints before using them (bsc#1037193).
- Input: hanwang - validate number of endpoints before using them (bsc#1037232).
- Input: yealink - validate number of endpoints before using them (bsc#1037227).
- KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- NFS: Avoid getting confused by confused server (bsc#1045416).
- NFS: Fix another OPEN_DOWNGRADE bug (git-next).
- NFS: Fix size of NFSACL SETACL operations (git-fixes).
- NFS: Make nfs_readdir revalidate less often (bsc#1048232).
- NFS: tidy up nfs_show_mountd_netid (git-fixes).
- NFSD: Do not use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- NFSv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- NFSv4: Fix another bug in the close/open_downgrade code (git-fixes).
- NFSv4: Fix problems with close in the presence of a delegation (git-fixes).
- NFSv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- SUNRPC: Fix a memory leak in the backchannel code (git-fixes).
- Staging: vt6655-6: potential NULL dereference in hostap_disable_hostapd() (bsc#1045479).
- USB: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- USB: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- USB: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- USB: iowarrior: fix NULL-deref in write (bsc#1037359).
- USB: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- USB: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- USB: serial: ark3116: fix register-accessor error handling (git-fixes).
- USB: serial: ch341: fix open error handling (bsc#1037441).
- USB: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- USB: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- USB: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- USB: serial: io_ti: fix information leak in completion handler (git-fixes).
- USB: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- USB: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- USB: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- USB: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- USB: usbip: fix nonconforming hub descriptor (bsc#1047487).
- USB: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- USB: usbtmc: Change magic number to constant (bsc#1036288).
- USB: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- USB: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- USB: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- USB: usbtmc: add missing endpoint sanity check (bsc#1036288).
- USB: usbtmc: fix DMA on stack (bsc#1036288).
- USB: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- USB: usbtmc: fix probe error path (bsc#1036288).
- USB: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- USB: wusbcore: fix NULL-deref at probe (bsc#1045487).
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- Use make --output-sync feature when available (bsc#1012422).
- Xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- blacklist b50a6c584bb4 powerpc/perf: Clear MMCR2 when enabling PMU (bsc#1035721). 
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: Blacklist 847fa1a6d3d0 ('ftrace/x86_32: Set ftrace_stub to weak to prevent gcc from using short jumps to it') The released kernels are not build with a gas new enough to optimize the jmps so that this patch would be required. (bsc#1051478)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- cifs: do not compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975). backporting upstream commit 2f2591a34db6c9361faa316c91a6e320cb4e6aee
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- dentry name snapshots (bsc#1049483).
- devres: fix a for loop bounds check (git-fixes).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216)
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport-&gt;dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fuse: add missing FR_FORCE (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- initial cr0 bits (bnc#1036056, LTC#153612).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jsm: add support for additional Neo cards (bsc#1045615).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush -&gt;event_work before stopping array (git-fixes).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- powerpc/ibmebus: Fix device reference leaks in sysfs interface (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/ibmebus: Fix further device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (bsc#1032471).
- powerpc/mm/slice: Update the function prototype (bsc#1032471).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (bsc#1032471).
- powerpc/pci/rpadlpar: Fix device reference leaks (bsc#1035777 [2017-04-24] Pending Base Kernel Fixes).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Drop support for pre-POWER4 cpus (bsc#1032471).
- powerpc: Remove STAB code (bsc#1032471).
- random32: fix off-by-one in seeding requirement (git-fixes).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev-&gt;stime underflow (bnc#938352).
- sched: Do not account bogus utime (bnc#938352).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of -&gt;host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- sfc: do not device_attach if a reset is pending (bsc#909618).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression greater than 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000365">SUSE bug 1000365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000380">SUSE bug 1000380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029140">SUSE bug 1029140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030814">SUSE bug 1030814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032471">SUSE bug 1032471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035721">SUSE bug 1035721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035777">SUSE bug 1035777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036056">SUSE bug 1036056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036288">SUSE bug 1036288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037191">SUSE bug 1037191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037193">SUSE bug 1037193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037227">SUSE bug 1037227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037232">SUSE bug 1037232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037233">SUSE bug 1037233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037356">SUSE bug 1037356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037358">SUSE bug 1037358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037359">SUSE bug 1037359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039258">SUSE bug 1039258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039456">SUSE bug 1039456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039594">SUSE bug 1039594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041762">SUSE bug 1041762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041975">SUSE bug 1041975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042045">SUSE bug 1042045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042615">SUSE bug 1042615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042633">SUSE bug 1042633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042687">SUSE bug 1042687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042832">SUSE bug 1042832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043234">SUSE bug 1043234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044216">SUSE bug 1044216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044230">SUSE bug 1044230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044882">SUSE bug 1044882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044913">SUSE bug 1044913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045356">SUSE bug 1045356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045416">SUSE bug 1045416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045487">SUSE bug 1045487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045525">SUSE bug 1045525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045547">SUSE bug 1045547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045615">SUSE bug 1045615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046192">SUSE bug 1046192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046715">SUSE bug 1046715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047053">SUSE bug 1047053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048232">SUSE bug 1048232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049688">SUSE bug 1049688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050154">SUSE bug 1050154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051515">SUSE bug 1051515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051770">SUSE bug 1051770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055680">SUSE bug 1055680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792863">SUSE bug 792863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909618">SUSE bug 909618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928138">SUSE bug 928138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938352">SUSE bug 938352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948562">SUSE bug 948562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972891">SUSE bug 972891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986924">SUSE bug 986924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-10277/">CVE-2016-10277</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000363/">CVE-2017-1000363</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583045" comment="kernel-bigmem-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583046" comment="kernel-bigmem-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583047" comment="kernel-bigmem-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583048" comment="kernel-default-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583049" comment="kernel-default-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583050" comment="kernel-default-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583051" comment="kernel-default-man-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583052" comment="kernel-ec2-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583053" comment="kernel-ec2-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583054" comment="kernel-ec2-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583055" comment="kernel-pae-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583056" comment="kernel-pae-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583057" comment="kernel-pae-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583058" comment="kernel-ppc64-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583059" comment="kernel-ppc64-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583060" comment="kernel-ppc64-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583061" comment="kernel-source-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583062" comment="kernel-syms-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583063" comment="kernel-trace-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583064" comment="kernel-trace-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583065" comment="kernel-trace-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583066" comment="kernel-xen-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583067" comment="kernel-xen-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583068" comment="kernel-xen-devel-3.0.101-108.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583045" comment="kernel-bigmem-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583046" comment="kernel-bigmem-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583047" comment="kernel-bigmem-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583048" comment="kernel-default-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583049" comment="kernel-default-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583050" comment="kernel-default-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583051" comment="kernel-default-man-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583052" comment="kernel-ec2-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583053" comment="kernel-ec2-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583054" comment="kernel-ec2-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583055" comment="kernel-pae-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583056" comment="kernel-pae-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583057" comment="kernel-pae-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583058" comment="kernel-ppc64-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583059" comment="kernel-ppc64-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583060" comment="kernel-ppc64-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583061" comment="kernel-source-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583062" comment="kernel-syms-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583063" comment="kernel-trace-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583064" comment="kernel-trace-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583065" comment="kernel-trace-devel-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583066" comment="kernel-xen-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583067" comment="kernel-xen-base-3.0.101-108.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583068" comment="kernel-xen-devel-3.0.101-108.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41574" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059525" ref_url="https://bugzilla.suse.com/1059525" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00016.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following issues:

- Stack corruption could have lead to local privilege escalation
  (bsc#1059525, CVE-2017-1000253).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-13"/>
	<updated date="2017-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583069" comment="kernel-bigmem-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583070" comment="kernel-bigmem-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583071" comment="kernel-bigmem-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583072" comment="kernel-default-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583073" comment="kernel-default-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583074" comment="kernel-default-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583075" comment="kernel-default-man-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583076" comment="kernel-ec2-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583077" comment="kernel-ec2-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583078" comment="kernel-ec2-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583079" comment="kernel-pae-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583080" comment="kernel-pae-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583081" comment="kernel-pae-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583082" comment="kernel-ppc64-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583083" comment="kernel-ppc64-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583084" comment="kernel-ppc64-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583085" comment="kernel-source-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583086" comment="kernel-syms-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583087" comment="kernel-trace-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583088" comment="kernel-trace-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583089" comment="kernel-trace-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583090" comment="kernel-xen-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583091" comment="kernel-xen-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583092" comment="kernel-xen-devel-3.0.101-108.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583069" comment="kernel-bigmem-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583070" comment="kernel-bigmem-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583071" comment="kernel-bigmem-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583072" comment="kernel-default-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583073" comment="kernel-default-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583074" comment="kernel-default-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583075" comment="kernel-default-man-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583076" comment="kernel-ec2-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583077" comment="kernel-ec2-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583078" comment="kernel-ec2-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583079" comment="kernel-pae-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583080" comment="kernel-pae-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583081" comment="kernel-pae-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583082" comment="kernel-ppc64-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583083" comment="kernel-ppc64-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583084" comment="kernel-ppc64-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583085" comment="kernel-source-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583086" comment="kernel-syms-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583087" comment="kernel-trace-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583088" comment="kernel-trace-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583089" comment="kernel-trace-devel-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583090" comment="kernel-xen-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583091" comment="kernel-xen-base-3.0.101-108.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583092" comment="kernel-xen-devel-3.0.101-108.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41575" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1092772" ref_url="https://bugzilla.suse.com/1092772" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1093666" ref_url="https://bugzilla.suse.com/1093666" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097562" ref_url="https://bugzilla.suse.com/1097562" source="BUGZILLA"/>
		<reference ref_id="1098822" ref_url="https://bugzilla.suse.com/1098822" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1100132" ref_url="https://bugzilla.suse.com/1100132" source="BUGZILLA"/>
		<reference ref_id="1100705" ref_url="https://bugzilla.suse.com/1100705" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103884" ref_url="https://bugzilla.suse.com/1103884" source="BUGZILLA"/>
		<reference ref_id="1103909" ref_url="https://bugzilla.suse.com/1103909" source="BUGZILLA"/>
		<reference ref_id="1104481" ref_url="https://bugzilla.suse.com/1104481" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1104901" ref_url="https://bugzilla.suse.com/1104901" source="BUGZILLA"/>
		<reference ref_id="1105100" ref_url="https://bugzilla.suse.com/1105100" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1105723" ref_url="https://bugzilla.suse.com/1105723" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106199" ref_url="https://bugzilla.suse.com/1106199" source="BUGZILLA"/>
		<reference ref_id="1106202" ref_url="https://bugzilla.suse.com/1106202" source="BUGZILLA"/>
		<reference ref_id="1106206" ref_url="https://bugzilla.suse.com/1106206" source="BUGZILLA"/>
		<reference ref_id="1106209" ref_url="https://bugzilla.suse.com/1106209" source="BUGZILLA"/>
		<reference ref_id="1106212" ref_url="https://bugzilla.suse.com/1106212" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106609" ref_url="https://bugzilla.suse.com/1106609" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1106930" ref_url="https://bugzilla.suse.com/1106930" source="BUGZILLA"/>
		<reference ref_id="1106995" ref_url="https://bugzilla.suse.com/1106995" source="BUGZILLA"/>
		<reference ref_id="1107001" ref_url="https://bugzilla.suse.com/1107001" source="BUGZILLA"/>
		<reference ref_id="1107064" ref_url="https://bugzilla.suse.com/1107064" source="BUGZILLA"/>
		<reference ref_id="1107071" ref_url="https://bugzilla.suse.com/1107071" source="BUGZILLA"/>
		<reference ref_id="1107650" ref_url="https://bugzilla.suse.com/1107650" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107949" ref_url="https://bugzilla.suse.com/1107949" source="BUGZILLA"/>
		<reference ref_id="1108096" ref_url="https://bugzilla.suse.com/1108096" source="BUGZILLA"/>
		<reference ref_id="1108170" ref_url="https://bugzilla.suse.com/1108170" source="BUGZILLA"/>
		<reference ref_id="1108823" ref_url="https://bugzilla.suse.com/1108823" source="BUGZILLA"/>
		<reference ref_id="1108912" ref_url="https://bugzilla.suse.com/1108912" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-14617: Prevent NULL pointer dereference and panic in
  hfsplus_lookup() when opening a file (that is purportedly a hard link) in an
  hfs+ filesystem that has malformed catalog data, and is mounted read-only
  without a metadata directory (bsc#1102870).
- CVE-2018-16276: Incorrect bounds checking in the yurex USB driver in
  yurex_read allowed local attackers to use user access read/writes to crash the
  kernel or potentially escalate privileges (bsc#1106095).
- CVE-2018-15594: Ensure correct handling of indirect calls, to prevent
  attackers for conducting Spectre-v2 attacks against paravirtual guests
  (bsc#1105348).
- CVE-2018-14634: Prevent integer overflow in create_elf_tables that allowed a
  local attacker to exploit this vulnerability via a SUID-root binary and obtain
  full root privileges (bsc#1108912)
- CVE-2018-12896: Prevent integer overflow in the POSIX timer code that was
  caused by the way the overrun accounting works. Depending on interval and
  expiry time values, the overrun can be larger than INT_MAX, but the accounting
  is int based. This basically made the accounting values, which are visible to
  user space via timer_getoverrun(2) and siginfo::si_overrun, random. This
  allowed a local user to cause a denial of service (signed integer overflow) via
  crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922)
- CVE-2018-10940: The cdrom_ioctl_media_changed function allowed local
  attackers to use a incorrect bounds check in the CDROM driver
  CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903)
- CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status that
  could have been used by local attackers to read kernel memory (bnc#1107689)
- CVE-2018-6555: The irda_setsockopt function allowed local users to cause a
  denial of service (ias_object use-after-free and system crash) or possibly have
  unspecified other impact via an AF_IRDA socket (bnc#1106511)
- CVE-2018-6554: Prevent memory leak in the irda_bind function that allowed
  local users to cause a denial of service (memory consumption) by repeatedly
  binding an AF_IRDA socket (bnc#1106509)
- CVE-2018-15572: The spectre_v2_select_mitigation function did not always fill
  RSB upon a context switch, which made it easier for attackers to conduct
  userspace-userspace spectreRSB attacks (bnc#1102517)
- CVE-2018-10902: Protect against concurrent access to prevent double realloc
  (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(). A
  malicious local attacker could have used this for privilege escalation
  (bnc#1105322)
- CVE-2018-14734: ucma_leave_multicast accessed a certain data structure after
  a cleanup step in ucma_process_join, which allowed attackers to cause a denial
  of service (use-after-free) (bsc#1103119)

The following non-security bugs were fixed:

- ACPI: APEI / ERST: Fix missing error handling in erst_reader() (bsc#1045538).
- ALSA: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1045538).
- ALSA: pcm: Fix snd_pcm_hw_params struct copy in compat mode (bsc#1045538).
- ALSA: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bsc#1045538).
- ALSA: pcm: fix fifo_size frame calculation (bsc#1045538).
- ALSA: snd-aoa: add of_node_put() in error path (bsc#1045538).
- ALSA: usb-audio: Add sanity checks in v2 clock parsers (bsc#1045538).
- ALSA: usb-audio: Add sanity checks to FE parser (bsc#1045538).
- ALSA: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bsc#1045538).
- ALSA: usb-audio: Fix bogus error return in snd_usb_create_stream() (bsc#1045538).
- ALSA: usb-audio: Fix parameter block size for UAC2 control requests (bsc#1045538).
- ALSA: usb-audio: Fix parsing descriptor of UAC2 processing unit (bsc#1045538).
- ALSA: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1045538).
- ALSA: usb-audio: Set correct type for some UAC2 mixer controls (bsc#1045538).
- ASoC: blackfin: Fix missing break (bsc#1045538).
- Enforce module signatures if the kernel is locked down (bsc#1093666).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- PCI: Fix TI816X class code quirk (bsc#1050431).
- Refresh patches.xen/xen3-x86-l1tf-04-protect-PROT_NONE-ptes.patch (bsc#1105100).
- TPM: Zero buffer whole after copying to userspace (bsc#1050381).
- USB: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- USB: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- USB: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- USB: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- USB: serial: io_ti: fix NULL-deref in interrupt callback (bsc#1106609).
- USB: serial: sierra: fix potential deadlock at close (bsc#1100132).
- USB: visor: Match I330 phone more precisely (bsc#1047487).
- applicom: dereferencing NULL on error path (git-fixes).
- ath5k: Change led pin configuration for compaq c700 laptop (bsc#1048185).
- base: make module_create_drivers_dir race-free (git-fixes).
- block: fix an error code in add_partition() (bsc#1106209).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (bsc#1107949).
- dasd: Add IFCC notice message (bnc#1104481, LTC#170484).
- drm/i915: Remove bogus __init annotation from DMI callbacks (bsc#1106886).
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1106886).
- drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve() (bsc#1106886).
- drm: crtc: integer overflow in drm_property_create_blob() (bsc#1106886).
- drm: re-enable error handling (bsc#1103884)
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1106886).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Fix the left value check of cmd buffer (bsc#1106105).
- iommu/amd: Free domain id when free a domain of struct dma_ops_domain (bsc#1106105).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#1106105).
- iommu/vt-d: Do not over-free page table directories (bsc#1106105).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ipv6: Regenerate host route according to node pointer upon loopback up (bsc#1100705).
- ipv6: correctly add local routes when lo goes up (bsc#1100705).
- ipv6: introduce ip6_rt_put() (bsc#1100705).
- ipv6: reallocate addrconf router for ipv6 address when lo device up (bsc#1100705).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- mm/hugetlb: add migration/hwpoisoned entry check in hugetlb_change_protection (bnc#1107071).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1107064).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info-&gt;hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- nbd: ratelimit error msgs after socket close (bsc#1106206).
- ncpfs: return proper error from NCP_IOC_SETROOT ioctl (bsc#1106199).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Add cpu_(prepare|starting|dying) for core_pmu (bsc#1104901).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772, bsc#1107650).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772, bsc#1107650).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/lib: Fix off-by-one in alternate feature patching (bsc#1064861).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1064861).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc: make feature-fixup tests fortify-safe (bsc#1064861).
- ptrace: fix PTRACE_LISTEN race corrupting task-&gt;state (bnc#1107001).
- qlge: Fix netdev features configuration (bsc#1098822).
- resource: fix integer overflow at reallocation (bsc#1045538).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- s390/ftrace: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/kernel: use expoline for indirect branches (bnc#1106930, LTC#171029).
- s390/qeth: do not clobber buffer on async TX completion (bnc#1060245, LTC#170349).
- s390: Correct register corruption in critical section cleanup (bnc#1106930, LTC#171029).
- s390: add assembler macros for CPU alternatives (bnc#1106930, LTC#171029).
- s390: detect etoken facility (bnc#1106930, LTC#171029).
- s390: move expoline assembler macros to a header (bnc#1106930, LTC#171029).
- s390: move spectre sysfs attribute code (bnc#1106930, LTC#171029).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1106930, LTC#171029).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- sys: do not hold uts_sem while accessing userspace memory (bnc#1106995).
- tpm: fix race condition in tpm_common_write() (bsc#1050381).
- tracing/blktrace: Fix to allow setting same value (bsc#1106212).
- tty: vt, fix bogus division in csi_J (git-fixes).
- tty: vt, return error when con_startup fails (git-fixes).
- uml: fix hostfs mknod() (bsc#1106202).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1045538).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1105723).
- x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/vdso: Fix vDSO build if a retpoline is emitted (git-fixes).
- xen x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen, x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen: x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092772">SUSE bug 1092772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093666">SUSE bug 1093666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097562">SUSE bug 1097562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098822">SUSE bug 1098822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100132">SUSE bug 1100132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100705">SUSE bug 1100705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103884">SUSE bug 1103884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103909">SUSE bug 1103909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104481">SUSE bug 1104481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104901">SUSE bug 1104901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105100">SUSE bug 1105100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105723">SUSE bug 1105723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106199">SUSE bug 1106199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106202">SUSE bug 1106202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106206">SUSE bug 1106206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106209">SUSE bug 1106209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106212">SUSE bug 1106212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106609">SUSE bug 1106609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106930">SUSE bug 1106930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106995">SUSE bug 1106995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107001">SUSE bug 1107001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107064">SUSE bug 1107064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107071">SUSE bug 1107071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107650">SUSE bug 1107650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107949">SUSE bug 1107949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108096">SUSE bug 1108096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108170">SUSE bug 1108170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108823">SUSE bug 1108823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583093" comment="kernel-bigmem-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583094" comment="kernel-bigmem-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583095" comment="kernel-bigmem-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583096" comment="kernel-default-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583097" comment="kernel-default-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583098" comment="kernel-default-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583099" comment="kernel-default-man-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583100" comment="kernel-ec2-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583101" comment="kernel-ec2-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583102" comment="kernel-ec2-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583103" comment="kernel-pae-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583104" comment="kernel-pae-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583105" comment="kernel-pae-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583106" comment="kernel-ppc64-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583107" comment="kernel-ppc64-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583108" comment="kernel-ppc64-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583109" comment="kernel-source-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583110" comment="kernel-syms-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583111" comment="kernel-trace-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583112" comment="kernel-trace-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583113" comment="kernel-trace-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583114" comment="kernel-xen-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583115" comment="kernel-xen-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583116" comment="kernel-xen-devel-3.0.101-108.71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583093" comment="kernel-bigmem-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583094" comment="kernel-bigmem-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583095" comment="kernel-bigmem-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583096" comment="kernel-default-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583097" comment="kernel-default-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583098" comment="kernel-default-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583099" comment="kernel-default-man-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583100" comment="kernel-ec2-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583101" comment="kernel-ec2-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583102" comment="kernel-ec2-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583103" comment="kernel-pae-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583104" comment="kernel-pae-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583105" comment="kernel-pae-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583106" comment="kernel-ppc64-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583107" comment="kernel-ppc64-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583108" comment="kernel-ppc64-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583109" comment="kernel-source-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583110" comment="kernel-syms-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583111" comment="kernel-trace-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583112" comment="kernel-trace-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583113" comment="kernel-trace-devel-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583114" comment="kernel-xen-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583115" comment="kernel-xen-base-3.0.101-108.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583116" comment="kernel-xen-devel-3.0.101-108.71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41576" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191660" ref_url="https://bugzilla.suse.com/1191660" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="904899" ref_url="https://bugzilla.suse.com/904899" source="BUGZILLA"/>
		<reference ref_id="905100" ref_url="https://bugzilla.suse.com/905100" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563 bnc#1192267).
- CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation, when ASCONF is used, allowed remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk (bnc#904899 bnc#905100).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673 bnc#1192036).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1188876).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c had a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computed the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. (bnc#1189399).
- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-3609: A potential local privilege escalation in the CAN BCM networking protocol was fixed (bsc#1187215).
- CVE-2020-36385: drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).

The following non-security bugs were fixed:

- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191660">SUSE bug 1191660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657593" comment="kernel-bigmem-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657594" comment="kernel-bigmem-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657595" comment="kernel-bigmem-devel-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657596" comment="kernel-default-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657597" comment="kernel-default-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657598" comment="kernel-default-devel-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657599" comment="kernel-default-man-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657600" comment="kernel-ec2-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657601" comment="kernel-ec2-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657602" comment="kernel-ec2-devel-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657603" comment="kernel-pae-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657604" comment="kernel-pae-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657605" comment="kernel-pae-devel-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657606" comment="kernel-ppc64-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657607" comment="kernel-ppc64-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657608" comment="kernel-ppc64-devel-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657609" comment="kernel-source-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657610" comment="kernel-syms-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657611" comment="kernel-trace-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657612" comment="kernel-trace-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657613" comment="kernel-trace-devel-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657614" comment="kernel-xen-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657615" comment="kernel-xen-base-3.0.101-108.132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657616" comment="kernel-xen-devel-3.0.101-108.132.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41577" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1195109" ref_url="https://bugzilla.suse.com/1195109" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).
- CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem (bsc#1194272).
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service (bsc#1193157).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).

The following non-security bugs were fixed:

- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- md: check the return of mddev_find() (bsc#1195109).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195109">SUSE bug 1195109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671856" comment="kernel-bigmem-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671857" comment="kernel-bigmem-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671858" comment="kernel-bigmem-devel-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671859" comment="kernel-default-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671860" comment="kernel-default-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671861" comment="kernel-default-devel-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671862" comment="kernel-default-man-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671863" comment="kernel-ec2-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671864" comment="kernel-ec2-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671865" comment="kernel-ec2-devel-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671866" comment="kernel-pae-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671867" comment="kernel-pae-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671868" comment="kernel-pae-devel-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671869" comment="kernel-ppc64-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671870" comment="kernel-ppc64-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671871" comment="kernel-ppc64-devel-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671872" comment="kernel-source-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671873" comment="kernel-syms-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671874" comment="kernel-trace-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671875" comment="kernel-trace-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671876" comment="kernel-trace-devel-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671877" comment="kernel-xen-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671878" comment="kernel-xen-base-3.0.101-108.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671879" comment="kernel-xen-devel-3.0.101-108.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41578" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="891116" ref_url="https://bugzilla.suse.com/891116" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917968" ref_url="https://bugzilla.suse.com/917968" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="923431" ref_url="https://bugzilla.suse.com/923431" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="928988" ref_url="https://bugzilla.suse.com/928988" source="BUGZILLA"/>
		<reference ref_id="929076" ref_url="https://bugzilla.suse.com/929076" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="932882" ref_url="https://bugzilla.suse.com/932882" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935055" ref_url="https://bugzilla.suse.com/935055" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936095" ref_url="https://bugzilla.suse.com/936095" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936921" ref_url="https://bugzilla.suse.com/936921" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942404" ref_url="https://bugzilla.suse.com/942404" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943477" ref_url="https://bugzilla.suse.com/943477" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.

Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
  VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
  system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 do not properly consider yielding a
  processor, which allowed remote attackers to cause a denial of service
  (system hang) via incorrect checksums within a UDP packet flood
  (bsc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
  values, which allowed remote attackers to cause a denial of service
  (EPOLLET epoll application read outage) via an incorrect checksum in a
  UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
  bypass intended size restrictions and trigger read operations on
  additional memory locations by changing the handle_bytes value of a
  file handle during the execution of this function (bsc#915517).
* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel before 3.16 do not properly consider the
  side effects of failed __copy_to_user_inatomic and
  __copy_from_user_inatomic calls, which allows local users to cause a
  denial of service (system crash) or possibly gain privileges via a
  crafted application, aka an 'I/O' vector array overrun. (bsc#933429)
* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through
  3.19.1 do not properly restrict access to PCI command registers, which
  might allow local guest users to cause a denial of service
  (non-maskable interrupt and host crash) by disabling the (1) memory or
  (2) I/O decoding for a PCI Express device and then accessing the
  device, which triggers an Unsupported Request (UR) response.
  (bsc#919463)
* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before
  3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode
  task, which might allow local users to bypass the seccomp or audit
  protection mechanism via a crafted application that uses the (1) fork
  or (2) close system call, as demonstrated by an attack against seccomp
  before 3.16. (bsc#926240)
* CVE-2015-4700: The bpf_int_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
  local users to cause a denial of service (system crash) by creating a
  packet filter and then loading crafted BPF instructions that trigger
  late convergence by the JIT compiler (bsc#935705).
* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.19.1 did not validate certain length values,
  which allowed local users to cause a denial of service (incorrect data
  representation or integer overflow, and OOPS) via a crafted UDF
  filesystem (bsc#933907).
* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0
  (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as
  used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,
  allows guest OS users to obtain sensitive information from
  uninitialized locations in host OS kernel memory via unspecified
  vectors. (bsc#917830)
* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not validate certain lengths, which allowed local
  users to cause a denial of service (buffer over-read and system crash)
  via a crafted filesystem image, related to fs/udf/inode.c and
  fs/udf/symlink.c (bsc#933904).
* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the
  Linux kernel before 3.18.2 relies on component lengths that are unused,
  which allowed local users to cause a denial of service (system crash)
  via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.18.2 did not ensure a certain data-structure size
  consistency, which allowed local users to cause a denial of service
  (system crash) via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not ensure that space is available for storing a
  symlink target's name along with a trailing \0 character, which allowed
  local users to obtain sensitive information via a crafted filesystem
  image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).

The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- Apparmor: fix file_permission if profile is updated (bsc#917968).
- block: Discard bios do not have data (bsc#928988).
- cifs: Fix missing crypto allocation (bnc#937402).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).
- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm-&gt;def_flags setting in load_elf_binary() (fate#317831,bnc#891116)).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637). 
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn.
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- supported.conf: enable sch_mqprio (bsc#932882)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-08"/>
	<updated date="2015-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891116">SUSE bug 891116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917968">SUSE bug 917968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923431">SUSE bug 923431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928988">SUSE bug 928988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929076">SUSE bug 929076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932882">SUSE bug 932882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935055">SUSE bug 935055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936095">SUSE bug 936095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936921">SUSE bug 936921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942404">SUSE bug 942404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943477">SUSE bug 943477</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583117" comment="kernel-default-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583118" comment="kernel-default-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583119" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583120" comment="kernel-default-man-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583121" comment="kernel-ec2-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583122" comment="kernel-ec2-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583123" comment="kernel-ec2-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583124" comment="kernel-ppc64-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583125" comment="kernel-ppc64-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583126" comment="kernel-ppc64-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583127" comment="kernel-source-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583128" comment="kernel-syms-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583129" comment="kernel-trace-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583130" comment="kernel-trace-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583131" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583117" comment="kernel-default-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583118" comment="kernel-default-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583119" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583120" comment="kernel-default-man-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583121" comment="kernel-ec2-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583122" comment="kernel-ec2-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583123" comment="kernel-ec2-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583124" comment="kernel-ppc64-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583125" comment="kernel-ppc64-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583126" comment="kernel-ppc64-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583127" comment="kernel-source-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583128" comment="kernel-syms-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583129" comment="kernel-trace-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583130" comment="kernel-trace-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583131" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41579" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="912738" ref_url="https://bugzilla.suse.com/912738" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="933782" ref_url="https://bugzilla.suse.com/933782" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951815" ref_url="https://bugzilla.suse.com/951815" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955837" ref_url="https://bugzilla.suse.com/955837" source="BUGZILLA"/>
		<reference ref_id="955925" ref_url="https://bugzilla.suse.com/955925" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959649" ref_url="https://bugzilla.suse.com/959649" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963561" ref_url="https://bugzilla.suse.com/963561" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964818" ref_url="https://bugzilla.suse.com/964818" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966137" ref_url="https://bugzilla.suse.com/966137" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320200)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of service
  or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
  Linux kernel did not verify an address length, which allowed local users
  to obtain sensitive information from kernel memory and bypass the KASLR
  protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in
  the umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in
  ALSA that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
  CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
  handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
  bsc#968012, bsc#968013).

The following non-security bugs were fixed:
- alsa: hda - Add one more node in the EAPD supporting candidate list (bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too (bsc#951815).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also address bsc#966094).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- xen: Update Xen config files (enable upstream block frontend).
- ec2: Update kabi files and start tracking ec2
- xen: consolidate and simplify struct xenbus_driver instantiation (bsc#961658 fate#320200).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658 fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#961658 fate#320200).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. (bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry (bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- s390/cio: collect format 1 channel-path description data (bnc#958000, LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000, LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000, LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation (bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of indirect segments (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed (XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent (bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658 fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658 fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658 fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path (bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658 fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658 fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend (bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658 fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658 fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support (bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together (bsc#961658 fate#320200).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658 fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658 fate#320200).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Skip dirty pages in -&gt;releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912738">SUSE bug 912738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933782">SUSE bug 933782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951815">SUSE bug 951815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955925">SUSE bug 955925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959649">SUSE bug 959649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963561">SUSE bug 963561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964818">SUSE bug 964818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966137">SUSE bug 966137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583132" comment="kernel-default-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583133" comment="kernel-default-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583134" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583135" comment="kernel-default-man-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583136" comment="kernel-ec2-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583137" comment="kernel-ec2-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583138" comment="kernel-ec2-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583139" comment="kernel-ppc64-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583140" comment="kernel-ppc64-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583141" comment="kernel-ppc64-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583142" comment="kernel-source-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583143" comment="kernel-syms-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583144" comment="kernel-trace-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583145" comment="kernel-trace-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583146" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583132" comment="kernel-default-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583133" comment="kernel-default-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583134" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583135" comment="kernel-default-man-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583136" comment="kernel-ec2-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583137" comment="kernel-ec2-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583138" comment="kernel-ec2-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583139" comment="kernel-ppc64-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583140" comment="kernel-ppc64-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583141" comment="kernel-ppc64-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583142" comment="kernel-source-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583143" comment="kernel-syms-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583144" comment="kernel-trace-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583145" comment="kernel-trace-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583146" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41580" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1024450" ref_url="https://bugzilla.suse.com/1024450" source="BUGZILLA"/>
		<reference ref_id="1031358" ref_url="https://bugzilla.suse.com/1031358" source="BUGZILLA"/>
		<reference ref_id="1036286" ref_url="https://bugzilla.suse.com/1036286" source="BUGZILLA"/>
		<reference ref_id="1036629" ref_url="https://bugzilla.suse.com/1036629" source="BUGZILLA"/>
		<reference ref_id="1037441" ref_url="https://bugzilla.suse.com/1037441" source="BUGZILLA"/>
		<reference ref_id="1037667" ref_url="https://bugzilla.suse.com/1037667" source="BUGZILLA"/>
		<reference ref_id="1037669" ref_url="https://bugzilla.suse.com/1037669" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1039803" ref_url="https://bugzilla.suse.com/1039803" source="BUGZILLA"/>
		<reference ref_id="1040609" ref_url="https://bugzilla.suse.com/1040609" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045205" ref_url="https://bugzilla.suse.com/1045205" source="BUGZILLA"/>
		<reference ref_id="1045327" ref_url="https://bugzilla.suse.com/1045327" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047523" ref_url="https://bugzilla.suse.com/1047523" source="BUGZILLA"/>
		<reference ref_id="1050381" ref_url="https://bugzilla.suse.com/1050381" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1051133" ref_url="https://bugzilla.suse.com/1051133" source="BUGZILLA"/>
		<reference ref_id="1051932" ref_url="https://bugzilla.suse.com/1051932" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="1052370" ref_url="https://bugzilla.suse.com/1052370" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1053148" ref_url="https://bugzilla.suse.com/1053148" source="BUGZILLA"/>
		<reference ref_id="1053152" ref_url="https://bugzilla.suse.com/1053152" source="BUGZILLA"/>
		<reference ref_id="1053317" ref_url="https://bugzilla.suse.com/1053317" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053933" ref_url="https://bugzilla.suse.com/1053933" source="BUGZILLA"/>
		<reference ref_id="1054070" ref_url="https://bugzilla.suse.com/1054070" source="BUGZILLA"/>
		<reference ref_id="1054076" ref_url="https://bugzilla.suse.com/1054076" source="BUGZILLA"/>
		<reference ref_id="1054093" ref_url="https://bugzilla.suse.com/1054093" source="BUGZILLA"/>
		<reference ref_id="1054247" ref_url="https://bugzilla.suse.com/1054247" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1054706" ref_url="https://bugzilla.suse.com/1054706" source="BUGZILLA"/>
		<reference ref_id="1056230" ref_url="https://bugzilla.suse.com/1056230" source="BUGZILLA"/>
		<reference ref_id="1056504" ref_url="https://bugzilla.suse.com/1056504" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1057179" ref_url="https://bugzilla.suse.com/1057179" source="BUGZILLA"/>
		<reference ref_id="1057796" ref_url="https://bugzilla.suse.com/1057796" source="BUGZILLA"/>
		<reference ref_id="1058524" ref_url="https://bugzilla.suse.com/1058524" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1060245" ref_url="https://bugzilla.suse.com/1060245" source="BUGZILLA"/>
		<reference ref_id="1060665" ref_url="https://bugzilla.suse.com/1060665" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061180" ref_url="https://bugzilla.suse.com/1061180" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062842" ref_url="https://bugzilla.suse.com/1062842" source="BUGZILLA"/>
		<reference ref_id="1063301" ref_url="https://bugzilla.suse.com/1063301" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1064803" ref_url="https://bugzilla.suse.com/1064803" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066618" ref_url="https://bugzilla.suse.com/1066618" source="BUGZILLA"/>
		<reference ref_id="1066625" ref_url="https://bugzilla.suse.com/1066625" source="BUGZILLA"/>
		<reference ref_id="1066650" ref_url="https://bugzilla.suse.com/1066650" source="BUGZILLA"/>
		<reference ref_id="1066671" ref_url="https://bugzilla.suse.com/1066671" source="BUGZILLA"/>
		<reference ref_id="1066700" ref_url="https://bugzilla.suse.com/1066700" source="BUGZILLA"/>
		<reference ref_id="1066705" ref_url="https://bugzilla.suse.com/1066705" source="BUGZILLA"/>
		<reference ref_id="1067085" ref_url="https://bugzilla.suse.com/1067085" source="BUGZILLA"/>
		<reference ref_id="1067816" ref_url="https://bugzilla.suse.com/1067816" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="909484" ref_url="https://bugzilla.suse.com/909484" source="BUGZILLA"/>
		<reference ref_id="984530" ref_url="https://bugzilla.suse.com/984530" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-12762" ref_url="https://www.suse.com/security/cve/CVE-2017-12762/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-16649: The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067085).
- CVE-2017-16535: The usb_get_bos_descriptor function in drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066700).
- CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference (bnc#1066705).
- CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor (bnc#1066671).
- CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066650).
- CVE-2017-16525: The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup (bnc#1066618).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local users to cause a denial of service (snd_usb_mixer_interrupt use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066625).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-14340: The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel did not verify that a filesystem has a realtime device, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory (bnc#1058524).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-1000112: An exploitable memory corruption due to UFO to non-UFO path switch was fixed. (bnc#1052311 bnc#1052365).

The following non-security bugs were fixed:

- alsa: core: Fix unexpected error at replacing user TLV (bsc#1045538).
- alsa: hda - fix Lewisburg audio issue (fate#319286).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1045538).
- alsa: timer: Add missing mutex lock for compat ioctls (bsc#1045538).
- audit: Fix use after free in audit_remove_watch_rule() (bsc#1045205).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- nfs: Cache aggressively when file is open for writing (bsc#1053933).
- nfs: Do drop directory dentry when error clearly requires it (bsc#1051932).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1053933). # Conflicts: #	series.conf
- nfs: Optimize fallocate by refreshing mapping when needed (bsc#1053933).
- nfs: Remove asserts from the NFS XDR code (bsc#1063544).
- nfs: invalidate file size when taking a lock (bsc#1053933).
- pci: fix hotplug related issues (bnc#1054247, LTC#157731).
- Update config files. (bsc#1057796) The CONFIG_MODULE_SIG_UEFI should be enabled on x86_64/xen architecture because xen can work with shim on x86_64. Enabling the following kernel config to load certificate from db/mok: +CONFIG_MODULE_SIG_BLACKLIST=y +CONFIG_MODULE_SIG_UEFI=y
- af_key: do not use GFP_KERNEL in atomic contexts (bsc#1054093).
- autofs: do not fail mount for transient error (bsc#1065180).
- xen: avoid deadlock in xenbus (bnc#1047523).
- blacklist.conf: Add PCI ASPM fix to blacklist (bsc#1045538)
- blkback/blktap: do not leak stack data via response ring (bsc#1042863 XSA-216).
- bnx2x: prevent crash when accessing PTP with interface down (bsc#1060665).
- cx231xx-audio: fix NULL-deref at probe (bsc#1050431).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- dm bufio: fix integer overflow when limiting maximum cache size (git-fixes).
- drm/mgag200: Fixes for G200eH3. (bnc#1062842)
- fnic: Use the local variable instead of I/O flag to acquire io_req_lock in fnic_queuecommand() to avoid deadloack (bsc#1067816).
- fuse: do not use iocb after it may have been freed (bsc#1054706).
- fuse: fix fuse_write_end() if zero bytes were copied (bsc#1054706).
- fuse: fsync() did not return IO errors (bsc#1054076).
- fuse: fuse_flush must check mapping-&gt;flags for errors (bsc#1054706).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gspca: konica: add missing endpoint sanity check (bsc#1050431).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#909484).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi/severities: Ignore zpci symbol changes (bsc#1054247)
- lib/mpi: mpi_read_raw_data(): fix nbits calculation (fate#314508).
- lpfc: check for valid scsi cmnd in lpfc_scsi_cmd_iocb_cmpl() (bsc#1051133).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061180).
- media: platform: davinci: return -EINVAL for VPFE_CMD_S_CCDC_RAW_PARAMS ioctl (bsc#1050431).
- net: Fix RCU splat in af_key (bsc#1054093).
- netback: coalesce (guest) RX SKBs as needed (bsc#1056504).
- nfs: Fix ugly referral attributes (git-fixes).
- nfs: improve shinking of access cache (bsc#1012917).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609 bsc#1024450).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669 bsc#1037667).
- powerpc/fadump: provide a helpful error message (bsc#1037669 bsc#1037667).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1064861, git-fixes).
- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530, bsc#1052370).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888, git-fixes f2ab6219969f).
- powerpc/slb: Force a full SLB flush when we insert for a bad EA (bsc#1054070).
- powerpc/xics: Harden xics hypervisor backend (bnc#1056230).
- powerpc: Correct instruction code for xxlor instruction (bsc#1064861, git-fixes).
- powerpc: Fix emulation of mfocrf in emulate_step() (bsc#1064861, git-fixes).
- powerpc: Fix the corrupt r3 error during MCE handling (bnc#1056230).
- powerpc: Make sure IPI handlers see data written by IPI senders (bnc#1056230).
- reiserfs: fix race in readdir (bsc#1039803).
- s390/cpcmd,vmcp: avoid GFP_DMA allocations (bnc#1060245, LTC#159112).
- s390/pci: do not cleanup in arch_setup_msi_irqs (bnc#1054247, LTC#157731).
- s390/pci: fix handling of PEC 306 (bnc#1054247, LTC#157731).
- s390/pci: improve error handling during fmb (de)registration (bnc#1054247, LTC#157731).
- s390/pci: improve error handling during interrupt deregistration (bnc#1054247, LTC#157731).
- s390/pci: improve pci hotplug (bnc#1054247, LTC#157731).
- s390/pci: improve unreg_ioat error handling (bnc#1054247, LTC#157731).
- s390/pci: introduce clp_get_state (bnc#1054247, LTC#157731).
- s390/pci: provide more debug information (bnc#1054247, LTC#157731).
- s390/qdio: avoid reschedule of outbound tasklet once killed (bnc#1063301, LTC#159885).
- s390/topology: alternative topology for topology-less machines (bnc#1060245, LTC#159177).
- s390/topology: enable / disable topology dynamically (bnc#1060245, LTC#159177).
- scsi: avoid system stall due to host_busy race (bsc#1031358).
- scsi: close race when updating blocked counters (bsc#1031358).
- scsi: qla2xxx: Get mutex lock before checking optrom_state (bsc#1053317).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1060245, LTC#158494).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1060245, LTC#158494).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1060245, LTC#158494).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1060245, LTC#158493).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1060245, LTC#158494).
- ser_gigaset: return -ENOMEM on error instead of success (bsc#1037441).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- tpm: fix a kernel memory leak in tpm-sysfs.c (bsc#1050381).
- usb-serial: check for NULL private data in pl2303_suse_disconnect (bsc#1064803).
- uwb: fix device quirk on big-endian hosts (bsc#1036629).
- virtio_scsi: do not call virtqueue_add_sgs(... GFP_NOIO) holding spinlock (bsc#1036286).
- x86/microcode/intel: Disable late loading on model 79 (bsc#1054305).
- xfs: fix inobt inode allocation search optimization (bsc#1013018).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-11"/>
	<updated date="2017-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024450">SUSE bug 1024450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031358">SUSE bug 1031358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036286">SUSE bug 1036286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036629">SUSE bug 1036629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037441">SUSE bug 1037441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037667">SUSE bug 1037667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037669">SUSE bug 1037669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039803">SUSE bug 1039803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040609">SUSE bug 1040609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045205">SUSE bug 1045205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047523">SUSE bug 1047523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050381">SUSE bug 1050381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051133">SUSE bug 1051133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051932">SUSE bug 1051932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052370">SUSE bug 1052370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053148">SUSE bug 1053148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053317">SUSE bug 1053317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053933">SUSE bug 1053933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054070">SUSE bug 1054070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054076">SUSE bug 1054076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054093">SUSE bug 1054093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054247">SUSE bug 1054247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054706">SUSE bug 1054706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056230">SUSE bug 1056230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056504">SUSE bug 1056504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057796">SUSE bug 1057796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060245">SUSE bug 1060245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060665">SUSE bug 1060665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061180">SUSE bug 1061180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062842">SUSE bug 1062842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063301">SUSE bug 1063301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064803">SUSE bug 1064803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066625">SUSE bug 1066625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066650">SUSE bug 1066650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066671">SUSE bug 1066671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066700">SUSE bug 1066700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067085">SUSE bug 1067085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067816">SUSE bug 1067816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909484">SUSE bug 909484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984530">SUSE bug 984530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12762/">CVE-2017-12762</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583147" comment="kernel-bigmem-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583148" comment="kernel-bigmem-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583149" comment="kernel-bigmem-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583150" comment="kernel-default-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583151" comment="kernel-default-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583152" comment="kernel-default-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583153" comment="kernel-default-man-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583154" comment="kernel-ec2-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583155" comment="kernel-ec2-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583156" comment="kernel-ec2-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583157" comment="kernel-pae-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583158" comment="kernel-pae-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583159" comment="kernel-pae-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583160" comment="kernel-ppc64-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583161" comment="kernel-ppc64-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583162" comment="kernel-ppc64-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583163" comment="kernel-source-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583164" comment="kernel-syms-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583165" comment="kernel-trace-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583166" comment="kernel-trace-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583167" comment="kernel-trace-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583168" comment="kernel-xen-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583169" comment="kernel-xen-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583170" comment="kernel-xen-devel-3.0.101-108.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583147" comment="kernel-bigmem-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583148" comment="kernel-bigmem-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583149" comment="kernel-bigmem-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583150" comment="kernel-default-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583151" comment="kernel-default-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583152" comment="kernel-default-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583153" comment="kernel-default-man-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583154" comment="kernel-ec2-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583155" comment="kernel-ec2-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583156" comment="kernel-ec2-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583157" comment="kernel-pae-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583158" comment="kernel-pae-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583159" comment="kernel-pae-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583160" comment="kernel-ppc64-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583161" comment="kernel-ppc64-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583162" comment="kernel-ppc64-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583163" comment="kernel-source-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583164" comment="kernel-syms-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583165" comment="kernel-trace-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583166" comment="kernel-trace-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583167" comment="kernel-trace-devel-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583168" comment="kernel-xen-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583169" comment="kernel-xen-base-3.0.101-108.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583170" comment="kernel-xen-devel-3.0.101-108.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41581" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1024612" ref_url="https://bugzilla.suse.com/1024612" source="BUGZILLA"/>
		<reference ref_id="1034862" ref_url="https://bugzilla.suse.com/1034862" source="BUGZILLA"/>
		<reference ref_id="1045479" ref_url="https://bugzilla.suse.com/1045479" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1048185" ref_url="https://bugzilla.suse.com/1048185" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066569" ref_url="https://bugzilla.suse.com/1066569" source="BUGZILLA"/>
		<reference ref_id="1066693" ref_url="https://bugzilla.suse.com/1066693" source="BUGZILLA"/>
		<reference ref_id="1066973" ref_url="https://bugzilla.suse.com/1066973" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071074" ref_url="https://bugzilla.suse.com/1071074" source="BUGZILLA"/>
		<reference ref_id="1071470" ref_url="https://bugzilla.suse.com/1071470" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1072457" ref_url="https://bugzilla.suse.com/1072457" source="BUGZILLA"/>
		<reference ref_id="1072561" ref_url="https://bugzilla.suse.com/1072561" source="BUGZILLA"/>
		<reference ref_id="1072876" ref_url="https://bugzilla.suse.com/1072876" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-13167" ref_url="https://www.suse.com/security/cve/CVE-2017-13167/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use attacker controllable speculative
  execution over code patterns in the Linux Kernel to leak content from
  otherwise not readable memory in the same address space, allowing
  retrieval of passwords, cryptographic keys and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.

  This issue is addressed for the x86_64, the IBM Power and IBM zSeries
  architecture.

- CVE-2017-5715: Local attackers on systems with modern CPUs featuring
  branch prediction could use mispredicted branches to speculatively execute
  code patterns that in turn could be made to leak other non-readable
  content in the same address space, an attack similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  This is done with help of Linux Kernel fixes on the Intel/AMD x86_64 and
  IBM zSeries architectures. On x86_64, this requires also updates of the
  CPU microcode packages, delivered in seperate updates.

  For IBM Power and zSeries the required firmware updates are supplied
  over regular channels by IBM.

  As this feature can have a performance impact, it can be disabled using
  the 'nospec' kernel commandline option.

- CVE-2017-5754: Local attackers on systems with modern CPUs featuring
  deep instruction pipelining could use code patterns in userspace to
  speculative executive code that would read otherwise read protected
  memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  This update does this on the Intel x86_64 and IBM Power
  architecture. Updates are also necessary for the ARM architecture,
  but will be delivered in the next round of updates.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.


The following security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).
- CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel did not ensure that an l2cap socket is available, which allowed local users to gain privileges via a crafted application (bnc#1071470).
- CVE-2017-13167: An elevation of privilege vulnerability in the kernel sound timer. (bnc#1072876).
- CVE-2017-16538: drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel allowed local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner) (bnc#1066569).
- CVE-2017-17558: The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel did not consider the maximum number of configurations and interfaces before attempting to release resources, which allowed local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device (bnc#1072561).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-7472: The KEYS subsystem in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2017-16534: The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066693).

The following non-security bugs were fixed:

- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1048185).
- autofs: fix careless error in recent commit (bsc#1065180).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- ecryptfs: fix dereference of NULL user_key_payload (bsc#1013018).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1013018).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1013018).
- fs: prevent speculative execution (bnc#1068032).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1045538).
- kabi: silence spurious kabi error in net/sctp/socket.c (bsc#1068671).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: fix ldt freeing.
- kaiser: Kernel Address Isolation.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: work around kABI.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1050431).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption.
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1072457, LTC#148203).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390/disassembler: correct disassembly lines alignment (bnc#1066973, LTC#161577).
- s390/disassembler: increase show_code buffer size (bnc#1066973, LTC#161577).
- s390: fix transactional execution control register handling (bnc#1072457, LTC#162116).
- s390: introduce CPU alternatives.
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier.
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- s390/spinlock: add ppa to system call path.
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler.
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off().
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1066973, LTC#160081).
- temporary fix (bsc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- usb: host: fix incorrect updating of offset (bsc#1047487).
- usb: uas: fix bug in handling of alternate settings (bsc#1071074).
- uvcvideo: prevent speculative execution (bnc#1068032).
- video: udlfb: Fix read EDID timeout (bsc#1045538).
- watchdog: hpwdt: add support for iLO5 (bsc#1024612).
- watchdog/hpwdt: Check source of NMI (bsc#1024612).
- x86-64: Give vvars their own page.
- x86-64: Map the HPET NX.
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add instruction padding.
- x86/alternatives: Cleanup DPRINTK macro.
- x86/alternatives: Make JMPs more robust.
- x86/alternatives: Use optimized NOPs for padding.
- x86/boot: Add early cmdline parsing for options with arguments.
- x86, boot: Carve out early cmdline parsing function.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: disable vmstat accounting.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: propagate info to /proc/cpuinfo.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86: Make alternative instruction pointers relative.
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE.
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID.
- x86/mm: Add INVPCID helpers.
- x86/mm: Add the 'nopcid' boot option to turn off PCID.
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP.
- x86/mm: Disable PCID on 32-bit kernels.
- x86/mm: Enable CR4.PCIDE on supported systems.
- x86/mm: fix bad backport to disable PCID on Xen.
- x86/mm: Fix INVPCID asm constraint.
- x86/mm: If INVPCID is available, use it to flush global mappings.
- x86/mm/kaiser: re-enable vsyscalls.
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- x86/mm, sched/core: Turn off IRQs in switch_mm().
- x86/mm, sched/core: Uninline switch_mm().
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
- xen/kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- xen/KAISER: Kernel Address Isolation.
- xen/kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- xen/kaiser: work around kABI.
- xen/x86-64: Give vvars their own page.
- xen/x86-64: Map the HPET NX.
- xen/x86/alternatives: Add instruction padding.
- xen/x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- xen/x86/mm: Enable CR4.PCIDE on supported systems.
- xen/x86/mm/kaiser: re-enable vsyscalls.
- xen/x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code.
- xen: x86/mm, sched/core: Turn off IRQs in switch_mm().
- xen: x86/mm, sched/core: Uninline switch_mm().
- zd1211rw: fix NULL-deref at probe (bsc#1045479).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024612">SUSE bug 1024612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045479">SUSE bug 1045479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048185">SUSE bug 1048185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066693">SUSE bug 1066693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066973">SUSE bug 1066973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071074">SUSE bug 1071074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072457">SUSE bug 1072457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072876">SUSE bug 1072876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13167/">CVE-2017-13167</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583171" comment="kernel-bigmem-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583172" comment="kernel-bigmem-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583173" comment="kernel-bigmem-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583174" comment="kernel-default-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583175" comment="kernel-default-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583176" comment="kernel-default-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583177" comment="kernel-default-man-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583178" comment="kernel-ec2-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583179" comment="kernel-ec2-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583180" comment="kernel-ec2-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583181" comment="kernel-pae-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583182" comment="kernel-pae-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583183" comment="kernel-pae-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583184" comment="kernel-ppc64-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583185" comment="kernel-ppc64-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583186" comment="kernel-ppc64-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583187" comment="kernel-source-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583188" comment="kernel-syms-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583189" comment="kernel-trace-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583190" comment="kernel-trace-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583191" comment="kernel-trace-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583192" comment="kernel-xen-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583193" comment="kernel-xen-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583194" comment="kernel-xen-devel-3.0.101-108.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583171" comment="kernel-bigmem-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583172" comment="kernel-bigmem-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583173" comment="kernel-bigmem-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583174" comment="kernel-default-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583175" comment="kernel-default-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583176" comment="kernel-default-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583177" comment="kernel-default-man-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583178" comment="kernel-ec2-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583179" comment="kernel-ec2-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583180" comment="kernel-ec2-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583181" comment="kernel-pae-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583182" comment="kernel-pae-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583183" comment="kernel-pae-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583184" comment="kernel-ppc64-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583185" comment="kernel-ppc64-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583186" comment="kernel-ppc64-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583187" comment="kernel-source-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583188" comment="kernel-syms-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583189" comment="kernel-trace-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583190" comment="kernel-trace-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583191" comment="kernel-trace-devel-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583192" comment="kernel-xen-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583193" comment="kernel-xen-base-3.0.101-108.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583194" comment="kernel-xen-devel-3.0.101-108.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41582" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583195" comment="kernel-default-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583196" comment="kernel-default-base-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583197" comment="kernel-default-devel-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583198" comment="kernel-default-man-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583199" comment="kernel-source-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583200" comment="kernel-syms-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583201" comment="kernel-trace-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583202" comment="kernel-trace-base-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583203" comment="kernel-trace-devel-3.0.101-108.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583195" comment="kernel-default-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583196" comment="kernel-default-base-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583197" comment="kernel-default-devel-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583198" comment="kernel-default-man-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583199" comment="kernel-source-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583200" comment="kernel-syms-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583201" comment="kernel-trace-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583202" comment="kernel-trace-base-3.0.101-108.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583203" comment="kernel-trace-devel-3.0.101-108.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41583" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1054305" ref_url="https://bugzilla.suse.com/1054305" source="BUGZILLA"/>
		<reference ref_id="1059174" ref_url="https://bugzilla.suse.com/1059174" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1063544" ref_url="https://bugzilla.suse.com/1063544" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069508" ref_url="https://bugzilla.suse.com/1069508" source="BUGZILLA"/>
		<reference ref_id="1070623" ref_url="https://bugzilla.suse.com/1070623" source="BUGZILLA"/>
		<reference ref_id="1070781" ref_url="https://bugzilla.suse.com/1070781" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074880" ref_url="https://bugzilla.suse.com/1074880" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075410" ref_url="https://bugzilla.suse.com/1075410" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075908" ref_url="https://bugzilla.suse.com/1075908" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076154" ref_url="https://bugzilla.suse.com/1076154" source="BUGZILLA"/>
		<reference ref_id="1076278" ref_url="https://bugzilla.suse.com/1076278" source="BUGZILLA"/>
		<reference ref_id="1076437" ref_url="https://bugzilla.suse.com/1076437" source="BUGZILLA"/>
		<reference ref_id="1076849" ref_url="https://bugzilla.suse.com/1076849" source="BUGZILLA"/>
		<reference ref_id="1077191" ref_url="https://bugzilla.suse.com/1077191" source="BUGZILLA"/>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="1077406" ref_url="https://bugzilla.suse.com/1077406" source="BUGZILLA"/>
		<reference ref_id="1077487" ref_url="https://bugzilla.suse.com/1077487" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077922" ref_url="https://bugzilla.suse.com/1077922" source="BUGZILLA"/>
		<reference ref_id="1078875" ref_url="https://bugzilla.suse.com/1078875" source="BUGZILLA"/>
		<reference ref_id="1079917" ref_url="https://bugzilla.suse.com/1079917" source="BUGZILLA"/>
		<reference ref_id="1080133" ref_url="https://bugzilla.suse.com/1080133" source="BUGZILLA"/>
		<reference ref_id="1080359" ref_url="https://bugzilla.suse.com/1080359" source="BUGZILLA"/>
		<reference ref_id="1080363" ref_url="https://bugzilla.suse.com/1080363" source="BUGZILLA"/>
		<reference ref_id="1080372" ref_url="https://bugzilla.suse.com/1080372" source="BUGZILLA"/>
		<reference ref_id="1080579" ref_url="https://bugzilla.suse.com/1080579" source="BUGZILLA"/>
		<reference ref_id="1080685" ref_url="https://bugzilla.suse.com/1080685" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="962257" ref_url="https://bugzilla.suse.com/962257" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18079" ref_url="https://www.suse.com/security/cve/CVE-2017-18079/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative
  execution and indirect branch prediction may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building
  the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function
  did not validate a value that is used during DMA page allocation, leading
  to a heap-based out-of-bounds write (related to the rds_rdma_extra_size
  function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in
  net/rds/rdma.c mishandled cases where page pinning fails or an invalid
  address is supplied, leading to an rds_atomic_free_op NULL pointer
  dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function in
  net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers
  to cause a denial of service (use-after-free and memory corruption)
  or possibly have unspecified other impact by leveraging the presence of
  xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2017-18079: drivers/input/serio/i8042.c in the Linux kernel allowed
  attackers to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact because the
  port-&gt;exists value can change after it is validated (bnc#1077922).
- CVE-2015-1142857: On multiple SR-IOV cars it is possible for VF's
  assigned to guests to send ethernet flow control pause frames via the
  PF. (bnc#1077355).
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed
  attackers to obtain potentially sensitive information from kernel
  memory, aka a write_mmio stack-based out-of-bounds read, related to
  arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2017-13215: A elevation of privilege vulnerability in the Upstream
  kernel skcipher. (bnc#1075908).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability
  existed in the sound system, this can lead to a deadlock and denial of
  service condition (bnc#1076017).

The following non-security bugs were fixed:

- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1045538).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1045538).
- alsa: aloop: Release cable upon open error path (bsc#1045538).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1045538).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1045538).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1045538).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1045538).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1045538).
- btrfs: cleanup unnecessary assignment when cleaning up all the residual transaction (FATE#325056).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: do not wait for all the writers circularly during the transaction commit (FATE#325056).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1080363).
- btrfs: fix two use-after-free bugs with transaction cleanup (FATE#325056).
- btrfs: make the state of the transaction more readable (FATE#325056).
- btrfs: qgroup: exit the rescan worker during umount (bsc#1080685).
- btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#1080685).
- btrfs: reset intwrite on transaction abort (FATE#325056).
- btrfs: set qgroup_ulist to be null after calling ulist_free() (bsc#1080359).
- btrfs: stop waiting on current trans if we aborted (FATE#325056).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- delay: add poll_event_interruptible (bsc#1048585).
- dm flakey: add corrupt_bio_byte feature (bsc#1080372).
- dm flakey: add drop_writes (bsc#1080372).
- dm flakey: error READ bios during the down_interval (bsc#1080372).
- dm flakey: fix crash on read when corrupt_bio_byte not set (bsc#1080372).
- dm flakey: fix reads to be issued if drop_writes configured (bsc#1080372).
- dm flakey: introduce 'error_writes' feature (bsc#1080372).
- dm flakey: support feature args (bsc#1080372).
- dm flakey: use dm_target_offset and support discards (bsc#1080372).
- ext2: free memory allocated and forget buffer head when io error happens (bnc#1069508).
- ext2: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- ext3: add necessary check in case IO error happens (bnc#1069508).
- ext3: use unlikely to improve the efficiency of the kernel (bnc#1069508).
- fork: clear thread stack upon allocation (bsc#1077560).
- kaiser: Add proper NX handling for !NX-capable systems also to kaiser_add_user_map(). (bsc#1076278).
- kaiser: do not clobber ZF by calling ENABLE_IBRS after test and before jz
- kaiser: fix ia32 compat sysexit (bsc#1080579) sysexit_from_sys_call cannot make assumption of accessible stack after CR3 switch, and therefore should use the SWITCH_USER_CR3_NO_STACK method to flip the pagetable hierarchy.
- kaiser: Fix trampoline stack loading issue on XEN PV
- kaiser: handle non-accessible stack in sysretl_from_sys_call properly (bsc#bsc#1080579)
- kaiser: make sure not to touch stack after CR3 switch in compat syscall return
- kaiser: really do switch away from trampoline stack to kernel stack in ia32_syscall entry (bsc#1080579)
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- keys: trusted: fix writing past end of buffer in trusted_read() (bsc#1074880).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- mISDN: fix a loop count (bsc#1077191).
- nfsd: do not share group_info among threads (bsc@1070623).
- ocfs2: avoid blocking in ocfs2_mark_lockres_freeing() in downconvert thread (bsc#1076437).
- ocfs2: do not set OCFS2_LOCK_UPCONVERT_FINISHING if nonblocking lock can not be granted at once (bsc#1076437).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075088).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075088).
- powerpc/64s: Add support for RFI flush of L1-D cache  (bsc#1068032, bsc#1075088).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032,  bsc#1075088).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075088).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075088).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075088).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075088).
- powerpc: Fix register clobbering when accumulating stolen time (bsc#1059174).
- powerpc: Fix up the kdump base cap to 128M (bsc#1079917, bsc#1077487).
- powerpc: Mark CONFIG_PPC_DEBUG_RFI as BROKEN (bsc#1075088).
- powerpc/perf: Dereference BHRB entries safely (bsc#1064861, FATE#317619, git-fixes).
- powerpc/perf: Fix book3s kernel to userspace backtraces (bsc#1080133).
- powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags &amp; wrapper (bsc#1068032, bsc#1075088).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075088).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075088).
- powerpc/pseries: Kill all prefetch streams on context switch (bsc#1068032, bsc#1075088).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075088).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1075088).
- powerpc/pseries/rfi-flush: Drop PVR-based selection (bsc#1075088).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032,  bsc#1075088).
- powerpc/rfi-flush: Factor out init_fallback_flush() (bsc#1075088).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1075088).
- powerpc/rfi-flush: Move RFI flush fields out of the paca  (unbreak kABI) (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the  sysfs code (bsc#1068032, bsc#1075088).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1075088).
- powerpc/vdso64: Use double word compare on pointers (bsc#1070781).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075088).
- rfi-flush: Move rfi_flush_fallback_area to end of paca (bsc#1075088).
- rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1075088).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032,bsc#1075088).
- s390: add ppa to the idle loop (bnc#1077406, LTC#163910).
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076849, LTC#163741).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1078875).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- scsi: virtio_scsi: let host do exception handling (bsc#936530,bsc#1060682).
- storvsc: do not assume SG list is continuous when doing bounce buffers (bsc#1075410).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86, asm: Extend definitions of _ASM_* with a raw format (bsc#1068032 CVE-2017-5754).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- x86/kaiser: Populate shadow PGD with NX bit only if supported by platform (bsc#1076154 bsc#1076278).
- x86/kaiser: use trampoline stack for kernel entry.
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bsc#1054305).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bsc#1054305).
- x86/microcode: Rescan feature flags upon late loading (bsc#1075994 bsc#1075091).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/spec_ctrl: handle late setting of X86_FEATURE_SPEC_CTRL properly (bsc#1075994 bsc#1075091).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bsc#1068032 CVE-2017-5715).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-27"/>
	<updated date="2018-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054305">SUSE bug 1054305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059174">SUSE bug 1059174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063544">SUSE bug 1063544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069508">SUSE bug 1069508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070623">SUSE bug 1070623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070781">SUSE bug 1070781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074880">SUSE bug 1074880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075410">SUSE bug 1075410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076154">SUSE bug 1076154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076278">SUSE bug 1076278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076437">SUSE bug 1076437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076849">SUSE bug 1076849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077191">SUSE bug 1077191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077406">SUSE bug 1077406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077487">SUSE bug 1077487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077922">SUSE bug 1077922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078875">SUSE bug 1078875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079917">SUSE bug 1079917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080133">SUSE bug 1080133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080359">SUSE bug 1080359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080363">SUSE bug 1080363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080372">SUSE bug 1080372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080579">SUSE bug 1080579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080685">SUSE bug 1080685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962257">SUSE bug 962257</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18079/">CVE-2017-18079</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583204" comment="kernel-bigmem-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583205" comment="kernel-bigmem-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583206" comment="kernel-bigmem-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583207" comment="kernel-default-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583208" comment="kernel-default-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583209" comment="kernel-default-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583210" comment="kernel-default-man-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583211" comment="kernel-ec2-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583212" comment="kernel-ec2-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583213" comment="kernel-ec2-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583214" comment="kernel-pae-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583215" comment="kernel-pae-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583216" comment="kernel-pae-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583217" comment="kernel-ppc64-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583218" comment="kernel-ppc64-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583219" comment="kernel-ppc64-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583220" comment="kernel-source-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583221" comment="kernel-syms-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583222" comment="kernel-trace-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583223" comment="kernel-trace-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583224" comment="kernel-trace-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583225" comment="kernel-xen-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583226" comment="kernel-xen-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583227" comment="kernel-xen-devel-3.0.101-108.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583204" comment="kernel-bigmem-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583205" comment="kernel-bigmem-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583206" comment="kernel-bigmem-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583207" comment="kernel-default-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583208" comment="kernel-default-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583209" comment="kernel-default-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583210" comment="kernel-default-man-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583211" comment="kernel-ec2-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583212" comment="kernel-ec2-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583213" comment="kernel-ec2-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583214" comment="kernel-pae-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583215" comment="kernel-pae-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583216" comment="kernel-pae-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583217" comment="kernel-ppc64-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583218" comment="kernel-ppc64-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583219" comment="kernel-ppc64-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583220" comment="kernel-source-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583221" comment="kernel-syms-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583222" comment="kernel-trace-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583223" comment="kernel-trace-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583224" comment="kernel-trace-devel-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583225" comment="kernel-xen-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583226" comment="kernel-xen-base-3.0.101-108.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583227" comment="kernel-xen-devel-3.0.101-108.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41584" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1084760" ref_url="https://bugzilla.suse.com/1084760" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090630" ref_url="https://bugzilla.suse.com/1090630" source="BUGZILLA"/>
		<reference ref_id="1090888" ref_url="https://bugzilla.suse.com/1090888" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1091671" ref_url="https://bugzilla.suse.com/1091671" source="BUGZILLA"/>
		<reference ref_id="1091755" ref_url="https://bugzilla.suse.com/1091755" source="BUGZILLA"/>
		<reference ref_id="1091815" ref_url="https://bugzilla.suse.com/1091815" source="BUGZILLA"/>
		<reference ref_id="1092372" ref_url="https://bugzilla.suse.com/1092372" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

- CVE-2018-1000199: An address corruption flaw was discovered while
  modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
  unprivileged user/process could use this flaw to crash the system kernel
  resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed
  local users to cause a denial of service (use-after-free) or possibly
  have unspecified other impact via crafted system calls (bnc#1091755).
- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.
- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions
  merged from the upstream kernel.

The following non-security bugs were fixed:

- Avoid quadratic search when freeing delegations (bsc#1084760).
- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).
- hid: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).
- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).
- powerpc/64: Disable gmb() on powerpc
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- series.conf: fix the header It was corrupted back in 2015.
- tracing: Create seq_buf layer in trace_seq (bsc#1091815).
- Update config files. Enable retpolines for i386 build.
- usb: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).
- usb: hub: fix SS hub-descriptor handling (bsc#1092372).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)
- x86/xen: disable IBRS around CPU stopper function invocation
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
- xfs: fix buffer use after free on IO error (bsc#1052943).
- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084760">SUSE bug 1084760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090630">SUSE bug 1090630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090888">SUSE bug 1090888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091671">SUSE bug 1091671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092372">SUSE bug 1092372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583228" comment="kernel-bigmem-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583229" comment="kernel-bigmem-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583230" comment="kernel-bigmem-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583231" comment="kernel-default-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583232" comment="kernel-default-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583233" comment="kernel-default-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583234" comment="kernel-default-man-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583235" comment="kernel-ec2-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583236" comment="kernel-ec2-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583237" comment="kernel-ec2-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583238" comment="kernel-pae-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583239" comment="kernel-pae-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583240" comment="kernel-pae-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583241" comment="kernel-ppc64-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583242" comment="kernel-ppc64-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583243" comment="kernel-ppc64-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583244" comment="kernel-source-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583245" comment="kernel-syms-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583246" comment="kernel-trace-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583247" comment="kernel-trace-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583248" comment="kernel-trace-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583249" comment="kernel-xen-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583250" comment="kernel-xen-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583251" comment="kernel-xen-devel-3.0.101-108.48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583228" comment="kernel-bigmem-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583229" comment="kernel-bigmem-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583230" comment="kernel-bigmem-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583231" comment="kernel-default-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583232" comment="kernel-default-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583233" comment="kernel-default-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583234" comment="kernel-default-man-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583235" comment="kernel-ec2-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583236" comment="kernel-ec2-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583237" comment="kernel-ec2-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583238" comment="kernel-pae-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583239" comment="kernel-pae-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583240" comment="kernel-pae-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583241" comment="kernel-ppc64-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583242" comment="kernel-ppc64-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583243" comment="kernel-ppc64-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583244" comment="kernel-source-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583245" comment="kernel-syms-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583246" comment="kernel-trace-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583247" comment="kernel-trace-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583248" comment="kernel-trace-devel-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583249" comment="kernel-xen-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583250" comment="kernel-xen-base-3.0.101-108.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583251" comment="kernel-xen-devel-3.0.101-108.48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41585" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1070404" ref_url="https://bugzilla.suse.com/1070404" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1088343" ref_url="https://bugzilla.suse.com/1088343" source="BUGZILLA"/>
		<reference ref_id="1089386" ref_url="https://bugzilla.suse.com/1089386" source="BUGZILLA"/>
		<reference ref_id="1090607" ref_url="https://bugzilla.suse.com/1090607" source="BUGZILLA"/>
		<reference ref_id="1091659" ref_url="https://bugzilla.suse.com/1091659" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1093600" ref_url="https://bugzilla.suse.com/1093600" source="BUGZILLA"/>
		<reference ref_id="1093710" ref_url="https://bugzilla.suse.com/1093710" source="BUGZILLA"/>
		<reference ref_id="919382" ref_url="https://bugzilla.suse.com/919382" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004105.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update main focus is a regression fix in SystemV IPC handling. (bsc#1093600)

The following non-security bugs were fixed:

- Drop cBPF SSBD as classic BPF does not really have a proper concept of pointers, and without eBPF maps the out-of-bounds access in speculative execution branch can't be mounted. Moreoever, seccomp BPF uses only such a subset of BPF that can only do absolute indexing, and therefore seccomp data buffer boundarier can't be crossed. Information condensed from Alexei and Kees.
- ibrs used instead of retpoline on Haswell processor with spectre_v2=retpoline (bsc#1092497)
- ib/mlx4: Convert slave port before building address-handle (bug#919382 FATE#317529).
- KABI protect struct _lowcore (bsc#1089386).
- Update config files, add Spectre mitigation for s390x (bnc#1089386, LTC#166572).
- Update s390 config files (bsc#1089386).
- fanotify: fix logic of events on child (bsc#1013018).
- ipc/msg: Fix faulty parsing of msgctl args (bsc#1093600,bsc#1072689).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1013018).
- powerpc, KVM: Split HVMODE_206 cpu feature bit into separate HV and architecture bits (bsc#1087082).
- powerpc: Fix /proc/cpuinfo revision for POWER9 DD2 (FATE#325713, bsc#1093710).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1091659, LTC#167429).
- s390/dasd: fix IO error for newly defined devices (bnc#1091659, LTC#167398).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1091659, LTC#168037).
- s390/qeth: on channel error, reject further cmd requests (bnc#1088343, LTC#165985).
- s390: add automatic detection of the spectre defense (bnc#1089386, LTC#166572).
- s390: add optimized array_index_mask_nospec (bnc#1089386, LTC#166572).
- s390: add sysfs attributes for spectre (bnc#1089386, LTC#166572).
- s390: correct module section names for expoline code revert (bsc#1089386).
- s390: correct nospec auto detection init order (bnc#1089386, LTC#166572).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1089386, LTC#166572).
- s390: fix retpoline build on 31bit (bsc#1089386).
- s390: improve cpu alternative handling for gmb and nobp (bnc#1089386, LTC#166572).
- s390: introduce execute-trampolines for branches (bnc#1089386, LTC#166572).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1089386, LTC#166572).
- s390: report spectre mitigation via syslog (bnc#1089386, LTC#166572).
- s390: run user space and KVM guests with modified branch prediction (bnc#1089386, LTC#166572).
- s390: scrub registers on kernel entry and KVM exit (bnc#1089386, LTC#166572).
- x86, mce: Fix mce_start_timer semantics (bsc#1090607).
- x86/kaiser: symbol kaiser_set_shadow_pgd() exported with non GPL
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-31"/>
	<updated date="2018-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070404">SUSE bug 1070404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088343">SUSE bug 1088343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089386">SUSE bug 1089386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090607">SUSE bug 1090607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091659">SUSE bug 1091659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093600">SUSE bug 1093600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093710">SUSE bug 1093710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919382">SUSE bug 919382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583252" comment="kernel-bigmem-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583253" comment="kernel-bigmem-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583254" comment="kernel-bigmem-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583255" comment="kernel-default-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583256" comment="kernel-default-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583257" comment="kernel-default-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583258" comment="kernel-default-man-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583259" comment="kernel-ec2-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583260" comment="kernel-ec2-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583261" comment="kernel-ec2-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583262" comment="kernel-pae-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583263" comment="kernel-pae-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583264" comment="kernel-pae-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583265" comment="kernel-ppc64-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583266" comment="kernel-ppc64-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583267" comment="kernel-ppc64-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583268" comment="kernel-source-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583269" comment="kernel-syms-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583270" comment="kernel-trace-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583271" comment="kernel-trace-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583272" comment="kernel-trace-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583273" comment="kernel-xen-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583274" comment="kernel-xen-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583275" comment="kernel-xen-devel-3.0.101-108.52.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583252" comment="kernel-bigmem-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583253" comment="kernel-bigmem-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583254" comment="kernel-bigmem-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583255" comment="kernel-default-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583256" comment="kernel-default-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583257" comment="kernel-default-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583258" comment="kernel-default-man-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583259" comment="kernel-ec2-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583260" comment="kernel-ec2-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583261" comment="kernel-ec2-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583262" comment="kernel-pae-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583263" comment="kernel-pae-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583264" comment="kernel-pae-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583265" comment="kernel-ppc64-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583266" comment="kernel-ppc64-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583267" comment="kernel-ppc64-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583268" comment="kernel-source-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583269" comment="kernel-syms-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583270" comment="kernel-trace-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583271" comment="kernel-trace-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583272" comment="kernel-trace-devel-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583273" comment="kernel-xen-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583274" comment="kernel-xen-base-3.0.101-108.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583275" comment="kernel-xen-devel-3.0.101-108.52.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41586" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097234" ref_url="https://bugzilla.suse.com/1097234" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1099942" ref_url="https://bugzilla.suse.com/1099942" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1104475" ref_url="https://bugzilla.suse.com/1104475" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="909361" ref_url="https://bugzilla.suse.com/909361" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8405" ref_url="https://www.suse.com/security/cve/CVE-2016-8405/" source="CVE"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).
- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).

The following non-security bugs were fixed:

- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097234">SUSE bug 1097234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099942">SUSE bug 1099942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104475">SUSE bug 1104475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909361">SUSE bug 909361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8405/">CVE-2016-8405</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583276" comment="kernel-bigmem-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583277" comment="kernel-bigmem-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583278" comment="kernel-bigmem-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583279" comment="kernel-default-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583280" comment="kernel-default-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583281" comment="kernel-default-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583282" comment="kernel-default-man-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583283" comment="kernel-ec2-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583284" comment="kernel-ec2-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583285" comment="kernel-ec2-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583286" comment="kernel-pae-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583287" comment="kernel-pae-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583288" comment="kernel-pae-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583289" comment="kernel-ppc64-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583290" comment="kernel-ppc64-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583291" comment="kernel-ppc64-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583292" comment="kernel-source-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583293" comment="kernel-syms-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583294" comment="kernel-trace-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583295" comment="kernel-trace-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583296" comment="kernel-trace-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583297" comment="kernel-xen-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583298" comment="kernel-xen-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583299" comment="kernel-xen-devel-3.0.101-108.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583276" comment="kernel-bigmem-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583277" comment="kernel-bigmem-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583278" comment="kernel-bigmem-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583279" comment="kernel-default-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583280" comment="kernel-default-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583281" comment="kernel-default-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583282" comment="kernel-default-man-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583283" comment="kernel-ec2-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583284" comment="kernel-ec2-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583285" comment="kernel-ec2-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583286" comment="kernel-pae-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583287" comment="kernel-pae-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583288" comment="kernel-pae-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583289" comment="kernel-ppc64-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583290" comment="kernel-ppc64-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583291" comment="kernel-ppc64-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583292" comment="kernel-source-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583293" comment="kernel-syms-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583294" comment="kernel-trace-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583295" comment="kernel-trace-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583296" comment="kernel-trace-devel-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583297" comment="kernel-xen-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583298" comment="kernel-xen-base-3.0.101-108.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583299" comment="kernel-xen-devel-3.0.101-108.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41587" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109967" ref_url="https://bugzilla.suse.com/1109967" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004663.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-17182: An issue was discovered in the Linux kernel The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).

The following non-security bugs were fixed:

- x86/fpu: Do not do __thread_fpu_end() if use_eager_fpu() (bnc#1109967).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-11"/>
	<updated date="2018-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109967">SUSE bug 1109967</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583300" comment="kernel-bigmem-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583301" comment="kernel-bigmem-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583302" comment="kernel-bigmem-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583303" comment="kernel-default-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583304" comment="kernel-default-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583305" comment="kernel-default-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583306" comment="kernel-default-man-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583307" comment="kernel-ec2-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583308" comment="kernel-ec2-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583309" comment="kernel-ec2-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583310" comment="kernel-pae-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583311" comment="kernel-pae-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583312" comment="kernel-pae-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583313" comment="kernel-ppc64-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583314" comment="kernel-ppc64-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583315" comment="kernel-ppc64-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583316" comment="kernel-source-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583317" comment="kernel-syms-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583318" comment="kernel-trace-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583319" comment="kernel-trace-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583320" comment="kernel-trace-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583321" comment="kernel-xen-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583322" comment="kernel-xen-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583323" comment="kernel-xen-devel-3.0.101-108.77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583300" comment="kernel-bigmem-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583301" comment="kernel-bigmem-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583302" comment="kernel-bigmem-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583303" comment="kernel-default-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583304" comment="kernel-default-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583305" comment="kernel-default-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583306" comment="kernel-default-man-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583307" comment="kernel-ec2-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583308" comment="kernel-ec2-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583309" comment="kernel-ec2-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583310" comment="kernel-pae-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583311" comment="kernel-pae-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583312" comment="kernel-pae-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583313" comment="kernel-ppc64-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583314" comment="kernel-ppc64-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583315" comment="kernel-ppc64-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583316" comment="kernel-source-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583317" comment="kernel-syms-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583318" comment="kernel-trace-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583319" comment="kernel-trace-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583320" comment="kernel-trace-devel-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583321" comment="kernel-xen-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583322" comment="kernel-xen-base-3.0.101-108.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583323" comment="kernel-xen-devel-3.0.101-108.77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41588" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031572" ref_url="https://bugzilla.suse.com/1031572" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1086695" ref_url="https://bugzilla.suse.com/1086695" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1098658" ref_url="https://bugzilla.suse.com/1098658" source="BUGZILLA"/>
		<reference ref_id="1104098" ref_url="https://bugzilla.suse.com/1104098" source="BUGZILLA"/>
		<reference ref_id="1104367" ref_url="https://bugzilla.suse.com/1104367" source="BUGZILLA"/>
		<reference ref_id="1104684" ref_url="https://bugzilla.suse.com/1104684" source="BUGZILLA"/>
		<reference ref_id="1104818" ref_url="https://bugzilla.suse.com/1104818" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106105" ref_url="https://bugzilla.suse.com/1106105" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1112963" ref_url="https://bugzilla.suse.com/1112963" source="BUGZILLA"/>
		<reference ref_id="1113667" ref_url="https://bugzilla.suse.com/1113667" source="BUGZILLA"/>
		<reference ref_id="1114440" ref_url="https://bugzilla.suse.com/1114440" source="BUGZILLA"/>
		<reference ref_id="1114672" ref_url="https://bugzilla.suse.com/1114672" source="BUGZILLA"/>
		<reference ref_id="1114920" ref_url="https://bugzilla.suse.com/1114920" source="BUGZILLA"/>
		<reference ref_id="1115007" ref_url="https://bugzilla.suse.com/1115007" source="BUGZILLA"/>
		<reference ref_id="1115038" ref_url="https://bugzilla.suse.com/1115038" source="BUGZILLA"/>
		<reference ref_id="1115827" ref_url="https://bugzilla.suse.com/1115827" source="BUGZILLA"/>
		<reference ref_id="1115828" ref_url="https://bugzilla.suse.com/1115828" source="BUGZILLA"/>
		<reference ref_id="1115829" ref_url="https://bugzilla.suse.com/1115829" source="BUGZILLA"/>
		<reference ref_id="1115830" ref_url="https://bugzilla.suse.com/1115830" source="BUGZILLA"/>
		<reference ref_id="1115831" ref_url="https://bugzilla.suse.com/1115831" source="BUGZILLA"/>
		<reference ref_id="1115832" ref_url="https://bugzilla.suse.com/1115832" source="BUGZILLA"/>
		<reference ref_id="1115833" ref_url="https://bugzilla.suse.com/1115833" source="BUGZILLA"/>
		<reference ref_id="1115834" ref_url="https://bugzilla.suse.com/1115834" source="BUGZILLA"/>
		<reference ref_id="1115835" ref_url="https://bugzilla.suse.com/1115835" source="BUGZILLA"/>
		<reference ref_id="1115836" ref_url="https://bugzilla.suse.com/1115836" source="BUGZILLA"/>
		<reference ref_id="1115837" ref_url="https://bugzilla.suse.com/1115837" source="BUGZILLA"/>
		<reference ref_id="1115838" ref_url="https://bugzilla.suse.com/1115838" source="BUGZILLA"/>
		<reference ref_id="1115839" ref_url="https://bugzilla.suse.com/1115839" source="BUGZILLA"/>
		<reference ref_id="1115840" ref_url="https://bugzilla.suse.com/1115840" source="BUGZILLA"/>
		<reference ref_id="1115841" ref_url="https://bugzilla.suse.com/1115841" source="BUGZILLA"/>
		<reference ref_id="1115842" ref_url="https://bugzilla.suse.com/1115842" source="BUGZILLA"/>
		<reference ref_id="1115843" ref_url="https://bugzilla.suse.com/1115843" source="BUGZILLA"/>
		<reference ref_id="1115844" ref_url="https://bugzilla.suse.com/1115844" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1117796" ref_url="https://bugzilla.suse.com/1117796" source="BUGZILLA"/>
		<reference ref_id="1117802" ref_url="https://bugzilla.suse.com/1117802" source="BUGZILLA"/>
		<reference ref_id="1117805" ref_url="https://bugzilla.suse.com/1117805" source="BUGZILLA"/>
		<reference ref_id="1117806" ref_url="https://bugzilla.suse.com/1117806" source="BUGZILLA"/>
		<reference ref_id="1117943" ref_url="https://bugzilla.suse.com/1117943" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1118760" ref_url="https://bugzilla.suse.com/1118760" source="BUGZILLA"/>
		<reference ref_id="1119255" ref_url="https://bugzilla.suse.com/1119255" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1120056" ref_url="https://bugzilla.suse.com/1120056" source="BUGZILLA"/>
		<reference ref_id="1120077" ref_url="https://bugzilla.suse.com/1120077" source="BUGZILLA"/>
		<reference ref_id="1120086" ref_url="https://bugzilla.suse.com/1120086" source="BUGZILLA"/>
		<reference ref_id="1120093" ref_url="https://bugzilla.suse.com/1120093" source="BUGZILLA"/>
		<reference ref_id="1120094" ref_url="https://bugzilla.suse.com/1120094" source="BUGZILLA"/>
		<reference ref_id="1120105" ref_url="https://bugzilla.suse.com/1120105" source="BUGZILLA"/>
		<reference ref_id="1120107" ref_url="https://bugzilla.suse.com/1120107" source="BUGZILLA"/>
		<reference ref_id="1120109" ref_url="https://bugzilla.suse.com/1120109" source="BUGZILLA"/>
		<reference ref_id="1120217" ref_url="https://bugzilla.suse.com/1120217" source="BUGZILLA"/>
		<reference ref_id="1120223" ref_url="https://bugzilla.suse.com/1120223" source="BUGZILLA"/>
		<reference ref_id="1120226" ref_url="https://bugzilla.suse.com/1120226" source="BUGZILLA"/>
		<reference ref_id="1120336" ref_url="https://bugzilla.suse.com/1120336" source="BUGZILLA"/>
		<reference ref_id="1120347" ref_url="https://bugzilla.suse.com/1120347" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120950" ref_url="https://bugzilla.suse.com/1120950" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1121997" ref_url="https://bugzilla.suse.com/1121997" source="BUGZILLA"/>
		<reference ref_id="1122874" ref_url="https://bugzilla.suse.com/1122874" source="BUGZILLA"/>
		<reference ref_id="1123505" ref_url="https://bugzilla.suse.com/1123505" source="BUGZILLA"/>
		<reference ref_id="1123702" ref_url="https://bugzilla.suse.com/1123702" source="BUGZILLA"/>
		<reference ref_id="1123706" ref_url="https://bugzilla.suse.com/1123706" source="BUGZILLA"/>
		<reference ref_id="1124010" ref_url="https://bugzilla.suse.com/1124010" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125931" ref_url="https://bugzilla.suse.com/1125931" source="BUGZILLA"/>
		<reference ref_id="931850" ref_url="https://bugzilla.suse.com/931850" source="BUGZILLA"/>
		<reference ref_id="969471" ref_url="https://bugzilla.suse.com/969471" source="BUGZILLA"/>
		<reference ref_id="969473" ref_url="https://bugzilla.suse.com/969473" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741/" source="CVE"/>
		<reference ref_id="CVE-2017-18360" ref_url="https://www.suse.com/security/cve/CVE-2017-18360/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-18360: In change_port_settings in drivers/usb/serial/io_ti.c local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates (bnc#1123706).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2019-7222: A information leak in exception handling in KVM could be used to expose host memory to guests. (bnc#1124735).

The following non-security bugs were fixed:

- aacraid: Fix memory leak in aac_fib_map_free (bsc#1115827).
- arcmsr: upper 32 of dma address lost (bsc#1115828).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (bsc#1121997).
- block/swim: Fix array bounds check (Git-fix).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- dasd: fix deadlock in dasd_times_out (bnc#1117943, LTC#174111).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106886)
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106886)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106886)
- Fix kabi break cased by NFS: Cache state owners after files are closed (bsc#1031572).
- fork: record start_time late (bsc#1121872).
- fscache: Fix dead object requeue (bsc#1107371).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub &amp; read (git-fixes).
- fs-cache: Move fscache_report_unexpected_submission() to make it more available (bsc#1107371).
- fs-cache: When submitting an op, cancel it if the target object is dying (bsc#1107371).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (git-fixes).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: Fix oops at process_init_reply() (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: umount should wait for all requests (git-fixes).
- igb: do not unmap NULL hw_addr (bsc#969471 bsc#969473 ) (bsc#1123702).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382) (bsc#1123702).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- kvm: x86: Fix the duplicated failure path handling in vmx_init (bsc#1104367).
- lib: add 'on'/'off' support to strtobool (bsc#1125931).
- megaraid_sas: Fix probing cards without io port (bsc#1115829).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114440, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114440, LTC#172679).
- nfs: Cache state owners after files are closed (bsc#1031572).
- nfs: Do not drop CB requests with invalid principals (git-fixes).
- nfsv4.1: Fix a kfree() of uninitialised pointers in decode_cb_sequence_args (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- nfsv4: Keep dropped state owners on the LRU list for a while (bsc#1031572).
- nlm: Ensure callback code also checks that the files match (git-fixes).
- ocfs2: fix three small problems in the patch (bsc#1086695)
- omap2fb: Fix stack memory disclosure (bsc#1106886)
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- powerpc/fadump: handle crash memory ranges array index overflow (git-fixes).
- powerpc/fadump: Return error when fadump registration fails (git-fixes).
- powerpc/fadump: Unregister fadump on kexec down path (git-fixes).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- Revert 'NFS: Make close(2) asynchronous when closing NFS O_DIRECT files' (git-fixes).
- ring-buffer: Always reset iterator to reader page (bsc#1120107).
- ring-buffer: Fix first commit on sub-buffer having non-zero delta (bsc#1120077).
- ring-buffer: Fix infinite spin in reading buffer (bsc#1120107).
- ring-buffer: Have ring_buffer_iter_empty() return true when empty (bsc#1120107).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- ring-buffer: Up rb_iter_peek() loop count to 3 (bsc#1120105).
- rpm/modprobe-xen.conf: Add --ignore-install.
- s390: always save and restore all registers on context switch (git-fixes).
- s390/dasd: fix using offset into zero size array error (git-fixes).
- s390/decompressor: fix initrd corruption caused by bss clear (git-fixes).
- s390/qdio: do not release memory in qdio_setup_irq() (git-fixes).
- s390/qdio: reset old sbal_state flags (bnc#1114440, LTC#171525).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114440, LTC#172682).
- s390/qeth: fix length check in SNMP processing (bnc#1117943, LTC#173657).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114440, LTC#172682).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/qeth: remove outdated portname debug msg (bnc#1117943, LTC#172960).
- s390/qeth: sanitize strings in debug messages (bnc#1117943, LTC#172960).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: aacraid: Fix typo in blink status (bsc#1115830).
- scsi: aacraid: Reorder Adapter status check (bsc#1115830).
- scsi: aic94xx: fix an error code in aic94xx_init() (bsc#1115831).
- scsi: bfa: integer overflow in debugfs (bsc#1115832).
- scsi: esp_scsi: Track residual for PIO transfers (bsc#1115833).
- scsi: fas216: fix sense buffer initialization (bsc#1115834).
- scsi: libfc: Revert ' libfc: use offload EM instance again instead jumping to next EM' (bsc#1115835).
- scsi: libsas: fix ata xfer length (bsc#1115836).
- scsi: libsas: fix error when getting phy events (bsc#1115837).
- scsi: lpfc: Do not return internal MBXERR_ERROR code from probe function (bsc#1115838).
- scsi: megaraid_sas: Fix data integrity failure for JBOD (passthrough) devices (bsc#1115839).
- scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression (bsc#1115839).
- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1115840).
- scsi: qla2xxx: shutdown chip if reset fail (bsc#1115841).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1115842).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bsc#1115843).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (git-fixes).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1123505, LTC#174581).
- sg: fix dxferp in from_to case (bsc#1115844).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- svc: Avoid garbage replies when pc_func() returns rpc_drop_reply (git-fixes).
- svcrpc: do not leak contexts on PROC_DESTROY (git-fixes).
- tracepoints: Do not trace when cpu is offline (bsc#1120109).
- tracing: Add #undef to fix compile error (bsc#1120226).
- tracing: Allow events to have NULL strings (bsc#1120056).
- tracing: Do not add event files for modules that fail tracepoints (bsc#1120086).
- tracing: Fix check for cpu online when event is disabled (bsc#1120109).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing/kprobes: Allow to create probe with a module name starting with a digit (bsc#1120336).
- tracing: Move mutex to protect against resetting of seq data (bsc#1120217).
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1120347).
- usb: keyspan: fix overrun-error reporting (bsc#1114672).
- usb: keyspan: fix tty line-status reporting (bsc#1114672).
- usb: option: fix Cinterion AHxx enumeration (bsc#1114672).
- usb: serial: ark3116: fix open error handling (bsc#1114672).
- usb: serial: ch341: fix control-message error handling (bsc#1114672).
- usb: serial: ch341: fix initial modem-control state (bsc#1114672).
- usb: serial: ch341: fix modem-status handling (bsc#1114672).
- usb: serial: ch341: fix open and resume after B0 (bsc#1114672).
- usb: serial: ch341: fix resume after reset (bsc#1114672).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1114672).
- usb: serial: cyberjack: fix NULL-deref at open (bsc#1114672).
- usb: serial: fix tty-device error handling at probe (bsc#1114672).
- usb: serial: ftdi_sio: fix modem-status error handling (bsc#1114672).
- usb: serial: io_ti: fix another NULL-deref at open (bsc#1114672).
- usb: serial: io_ti: fix NULL-deref at open (bsc#1114672).
- usb: serial: keyspan_pda: verify endpoints at probe (bsc#1114672).
- usb: serial: kl5kusb105: abort on open exception path (bsc#1114672).
- usb: serial: kl5kusb105: fix open error path (bsc#1114672).
- usb: serial: kobil_sct: fix NULL-deref in write (bsc#1114672).
- usb: serial: mct_u232: fix modem-status error handling (bsc#1114672).
- usb: serial: omninet: fix NULL-derefs at open and disconnect.
- usb: serial: pl2303: fix NULL-deref at open (bsc#1114672).
- usb: serial: ti_usb_3410_5052: fix NULL-deref at open (bsc#1114672).
- vmcore: Remove 'weak' from function declarations (git-fixes).
- x86, kvm: Remove incorrect redundant assembly constraint (bnc#931850).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081, bnc#1104684).
- xen: kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen: x86, l1tf: Protect PROT_NONE PTEs against speculation fixup (bnc#1104684, bnc#1104818).
- xen/x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y (bsc#1106105).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/process: Re-export start_thread() (bsc#1110006).
- xen/x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- xen/x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bnc#1087081).
- xen/x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- xen/x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix the logspace waiting algorithm (bsc#1122874).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031572">SUSE bug 1031572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086695">SUSE bug 1086695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098658">SUSE bug 1098658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104098">SUSE bug 1104098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104367">SUSE bug 1104367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104684">SUSE bug 1104684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104818">SUSE bug 1104818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106105">SUSE bug 1106105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112963">SUSE bug 1112963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113667">SUSE bug 1113667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114440">SUSE bug 1114440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114672">SUSE bug 1114672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115007">SUSE bug 1115007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115038">SUSE bug 1115038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115827">SUSE bug 1115827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115828">SUSE bug 1115828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115829">SUSE bug 1115829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115830">SUSE bug 1115830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115831">SUSE bug 1115831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115832">SUSE bug 1115832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115833">SUSE bug 1115833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115834">SUSE bug 1115834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115835">SUSE bug 1115835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115836">SUSE bug 1115836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115837">SUSE bug 1115837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115838">SUSE bug 1115838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115839">SUSE bug 1115839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115840">SUSE bug 1115840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115841">SUSE bug 1115841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115842">SUSE bug 1115842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115843">SUSE bug 1115843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115844">SUSE bug 1115844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117796">SUSE bug 1117796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117802">SUSE bug 1117802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117805">SUSE bug 1117805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117806">SUSE bug 1117806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117943">SUSE bug 1117943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118760">SUSE bug 1118760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119255">SUSE bug 1119255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120056">SUSE bug 1120056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120077">SUSE bug 1120077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120086">SUSE bug 1120086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120093">SUSE bug 1120093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120094">SUSE bug 1120094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120105">SUSE bug 1120105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120107">SUSE bug 1120107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120109">SUSE bug 1120109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120217">SUSE bug 1120217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120223">SUSE bug 1120223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120226">SUSE bug 1120226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120336">SUSE bug 1120336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120347">SUSE bug 1120347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120950">SUSE bug 1120950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121997">SUSE bug 1121997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122874">SUSE bug 1122874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123505">SUSE bug 1123505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123702">SUSE bug 1123702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123706">SUSE bug 1123706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125931">SUSE bug 1125931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931850">SUSE bug 931850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969471">SUSE bug 969471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969473">SUSE bug 969473</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18360/">CVE-2017-18360</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583324" comment="kernel-bigmem-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583325" comment="kernel-bigmem-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583326" comment="kernel-bigmem-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583327" comment="kernel-default-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583328" comment="kernel-default-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583329" comment="kernel-default-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583330" comment="kernel-default-man-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583331" comment="kernel-ec2-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583332" comment="kernel-ec2-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583333" comment="kernel-ec2-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583334" comment="kernel-pae-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583335" comment="kernel-pae-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583336" comment="kernel-pae-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583337" comment="kernel-ppc64-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583338" comment="kernel-ppc64-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583339" comment="kernel-ppc64-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583340" comment="kernel-source-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583341" comment="kernel-syms-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583342" comment="kernel-trace-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583343" comment="kernel-trace-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583344" comment="kernel-trace-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583345" comment="kernel-xen-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583346" comment="kernel-xen-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583347" comment="kernel-xen-devel-3.0.101-108.87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583324" comment="kernel-bigmem-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583325" comment="kernel-bigmem-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583326" comment="kernel-bigmem-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583327" comment="kernel-default-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583328" comment="kernel-default-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583329" comment="kernel-default-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583330" comment="kernel-default-man-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583331" comment="kernel-ec2-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583332" comment="kernel-ec2-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583333" comment="kernel-ec2-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583334" comment="kernel-pae-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583335" comment="kernel-pae-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583336" comment="kernel-pae-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583337" comment="kernel-ppc64-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583338" comment="kernel-ppc64-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583339" comment="kernel-ppc64-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583340" comment="kernel-source-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583341" comment="kernel-syms-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583342" comment="kernel-trace-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583343" comment="kernel-trace-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583344" comment="kernel-trace-devel-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583345" comment="kernel-xen-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583346" comment="kernel-xen-base-3.0.101-108.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583347" comment="kernel-xen-devel-3.0.101-108.87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41589" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1106886" ref_url="https://bugzilla.suse.com/1106886" source="BUGZILLA"/>
		<reference ref_id="1110436" ref_url="https://bugzilla.suse.com/1110436" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1117515" ref_url="https://bugzilla.suse.com/1117515" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1127082" ref_url="https://bugzilla.suse.com/1127082" source="BUGZILLA"/>
		<reference ref_id="1127376" ref_url="https://bugzilla.suse.com/1127376" source="BUGZILLA"/>
		<reference ref_id="1127445" ref_url="https://bugzilla.suse.com/1127445" source="BUGZILLA"/>
		<reference ref_id="1127534" ref_url="https://bugzilla.suse.com/1127534" source="BUGZILLA"/>
		<reference ref_id="1127738" ref_url="https://bugzilla.suse.com/1127738" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1128383" ref_url="https://bugzilla.suse.com/1128383" source="BUGZILLA"/>
		<reference ref_id="1129248" ref_url="https://bugzilla.suse.com/1129248" source="BUGZILLA"/>
		<reference ref_id="1129437" ref_url="https://bugzilla.suse.com/1129437" source="BUGZILLA"/>
		<reference ref_id="1129439" ref_url="https://bugzilla.suse.com/1129439" source="BUGZILLA"/>
		<reference ref_id="1129770" ref_url="https://bugzilla.suse.com/1129770" source="BUGZILLA"/>
		<reference ref_id="1130353" ref_url="https://bugzilla.suse.com/1130353" source="BUGZILLA"/>
		<reference ref_id="1130384" ref_url="https://bugzilla.suse.com/1130384" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1132589" ref_url="https://bugzilla.suse.com/1132589" source="BUGZILLA"/>
		<reference ref_id="773383" ref_url="https://bugzilla.suse.com/773383" source="BUGZILLA"/>
		<reference ref_id="774523" ref_url="https://bugzilla.suse.com/774523" source="BUGZILLA"/>
		<reference ref_id="797175" ref_url="https://bugzilla.suse.com/797175" source="BUGZILLA"/>
		<reference ref_id="800280" ref_url="https://bugzilla.suse.com/800280" source="BUGZILLA"/>
		<reference ref_id="801178" ref_url="https://bugzilla.suse.com/801178" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412/" source="CVE"/>
		<reference ref_id="CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2019-9213: The expand_downwards function in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2013-0216: The Xen netback functionality allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption (bnc#800280).
- CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen allowed guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. (bnc#801178).
- CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c did not initialize a certain structure member, which allowed local users to obtain potentially sensitive information from kernel stack memory via a recvfrom or recvmsg system call on an RDS socket (bnc#773383).
- CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver allowed remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value (bnc#774523).
- CVE-2013-0160: The kernel allowed local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device (bnc#797175).
- CVE-2013-1979: The scm_set_cred function in include/net/scm.h uses incorrect uid and gid values during credentials passing, which allowed local users to gain privileges via a crafted application (bnc#816708).

The following non-security bugs were fixed:

- Add opcodes from net: filter: BPF 'JIT' compiler for PPC64 (bsc#1131107).
- EHCI: improved logic for isochronous scheduling (bsc#1117515).
- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129439).
- USB: Add new USB LPM helpers (bsc#1129770).
- USB: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).
- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
- USB: EHCI: add symbolic constants for QHs (bsc#1117515).
- USB: EHCI: always scan each interrupt QH (bsc#1117515).
- USB: EHCI: do not lose events during a scan (bsc#1117515).
- USB: EHCI: do not refcount QHs (bsc#1117515).
- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).
- USB: EHCI: fix up locking (bsc#1117515).
- USB: EHCI: initialize data before resetting hardware (bsc#1117515).
- USB: EHCI: introduce high-res timer (bsc#1117515).
- USB: EHCI: remove PS3 status polling (bsc#1117515).
- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
- USB: EHCI: rename 'reclaim' (bsc#1117515).
- USB: EHCI: resolve some unlikely races (bsc#1117515).
- USB: EHCI: return void instead of 0 (bsc#1117515).
- USB: EHCI: simplify isochronous scanning (bsc#1117515).
- USB: EHCI: unlink multiple async QHs together (bsc#1117515).
- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
- USB: EHCI: use hrtimer for async schedule (bsc#1117515).
- USB: EHCI: use hrtimer for controller death (bsc#1117515).
- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106886)
- ext3: Set bitmap tails when growing filesystem (bsc#1128383).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106886)
- iommu/vt-d: Check capability before disabling protected memory (bsc#1130353).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129248).
- kernel/watchdog.c: control hard lockup detection default (bsc#1110436).
- kvm: ensure hard lockup detection is disabled by default (bsc#1110436).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129437).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/mmap)).
- mpt2sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bsc#1130384).
- nfsd: fix memory corruption caused by readdir (bsc#1127445).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/qeth: cancel close_dev work before removing a card (LTC#175048, bsc#1127376).
- s390/qeth: fix use-after-free in error path (LTC#175048, bsc#1127376, bsc#1127534).
- s390/qeth: handle failure on workqueue creation (LTC#175048, bsc#1127376).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1111331).
- sched/smt: Make sched_smt_present track topology (bsc#1111331).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: qla2xxx: do not disable a not previously enabled PCI device (bsc#1127738).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106886">SUSE bug 1106886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110436">SUSE bug 1110436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117515">SUSE bug 1117515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127082">SUSE bug 1127082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127376">SUSE bug 1127376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127445">SUSE bug 1127445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127534">SUSE bug 1127534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127738">SUSE bug 1127738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128383">SUSE bug 1128383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129248">SUSE bug 1129248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129437">SUSE bug 1129437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129439">SUSE bug 1129439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129770">SUSE bug 1129770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130353">SUSE bug 1130353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130384">SUSE bug 1130384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132589">SUSE bug 1132589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583348" comment="kernel-bigmem-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583349" comment="kernel-bigmem-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583350" comment="kernel-bigmem-devel-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583351" comment="kernel-default-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583352" comment="kernel-default-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583353" comment="kernel-default-devel-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583354" comment="kernel-default-man-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583355" comment="kernel-ec2-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583356" comment="kernel-ec2-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583357" comment="kernel-ec2-devel-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583358" comment="kernel-pae-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583359" comment="kernel-pae-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583360" comment="kernel-pae-devel-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583361" comment="kernel-ppc64-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583362" comment="kernel-ppc64-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583363" comment="kernel-ppc64-devel-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583364" comment="kernel-source-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583365" comment="kernel-syms-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583366" comment="kernel-trace-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583367" comment="kernel-trace-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583368" comment="kernel-trace-devel-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583369" comment="kernel-xen-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583370" comment="kernel-xen-base-3.0.101-108.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583371" comment="kernel-xen-devel-3.0.101-108.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41590" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003809.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files for ethernet flow control vulnerability in SRIOV devices (bsc#1077355)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583372" comment="kernel-firmware-20110923-0.59.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583372" comment="kernel-firmware-20110923-0.59.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41591" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="921081" ref_url="https://bugzilla.suse.com/921081" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="930835" ref_url="https://bugzilla.suse.com/930835" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944677" ref_url="https://bugzilla.suse.com/944677" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946214" ref_url="https://bugzilla.suse.com/946214" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="950298" ref_url="https://bugzilla.suse.com/950298" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953799" ref_url="https://bugzilla.suse.com/953799" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="954950" ref_url="https://bugzilla.suse.com/954950" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921081">SUSE bug 921081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930835">SUSE bug 930835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944677">SUSE bug 944677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946214">SUSE bug 946214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950298">SUSE bug 950298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953799">SUSE bug 953799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954950">SUSE bug 954950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583373" comment="kernel-default-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583374" comment="kernel-default-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583375" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583376" comment="kernel-default-man-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583377" comment="kernel-ec2-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583378" comment="kernel-ec2-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583379" comment="kernel-ec2-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583380" comment="kernel-ppc64-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583381" comment="kernel-ppc64-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583382" comment="kernel-ppc64-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583383" comment="kernel-source-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583384" comment="kernel-syms-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583385" comment="kernel-trace-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583386" comment="kernel-trace-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583387" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583373" comment="kernel-default-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583374" comment="kernel-default-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583375" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583376" comment="kernel-default-man-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583377" comment="kernel-ec2-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583378" comment="kernel-ec2-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583379" comment="kernel-ec2-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583380" comment="kernel-ppc64-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583381" comment="kernel-ppc64-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583382" comment="kernel-ppc64-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583383" comment="kernel-source-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583384" comment="kernel-syms-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583385" comment="kernel-trace-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583386" comment="kernel-trace-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583387" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41592" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="676471" ref_url="https://bugzilla.suse.com/676471" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="898592" ref_url="https://bugzilla.suse.com/898592" source="BUGZILLA"/>
		<reference ref_id="936530" ref_url="https://bugzilla.suse.com/936530" source="BUGZILLA"/>
		<reference ref_id="940413" ref_url="https://bugzilla.suse.com/940413" source="BUGZILLA"/>
		<reference ref_id="944309" ref_url="https://bugzilla.suse.com/944309" source="BUGZILLA"/>
		<reference ref_id="946122" ref_url="https://bugzilla.suse.com/946122" source="BUGZILLA"/>
		<reference ref_id="949752" ref_url="https://bugzilla.suse.com/949752" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="956491" ref_url="https://bugzilla.suse.com/956491" source="BUGZILLA"/>
		<reference ref_id="956852" ref_url="https://bugzilla.suse.com/956852" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="959381" ref_url="https://bugzilla.suse.com/959381" source="BUGZILLA"/>
		<reference ref_id="960458" ref_url="https://bugzilla.suse.com/960458" source="BUGZILLA"/>
		<reference ref_id="960857" ref_url="https://bugzilla.suse.com/960857" source="BUGZILLA"/>
		<reference ref_id="961512" ref_url="https://bugzilla.suse.com/961512" source="BUGZILLA"/>
		<reference ref_id="961518" ref_url="https://bugzilla.suse.com/961518" source="BUGZILLA"/>
		<reference ref_id="963762" ref_url="https://bugzilla.suse.com/963762" source="BUGZILLA"/>
		<reference ref_id="963998" ref_url="https://bugzilla.suse.com/963998" source="BUGZILLA"/>
		<reference ref_id="965319" ref_url="https://bugzilla.suse.com/965319" source="BUGZILLA"/>
		<reference ref_id="965860" ref_url="https://bugzilla.suse.com/965860" source="BUGZILLA"/>
		<reference ref_id="965923" ref_url="https://bugzilla.suse.com/965923" source="BUGZILLA"/>
		<reference ref_id="966245" ref_url="https://bugzilla.suse.com/966245" source="BUGZILLA"/>
		<reference ref_id="967863" ref_url="https://bugzilla.suse.com/967863" source="BUGZILLA"/>
		<reference ref_id="967914" ref_url="https://bugzilla.suse.com/967914" source="BUGZILLA"/>
		<reference ref_id="968010" ref_url="https://bugzilla.suse.com/968010" source="BUGZILLA"/>
		<reference ref_id="968018" ref_url="https://bugzilla.suse.com/968018" source="BUGZILLA"/>
		<reference ref_id="968141" ref_url="https://bugzilla.suse.com/968141" source="BUGZILLA"/>
		<reference ref_id="968500" ref_url="https://bugzilla.suse.com/968500" source="BUGZILLA"/>
		<reference ref_id="968566" ref_url="https://bugzilla.suse.com/968566" source="BUGZILLA"/>
		<reference ref_id="968670" ref_url="https://bugzilla.suse.com/968670" source="BUGZILLA"/>
		<reference ref_id="968687" ref_url="https://bugzilla.suse.com/968687" source="BUGZILLA"/>
		<reference ref_id="969149" ref_url="https://bugzilla.suse.com/969149" source="BUGZILLA"/>
		<reference ref_id="969391" ref_url="https://bugzilla.suse.com/969391" source="BUGZILLA"/>
		<reference ref_id="969571" ref_url="https://bugzilla.suse.com/969571" source="BUGZILLA"/>
		<reference ref_id="970114" ref_url="https://bugzilla.suse.com/970114" source="BUGZILLA"/>
		<reference ref_id="970504" ref_url="https://bugzilla.suse.com/970504" source="BUGZILLA"/>
		<reference ref_id="970892" ref_url="https://bugzilla.suse.com/970892" source="BUGZILLA"/>
		<reference ref_id="970909" ref_url="https://bugzilla.suse.com/970909" source="BUGZILLA"/>
		<reference ref_id="970911" ref_url="https://bugzilla.suse.com/970911" source="BUGZILLA"/>
		<reference ref_id="970948" ref_url="https://bugzilla.suse.com/970948" source="BUGZILLA"/>
		<reference ref_id="970956" ref_url="https://bugzilla.suse.com/970956" source="BUGZILLA"/>
		<reference ref_id="970958" ref_url="https://bugzilla.suse.com/970958" source="BUGZILLA"/>
		<reference ref_id="970970" ref_url="https://bugzilla.suse.com/970970" source="BUGZILLA"/>
		<reference ref_id="971124" ref_url="https://bugzilla.suse.com/971124" source="BUGZILLA"/>
		<reference ref_id="971125" ref_url="https://bugzilla.suse.com/971125" source="BUGZILLA"/>
		<reference ref_id="971126" ref_url="https://bugzilla.suse.com/971126" source="BUGZILLA"/>
		<reference ref_id="971360" ref_url="https://bugzilla.suse.com/971360" source="BUGZILLA"/>
		<reference ref_id="971433" ref_url="https://bugzilla.suse.com/971433" source="BUGZILLA"/>
		<reference ref_id="971446" ref_url="https://bugzilla.suse.com/971446" source="BUGZILLA"/>
		<reference ref_id="971729" ref_url="https://bugzilla.suse.com/971729" source="BUGZILLA"/>
		<reference ref_id="971944" ref_url="https://bugzilla.suse.com/971944" source="BUGZILLA"/>
		<reference ref_id="971947" ref_url="https://bugzilla.suse.com/971947" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="972363" ref_url="https://bugzilla.suse.com/972363" source="BUGZILLA"/>
		<reference ref_id="973237" ref_url="https://bugzilla.suse.com/973237" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="973556" ref_url="https://bugzilla.suse.com/973556" source="BUGZILLA"/>
		<reference ref_id="973570" ref_url="https://bugzilla.suse.com/973570" source="BUGZILLA"/>
		<reference ref_id="974646" ref_url="https://bugzilla.suse.com/974646" source="BUGZILLA"/>
		<reference ref_id="974787" ref_url="https://bugzilla.suse.com/974787" source="BUGZILLA"/>
		<reference ref_id="975358" ref_url="https://bugzilla.suse.com/975358" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="975945" ref_url="https://bugzilla.suse.com/975945" source="BUGZILLA"/>
		<reference ref_id="976739" ref_url="https://bugzilla.suse.com/976739" source="BUGZILLA"/>
		<reference ref_id="976868" ref_url="https://bugzilla.suse.com/976868" source="BUGZILLA"/>
		<reference ref_id="978401" ref_url="https://bugzilla.suse.com/978401" source="BUGZILLA"/>
		<reference ref_id="978821" ref_url="https://bugzilla.suse.com/978821" source="BUGZILLA"/>
		<reference ref_id="978822" ref_url="https://bugzilla.suse.com/978822" source="BUGZILLA"/>
		<reference ref_id="979213" ref_url="https://bugzilla.suse.com/979213" source="BUGZILLA"/>
		<reference ref_id="979274" ref_url="https://bugzilla.suse.com/979274" source="BUGZILLA"/>
		<reference ref_id="979347" ref_url="https://bugzilla.suse.com/979347" source="BUGZILLA"/>
		<reference ref_id="979419" ref_url="https://bugzilla.suse.com/979419" source="BUGZILLA"/>
		<reference ref_id="979548" ref_url="https://bugzilla.suse.com/979548" source="BUGZILLA"/>
		<reference ref_id="979595" ref_url="https://bugzilla.suse.com/979595" source="BUGZILLA"/>
		<reference ref_id="979867" ref_url="https://bugzilla.suse.com/979867" source="BUGZILLA"/>
		<reference ref_id="979879" ref_url="https://bugzilla.suse.com/979879" source="BUGZILLA"/>
		<reference ref_id="980371" ref_url="https://bugzilla.suse.com/980371" source="BUGZILLA"/>
		<reference ref_id="980725" ref_url="https://bugzilla.suse.com/980725" source="BUGZILLA"/>
		<reference ref_id="980788" ref_url="https://bugzilla.suse.com/980788" source="BUGZILLA"/>
		<reference ref_id="980931" ref_url="https://bugzilla.suse.com/980931" source="BUGZILLA"/>
		<reference ref_id="981231" ref_url="https://bugzilla.suse.com/981231" source="BUGZILLA"/>
		<reference ref_id="981267" ref_url="https://bugzilla.suse.com/981267" source="BUGZILLA"/>
		<reference ref_id="982532" ref_url="https://bugzilla.suse.com/982532" source="BUGZILLA"/>
		<reference ref_id="982691" ref_url="https://bugzilla.suse.com/982691" source="BUGZILLA"/>
		<reference ref_id="983143" ref_url="https://bugzilla.suse.com/983143" source="BUGZILLA"/>
		<reference ref_id="983213" ref_url="https://bugzilla.suse.com/983213" source="BUGZILLA"/>
		<reference ref_id="984107" ref_url="https://bugzilla.suse.com/984107" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566/" source="CVE"/>
		<reference ref_id="CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4580" ref_url="https://www.suse.com/security/cve/CVE-2016-4580/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable changes in this kernel:
- It is now possible to mount a NFS export on the exporting host directly.

The following security bugs were fixed:
- CVE-2016-5244: A kernel information leak in rds_inc_info_copy was fixed that could leak kernel stack memory to userspace (bsc#983213).
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacked a bulk-out endpoint (bnc#961512).

The following non-security bugs were fixed:
- acpi / PCI: Account for ARI in _PRT lookups (bsc#968566).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- alsa: hrtimer: Handle start/stop more properly (bsc#973378).
- alsa: oxygen: add Xonar DGX support (bsc#982691).
- alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018).
- alsa: rawmidi: Fix race at copying and updating the position (bsc#968018).
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix double port list deletion (bsc#968018).
- alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).
- alsa: seq: Fix race at closing in virmidi driver (bsc#968018).
- alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018).
- alsa: timer: Call notifier in the same spinlock (bsc#973378).
- alsa: timer: Code cleanup (bsc#968018).
- alsa: timer: Fix leftover link at closing (bsc#968018).
- alsa: timer: Fix link corruption due to double start or stop (bsc#968018).
- alsa: timer: Fix race between stop and interrupt (bsc#968018).
- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
- alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- alsa: timer: Sync timer deletion at closing the system timer (bsc#973378).
- alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- enic: set netdev-&gt;vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- hid-elo: kill not flush the work (bnc#982532).
- hpsa: fix issues with multilun devices (bsc#959381).
- hv: Assign correct -&gt;can_queue value in hv_storvsc (bnc#969391)
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- Import kabi files from kernel 3.0.101-71
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- ipvs: count pre-established TCP states as active (bsc#970114).
- isofs: Revert 'get_rock_ridge_filename(): handle malformed NM entries' This reverts commit cb6ce3ec7a964e56da9ba9cd3c9f0e708b5c3b2c. It should have never landed in the tree (we already have the patch via c63531c60ff that came through CVE branch), but I messed up the merge.
- kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- llist: Add llist_next().
- make vfree() safe to call from interrupt contexts .
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433).
- net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433).
- net/core: __hw_addr_sync_one / _multiple broken (bsc#971433).
- net/core: __hw_addr_unsync_one 'from' address not marked synced (bsc#971433).
- NFS4: treat lock owners as opaque values (bnc#968141).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFSd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237).
- NFSd: do not fail unchecked creates of non-special files (bsc#973237).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFS: use smaller allocations for 'struct idmap' (bsc#965923).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nvme: fix max_segments integer truncation (bsc#676471).
- NVMe: Unify controller probe and resume (bsc#979347).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- PCI: Move pci_ari_enabled() to global header (bsc#968566).
- RDMA/ucma: Fix AB-BA deadlock (bsc#963998).
- Restore kabi after lock-owner change (bnc#968141).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci_dma: fix DMA table corruption with &gt; 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- SCSI mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- Tidy series.conf, p5 Only one last patch which can be moved easily. There are some more x86-related things left at the end but moving them won't be that trivial.
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- vmxnet3: set carrier state properly on probe (bsc#972363).
- vmxnet3: set netdev parant device before calling netdev_info (bsc#972363).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- xfrm: do not segment UFO packets (bsc#946122).
- xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-24"/>
	<updated date="2016-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/676471">SUSE bug 676471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898592">SUSE bug 898592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936530">SUSE bug 936530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940413">SUSE bug 940413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944309">SUSE bug 944309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946122">SUSE bug 946122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949752">SUSE bug 949752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956491">SUSE bug 956491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956852">SUSE bug 956852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959381">SUSE bug 959381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960458">SUSE bug 960458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960857">SUSE bug 960857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961518">SUSE bug 961518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963998">SUSE bug 963998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965319">SUSE bug 965319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965860">SUSE bug 965860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965923">SUSE bug 965923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966245">SUSE bug 966245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967863">SUSE bug 967863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967914">SUSE bug 967914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968018">SUSE bug 968018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968141">SUSE bug 968141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968500">SUSE bug 968500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968566">SUSE bug 968566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968687">SUSE bug 968687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969149">SUSE bug 969149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969391">SUSE bug 969391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969571">SUSE bug 969571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970114">SUSE bug 970114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971433">SUSE bug 971433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971446">SUSE bug 971446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971729">SUSE bug 971729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971947">SUSE bug 971947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972363">SUSE bug 972363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973237">SUSE bug 973237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973556">SUSE bug 973556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973570">SUSE bug 973570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974787">SUSE bug 974787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975358">SUSE bug 975358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975945">SUSE bug 975945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976739">SUSE bug 976739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976868">SUSE bug 976868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979274">SUSE bug 979274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979347">SUSE bug 979347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979419">SUSE bug 979419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979595">SUSE bug 979595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980788">SUSE bug 980788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980931">SUSE bug 980931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981231">SUSE bug 981231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981267">SUSE bug 981267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982532">SUSE bug 982532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982691">SUSE bug 982691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984107">SUSE bug 984107</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4580/">CVE-2016-4580</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583388" comment="kernel-default-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583389" comment="kernel-default-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583390" comment="kernel-default-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583391" comment="kernel-default-man-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583392" comment="kernel-ec2-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583393" comment="kernel-ec2-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583394" comment="kernel-ec2-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583395" comment="kernel-pae-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583396" comment="kernel-pae-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583397" comment="kernel-pae-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583398" comment="kernel-ppc64-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583399" comment="kernel-ppc64-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583400" comment="kernel-ppc64-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583401" comment="kernel-source-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583402" comment="kernel-syms-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583403" comment="kernel-trace-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583404" comment="kernel-trace-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583405" comment="kernel-trace-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583406" comment="kernel-xen-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583407" comment="kernel-xen-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583408" comment="kernel-xen-devel-3.0.101-77.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583388" comment="kernel-default-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583389" comment="kernel-default-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583390" comment="kernel-default-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583391" comment="kernel-default-man-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583392" comment="kernel-ec2-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583393" comment="kernel-ec2-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583394" comment="kernel-ec2-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583395" comment="kernel-pae-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583396" comment="kernel-pae-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583397" comment="kernel-pae-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583398" comment="kernel-ppc64-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583399" comment="kernel-ppc64-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583400" comment="kernel-ppc64-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583401" comment="kernel-source-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583402" comment="kernel-syms-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583403" comment="kernel-trace-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583404" comment="kernel-trace-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583405" comment="kernel-trace-devel-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583406" comment="kernel-xen-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583407" comment="kernel-xen-base-3.0.101-77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583408" comment="kernel-xen-devel-3.0.101-77.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41593" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004418" ref_url="https://bugzilla.suse.com/1004418" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.

This security bug was fixed:

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-21"/>
	<updated date="2016-10-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583409" comment="kernel-default-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583410" comment="kernel-default-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583411" comment="kernel-default-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583412" comment="kernel-default-man-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583413" comment="kernel-ec2-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583414" comment="kernel-ec2-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583415" comment="kernel-ec2-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583416" comment="kernel-pae-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583417" comment="kernel-pae-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583418" comment="kernel-pae-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583419" comment="kernel-ppc64-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583420" comment="kernel-ppc64-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583421" comment="kernel-ppc64-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583422" comment="kernel-source-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583423" comment="kernel-syms-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583424" comment="kernel-trace-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583425" comment="kernel-trace-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583426" comment="kernel-trace-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583427" comment="kernel-xen-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583428" comment="kernel-xen-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583429" comment="kernel-xen-devel-3.0.101-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583409" comment="kernel-default-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583410" comment="kernel-default-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583411" comment="kernel-default-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583412" comment="kernel-default-man-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583413" comment="kernel-ec2-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583414" comment="kernel-ec2-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583415" comment="kernel-ec2-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583416" comment="kernel-pae-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583417" comment="kernel-pae-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583418" comment="kernel-pae-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583419" comment="kernel-ppc64-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583420" comment="kernel-ppc64-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583421" comment="kernel-ppc64-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583422" comment="kernel-source-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583423" comment="kernel-syms-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583424" comment="kernel-trace-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583425" comment="kernel-trace-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583426" comment="kernel-trace-devel-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583427" comment="kernel-xen-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583428" comment="kernel-xen-base-3.0.101-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583429" comment="kernel-xen-devel-3.0.101-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41594" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="1045406" ref_url="https://bugzilla.suse.com/1045406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00033.html" source="SUSE-SU"/>
		<description>
This Linux kernel update for SUSE Linux Enterprise 11 SP4 fixes the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340, bsc#1045406]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045406">SUSE bug 1045406</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583430" comment="kernel-bigmem-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583431" comment="kernel-bigmem-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583432" comment="kernel-bigmem-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583433" comment="kernel-default-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583434" comment="kernel-default-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583435" comment="kernel-default-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583436" comment="kernel-default-man-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583437" comment="kernel-ec2-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583438" comment="kernel-ec2-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583439" comment="kernel-ec2-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583440" comment="kernel-pae-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583441" comment="kernel-pae-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583442" comment="kernel-pae-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583443" comment="kernel-ppc64-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583444" comment="kernel-ppc64-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583445" comment="kernel-ppc64-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583446" comment="kernel-source-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583447" comment="kernel-syms-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583448" comment="kernel-trace-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583449" comment="kernel-trace-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583450" comment="kernel-trace-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583451" comment="kernel-xen-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583452" comment="kernel-xen-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583453" comment="kernel-xen-devel-3.0.101-107.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583430" comment="kernel-bigmem-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583431" comment="kernel-bigmem-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583432" comment="kernel-bigmem-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583433" comment="kernel-default-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583434" comment="kernel-default-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583435" comment="kernel-default-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583436" comment="kernel-default-man-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583437" comment="kernel-ec2-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583438" comment="kernel-ec2-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583439" comment="kernel-ec2-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583440" comment="kernel-pae-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583441" comment="kernel-pae-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583442" comment="kernel-pae-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583443" comment="kernel-ppc64-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583444" comment="kernel-ppc64-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583445" comment="kernel-ppc64-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583446" comment="kernel-source-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583447" comment="kernel-syms-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583448" comment="kernel-trace-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583449" comment="kernel-trace-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583450" comment="kernel-trace-devel-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583451" comment="kernel-xen-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583452" comment="kernel-xen-base-3.0.101-107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583453" comment="kernel-xen-devel-3.0.101-107.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41595" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00080.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote code execution vulnerability.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583454" comment="kernel-bigmem-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583455" comment="kernel-bigmem-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583456" comment="kernel-bigmem-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583457" comment="kernel-default-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583458" comment="kernel-default-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583459" comment="kernel-default-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583460" comment="kernel-default-man-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583461" comment="kernel-ec2-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583462" comment="kernel-ec2-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583463" comment="kernel-ec2-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583464" comment="kernel-pae-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583465" comment="kernel-pae-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583466" comment="kernel-pae-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583467" comment="kernel-ppc64-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583468" comment="kernel-ppc64-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583469" comment="kernel-ppc64-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583470" comment="kernel-source-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583471" comment="kernel-syms-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583472" comment="kernel-trace-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583473" comment="kernel-trace-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583474" comment="kernel-trace-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583475" comment="kernel-xen-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583476" comment="kernel-xen-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583477" comment="kernel-xen-devel-3.0.101-108.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583454" comment="kernel-bigmem-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583455" comment="kernel-bigmem-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583456" comment="kernel-bigmem-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583457" comment="kernel-default-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583458" comment="kernel-default-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583459" comment="kernel-default-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583460" comment="kernel-default-man-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583461" comment="kernel-ec2-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583462" comment="kernel-ec2-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583463" comment="kernel-ec2-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583464" comment="kernel-pae-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583465" comment="kernel-pae-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583466" comment="kernel-pae-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583467" comment="kernel-ppc64-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583468" comment="kernel-ppc64-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583469" comment="kernel-ppc64-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583470" comment="kernel-source-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583471" comment="kernel-syms-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583472" comment="kernel-trace-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583473" comment="kernel-trace-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583474" comment="kernel-trace-devel-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583475" comment="kernel-xen-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583476" comment="kernel-xen-base-3.0.101-108.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583477" comment="kernel-xen-devel-3.0.101-108.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41596" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1052351" ref_url="https://bugzilla.suse.com/1052351" source="BUGZILLA"/>
		<reference ref_id="1068054" ref_url="https://bugzilla.suse.com/1068054" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1080837" ref_url="https://bugzilla.suse.com/1080837" source="BUGZILLA"/>
		<reference ref_id="1083347" ref_url="https://bugzilla.suse.com/1083347" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1088997" ref_url="https://bugzilla.suse.com/1088997" source="BUGZILLA"/>
		<reference ref_id="1088998" ref_url="https://bugzilla.suse.com/1088998" source="BUGZILLA"/>
		<reference ref_id="1088999" ref_url="https://bugzilla.suse.com/1088999" source="BUGZILLA"/>
		<reference ref_id="1089000" ref_url="https://bugzilla.suse.com/1089000" source="BUGZILLA"/>
		<reference ref_id="1089001" ref_url="https://bugzilla.suse.com/1089001" source="BUGZILLA"/>
		<reference ref_id="1089002" ref_url="https://bugzilla.suse.com/1089002" source="BUGZILLA"/>
		<reference ref_id="1089003" ref_url="https://bugzilla.suse.com/1089003" source="BUGZILLA"/>
		<reference ref_id="1089004" ref_url="https://bugzilla.suse.com/1089004" source="BUGZILLA"/>
		<reference ref_id="1089005" ref_url="https://bugzilla.suse.com/1089005" source="BUGZILLA"/>
		<reference ref_id="1089006" ref_url="https://bugzilla.suse.com/1089006" source="BUGZILLA"/>
		<reference ref_id="1089007" ref_url="https://bugzilla.suse.com/1089007" source="BUGZILLA"/>
		<reference ref_id="1089008" ref_url="https://bugzilla.suse.com/1089008" source="BUGZILLA"/>
		<reference ref_id="1089010" ref_url="https://bugzilla.suse.com/1089010" source="BUGZILLA"/>
		<reference ref_id="1089011" ref_url="https://bugzilla.suse.com/1089011" source="BUGZILLA"/>
		<reference ref_id="1089012" ref_url="https://bugzilla.suse.com/1089012" source="BUGZILLA"/>
		<reference ref_id="1089013" ref_url="https://bugzilla.suse.com/1089013" source="BUGZILLA"/>
		<reference ref_id="1089016" ref_url="https://bugzilla.suse.com/1089016" source="BUGZILLA"/>
		<reference ref_id="1089192" ref_url="https://bugzilla.suse.com/1089192" source="BUGZILLA"/>
		<reference ref_id="1089199" ref_url="https://bugzilla.suse.com/1089199" source="BUGZILLA"/>
		<reference ref_id="1089200" ref_url="https://bugzilla.suse.com/1089200" source="BUGZILLA"/>
		<reference ref_id="1089201" ref_url="https://bugzilla.suse.com/1089201" source="BUGZILLA"/>
		<reference ref_id="1089202" ref_url="https://bugzilla.suse.com/1089202" source="BUGZILLA"/>
		<reference ref_id="1089203" ref_url="https://bugzilla.suse.com/1089203" source="BUGZILLA"/>
		<reference ref_id="1089204" ref_url="https://bugzilla.suse.com/1089204" source="BUGZILLA"/>
		<reference ref_id="1089205" ref_url="https://bugzilla.suse.com/1089205" source="BUGZILLA"/>
		<reference ref_id="1089206" ref_url="https://bugzilla.suse.com/1089206" source="BUGZILLA"/>
		<reference ref_id="1089207" ref_url="https://bugzilla.suse.com/1089207" source="BUGZILLA"/>
		<reference ref_id="1089208" ref_url="https://bugzilla.suse.com/1089208" source="BUGZILLA"/>
		<reference ref_id="1089209" ref_url="https://bugzilla.suse.com/1089209" source="BUGZILLA"/>
		<reference ref_id="1089210" ref_url="https://bugzilla.suse.com/1089210" source="BUGZILLA"/>
		<reference ref_id="1089211" ref_url="https://bugzilla.suse.com/1089211" source="BUGZILLA"/>
		<reference ref_id="1089212" ref_url="https://bugzilla.suse.com/1089212" source="BUGZILLA"/>
		<reference ref_id="1089213" ref_url="https://bugzilla.suse.com/1089213" source="BUGZILLA"/>
		<reference ref_id="1089214" ref_url="https://bugzilla.suse.com/1089214" source="BUGZILLA"/>
		<reference ref_id="1089215" ref_url="https://bugzilla.suse.com/1089215" source="BUGZILLA"/>
		<reference ref_id="1089216" ref_url="https://bugzilla.suse.com/1089216" source="BUGZILLA"/>
		<reference ref_id="1089217" ref_url="https://bugzilla.suse.com/1089217" source="BUGZILLA"/>
		<reference ref_id="1089218" ref_url="https://bugzilla.suse.com/1089218" source="BUGZILLA"/>
		<reference ref_id="1089219" ref_url="https://bugzilla.suse.com/1089219" source="BUGZILLA"/>
		<reference ref_id="1089220" ref_url="https://bugzilla.suse.com/1089220" source="BUGZILLA"/>
		<reference ref_id="1089221" ref_url="https://bugzilla.suse.com/1089221" source="BUGZILLA"/>
		<reference ref_id="1089222" ref_url="https://bugzilla.suse.com/1089222" source="BUGZILLA"/>
		<reference ref_id="1089223" ref_url="https://bugzilla.suse.com/1089223" source="BUGZILLA"/>
		<reference ref_id="1089224" ref_url="https://bugzilla.suse.com/1089224" source="BUGZILLA"/>
		<reference ref_id="1089225" ref_url="https://bugzilla.suse.com/1089225" source="BUGZILLA"/>
		<reference ref_id="1089226" ref_url="https://bugzilla.suse.com/1089226" source="BUGZILLA"/>
		<reference ref_id="1089227" ref_url="https://bugzilla.suse.com/1089227" source="BUGZILLA"/>
		<reference ref_id="1089228" ref_url="https://bugzilla.suse.com/1089228" source="BUGZILLA"/>
		<reference ref_id="1089229" ref_url="https://bugzilla.suse.com/1089229" source="BUGZILLA"/>
		<reference ref_id="1089230" ref_url="https://bugzilla.suse.com/1089230" source="BUGZILLA"/>
		<reference ref_id="1089231" ref_url="https://bugzilla.suse.com/1089231" source="BUGZILLA"/>
		<reference ref_id="1089232" ref_url="https://bugzilla.suse.com/1089232" source="BUGZILLA"/>
		<reference ref_id="1089233" ref_url="https://bugzilla.suse.com/1089233" source="BUGZILLA"/>
		<reference ref_id="1089234" ref_url="https://bugzilla.suse.com/1089234" source="BUGZILLA"/>
		<reference ref_id="1089235" ref_url="https://bugzilla.suse.com/1089235" source="BUGZILLA"/>
		<reference ref_id="1089236" ref_url="https://bugzilla.suse.com/1089236" source="BUGZILLA"/>
		<reference ref_id="1089237" ref_url="https://bugzilla.suse.com/1089237" source="BUGZILLA"/>
		<reference ref_id="1089238" ref_url="https://bugzilla.suse.com/1089238" source="BUGZILLA"/>
		<reference ref_id="1089239" ref_url="https://bugzilla.suse.com/1089239" source="BUGZILLA"/>
		<reference ref_id="1089240" ref_url="https://bugzilla.suse.com/1089240" source="BUGZILLA"/>
		<reference ref_id="1089241" ref_url="https://bugzilla.suse.com/1089241" source="BUGZILLA"/>
		<reference ref_id="1093194" ref_url="https://bugzilla.suse.com/1093194" source="BUGZILLA"/>
		<reference ref_id="1093195" ref_url="https://bugzilla.suse.com/1093195" source="BUGZILLA"/>
		<reference ref_id="1093196" ref_url="https://bugzilla.suse.com/1093196" source="BUGZILLA"/>
		<reference ref_id="1093197" ref_url="https://bugzilla.suse.com/1093197" source="BUGZILLA"/>
		<reference ref_id="1093198" ref_url="https://bugzilla.suse.com/1093198" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094421" ref_url="https://bugzilla.suse.com/1094421" source="BUGZILLA"/>
		<reference ref_id="1094422" ref_url="https://bugzilla.suse.com/1094422" source="BUGZILLA"/>
		<reference ref_id="1094423" ref_url="https://bugzilla.suse.com/1094423" source="BUGZILLA"/>
		<reference ref_id="1094424" ref_url="https://bugzilla.suse.com/1094424" source="BUGZILLA"/>
		<reference ref_id="1094425" ref_url="https://bugzilla.suse.com/1094425" source="BUGZILLA"/>
		<reference ref_id="1094436" ref_url="https://bugzilla.suse.com/1094436" source="BUGZILLA"/>
		<reference ref_id="1094437" ref_url="https://bugzilla.suse.com/1094437" source="BUGZILLA"/>
		<reference ref_id="1095241" ref_url="https://bugzilla.suse.com/1095241" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096746" ref_url="https://bugzilla.suse.com/1096746" source="BUGZILLA"/>
		<reference ref_id="1097443" ref_url="https://bugzilla.suse.com/1097443" source="BUGZILLA"/>
		<reference ref_id="1097445" ref_url="https://bugzilla.suse.com/1097445" source="BUGZILLA"/>
		<reference ref_id="1097948" ref_url="https://bugzilla.suse.com/1097948" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="989401" ref_url="https://bugzilla.suse.com/989401" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This new feature was added:

- Btrfs: Remove empty block groups in the background

The following security bugs were fixed:

- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Btrfs: Avoid trucating page or punching hole in a already existed hole (bsc#1088998).
- Btrfs: Avoid truncate tailing page if fallocate range does not exceed inode size (bsc#1094424).
- Btrfs: Fix lost-data-profile caused by auto removing bg.
- Btrfs: Fix misuse of chunk mutex
- Btrfs: Fix out-of-space bug (bsc#1089231).
- Btrfs: Set relative data on clear btrfs_block_group_cache-&gt;pinned.
- Btrfs: Use ref_cnt for set_block_group_ro() (bsc#1089239).
- Btrfs: add alloc_fs_devices and switch to it (bsc#1089205).
- Btrfs: add btrfs_alloc_device and switch to it (bsc#1089204).
- Btrfs: add missing discards when unpinning extents with -o discard.
- Btrfs: add missing inode update when punching hole (bsc#1089006).
- Btrfs: add support for asserts (bsc#1089207).
- Btrfs: avoid syncing log in the fast fsync path when not necessary (bsc#1089010).
- Btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries.
- Btrfs: check pending chunks when shrinking fs to avoid corruption (bsc#1089235).
- Btrfs: cleanup backref search commit root flag stuff (bsc#1089200).
- Btrfs: delete chunk allocation attemp when setting block group ro.
- Btrfs: do not leak transaction in btrfs_sync_file() (bsc#1089210).
- Btrfs: do not mix the ordered extents of all files together during logging the inodes (bsc#1089214).
- Btrfs: do not remove extents and xattrs when logging new names (bsc#1089005).
- Btrfs: eliminate races in worker stopping code (bsc#1089211).
- Btrfs: ensure deletion from pinned_chunks list is protected.
- Btrfs: explictly delete unused block groups in close_ctree and ro-remount.
- Btrfs: fix -ENOSPC on block group removal.
- Btrfs: fix -ENOSPC when finishing block group creation.
- Btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group.
- Btrfs: fix NULL pointer crash when running balance and scrub concurrently (bsc#1089220).
- Btrfs: fix chunk allocation regression leading to transaction abort (bsc#1089236).
- Btrfs: fix crash caused by block group removal.
- Btrfs: fix data loss in the fast fsync path (bsc#1089007).
- Btrfs: fix deadlock caused by fsync when logging directory entries (bsc#1093194).
- Btrfs: fix directory inconsistency after fsync log replay (bsc#1089001).
- Btrfs: fix directory recovery from fsync log (bsc#1088999).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#1093195).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#1093196).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#1089241).
- Btrfs: fix find_free_dev_extent() malfunction in case device tree has hole (bsc#1089232).
- Btrfs: fix fitrim discarding device area reserved for boot loader's use.
- Btrfs: fix freeing used extent after removing empty block group.
- Btrfs: fix freeing used extents after removing empty block group.
- Btrfs: fix fs mapping extent map leak (bsc#1089229).
- Btrfs: fix fsync data loss after a ranged fsync (bsc#1089221).
- Btrfs: fix fsync data loss after adding hard link to inode (bsc#1089004).
- Btrfs: fix fsync data loss after append write (bsc#1089238).
- Btrfs: fix fsync log replay for inodes with a mix of regular refs and extrefs (bsc#1089003).
- Btrfs: fix fsync race leading to invalid data after log replay (bsc#1089000).
- Btrfs: fix fsync when extend references are added to an inode (bsc#1089002).
- Btrfs: fix fsync xattr loss in the fast fsync path (bsc#1094423).
- Btrfs: fix invalid extent maps due to hole punching (bsc#1094425).
- Btrfs: fix kernel oops while reading compressed data (bsc#1089192).
- Btrfs: fix log replay failure after linking special file and fsync (bsc#1089016).
- Btrfs: fix memory leak after block remove + trimming.
- Btrfs: fix metadata inconsistencies after directory fsync (bsc#1093197).
- Btrfs: fix race between balance and unused block group deletion (bsc#1089237).
- Btrfs: fix race between fs trimming and block group remove/allocation.
- Btrfs: fix race between scrub and block group deletion.
- Btrfs: fix race between transaction commit and empty block group removal.
- Btrfs: fix race conditions in BTRFS_IOC_FS_INFO ioctl (bsc#1089206).
- Btrfs: fix racy system chunk allocation when setting block group ro (bsc#1089233).
- Btrfs: fix regression in raid level conversion (bsc#1089234).
- Btrfs: fix skipped error handle when log sync failed (bsc#1089217).
- Btrfs: fix stale dir entries after removing a link and fsync (bsc#1089011).
- Btrfs: fix the number of transaction units needed to remove a block group.
- Btrfs: fix the skipped transaction commit during the file sync (bsc#1089216).
- Btrfs: fix unprotected alloc list insertion during the finishing procedure of replace (bsc#1089215).
- Btrfs: fix unprotected assignment of the target device (bsc#1089222).
- Btrfs: fix unprotected deletion from pending_chunks list.
- Btrfs: fix unprotected device list access when getting the fs information (bsc#1089228).
- Btrfs: fix unprotected device's variants on 32bits machine (bsc#1089227).
- Btrfs: fix unprotected device-&gt;bytes_used update (bsc#1089225).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#1089240).
- Btrfs: fix up read_tree_block to return proper error (bsc#1080837).
- Btrfs: fix wrong device bytes_used in the super block (bsc#1089224).
- Btrfs: fix wrong disk size when writing super blocks (bsc#1089223).
- Btrfs: fix xattr loss after power failure (bsc#1094436).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#1089013).
- Btrfs: initialize the seq counter in struct btrfs_device (bsc#1094437).
- Btrfs: iterate over unused chunk space in FITRIM.
- Btrfs: make btrfs_issue_discard return bytes discarded.
- Btrfs: make btrfs_search_forward return with nodes unlocked (bsc#1094422).
- Btrfs: make sure to copy everything if we rename (bsc#1088997).
- Btrfs: make the chunk allocator completely tree lockless (bsc#1089202).
- Btrfs: move btrfs_truncate_page to btrfs_cont_expand instead of btrfs_truncate (bsc#1089201).
- Btrfs: nuke write_super from comments (bsc#1089199).
- Btrfs: only drop modified extents if we logged the whole inode (bsc#1089213).
- Btrfs: only update disk_i_size as we remove extents (bsc#1089209).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#1089012).
- Btrfs: remove deleted xattrs on fsync log replay (bsc#1089008).
- Btrfs: remove empty block groups automatically.
- Btrfs: remove non-sense btrfs_error_discard_extent() function (bsc#1089230).
- Btrfs: remove parameter blocksize from read_tree_block (bsc#1080837).
- Btrfs: remove transaction from send (bsc#1089218).
- Btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock.
- Btrfs: remove unused max_key arg from btrfs_search_forward (bsc#1094421).
- Btrfs: return an error from btrfs_wait_ordered_range (bsc#1089212).
- Btrfs: set inode's logged_trans/last_log_commit after ranged fsync (bsc#1093198).
- Btrfs: skip superblocks during discard.
- Btrfs: stop refusing the relocation of chunk 0 (bsc#1089208).
- Btrfs: update free_chunk_space during allocting a new chunk (bsc#1089226).
- Btrfs: use global reserve when deleting unused block group after ENOSPC.
- Btrfs: use nodesize everywhere, kill leafsize (bsc#1080837).
- Btrfs: wait ordered range before doing direct io (bsc#1089203).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Xen counterparts of eager FPU implementation.
- balloon: do not BUG() when balloon is empty (bsc#1083347).
- fs: btrfs: volumes.c: Fix for possible null pointer dereference (bsc#1089219).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096746).
- kvm/powerpc: Add new ioctl to retreive server MMU infos (bsc#1094244).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- module: Fix locking in symbol_put_addr() (bsc#1097445).
- netfront: make req_prod check properly deal with index wraps (bsc#1046610).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump and flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: convert rtas_log_buf to linear allocation (bsc#1094244).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096746).
- s390/dasd: fix failing path verification (bnc#1096746).
- trace: module: Maintain a valid user count (bsc#1097443).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86: Fix /proc/mtrr with base/size more than 44bits (bsc#1052351).
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#989401).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-27"/>
	<updated date="2018-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052351">SUSE bug 1052351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068054">SUSE bug 1068054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080837">SUSE bug 1080837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083347">SUSE bug 1083347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088997">SUSE bug 1088997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088998">SUSE bug 1088998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088999">SUSE bug 1088999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089000">SUSE bug 1089000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089001">SUSE bug 1089001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089002">SUSE bug 1089002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089003">SUSE bug 1089003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089004">SUSE bug 1089004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089005">SUSE bug 1089005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089006">SUSE bug 1089006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089007">SUSE bug 1089007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089008">SUSE bug 1089008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089010">SUSE bug 1089010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089011">SUSE bug 1089011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089012">SUSE bug 1089012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089013">SUSE bug 1089013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089016">SUSE bug 1089016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089192">SUSE bug 1089192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089199">SUSE bug 1089199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089200">SUSE bug 1089200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089201">SUSE bug 1089201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089202">SUSE bug 1089202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089203">SUSE bug 1089203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089204">SUSE bug 1089204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089205">SUSE bug 1089205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089206">SUSE bug 1089206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089207">SUSE bug 1089207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089208">SUSE bug 1089208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089209">SUSE bug 1089209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089210">SUSE bug 1089210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089211">SUSE bug 1089211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089212">SUSE bug 1089212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089213">SUSE bug 1089213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089214">SUSE bug 1089214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089215">SUSE bug 1089215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089216">SUSE bug 1089216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089217">SUSE bug 1089217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089218">SUSE bug 1089218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089219">SUSE bug 1089219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089220">SUSE bug 1089220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089221">SUSE bug 1089221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089222">SUSE bug 1089222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089223">SUSE bug 1089223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089224">SUSE bug 1089224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089225">SUSE bug 1089225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089226">SUSE bug 1089226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089227">SUSE bug 1089227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089228">SUSE bug 1089228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089229">SUSE bug 1089229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089230">SUSE bug 1089230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089231">SUSE bug 1089231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089232">SUSE bug 1089232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089233">SUSE bug 1089233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089234">SUSE bug 1089234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089235">SUSE bug 1089235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089236">SUSE bug 1089236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089237">SUSE bug 1089237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089238">SUSE bug 1089238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089239">SUSE bug 1089239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089240">SUSE bug 1089240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089241">SUSE bug 1089241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093194">SUSE bug 1093194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093195">SUSE bug 1093195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093196">SUSE bug 1093196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093197">SUSE bug 1093197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093198">SUSE bug 1093198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094421">SUSE bug 1094421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094422">SUSE bug 1094422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094423">SUSE bug 1094423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094424">SUSE bug 1094424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094425">SUSE bug 1094425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094436">SUSE bug 1094436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094437">SUSE bug 1094437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096746">SUSE bug 1096746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097443">SUSE bug 1097443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097445">SUSE bug 1097445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097948">SUSE bug 1097948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989401">SUSE bug 989401</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583478" comment="kernel-bigmem-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583479" comment="kernel-bigmem-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583480" comment="kernel-bigmem-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583481" comment="kernel-default-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583482" comment="kernel-default-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583483" comment="kernel-default-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583484" comment="kernel-default-man-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583485" comment="kernel-ec2-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583486" comment="kernel-ec2-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583487" comment="kernel-ec2-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583488" comment="kernel-pae-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583489" comment="kernel-pae-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583490" comment="kernel-pae-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583491" comment="kernel-ppc64-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583492" comment="kernel-ppc64-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583493" comment="kernel-ppc64-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583494" comment="kernel-source-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583495" comment="kernel-syms-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583496" comment="kernel-trace-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583497" comment="kernel-trace-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583498" comment="kernel-trace-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583499" comment="kernel-xen-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583500" comment="kernel-xen-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583501" comment="kernel-xen-devel-3.0.101-108.57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583478" comment="kernel-bigmem-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583479" comment="kernel-bigmem-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583480" comment="kernel-bigmem-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583481" comment="kernel-default-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583482" comment="kernel-default-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583483" comment="kernel-default-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583484" comment="kernel-default-man-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583485" comment="kernel-ec2-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583486" comment="kernel-ec2-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583487" comment="kernel-ec2-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583488" comment="kernel-pae-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583489" comment="kernel-pae-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583490" comment="kernel-pae-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583491" comment="kernel-ppc64-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583492" comment="kernel-ppc64-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583493" comment="kernel-ppc64-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583494" comment="kernel-source-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583495" comment="kernel-syms-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583496" comment="kernel-trace-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583497" comment="kernel-trace-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583498" comment="kernel-trace-devel-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583499" comment="kernel-xen-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583500" comment="kernel-xen-base-3.0.101-108.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583501" comment="kernel-xen-devel-3.0.101-108.57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41597" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045538" ref_url="https://bugzilla.suse.com/1045538" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094876" ref_url="https://bugzilla.suse.com/1094876" source="BUGZILLA"/>
		<reference ref_id="1098408" ref_url="https://bugzilla.suse.com/1098408" source="BUGZILLA"/>
		<reference ref_id="1099177" ref_url="https://bugzilla.suse.com/1099177" source="BUGZILLA"/>
		<reference ref_id="1099598" ref_url="https://bugzilla.suse.com/1099598" source="BUGZILLA"/>
		<reference ref_id="1099709" ref_url="https://bugzilla.suse.com/1099709" source="BUGZILLA"/>
		<reference ref_id="1099966" ref_url="https://bugzilla.suse.com/1099966" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100091" ref_url="https://bugzilla.suse.com/1100091" source="BUGZILLA"/>
		<reference ref_id="1101296" ref_url="https://bugzilla.suse.com/1101296" source="BUGZILLA"/>
		<reference ref_id="780242" ref_url="https://bugzilla.suse.com/780242" source="BUGZILLA"/>
		<reference ref_id="784815" ref_url="https://bugzilla.suse.com/784815" source="BUGZILLA"/>
		<reference ref_id="786036" ref_url="https://bugzilla.suse.com/786036" source="BUGZILLA"/>
		<reference ref_id="790588" ref_url="https://bugzilla.suse.com/790588" source="BUGZILLA"/>
		<reference ref_id="795301" ref_url="https://bugzilla.suse.com/795301" source="BUGZILLA"/>
		<reference ref_id="902351" ref_url="https://bugzilla.suse.com/902351" source="BUGZILLA"/>
		<reference ref_id="909495" ref_url="https://bugzilla.suse.com/909495" source="BUGZILLA"/>
		<reference ref_id="923242" ref_url="https://bugzilla.suse.com/923242" source="BUGZILLA"/>
		<reference ref_id="925105" ref_url="https://bugzilla.suse.com/925105" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2014-3688: The SCTP implementation allowed remote attackers to cause a
  denial of service (memory consumption) by triggering a large number of chunks
  in an association's output queue (bsc#902351).

The following non-security bugs were fixed:

- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1045538).
- ALSA: seq: Do not allow resizing pool in use (bsc#1045538).
- Delete patches.fixes/0001-ipc-shm-Fix-shmat-mmap-nil-page-protection.patch (bsc# 1090078)
- IB/mlx4: fix sprintf format warning (bnc#786036).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#786036).
- USB: uss720: fix NULL-deref at probe (bnc#1047487).
- bna: integer overflow bug in debugfs (bnc#780242).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bug#923242).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bug#909495).
- fix a leak in /proc/schedstats (bsc#1094876).
- ixgbe: Initialize 64-bit stats seqcounts (bnc#795301).
- mm: fix the NULL mapping case in __isolate_lru_page() (git-fixes).
- module/retpoline: Warn about missing retpoline in module (bnc#1099177).
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bnc#786036).
- net/mlx4_en: Change default QoS settings (bnc#786036 ).
- net/mlx4_en: Use __force to fix a sparse warning in TX datapath (bug#925105).
- netxen: fix incorrect loop counter decrement (bnc#784815).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- s390/qdio: do not merge ERROR output buffers (bnc#1099709).
- s390/qeth: do not dump control cmd twice (bnc#1099709).
- s390/qeth: fix SETIP command handling (bnc#1099709).
- s390/qeth: free netdevice when removing a card (bnc#1099709).
- s390/qeth: lock read device while queueing next buffer (bnc#1099709).
- s390/qeth: when thread completes, wake up all waiters (bnc#1099709).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- tg3: do not clear stats while tg3_close (bnc#790588).
- video/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bnc#1099966).
- vmxnet3: use correct flag to indicate LRO feature (bsc#936423).
- x86-32/kaiser: Add CPL check for CR3 switch before iret (bsc#1098408).
- x86-non-upstream-eager-fpu 32bit fix (bnc#1087086, bnc#1100091, bnc#1099598).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1099177).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045538">SUSE bug 1045538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094876">SUSE bug 1094876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098408">SUSE bug 1098408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099177">SUSE bug 1099177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099598">SUSE bug 1099598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099709">SUSE bug 1099709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099966">SUSE bug 1099966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101296">SUSE bug 1101296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780242">SUSE bug 780242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784815">SUSE bug 784815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786036">SUSE bug 786036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790588">SUSE bug 790588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795301">SUSE bug 795301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909495">SUSE bug 909495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923242">SUSE bug 923242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925105">SUSE bug 925105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583502" comment="kernel-bigmem-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583503" comment="kernel-bigmem-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583504" comment="kernel-bigmem-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583505" comment="kernel-default-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583506" comment="kernel-default-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583507" comment="kernel-default-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583508" comment="kernel-default-man-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583509" comment="kernel-ec2-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583510" comment="kernel-ec2-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583511" comment="kernel-ec2-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583512" comment="kernel-pae-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583513" comment="kernel-pae-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583514" comment="kernel-pae-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583515" comment="kernel-ppc64-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583516" comment="kernel-ppc64-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583517" comment="kernel-ppc64-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583518" comment="kernel-source-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583519" comment="kernel-syms-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583520" comment="kernel-trace-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583521" comment="kernel-trace-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583522" comment="kernel-trace-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583523" comment="kernel-xen-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583524" comment="kernel-xen-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583525" comment="kernel-xen-devel-3.0.101-108.60.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583502" comment="kernel-bigmem-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583503" comment="kernel-bigmem-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583504" comment="kernel-bigmem-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583505" comment="kernel-default-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583506" comment="kernel-default-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583507" comment="kernel-default-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583508" comment="kernel-default-man-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583509" comment="kernel-ec2-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583510" comment="kernel-ec2-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583511" comment="kernel-ec2-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583512" comment="kernel-pae-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583513" comment="kernel-pae-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583514" comment="kernel-pae-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583515" comment="kernel-ppc64-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583516" comment="kernel-ppc64-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583517" comment="kernel-ppc64-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583518" comment="kernel-source-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583519" comment="kernel-syms-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583520" comment="kernel-trace-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583521" comment="kernel-trace-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583522" comment="kernel-trace-devel-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583523" comment="kernel-xen-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583524" comment="kernel-xen-base-3.0.101-108.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583525" comment="kernel-xen-devel-3.0.101-108.60.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41598" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031240" ref_url="https://bugzilla.suse.com/1031240" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1049128" ref_url="https://bugzilla.suse.com/1049128" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1064861" ref_url="https://bugzilla.suse.com/1064861" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066674" ref_url="https://bugzilla.suse.com/1066674" source="BUGZILLA"/>
		<reference ref_id="1071021" ref_url="https://bugzilla.suse.com/1071021" source="BUGZILLA"/>
		<reference ref_id="1081680" ref_url="https://bugzilla.suse.com/1081680" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1103145" ref_url="https://bugzilla.suse.com/1103145" source="BUGZILLA"/>
		<reference ref_id="1105799" ref_url="https://bugzilla.suse.com/1105799" source="BUGZILLA"/>
		<reference ref_id="1106139" ref_url="https://bugzilla.suse.com/1106139" source="BUGZILLA"/>
		<reference ref_id="1106240" ref_url="https://bugzilla.suse.com/1106240" source="BUGZILLA"/>
		<reference ref_id="1107371" ref_url="https://bugzilla.suse.com/1107371" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1107849" ref_url="https://bugzilla.suse.com/1107849" source="BUGZILLA"/>
		<reference ref_id="1108314" ref_url="https://bugzilla.suse.com/1108314" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109806" ref_url="https://bugzilla.suse.com/1109806" source="BUGZILLA"/>
		<reference ref_id="1109818" ref_url="https://bugzilla.suse.com/1109818" source="BUGZILLA"/>
		<reference ref_id="1110006" ref_url="https://bugzilla.suse.com/1110006" source="BUGZILLA"/>
		<reference ref_id="1110247" ref_url="https://bugzilla.suse.com/1110247" source="BUGZILLA"/>
		<reference ref_id="1113337" ref_url="https://bugzilla.suse.com/1113337" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114460" ref_url="https://bugzilla.suse.com/1114460" source="BUGZILLA"/>
		<reference ref_id="923775" ref_url="https://bugzilla.suse.com/923775" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).

The following non-security bugs were fixed:

- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).
- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KVM: Disable irq while unregistering user notifier (bsc#1106240).
- KVM: SVM: obey guest PAT (bsc#1106240).
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).
- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).
- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).
- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).
- KVM: x86: zero base3 of unusable segments (bsc#1106240).
- NFS - do not hang if xdr decoded username is bad (bsc#1105799).
- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).
- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).
- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).
- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).
- add kernel parameter to disable failfast on block devices  (bsc#1081680).
- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).
- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).
- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).
- dm: fix incomplete request_queue initialization (bsc#1047027).
- dm: only initialize the request_queue once (bsc#1047027).
- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).
- locks: fix unlock when fcntl_setlk races with a close (git-fixes).
- media: Fix invalid free in the fix for mceusb (bsc#1050431).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).
- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).
- media: mceusb: fix NULL-deref at probe (bsc#1050431).
- media: mceusb: fix memory leaks in error path.
- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).
- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).
- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).
- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).
- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).
- powerpc/book3s: handle machine check in Linux host (bsc#1094244).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).
- powerpc: Rework runlatch code (bsc#1094244).
- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).
- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).
- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).
- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).
- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).
- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).
- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).
- scsi: libfc: Do not login if the port is already started (bsc#1106139).
- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1110247).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049128">SUSE bug 1049128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064861">SUSE bug 1064861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066674">SUSE bug 1066674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081680">SUSE bug 1081680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103145">SUSE bug 1103145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105799">SUSE bug 1105799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106139">SUSE bug 1106139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106240">SUSE bug 1106240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107371">SUSE bug 1107371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107849">SUSE bug 1107849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108314">SUSE bug 1108314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109806">SUSE bug 1109806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109818">SUSE bug 1109818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110006">SUSE bug 1110006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110247">SUSE bug 1110247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113337">SUSE bug 1113337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114460">SUSE bug 1114460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923775">SUSE bug 923775</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583526" comment="kernel-bigmem-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583527" comment="kernel-bigmem-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583528" comment="kernel-bigmem-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583529" comment="kernel-default-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583530" comment="kernel-default-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583531" comment="kernel-default-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583532" comment="kernel-default-man-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583533" comment="kernel-ec2-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583534" comment="kernel-ec2-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583535" comment="kernel-ec2-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583536" comment="kernel-pae-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583537" comment="kernel-pae-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583538" comment="kernel-pae-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583539" comment="kernel-ppc64-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583540" comment="kernel-ppc64-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583541" comment="kernel-ppc64-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583542" comment="kernel-source-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583543" comment="kernel-syms-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583544" comment="kernel-trace-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583545" comment="kernel-trace-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583546" comment="kernel-trace-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583547" comment="kernel-xen-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583548" comment="kernel-xen-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583549" comment="kernel-xen-devel-3.0.101-108.81.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583526" comment="kernel-bigmem-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583527" comment="kernel-bigmem-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583528" comment="kernel-bigmem-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583529" comment="kernel-default-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583530" comment="kernel-default-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583531" comment="kernel-default-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583532" comment="kernel-default-man-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583533" comment="kernel-ec2-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583534" comment="kernel-ec2-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583535" comment="kernel-ec2-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583536" comment="kernel-pae-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583537" comment="kernel-pae-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583538" comment="kernel-pae-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583539" comment="kernel-ppc64-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583540" comment="kernel-ppc64-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583541" comment="kernel-ppc64-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583542" comment="kernel-source-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583543" comment="kernel-syms-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583544" comment="kernel-trace-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583545" comment="kernel-trace-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583546" comment="kernel-trace-devel-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583547" comment="kernel-xen-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583548" comment="kernel-xen-base-3.0.101-108.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583549" comment="kernel-xen-devel-3.0.101-108.81.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41599" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1119314" ref_url="https://bugzilla.suse.com/1119314" source="BUGZILLA"/>
		<reference ref_id="1120326" ref_url="https://bugzilla.suse.com/1120326" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1131295" ref_url="https://bugzilla.suse.com/1131295" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1132580" ref_url="https://bugzilla.suse.com/1132580" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="1134102" ref_url="https://bugzilla.suse.com/1134102" source="BUGZILLA"/>
		<reference ref_id="1134729" ref_url="https://bugzilla.suse.com/1134729" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="923908" ref_url="https://bugzilla.suse.com/923908" source="BUGZILLA"/>
		<reference ref_id="939260" ref_url="https://bugzilla.suse.com/939260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9710" ref_url="https://www.suse.com/security/cve/CVE-2014-9710/" source="CVE"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel version 3.0.101 was updated to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can
  trigger an integer overflow, leading to a kernel panic. (bsc#1137586)

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  will fragment the TCP retransmission queue. An attacker may have been able to
  further exploit the fragmented queue to cause an expensive linked-list walk
  for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  will fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2014-9710: The Btrfs implementation in the Linux kernel did not ensure
  that the visible xattr state is consistent with a requested replacement,
  which allowed local users to bypass intended ACL settings and gain privileges
  via standard filesystem operations (1) during an xattr-replacement time
  window, related to a race condition, or (2) after an xattr-replacement
  attempt that fails because the data did not fit (bnc#923908).

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may be possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server (bnc#1120843).

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  has a race condition when reading /proc/pid/stat (bnc#1131543).

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents
  (bnc#1110785).

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not end with a '\0' character (bnc#1134848).

- CVE-2019-11486: The Siemens R3964 line discipline driver in
  drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions
  (bnc#1133188).

The following non-security bugs were fixed:

- cifs: fix uninitialized memory access (bsc#1120326).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kernel: Add CEX7 toleration support (bsc#1131295).
- net: ipsec: fix a kernel oops caused by reentrant workqueue (bsc#1119314).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- x86/MCE: Handle 'nosmt' offlining properly (bsc#1134729).
- xfs: do not cache inodes read through bulkstat (bsc#1134102).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119314">SUSE bug 1119314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120326">SUSE bug 1120326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131295">SUSE bug 1131295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132580">SUSE bug 1132580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134102">SUSE bug 1134102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134729">SUSE bug 1134729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939260">SUSE bug 939260</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9710/">CVE-2014-9710</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583550" comment="kernel-bigmem-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583551" comment="kernel-bigmem-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583552" comment="kernel-bigmem-devel-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583553" comment="kernel-default-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583554" comment="kernel-default-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583555" comment="kernel-default-devel-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583556" comment="kernel-default-man-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583557" comment="kernel-ec2-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583558" comment="kernel-ec2-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583559" comment="kernel-ec2-devel-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583560" comment="kernel-pae-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583561" comment="kernel-pae-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583562" comment="kernel-pae-devel-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583563" comment="kernel-ppc64-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583564" comment="kernel-ppc64-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583565" comment="kernel-ppc64-devel-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583566" comment="kernel-source-3.0.101-108.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583567" comment="kernel-syms-3.0.101-108.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583568" comment="kernel-trace-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583569" comment="kernel-trace-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583570" comment="kernel-trace-devel-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583571" comment="kernel-xen-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583572" comment="kernel-xen-base-3.0.101-108.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583573" comment="kernel-xen-devel-3.0.101-108.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41600" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1090078" ref_url="https://bugzilla.suse.com/1090078" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1134835" ref_url="https://bugzilla.suse.com/1134835" source="BUGZILLA"/>
		<reference ref_id="1135650" ref_url="https://bugzilla.suse.com/1135650" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1138943" ref_url="https://bugzilla.suse.com/1138943" source="BUGZILLA"/>
		<reference ref_id="1139751" ref_url="https://bugzilla.suse.com/1139751" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3896" ref_url="https://www.suse.com/security/cve/CVE-2019-3896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel(bnc#1120758).
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before (bnc#1120758).
- CVE-2019-3896: A double-free could happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker could use this flaw for a privilege escalation or for a system crash and a denial of service (DoS) (bnc#1138943).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could lead to a denial of service (bnc#1102340).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424 1136446).

The following non-security bugs were fixed:

- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- fnic: Fix to cleanup aborted IO to avoid device being offlined by mid-layer (bsc#1134835).
- signal: give SEND_SIG_FORCED more power to beat SIGNAL_UNKILLABLE (bsc#1135650).
- signal: oom_kill_task: use SEND_SIG_FORCED instead of force_sig() (bsc#1135650).
- tcp: a regression in the previous fix for the TCP SACK issue was fixed (bnc#1139751)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-18"/>
	<updated date="2019-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090078">SUSE bug 1090078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134835">SUSE bug 1134835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135650">SUSE bug 1135650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139751">SUSE bug 1139751</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3896/">CVE-2019-3896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583574" comment="kernel-bigmem-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583575" comment="kernel-bigmem-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583576" comment="kernel-bigmem-devel-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583577" comment="kernel-default-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583578" comment="kernel-default-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583579" comment="kernel-default-devel-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583580" comment="kernel-default-man-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583581" comment="kernel-ec2-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583582" comment="kernel-ec2-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583583" comment="kernel-ec2-devel-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583584" comment="kernel-pae-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583585" comment="kernel-pae-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583586" comment="kernel-pae-devel-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583587" comment="kernel-ppc64-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583588" comment="kernel-ppc64-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583589" comment="kernel-ppc64-devel-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583590" comment="kernel-source-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583591" comment="kernel-syms-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583592" comment="kernel-trace-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583593" comment="kernel-trace-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583594" comment="kernel-trace-devel-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583595" comment="kernel-xen-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583596" comment="kernel-xen-base-3.0.101-108.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583597" comment="kernel-xen-devel-3.0.101-108.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41601" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1134390" ref_url="https://bugzilla.suse.com/1134390" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1138744" ref_url="https://bugzilla.suse.com/1138744" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1140965" ref_url="https://bugzilla.suse.com/1140965" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143179" ref_url="https://bugzilla.suse.com/1143179" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2015-9289: A buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allowed larger values such as 23 (bsc#1143179).

The following non-security bugs were fixed:

- fix detection of race between fcntl-setlk and close (bsc#1140965).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-29"/>
	<updated date="2019-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1134390">SUSE bug 1134390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138744">SUSE bug 1138744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140965">SUSE bug 1140965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583598" comment="kernel-bigmem-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583599" comment="kernel-bigmem-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583600" comment="kernel-bigmem-devel-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583601" comment="kernel-default-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583602" comment="kernel-default-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583603" comment="kernel-default-devel-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583604" comment="kernel-default-man-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583605" comment="kernel-ec2-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583606" comment="kernel-ec2-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583607" comment="kernel-ec2-devel-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583608" comment="kernel-pae-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583609" comment="kernel-pae-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583610" comment="kernel-pae-devel-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583611" comment="kernel-ppc64-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583612" comment="kernel-ppc64-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583613" comment="kernel-ppc64-devel-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583614" comment="kernel-source-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583615" comment="kernel-syms-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583616" comment="kernel-trace-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583617" comment="kernel-trace-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583618" comment="kernel-trace-devel-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583619" comment="kernel-xen-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583620" comment="kernel-xen-base-3.0.101-108.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583621" comment="kernel-xen-devel-3.0.101-108.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41602" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1101061" ref_url="https://bugzilla.suse.com/1101061" source="BUGZILLA"/>
		<reference ref_id="1113201" ref_url="https://bugzilla.suse.com/1113201" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1143327" ref_url="https://bugzilla.suse.com/1143327" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146524" ref_url="https://bugzilla.suse.com/1146524" source="BUGZILLA"/>
		<reference ref_id="1146540" ref_url="https://bugzilla.suse.com/1146540" source="BUGZILLA"/>
		<reference ref_id="1146547" ref_url="https://bugzilla.suse.com/1146547" source="BUGZILLA"/>
		<reference ref_id="1146678" ref_url="https://bugzilla.suse.com/1146678" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150599" ref_url="https://bugzilla.suse.com/1150599" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152779" ref_url="https://bugzilla.suse.com/1152779" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152786" ref_url="https://bugzilla.suse.com/1152786" source="BUGZILLA"/>
		<reference ref_id="1152789" ref_url="https://bugzilla.suse.com/1152789" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11-SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).
- CVE-2019-17052: ax25_create in the AF_AX25 network module in the Linux kernel
  did not enforce CAP_NET_RAW, which meant that unprivileged users could create
  a raw socket, aka CID-0614e2b73768. (bnc#1152779)
- CVE-2019-17055: base_sock_create in the AF_ISDN network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users can create
  a raw socket,  aka CID-b91ee4aa2a21. (bnc#1152782)
- CVE-2019-17054: atalk_create in the AF_APPLETALK network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users can create
  a raw socket, aka CID-6cc03e8aa36c. (bnc#1152786)
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17053: ieee802154_create in the AF_IEEE802154 network module in the Linux kernel
  did not enforce CAP_NET_RAW, which means that unprivileged users could create
  a raw socket, aka CID-e69dbd4619e7. (bnc#1152789)
- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly, which caused an
  i_size_read() infinite loop and denial of service on SMP systems. (bnc#1151347)
- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the
  flexcop_usb_probe function. (bnc#1146540)
- CVE-2019-15807: There was a memory leak in the SAS expander driver when SAS expander discovery
  fails. This could cause a denial of service. (bnc#1148938)
- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux the kernel's KVM hypervisor
  implemented the Coalesced MMIO write operation. It operated on an MMIO ring buffer
  'struct kvm_coalesced_mmio' object, wherein write indices value could be supplied by a
   host user-space process. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of service
  or potentially escalating privileges on the system. (bnc#1151350)
- CVE-2019-15505: The Linux kernel had an out-of-bounds read via crafted USB device traffic
  (which may have been remote via usbip or usbredir). (bnc#1147122)
- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel's vhost functionality
  that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A
  privileged guest user able to pass descriptors with invalid length to the host when migration
  is underway, could have used this flaw to increase their privileges on the host. (bnc#1150112)
- CVE-2019-15216: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/usb/misc/yurex.c driver. (bnc#1146361)
- CVE-2019-9456: In the Android kernel in Pixel C USB monitor driver there was a possible
  OOB write due to a missing bounds check. This could lead to local escalation of privilege
  with System execution privileges needed. User interaction was not needed for exploitation. (bnc#1150025)
- CVE-2019-15927: An out-of-bounds access existed in the function build_audio_procunit in the
  file sound/usb/mixer.c. (bnc#1149522)
- CVE-2019-15902:  Misuse of the upstream 'x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()'
  commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two (correctly ordered)\
  code lines were swapped. (bnc#1149376)
- CVE-2019-15219: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/usb/misc/sisusbvga/sisusb.c driver. (bnc#1146524)
- CVE-2017-18509: An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel By setting a specific
  socket option, an attacker could control a pointer in kernel land and cause an inet_csk_listen_stop
  general protection fault, or potentially execute arbitrary code under certain circumstances. The issue
  could be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability)
  or after namespace unsharing. This occurred because sk_type and protocol were not checked in the
  appropriate part of the ip6_mroute_* functions. (bnc#1145477)
- CVE-2019-15212: There was a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. (bnc#1146391)
- CVE-2019-15292: There was a use-after-free in atalk_proc_exit. (bnc#1146678)
- CVE-2019-15217: There was a NULL pointer dereference caused by a malicious USB device in the
  drivers/media/usb/zr364xx/zr364xx.c driver. (bnc#1146547)
- CVE-2018-20976: A use after free was discovered in fs/xfs/xfs_super.c, related to xfs_fs_fill_super
  failure. (bnc#1146285)
- CVE-2017-18551: There was an out of bounds write in the function i2c_smbus_xfer_emulated. (bnc#1146163)
- CVE-2019-15118: check_input_term in sound/usb/mixer.c mishandled recursion, leading to kernel stack
  exhaustion. (bnc#1145922)

The following non-security bugs were fixed:

- add a missing lfence in kernel error entry and remove a superfluous lfence in userspace interrupt exit paths
- Documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- array_index_nospec: Sanitize speculative array (bsc#1155671)
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- IB/core: Add mitigation for Spectre V1 (bsc#1155671)
- inet_diag: fix oops for IPv4 AF_INET6 TCP SYN-RECV state (bsc#1101061).
- kABI Fix for IFU Patches (bsc#1117665).
- kthread: Implement park/unpark facility (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).
- kvm: MMU: fast invalidate all pages (bsc1117665).
- kvm: VMX: export PFEC.P bit on ept (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- mm/readahead.c: fix readahead failure for memoryless NUMA nodes and limit readahead pages (bsc#1143327).
- mm: use only per-device readahead limit (bsc#1143327).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Update Spectre v2 reporting (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- xfs: xfs_remove deadlocks due to inverted AGF vs AGI lock ordering (bsc#1150599).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101061">SUSE bug 1101061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113201">SUSE bug 1113201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143327">SUSE bug 1143327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150599">SUSE bug 1150599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583622" comment="kernel-bigmem-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583623" comment="kernel-bigmem-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583624" comment="kernel-bigmem-devel-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583625" comment="kernel-default-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583626" comment="kernel-default-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583627" comment="kernel-default-devel-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583628" comment="kernel-default-man-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583629" comment="kernel-ec2-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583630" comment="kernel-ec2-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583631" comment="kernel-ec2-devel-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583632" comment="kernel-pae-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583633" comment="kernel-pae-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583634" comment="kernel-pae-devel-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583635" comment="kernel-ppc64-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583636" comment="kernel-ppc64-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583637" comment="kernel-ppc64-devel-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583638" comment="kernel-source-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583639" comment="kernel-syms-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583640" comment="kernel-trace-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583641" comment="kernel-trace-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583642" comment="kernel-trace-devel-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583643" comment="kernel-xen-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583644" comment="kernel-xen-base-3.0.101-108.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583645" comment="kernel-xen-devel-3.0.101-108.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41603" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1105327" ref_url="https://bugzilla.suse.com/1105327" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1136471" ref_url="https://bugzilla.suse.com/1136471" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1148871" ref_url="https://bugzilla.suse.com/1148871" source="BUGZILLA"/>
		<reference ref_id="1149448" ref_url="https://bugzilla.suse.com/1149448" source="BUGZILLA"/>
		<reference ref_id="1152631" ref_url="https://bugzilla.suse.com/1152631" source="BUGZILLA"/>
		<reference ref_id="1156652" ref_url="https://bugzilla.suse.com/1156652" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157344" ref_url="https://bugzilla.suse.com/1157344" source="BUGZILLA"/>
		<reference ref_id="1157678" ref_url="https://bugzilla.suse.com/1157678" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1158381" ref_url="https://bugzilla.suse.com/1158381" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158427" ref_url="https://bugzilla.suse.com/1158427" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1161358" ref_url="https://bugzilla.suse.com/1161358" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).
- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).
- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).
- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).
- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).
- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).
- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).
- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).
- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).
- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).
- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).
- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).
- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).
- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).

The following non-security bugs were fixed:

- Input: add safety guards to input_set_keycode() (bsc#1168075).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- block: Fix oops scsi_disk_get() (bsc#1105327).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).
- klist: fix starting point removed bug in klist iterators (bsc#1156652).
- kobject: Export kobject_get_unless_zero() (bsc#1105327).
- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).
- kref: minor cleanup (bsc#1105327).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- rpm/kernel-binary.spec.in: Replace Novell with SUSE
- sched: Fix race between task_group and sched_task_group (bsc#1136471).
- sched: Remove lockdep check in sched_move_task() (bsc#1136471).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).
- writeback: fix race that cause writeback hung (bsc#1161358).
- x86: fix speculation bug reporting (bsc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-30"/>
	<updated date="2020-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105327">SUSE bug 1105327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136471">SUSE bug 1136471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148871">SUSE bug 1148871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152631">SUSE bug 1152631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156652">SUSE bug 1156652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157344">SUSE bug 1157344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157678">SUSE bug 1157678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161358">SUSE bug 1161358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583646" comment="kernel-bigmem-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583647" comment="kernel-bigmem-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583648" comment="kernel-bigmem-devel-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583649" comment="kernel-default-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583650" comment="kernel-default-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583651" comment="kernel-default-devel-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583652" comment="kernel-default-man-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583653" comment="kernel-ec2-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583654" comment="kernel-ec2-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583655" comment="kernel-ec2-devel-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583656" comment="kernel-pae-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583657" comment="kernel-pae-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583658" comment="kernel-pae-devel-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583659" comment="kernel-ppc64-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583660" comment="kernel-ppc64-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583661" comment="kernel-ppc64-devel-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583662" comment="kernel-source-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583663" comment="kernel-syms-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583664" comment="kernel-trace-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583665" comment="kernel-trace-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583666" comment="kernel-trace-devel-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583667" comment="kernel-xen-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583668" comment="kernel-xen-base-3.0.101-108.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583669" comment="kernel-xen-devel-3.0.101-108.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41604" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154290" ref_url="https://bugzilla.suse.com/1154290" source="BUGZILLA"/>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. 
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).

The following non-security bugs were fixed:

- nfsd4: clean up open owners on OPEN failure (bsc#1154290).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154290">SUSE bug 1154290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583670" comment="kernel-bigmem-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583671" comment="kernel-bigmem-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583672" comment="kernel-bigmem-devel-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583673" comment="kernel-default-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583674" comment="kernel-default-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583675" comment="kernel-default-devel-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583676" comment="kernel-default-man-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583677" comment="kernel-ec2-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583678" comment="kernel-ec2-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583679" comment="kernel-ec2-devel-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583680" comment="kernel-pae-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583681" comment="kernel-pae-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583682" comment="kernel-pae-devel-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583683" comment="kernel-ppc64-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583684" comment="kernel-ppc64-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583685" comment="kernel-ppc64-devel-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583686" comment="kernel-source-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583687" comment="kernel-syms-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583688" comment="kernel-trace-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583689" comment="kernel-trace-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583690" comment="kernel-trace-devel-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583691" comment="kernel-xen-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583692" comment="kernel-xen-base-3.0.101-108.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583693" comment="kernel-xen-devel-3.0.101-108.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41605" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173265" ref_url="https://bugzilla.suse.com/1173265" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-12652: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a 'double fetch' vulnerability (bnc#1171218).
- CVE-2019-5108: Fixed a denial-of-service vulnerability in the wifi stack. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).

The following non-security bugs were fixed:

- Fix gcc-discovered error in zeroing a struct (bnc#680814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583694" comment="kernel-bigmem-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583695" comment="kernel-bigmem-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583696" comment="kernel-bigmem-devel-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583697" comment="kernel-default-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583698" comment="kernel-default-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583699" comment="kernel-default-devel-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583700" comment="kernel-default-man-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583701" comment="kernel-ec2-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583702" comment="kernel-ec2-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583703" comment="kernel-ec2-devel-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583704" comment="kernel-pae-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583705" comment="kernel-pae-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583706" comment="kernel-pae-devel-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583707" comment="kernel-ppc64-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583708" comment="kernel-ppc64-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583709" comment="kernel-ppc64-devel-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583710" comment="kernel-source-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583711" comment="kernel-syms-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583712" comment="kernel-trace-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583713" comment="kernel-trace-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583714" comment="kernel-trace-devel-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583715" comment="kernel-xen-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583716" comment="kernel-xen-base-3.0.101-108.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583717" comment="kernel-xen-devel-3.0.101-108.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41606" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174993" ref_url="https://bugzilla.suse.com/1174993" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177906" ref_url="https://bugzilla.suse.com/1177906" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181166" ref_url="https://bugzilla.suse.com/1181166" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14353" ref_url="https://www.suse.com/security/cve/CVE-2020-14353/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- net/x25: fix a race in x25_bind() (bsc#1178590).
- net/x25: prevent a couple of overflows (bsc#1178590).
- tty: fix memleak in alloc_pid (bsc#1179745).
- xfs: mark all internal workqueues as freezable (bsc#1181166).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174993">SUSE bug 1174993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177906">SUSE bug 1177906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181166">SUSE bug 1181166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14353/">CVE-2020-14353</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583718" comment="kernel-bigmem-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583719" comment="kernel-bigmem-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583720" comment="kernel-bigmem-devel-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583721" comment="kernel-default-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583722" comment="kernel-default-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583723" comment="kernel-default-devel-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583724" comment="kernel-default-man-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583725" comment="kernel-ec2-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583726" comment="kernel-ec2-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583727" comment="kernel-ec2-devel-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583728" comment="kernel-pae-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583729" comment="kernel-pae-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583730" comment="kernel-pae-devel-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583731" comment="kernel-ppc64-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583732" comment="kernel-ppc64-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583733" comment="kernel-ppc64-devel-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583734" comment="kernel-source-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583735" comment="kernel-syms-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583736" comment="kernel-trace-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583737" comment="kernel-trace-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583738" comment="kernel-trace-devel-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583739" comment="kernel-xen-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583740" comment="kernel-xen-base-3.0.101-108.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583741" comment="kernel-xen-devel-3.0.101-108.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41607" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1056134" ref_url="https://bugzilla.suse.com/1056134" source="BUGZILLA"/>
		<reference ref_id="1180963" ref_url="https://bugzilla.suse.com/1180963" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183400" ref_url="https://bugzilla.suse.com/1183400" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20261" ref_url="https://www.suse.com/security/cve/CVE-2021-20261/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29650: Fixed an issue where the netfilter subsystem allowed attackers to cause a denial of service (bsc#1184208).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28950: Fixed an infinite loop because a retry loop continually finds the same bad inode (bsc#1184194).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2021-20261: Fixed a race condition in the implementation of the floppy disk drive controller driver software (bsc#1183400).
- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation which could have caused a system crash (bsc#1184211).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).

The following non-security bugs were fixed:

- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134, bsc#1180963).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056134">SUSE bug 1056134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180963">SUSE bug 1180963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183400">SUSE bug 1183400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20261/">CVE-2021-20261</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583742" comment="kernel-bigmem-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583743" comment="kernel-bigmem-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583744" comment="kernel-bigmem-devel-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583745" comment="kernel-default-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583746" comment="kernel-default-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583747" comment="kernel-default-devel-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583748" comment="kernel-default-man-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583749" comment="kernel-ec2-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583750" comment="kernel-ec2-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583751" comment="kernel-ec2-devel-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583752" comment="kernel-pae-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583753" comment="kernel-pae-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583754" comment="kernel-pae-devel-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583755" comment="kernel-ppc64-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583756" comment="kernel-ppc64-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583757" comment="kernel-ppc64-devel-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583758" comment="kernel-source-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583759" comment="kernel-syms-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583760" comment="kernel-trace-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583761" comment="kernel-trace-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583762" comment="kernel-trace-devel-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583763" comment="kernel-xen-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583764" comment="kernel-xen-base-3.0.101-108.126.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583765" comment="kernel-xen-devel-3.0.101-108.126.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41608" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-0512: Fixed a possible out of bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)
- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859 bsc#1185863)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1185863 bsc#1186062)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862 bsc#1185863)

The following non-security bugs were fixed:

- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-13"/>
	<updated date="2021-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624243" comment="kernel-bigmem-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624244" comment="kernel-bigmem-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624245" comment="kernel-bigmem-devel-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624246" comment="kernel-default-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624247" comment="kernel-default-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624248" comment="kernel-default-devel-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624249" comment="kernel-default-man-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624250" comment="kernel-ec2-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624251" comment="kernel-ec2-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624252" comment="kernel-ec2-devel-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624253" comment="kernel-pae-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624254" comment="kernel-pae-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624255" comment="kernel-pae-devel-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624256" comment="kernel-ppc64-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624257" comment="kernel-ppc64-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624258" comment="kernel-ppc64-devel-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624259" comment="kernel-source-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624260" comment="kernel-syms-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624261" comment="kernel-trace-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624262" comment="kernel-trace-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624263" comment="kernel-trace-devel-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624264" comment="kernel-xen-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624265" comment="kernel-xen-base-3.0.101-108.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624266" comment="kernel-xen-devel-3.0.101-108.129.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41609" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010470" ref_url="https://bugzilla.suse.com/1010470" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1052943" ref_url="https://bugzilla.suse.com/1052943" source="BUGZILLA"/>
		<reference ref_id="1062568" ref_url="https://bugzilla.suse.com/1062568" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1063416" ref_url="https://bugzilla.suse.com/1063416" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065999" ref_url="https://bugzilla.suse.com/1065999" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1067912" ref_url="https://bugzilla.suse.com/1067912" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1075088" ref_url="https://bugzilla.suse.com/1075088" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1078669" ref_url="https://bugzilla.suse.com/1078669" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078674" ref_url="https://bugzilla.suse.com/1078674" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080757" ref_url="https://bugzilla.suse.com/1080757" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1081358" ref_url="https://bugzilla.suse.com/1081358" source="BUGZILLA"/>
		<reference ref_id="1082091" ref_url="https://bugzilla.suse.com/1082091" source="BUGZILLA"/>
		<reference ref_id="1082424" ref_url="https://bugzilla.suse.com/1082424" source="BUGZILLA"/>
		<reference ref_id="1083242" ref_url="https://bugzilla.suse.com/1083242" source="BUGZILLA"/>
		<reference ref_id="1083275" ref_url="https://bugzilla.suse.com/1083275" source="BUGZILLA"/>
		<reference ref_id="1083483" ref_url="https://bugzilla.suse.com/1083483" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085113" ref_url="https://bugzilla.suse.com/1085113" source="BUGZILLA"/>
		<reference ref_id="1085279" ref_url="https://bugzilla.suse.com/1085279" source="BUGZILLA"/>
		<reference ref_id="1085331" ref_url="https://bugzilla.suse.com/1085331" source="BUGZILLA"/>
		<reference ref_id="1085513" ref_url="https://bugzilla.suse.com/1085513" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1087092" ref_url="https://bugzilla.suse.com/1087092" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087762" ref_url="https://bugzilla.suse.com/1087762" source="BUGZILLA"/>
		<reference ref_id="1088147" ref_url="https://bugzilla.suse.com/1088147" source="BUGZILLA"/>
		<reference ref_id="1088260" ref_url="https://bugzilla.suse.com/1088260" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="909077" ref_url="https://bugzilla.suse.com/909077" source="BUGZILLA"/>
		<reference ref_id="940776" ref_url="https://bugzilla.suse.com/940776" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<reference ref_id="CVE-2016-7915" ref_url="https://www.suse.com/security/cve/CVE-2016-7915/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  Enhancements and bugfixes over the previous fixes have been added to this kernel.

- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).

The following non-security bugs were fixed:

- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).
- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).
- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).
- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kabi: x86/kaiser: properly align trampoline stack.
- keys: do not let add_key() update an uninstantiated key (bnc#1063416).
- keys: prevent creating a different user's keyrings (bnc#1065999).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- nfsv4: fix getacl head length estimation (git-fixes).
- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).
- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).
- posix-timers: Protect posix clock array access against speculation (bnc#1081358).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).
- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).
- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)
- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010470">SUSE bug 1010470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052943">SUSE bug 1052943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063416">SUSE bug 1063416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065999">SUSE bug 1065999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075088">SUSE bug 1075088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078669">SUSE bug 1078669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078674">SUSE bug 1078674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081358">SUSE bug 1081358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082091">SUSE bug 1082091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082424">SUSE bug 1082424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083275">SUSE bug 1083275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085113">SUSE bug 1085113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085279">SUSE bug 1085279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085331">SUSE bug 1085331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085513">SUSE bug 1085513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087092">SUSE bug 1087092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087762">SUSE bug 1087762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7915/">CVE-2016-7915</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583766" comment="kernel-bigmem-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583767" comment="kernel-bigmem-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583768" comment="kernel-bigmem-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583769" comment="kernel-default-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583770" comment="kernel-default-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583771" comment="kernel-default-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583772" comment="kernel-default-man-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583773" comment="kernel-ec2-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583774" comment="kernel-ec2-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583775" comment="kernel-ec2-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583776" comment="kernel-pae-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583777" comment="kernel-pae-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583778" comment="kernel-pae-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583779" comment="kernel-ppc64-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583780" comment="kernel-ppc64-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583781" comment="kernel-ppc64-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583782" comment="kernel-source-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583783" comment="kernel-syms-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583784" comment="kernel-trace-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583785" comment="kernel-trace-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583786" comment="kernel-trace-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583787" comment="kernel-xen-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583788" comment="kernel-xen-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583789" comment="kernel-xen-devel-3.0.101-108.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583766" comment="kernel-bigmem-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583767" comment="kernel-bigmem-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583768" comment="kernel-bigmem-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583769" comment="kernel-default-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583770" comment="kernel-default-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583771" comment="kernel-default-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583772" comment="kernel-default-man-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583773" comment="kernel-ec2-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583774" comment="kernel-ec2-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583775" comment="kernel-ec2-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583776" comment="kernel-pae-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583777" comment="kernel-pae-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583778" comment="kernel-pae-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583779" comment="kernel-ppc64-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583780" comment="kernel-ppc64-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583781" comment="kernel-ppc64-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583782" comment="kernel-source-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583783" comment="kernel-syms-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583784" comment="kernel-trace-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583785" comment="kernel-trace-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583786" comment="kernel-trace-devel-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583787" comment="kernel-xen-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583788" comment="kernel-xen-base-3.0.101-108.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583789" comment="kernel-xen-devel-3.0.101-108.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41610" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1032084" ref_url="https://bugzilla.suse.com/1032084" source="BUGZILLA"/>
		<reference ref_id="1050431" ref_url="https://bugzilla.suse.com/1050431" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1089665" ref_url="https://bugzilla.suse.com/1089665" source="BUGZILLA"/>
		<reference ref_id="1089668" ref_url="https://bugzilla.suse.com/1089668" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).

The following non-security bugs were fixed:

- kvm/x86: fix icebp instruction handling (bsc#1087088).
- media: cpia2: Fix a couple off by one bugs (bsc#1050431).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: allow flush-on-stat to be disabled (bsc#1065726).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bnc#1032084, FATE#323225).
- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084, FATE#323225).
- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084, FATE#323225).
- powerpc/fadump: use 'fadump_reserve_mem=' when specified (bnc#1032084, FATE#323225).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032084">SUSE bug 1032084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050431">SUSE bug 1050431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089665">SUSE bug 1089665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089668">SUSE bug 1089668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583790" comment="kernel-bigmem-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583791" comment="kernel-bigmem-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583792" comment="kernel-bigmem-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583793" comment="kernel-default-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583794" comment="kernel-default-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583795" comment="kernel-default-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583796" comment="kernel-default-man-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583797" comment="kernel-ec2-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583798" comment="kernel-ec2-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583799" comment="kernel-ec2-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583800" comment="kernel-pae-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583801" comment="kernel-pae-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583802" comment="kernel-pae-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583803" comment="kernel-ppc64-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583804" comment="kernel-ppc64-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583805" comment="kernel-ppc64-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583806" comment="kernel-source-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583807" comment="kernel-syms-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583808" comment="kernel-trace-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583809" comment="kernel-trace-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583810" comment="kernel-trace-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583811" comment="kernel-xen-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583812" comment="kernel-xen-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583813" comment="kernel-xen-devel-3.0.101-108.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583790" comment="kernel-bigmem-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583791" comment="kernel-bigmem-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583792" comment="kernel-bigmem-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583793" comment="kernel-default-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583794" comment="kernel-default-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583795" comment="kernel-default-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583796" comment="kernel-default-man-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583797" comment="kernel-ec2-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583798" comment="kernel-ec2-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583799" comment="kernel-ec2-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583800" comment="kernel-pae-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583801" comment="kernel-pae-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583802" comment="kernel-pae-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583803" comment="kernel-ppc64-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583804" comment="kernel-ppc64-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583805" comment="kernel-ppc64-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583806" comment="kernel-source-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583807" comment="kernel-syms-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583808" comment="kernel-trace-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583809" comment="kernel-trace-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583810" comment="kernel-trace-devel-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583811" comment="kernel-xen-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583812" comment="kernel-xen-base-3.0.101-108.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583813" comment="kernel-xen-devel-3.0.101-108.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41611" version="1" class="patch">
	<metadata>
		<title>Security update for kernel modules packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="926856" ref_url="https://bugzilla.suse.com/926856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<description>


The following kernel modules were rebuild with 'retpoline' enablement
to allow full mitigation of the Spectre Variant 2 (CVE-2017-5715, bsc#1068032)

OFED was adjusted to add an entry to control the loading/unloading of cxgb4 to
/etc/sysconf/infiniband (bsc#926856).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926856">SUSE bug 926856</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583814" comment="iscsitarget-1.4.20-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583815" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583816" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583817" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583818" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583819" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583820" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583821" comment="ofed-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583822" comment="ofed-doc-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583823" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583824" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583825" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583826" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583827" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583814" comment="iscsitarget-1.4.20-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583815" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583816" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583817" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583818" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583819" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583820" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.52-0.43.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583821" comment="ofed-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583822" comment="ofed-doc-1.5.4.1-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583823" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583824" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583825" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583826" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583827" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.52-22.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41612" version="1" class="patch">
	<metadata>
		<title>Security update for various KMPs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1095824" ref_url="https://bugzilla.suse.com/1095824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<description>

This update rebuilds missing kernel modules (KMP) to use 'retpolines'
mitigations for Spectre Variant 2 (CVE-2017-5715).

Rebuilt KMP packages:

- cluster-network
- drbd
- gfs2
- iscsitarget
- ocfs2
- ofed
- oracleasm

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095824">SUSE bug 1095824</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583828" comment="iscsitarget-1.4.20-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583829" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583830" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583831" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583832" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583833" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583834" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583835" comment="ofed-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583836" comment="ofed-doc-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583837" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583838" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583839" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583840" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583841" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583842" comment="oracleasm-2.0.5-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583843" comment="oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583844" comment="oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583845" comment="oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583846" comment="oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583847" comment="oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583848" comment="oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583828" comment="iscsitarget-1.4.20-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583829" comment="iscsitarget-kmp-bigmem-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583830" comment="iscsitarget-kmp-default-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583831" comment="iscsitarget-kmp-pae-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583832" comment="iscsitarget-kmp-ppc64-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583833" comment="iscsitarget-kmp-trace-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583834" comment="iscsitarget-kmp-xen-1.4.20_3.0.101_108.87-0.43.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583835" comment="ofed-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583836" comment="ofed-doc-1.5.4.1-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583837" comment="ofed-kmp-bigmem-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583838" comment="ofed-kmp-default-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583839" comment="ofed-kmp-pae-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583840" comment="ofed-kmp-ppc64-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583841" comment="ofed-kmp-trace-1.5.4.1_3.0.101_108.87-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583842" comment="oracleasm-2.0.5-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583843" comment="oracleasm-kmp-bigmem-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583844" comment="oracleasm-kmp-default-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583845" comment="oracleasm-kmp-pae-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583846" comment="oracleasm-kmp-ppc64-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583847" comment="oracleasm-kmp-trace-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583848" comment="oracleasm-kmp-xen-2.0.5_3.0.101_108.87-7.44.2.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41613" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578653" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578654" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578655" comment="krb5-apps-clients-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578656" comment="krb5-apps-servers-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578657" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572184" comment="krb5-doc-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578658" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578659" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.97.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578660" comment="krb5-server-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578661" comment="krb5-x86-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41614" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578662" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578663" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578664" comment="krb5-apps-clients-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578665" comment="krb5-apps-servers-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578666" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578667" comment="krb5-server-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578668" comment="krb5-x86-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41615" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583849" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583850" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583851" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583852" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583853" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583854" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583855" comment="krb5-x86-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583849" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583850" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583851" comment="krb5-apps-clients-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583852" comment="krb5-apps-servers-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583853" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583854" comment="krb5-server-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583855" comment="krb5-x86-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41616" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="971942" ref_url="https://bugzilla.suse.com/971942" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following security issue:

- CVE-2016-3119: An authenticated attacker with permission to modify a
  principal entry could have caused kadmind to dereference a null pointer
  by supplying an empty DB argument to the modify_principal command,
  if kadmind is configured to use the LDAP KDB module. (bsc#971942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-18"/>
	<updated date="2016-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583856" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583857" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583858" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583859" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583860" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583861" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583862" comment="krb5-x86-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583856" comment="krb5-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583857" comment="krb5-32bit-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583858" comment="krb5-apps-clients-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583859" comment="krb5-apps-servers-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583860" comment="krb5-client-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583861" comment="krb5-server-1.6.3-133.49.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583862" comment="krb5-x86-1.6.3-133.49.109.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41617" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="970696" ref_url="https://bugzilla.suse.com/970696" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent double-free (bsc#1056995).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).


This non-security issue was fixed:

- Avoid indefinite polling in KDC communication. (bsc#970696)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970696">SUSE bug 970696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583863" comment="krb5-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583864" comment="krb5-32bit-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583865" comment="krb5-apps-clients-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583866" comment="krb5-apps-servers-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583867" comment="krb5-client-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583868" comment="krb5-server-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583869" comment="krb5-x86-1.6.3-133.49.113.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583863" comment="krb5-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583864" comment="krb5-32bit-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583865" comment="krb5-apps-clients-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583866" comment="krb5-apps-servers-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583867" comment="krb5-client-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583868" comment="krb5-server-1.6.3-133.49.113.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583869" comment="krb5-x86-1.6.3-133.49.113.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41618" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578687" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578688" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578689" comment="krb5-apps-clients-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578690" comment="krb5-apps-servers-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578691" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572268" comment="krb5-doc-1.6.3-133.49.68.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578692" comment="krb5-plugin-kdb-ldap-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578693" comment="krb5-plugin-preauth-pkinit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578694" comment="krb5-server-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578695" comment="krb5-x86-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41619" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html" source="SUSE-SU"/>
		<description>

kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583870" comment="kvm-1.4.2-32.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583870" comment="kvm-1.4.2-32.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41620" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Other bugs fixed:
- To assist users past the migration incompatibility discussed in
  bsc#950590 (restore migration compatibility with SLE11 SP3 and
  SLE12, at the unfortunate expense to prior SLE11 SP4 kvm release
  compatability when a virtio-net device is used), print a message
  which references the support document TID 7017048.
  See https://www.suse.com/support/kb/doc.php?id=7017048
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
- Fix kvm live migration fails between sles11 sp3 and sp4 (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-04"/>
	<updated date="2016-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583871" comment="kvm-1.4.2-35.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583871" comment="kvm-1.4.2-35.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41621" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="895528" ref_url="https://bugzilla.suse.com/895528" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="934069" ref_url="https://bugzilla.suse.com/934069" source="BUGZILLA"/>
		<reference ref_id="936132" ref_url="https://bugzilla.suse.com/936132" source="BUGZILLA"/>
		<reference ref_id="940929" ref_url="https://bugzilla.suse.com/940929" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945987" ref_url="https://bugzilla.suse.com/945987" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="947159" ref_url="https://bugzilla.suse.com/947159" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961333" ref_url="https://bugzilla.suse.com/961333" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961556" ref_url="https://bugzilla.suse.com/961556" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="970036" ref_url="https://bugzilla.suse.com/970036" source="BUGZILLA"/>
		<reference ref_id="970037" ref_url="https://bugzilla.suse.com/970037" source="BUGZILLA"/>
		<reference ref_id="975128" ref_url="https://bugzilla.suse.com/975128" source="BUGZILLA"/>
		<reference ref_id="975136" ref_url="https://bugzilla.suse.com/975136" source="BUGZILLA"/>
		<reference ref_id="975700" ref_url="https://bugzilla.suse.com/975700" source="BUGZILLA"/>
		<reference ref_id="976109" ref_url="https://bugzilla.suse.com/976109" source="BUGZILLA"/>
		<reference ref_id="978158" ref_url="https://bugzilla.suse.com/978158" source="BUGZILLA"/>
		<reference ref_id="978160" ref_url="https://bugzilla.suse.com/978160" source="BUGZILLA"/>
		<reference ref_id="980711" ref_url="https://bugzilla.suse.com/980711" source="BUGZILLA"/>
		<reference ref_id="980723" ref_url="https://bugzilla.suse.com/980723" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<reference ref_id="CVE-2016-2858" ref_url="https://www.suse.com/security/cve/CVE-2016-2858/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix 33 security issues.

These security issues were fixed:
- CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711)
- CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723)
- CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158)
- CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160)
- CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109)
- CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969)
- CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350)
- CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036)
- CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037)
- CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128)
- CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136)
- CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700)
- CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069)
- CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393)
- CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508)
- CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987).
- CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929).
- CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159).
- CVE-2015-7549: PCI null pointer dereferences (bsc#958917).
- CVE-2015-8504: VNC floating point exception (bsc#958491).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005).
- CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358).
- CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334).
- CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725).
- CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332).
- CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691).
- CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320).
- CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782).
- CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413).

This non-security issue was fixed:
- Fix case of IDE interface needing busy status set before flush (bsc#936132)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-11"/>
	<updated date="2016-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936132">SUSE bug 936132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970036">SUSE bug 970036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975128">SUSE bug 975128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2858/">CVE-2016-2858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583872" comment="kvm-1.4.2-44.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583872" comment="kvm-1.4.2-44.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41622" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="982017" ref_url="https://bugzilla.suse.com/982017" source="BUGZILLA"/>
		<reference ref_id="982018" ref_url="https://bugzilla.suse.com/982018" source="BUGZILLA"/>
		<reference ref_id="982019" ref_url="https://bugzilla.suse.com/982019" source="BUGZILLA"/>
		<reference ref_id="982222" ref_url="https://bugzilla.suse.com/982222" source="BUGZILLA"/>
		<reference ref_id="982223" ref_url="https://bugzilla.suse.com/982223" source="BUGZILLA"/>
		<reference ref_id="982285" ref_url="https://bugzilla.suse.com/982285" source="BUGZILLA"/>
		<reference ref_id="982959" ref_url="https://bugzilla.suse.com/982959" source="BUGZILLA"/>
		<reference ref_id="983961" ref_url="https://bugzilla.suse.com/983961" source="BUGZILLA"/>
		<reference ref_id="983982" ref_url="https://bugzilla.suse.com/983982" source="BUGZILLA"/>
		<reference ref_id="991080" ref_url="https://bugzilla.suse.com/991080" source="BUGZILLA"/>
		<reference ref_id="991466" ref_url="https://bugzilla.suse.com/991466" source="BUGZILLA"/>
		<reference ref_id="996441" ref_url="https://bugzilla.suse.com/996441" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix 16 security issues.

These security issues were fixed:
- CVE-2015-6815: e1000 NIC emulation support was vulnerable to an infinite loop issue. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS.  (bsc#944697).
- CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013).
- CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012).
- CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223).
- CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222).
- CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017).
- CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018).
- CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959).
- CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982).
- CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080).
- CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466).
- CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-25"/>
	<updated date="2016-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583873" comment="kvm-1.4.2-47.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583873" comment="kvm-1.4.2-47.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41623" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007450" ref_url="https://bugzilla.suse.com/1007450" source="BUGZILLA"/>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues:

- Address various security/stability issues
 * Fix OOB access in xlnx.xpx-ethernetlite emulation (CVE-2016-7161 bsc#1001151)
 * Fix OOB access in VMware SVGA emulation (CVE-2016-7170 bsc#998516)
 * Fix DOS in ColdFire Fast Ethernet Controller emulation
   (CVE-2016-7908 bsc#1002550)
 * Fix DOS in USB xHCI emulation (CVE-2016-8576 bsc#1003878)
 * Fix DOS in virtio-9pfs (CVE-2016-8578 bsc#1003894)
 * Fix DOS in virtio-9pfs (CVE-2016-9105 bsc#1007494)
 * Fix DOS in virtio-9pfs (CVE-2016-8577 bsc#1003893)
 * Plug data leak in virtio-9pfs interface (CVE-2016-9103 bsc#1007454)
 * Fix DOS in virtio-9pfs interface (CVE-2016-9102 bsc#1007450)
 * Fix DOS in virtio-9pfs (CVE-2016-9106 bsc#1007495)
 * Fix DOS in 16550A UART emulation (CVE-2016-8669 bsc#1004707)
 * Fix DOS in PC-Net II emulation (CVE-2016-7909 bsc#1002557)
 * Fix DOS in PRO100 emulation (CVE-2016-9101 bsc#1007391)
 * Fix DOS in RTL8139 emulation (CVE-2016-8910 bsc#1006538)
 * Fix DOS in Intel HDA controller emulation (CVE-2016-8909 bsc#1006536)
 * Fix DOS in virtio-9pfs (CVE-2016-9104 bsc#1007493)
 * Fix DOS in JAZZ RC4030 emulation (CVE-2016-8667 bsc#1004702)

- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE11-SP4
- Remove semi-contradictory and now determined erroneous statement
  in kvm-supported.txt regarding not running ntp in kvm guest when
  kvm-clock is used. It is now recommended to use ntp in guest in
  this case.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583874" comment="kvm-1.4.2-50.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583874" comment="kvm-1.4.2-50.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41624" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015048" ref_url="https://bugzilla.suse.com/1015048" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)

These non-security issues were fixed:

- Fixed various inaccuracies in cirrus vga device emulation
- Fixed virtio interface failure (bsc#1015048)
- Fixed graphical update errors introduced by previous security fix (bsc#1016779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015048">SUSE bug 1015048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583875" comment="kvm-1.4.2-59.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583875" comment="kvm-1.4.2-59.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41625" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031051" ref_url="https://bugzilla.suse.com/1031051" source="BUGZILLA"/>
		<reference ref_id="1034044" ref_url="https://bugzilla.suse.com/1034044" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1038396" ref_url="https://bugzilla.suse.com/1038396" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="1045035" ref_url="https://bugzilla.suse.com/1045035" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1049785" ref_url="https://bugzilla.suse.com/1049785" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes several issues.

These security issues were fixed:

- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674).
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334).
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585).
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122).
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-6505: The ohci_service_ed_list function allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866)
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159)
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801)
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296)
- Privilege escalation in TCG mode (bsc#1030624)

These non-security issues were fixed:

- bsc#1038396: Fixed 12 tempest tests
- bsc#1045035: Fixed regression introduced by previous virtfs security fixes
- bsc#1034044: Prevent KVM guests stuck when waiting for sg_io() completion
- bsc#1031051: Prevent I/O errors when using pvmove with disk device=lun
- bsc#1049785: Make virsh dump output readable by crash 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-09"/>
	<updated date="2017-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031051">SUSE bug 1031051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034044">SUSE bug 1034044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038396">SUSE bug 1038396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045035">SUSE bug 1045035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049785">SUSE bug 1049785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583876" comment="kvm-1.4.2-60.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583876" comment="kvm-1.4.2-60.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41626" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1026612" ref_url="https://bugzilla.suse.com/1026612" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" source="SUSE-SU"/>
		<description>


This update for kvm fixes the following issues:

Also a mitigation for a security flaw has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

Security fixes have been applied:

- CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc infrastructure (bsc#1026612)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583877" comment="kvm-1.4.2-60.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583877" comment="kvm-1.4.2-60.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41627" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- This update has the next round of Spectre v2 related patches,
  which now integrates with corresponding changes in libvirt. A
  January 2018 release of qemu initially addressed the Spectre v2
  vulnerability for KVM guests by exposing the spec-ctrl feature
  for all x86 vcpu types, which was the quick and dirty approach,
  but not the proper solution. We remove that initial patch and now
  rely on patches from upstream. This update defines spec_ctrl and
  ibpb cpu feature flags as well as new cpu models which are clones
  of existing models with either -IBRS or -IBPB added to the end of
  the model name. These new vcpu models explicitly include the new
  feature(s), whereas the feature flags can be added to the cpu
  parameter as with other features. In short, for continued Spectre
  v2 protection, ensure that either the appropriate cpu feature
  flag is added to the QEMU command-line, or one of the new cpu
  models is used. Although migration from older versions is
  supported, the new cpu features won't be properly exposed to the
  guest until it is restarted with the cpu features explicitly
  added. A reboot is insufficient.
- A warning patch is added which attempts to detect a migration
  from a qemu version which had the quick and dirty fix (it only
  detects certain cases, but hopefully is helpful.)
  For additional information on Spectre v2 as it relates to QEMU,
  see: https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
  (CVE-2017-5715 bsc#1068032)
- A patch is added to continue to detect Spectre v2 mitigation
  features (as shown by cpuid), and if found provide that feature
  to guests, even if running on older KVM (kernel) versions which
  do not yet expose that feature to QEMU. (bsc#1082276)
  These two patches will be removed when we can reasonably assume
  everyone is running with the appropriate updates.

- Security fixes for the following CVE issues:
  (bsc#1076114 CVE-2018-5683)
  (bsc#1083291 CVE-2018-7550)
- This patch is already included, add here for CVE track
  (bsc#1076179 CVE-2017-18030)

- Toolchain changes have cause the built size of pxe-virtio.rom to
  exceed 64K. Tweak rarely used strings in code to reduce size of
  the binary so it fits again.

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-25"/>
	<updated date="2018-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583878" comment="kvm-1.4.2-60.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583878" comment="kvm-1.4.2-60.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41628" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes one security issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).
  
  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.
  
  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.
  
  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.
  
  spec-ctrl and ssbd support is also required in the host.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583879" comment="kvm-1.4.2-60.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583879" comment="kvm-1.4.2-60.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41629" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS
  (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-07"/>
	<updated date="2018-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583880" comment="kvm-1.4.2-60.15.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583880" comment="kvm-1.4.2-60.15.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41630" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1112185" ref_url="https://bugzilla.suse.com/1112185" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
- CVE-2018-18438: Fixed integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value (bnc#1112185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-04"/>
	<updated date="2018-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583881" comment="kvm-1.4.2-60.18.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583881" comment="kvm-1.4.2-60.18.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41631" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1109544" ref_url="https://bugzilla.suse.com/1109544" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).

Non-security issue fixed:

- Fixed LAPIC TSC deadline timer save/restore (bsc#1109544)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-15"/>
	<updated date="2019-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109544">SUSE bug 1109544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583882" comment="kvm-1.4.2-60.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583882" comment="kvm-1.4.2-60.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41632" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583883" comment="kvm-1.4.2-60.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41633" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583884" comment="kvm-1.4.2-60.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41634" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

Security issues fixed:

- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-11"/>
	<updated date="2020-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583885" comment="kvm-1.4.2-60.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41635" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:

- Fix OOB read and write due to integer overflow in sm501_2d_operation() in hw/display/sm501.c (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix DoS in e1000 emulated device (CVE-2021-20257 bsc#1182577)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583886" comment="kvm-1.4.2-60.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41636" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1186473" ref_url="https://bugzilla.suse.com/1186473" source="BUGZILLA"/>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<description>
This update for kvm fixes the following issues:


- CVE-2021-3594: invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187367)
- CVE-2021-3592: invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3416: infinite loop in loopback mode may lead to stack overflow. (bsc#1186473)
- CVE-2020-15469: MMIO ops null pointer dereference may lead to DoS. (bsc#1173612)
- CVE-2020-11947: iscsi_aio_ioctl_cb in block/iscsi.c has a heap-based buffer over-read. (bsc#1180523)
- CVE-2021-20221: out-of-bound heap buffer access via an interrupt ID field. (bsc#1181933)
- CVE-2020-25707: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c. (bsc#1178683)
- CVE-2020-15863: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c. (bsc#1174386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626555" comment="kvm-1.4.2-60.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41637" version="1" class="patch">
	<metadata>
		<title>Security update for lha (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="962528" ref_url="https://bugzilla.suse.com/962528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1925" ref_url="https://www.suse.com/security/cve/CVE-2016-1925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002168.html" source="SUSE-SU"/>
		<description>

lha was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1925: Buffer Overflow while parsing level0 and level1 headers (bsc#962528).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-28"/>
	<updated date="2016-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/962528">SUSE bug 962528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1925/">CVE-2016-1925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583887" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583887" comment="lha-1.14.0.894-3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41638" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003689.html" source="SUSE-SU"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583888" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583889" comment="libapr-util1-32bit-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583890" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583888" comment="libapr-util1-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583889" comment="libapr-util1-32bit-1.3.4-12.22.23.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583890" comment="libapr-util1-dbd-sqlite3-1.3.4-12.22.23.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41639" version="1" class="patch">
	<metadata>
		<title>Security update for libapr1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064982" ref_url="https://bugzilla.suse.com/1064982" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004058.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:
  
- CVE-2017-12613: DoS or information disclosure in pr_exp_time*() or apr_os_exp_time*() functions (bsc#1064982).

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<cve impact="moderate" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583891" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583892" comment="libapr1-32bit-1.3.3-11.18.19.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583891" comment="libapr1-1.3.3-11.18.19.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583892" comment="libapr1-32bit-1.3.3-11.18.19.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41640" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010438.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30499: Fixed a memory corruption issue when exporting troff sources (bsc#1184751).
- CVE-2021-30498: Fixed a memory corruption issue when exporting TGA images (bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670912" comment="libcaca-0.99.beta13b-49.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41641" version="1" class="patch">
	<metadata>
		<title>Security update for libcap-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="876832" ref_url="https://bugzilla.suse.com/876832" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3215" ref_url="https://www.suse.com/security/cve/CVE-2014-3215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002617.html" source="SUSE-SU"/>
		<description>
libcap-ng was updated to fix one security issue.

This security issue was fixed:

- CVE-2014-3215: seunshare in policycoreutils (which uses libcap-ng) is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which made it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges (bsc#876832).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/876832">SUSE bug 876832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3215/">CVE-2014-3215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583893" comment="libcap-ng-utils-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583894" comment="libcap-ng0-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583895" comment="libcap-ng0-32bit-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583893" comment="libcap-ng-utils-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583894" comment="libcap-ng0-0.6.3-1.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583895" comment="libcap-ng0-32bit-0.6.3-1.9.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41642" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002530.html" source="SUSE-SU"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583896" comment="libcares2-1.7.4-7.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583896" comment="libcares2-1.7.4-7.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41643" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009278.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630425" comment="libcares2-1.7.4-7.10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41644" version="1" class="patch">
	<metadata>
		<title>Security update for libcgroup1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1100365" ref_url="https://bugzilla.suse.com/1100365" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004358.html" source="SUSE-SU"/>
		<description>
This update for libcgroup1 fixes the following issues:

Security issue fixed:

- CVE-2018-14348: Fix daemon that creates /var/log/cgred with mode 0666 (bsc#1100365).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-30"/>
	<updated date="2018-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583897" comment="libcgroup1-0.41.rc1-7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583897" comment="libcgroup1-0.41.rc1-7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41645" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009454.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631920" comment="libcroco-0_6-3-0.6.1-122.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631921" comment="libcroco-0_6-3-32bit-0.6.1-122.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41646" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003718.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_5 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583898" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583899" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583900" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583901" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583902" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583903" comment="libdb-4_5-x86-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583898" comment="db-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583899" comment="db-utils-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583900" comment="db-utils-doc-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583901" comment="libdb-4_5-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583902" comment="libdb-4_5-32bit-4.5.20-97.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583903" comment="libdb-4_5-x86-4.5.20-97.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41647" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009358.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629509" comment="libesmtp-1.0.4-157.18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41648" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) (backport for 2.0.21)
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583904" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583904" comment="libevent-1_4-2-1.4.5-24.24.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41649" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003626.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following security issue:

- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583905" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583906" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583907" comment="libexif-x86-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583905" comment="libexif-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583906" comment="libexif-32bit-0.6.17-2.14.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583907" comment="libexif-x86-0.6.17-2.14.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41650" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583908" comment="libexif-0.6.17-2.14.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583909" comment="libexif-32bit-0.6.17-2.14.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41651" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578758" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578759" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578760" comment="libgcrypt11-x86-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41652" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="994157" ref_url="https://bugzilla.suse.com/994157" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<description>

This update for libgcrypt fixes the following issues:

  - RNG prediction vulnerability (bsc#994157, CVE-2016-6313)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-21"/>
	<updated date="2016-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583910" comment="libgcrypt11-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583911" comment="libgcrypt11-32bit-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583912" comment="libgcrypt11-x86-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583910" comment="libgcrypt11-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583911" comment="libgcrypt11-32bit-1.5.0-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583912" comment="libgcrypt11-x86-1.5.0-0.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41653" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003013.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening a against local side-channel attack in RSA key handling has been added (bsc#1046607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583913" comment="libgcrypt11-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583914" comment="libgcrypt11-32bit-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583915" comment="libgcrypt11-x86-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583913" comment="libgcrypt11-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583914" comment="libgcrypt11-32bit-1.5.0-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583915" comment="libgcrypt11-x86-1.5.0-0.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41654" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009053.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583916" comment="libgcrypt11-1.5.0-0.26.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583917" comment="libgcrypt11-32bit-1.5.0-0.26.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41655" version="1" class="patch">
	<metadata>
		<title>Recommended update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986632" ref_url="https://bugzilla.suse.com/986632" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="986642" ref_url="https://bugzilla.suse.com/986642" source="BUGZILLA"/>
		<reference ref_id="986658" ref_url="https://bugzilla.suse.com/986658" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5823" ref_url="https://www.suse.com/security/cve/CVE-2016-5823/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5825" ref_url="https://www.suse.com/security/cve/CVE-2016-5825/" source="CVE"/>
		<reference ref_id="CVE-2016-5826" ref_url="https://www.suse.com/security/cve/CVE-2016-5826/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:

- CVE-2016-5823: The icalproperty_new_clone function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (use-after-free) via a crafted ics file. (bnc#986632)
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5825: The icalparser_parse_string function in libical 0.47 and 1.0 allows remote
  attackers to cause a denial of service (out-of-bounds heap read) via a crafted ics file.
  (bsc#986642)
- CVE-2016-5826: The parser_get_next_char function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) by crafting a string to the
  icalparser_parse_string function. (bsc#986658)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bnc#1015964)

Bug fixes:

- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986632">SUSE bug 986632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5823/">CVE-2016-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5825/">CVE-2016-5825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5826/">CVE-2016-5826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583918" comment="libical0-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564664" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583918" comment="libical0-0.43-1.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564664" comment="libical0-32bit-0.43-1.10.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41656" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="923241" ref_url="https://bugzilla.suse.com/923241" source="BUGZILLA"/>
		<reference ref_id="990189" ref_url="https://bugzilla.suse.com/990189" source="BUGZILLA"/>
		<reference ref_id="990190" ref_url="https://bugzilla.suse.com/990190" source="BUGZILLA"/>
		<reference ref_id="990191" ref_url="https://bugzilla.suse.com/990191" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<description>

This update for libidn fixes the following issues:

- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190) 

- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241) 

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-12"/>
	<updated date="2016-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583919" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583920" comment="libidn-32bit-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583921" comment="libidn-x86-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583919" comment="libidn-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583920" comment="libidn-32bit-1.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583921" comment="libidn-x86-1.10-6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41657" version="1" class="patch">
	<metadata>
		<title>Security update for libidn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056450" ref_url="https://bugzilla.suse.com/1056450" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003879.html" source="SUSE-SU"/>
		<description>
This update for libidn fixes one issues.

This security issue was fixed:

- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
  allowed remote attackers to cause a denial of service or possibly have
  unspecified other impact (bsc#1056450).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-08"/>
	<updated date="2018-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583922" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583923" comment="libidn-32bit-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583924" comment="libidn-x86-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583922" comment="libidn-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583923" comment="libidn-32bit-1.10-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583924" comment="libidn-x86-1.10-7.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41658" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979261" ref_url="https://bugzilla.suse.com/979261" source="BUGZILLA"/>
		<reference ref_id="979906" ref_url="https://bugzilla.suse.com/979906" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<description>

This update for libksba fixes the following issues:

- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)

Also adding reliability fixes from v1.3.4.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583925" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583925" comment="libksba-1.0.4-1.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41659" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578778" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41660" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101)
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097)  ()
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095)
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583926" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583927" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583928" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583926" comment="liblouis-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583927" comment="liblouis0-1.7.0-1.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583928" comment="python-louis-1.7.0-1.3.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41661" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062458" ref_url="https://bugzilla.suse.com/1062458" source="BUGZILLA"/>
		<reference ref_id="1067336" ref_url="https://bugzilla.suse.com/1067336" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003411.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes the following issues:

Security issues fixed:

- CVE-2017-15101: Buffer overflow in findTable (bsc#1067336).
- CVE-2014-8184: stack-based buffer overflow in findTable() (bsc#1062458).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583929" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583930" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583931" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583929" comment="liblouis-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583930" comment="liblouis0-1.7.0-1.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583931" comment="python-louis-1.7.0-1.3.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41662" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1095825" ref_url="https://bugzilla.suse.com/1095825" source="BUGZILLA"/>
		<reference ref_id="1095826" ref_url="https://bugzilla.suse.com/1095826" source="BUGZILLA"/>
		<reference ref_id="1095827" ref_url="https://bugzilla.suse.com/1095827" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004520.html" source="SUSE-SU"/>
		<description>
This update for liblouis, python-louis fixes the following issues:

Security issues fixed:

- CVE-2018-11684: Fixed stack-based buffer overflow in the function
  includeFile() in compileTranslationTable.c (bsc#1095826)
- CVE-2018-11685: Fixed a stack-based buffer overflow in the function
  compileHyphenation() in compileTranslationTable.c (bsc#1095825)
- CVE-2018-11683: Fix a stack-based buffer overflow in the function parseChars()
  in compileTranslationTable.c (bsc#1095827)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095825">SUSE bug 1095825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095826">SUSE bug 1095826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095827">SUSE bug 1095827</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583932" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583933" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583934" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583932" comment="liblouis-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583933" comment="liblouis0-1.7.0-1.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583934" comment="python-louis-1.7.0-1.3.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41663" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1109319" ref_url="https://bugzilla.suse.com/1109319" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17294" ref_url="https://www.suse.com/security/cve/CVE-2018-17294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005267.html" source="SUSE-SU"/>
		<description>
This update for liblouis and python-louis fixes the following issue:

Security issue fixed: 

- CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function
  which could allow a remote attacker to cause Denail of Service (bsc#1109319).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1109319">SUSE bug 1109319</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17294/">CVE-2018-17294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583935" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583936" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583937" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583935" comment="liblouis-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583936" comment="liblouis0-1.7.0-1.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583937" comment="python-louis-1.7.0-1.3.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41664" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578786" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41665" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1113038" ref_url="https://bugzilla.suse.com/1113038" source="BUGZILLA"/>
		<reference ref_id="1113039" ref_url="https://bugzilla.suse.com/1113039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

Security issues fixed:

- CVE-2018-18584: The CAB block input buffer was one byte too small for the maximal Quantum block, leading to an out-of-bounds write. (bsc#1113038)
- CVE-2018-18585: chmd_read_headers accepted a filename that has '\0' as its first or second character (such as the '/\0' name). (bsc#1113039)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583938" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583938" comment="libmspack0-0.0.20060920alpha-74.11.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41666" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583939" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583939" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41667" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578811" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578812" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578813" comment="libpng12-0-x86-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41668" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578814" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578815" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578816" comment="libpng12-0-x86-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41669" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<description>

This update for libpng12-0 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-31"/>
	<updated date="2017-03-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583940" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583941" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583942" comment="libpng12-0-x86-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583940" comment="libpng12-0-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583941" comment="libpng12-0-32bit-1.2.31-5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583942" comment="libpng12-0-x86-1.2.31-5.43.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41670" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578891" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578892" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578893" comment="librsvg-x86-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578894" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41671" version="1" class="patch">
	<metadata>
		<title>Security update for libsamplerate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033564" ref_url="https://bugzilla.suse.com/1033564" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002819.html" source="SUSE-SU"/>
		<description>

This update for libsamplerate fixes the following issues:

- CVE-2017-7697: Fixed a buffer overflow in calc_output_single.  (bsc#1033564)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583943" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583944" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583945" comment="libsamplerate-x86-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583943" comment="libsamplerate-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583944" comment="libsamplerate-32bit-0.1.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583945" comment="libsamplerate-x86-0.1.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41672" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578898" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578899" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578900" comment="libsndfile-x86-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41673" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-7585,CVE-2017-7741,CVE-2017-7742: Some stack-based buffer overflows via a specially crafted FLAC
  file were fixed (error in the 'flac_buffer_copy()' function) (bsc#1033054, bsc#1033914, bsc#1033915).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583946" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583947" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583948" comment="libsndfile-x86-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583946" comment="libsndfile-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583947" comment="libsndfile-32bit-1.0.20-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583948" comment="libsndfile-x86-1.0.20-2.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41674" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8362: invalid memory read in flac_buffer_copy (flac.c) (bsc#1036943)
- CVE-2017-8365: global buffer overflow in i2les_array (pcm.c) (bsc#1036946)
- CVE-2017-8361: global buffer overflow in flac_buffer_copy (flac.c) (bsc#1036944)
- CVE-2017-8363: heap-based buffer overflow in flac_buffer_copy (flac.c) (bsc#1036945)
- CVE-2017-7585: stack-based buffer overflow via a specially crafted FLAC file (bsc#1033054)
   		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583949" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583950" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583951" comment="libsndfile-x86-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583949" comment="libsndfile-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583950" comment="libsndfile-32bit-1.0.20-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583951" comment="libsndfile-x86-1.0.20-2.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41675" version="1" class="patch">
	<metadata>
		<title>Recommended update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<description>

- This update for libsndfile fixes a memory leak in an error path.(bsc#1038856)

- CVE-2017-16942: A divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file. (bsc#1069874)
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583952" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583953" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583954" comment="libsndfile-x86-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583952" comment="libsndfile-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583953" comment="libsndfile-32bit-1.0.20-2.19.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583954" comment="libsndfile-x86-1.0.20-2.19.7.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41676" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1071767" ref_url="https://bugzilla.suse.com/1071767" source="BUGZILLA"/>
		<reference ref_id="1071777" ref_url="https://bugzilla.suse.com/1071777" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

Security issues fixed:

- CVE-2017-17456: Prevent segmentation fault in the function d2alaw_array() that may have lead to a remote DoS (bsc#1071777).
- CVE-2017-17457: Prevent segmentation fault in the function d2ulaw_array() that may have lead to a remote DoS, a different vulnerability than CVE-2017-14246 (bsc#1071767).
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header that could have been used for a denial of service attack (bsc#1117954).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-02"/>
	<updated date="2019-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583955" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583956" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583957" comment="libsndfile-x86-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583955" comment="libsndfile-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583956" comment="libsndfile-32bit-1.0.20-2.19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583957" comment="libsndfile-x86-1.0.20-2.19.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41677" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626762" comment="libsndfile-1.0.20-2.19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626763" comment="libsndfile-32bit-1.0.20-2.19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41678" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009970.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662534" comment="libsndfile-1.0.20-2.19.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662535" comment="libsndfile-32bit-1.0.20-2.19.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41679" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583958" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583958" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41680" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed:	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenicate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-19"/>
	<updated date="2019-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583959" comment="libssh2-1-1.4.3-17.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583959" comment="libssh2-1-1.4.3-17.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41681" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

- Store but don't use keys of unsupported types in the known_hosts file [bsc#1091236]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583960" comment="libssh2-1-1.4.3-17.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41682" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583961" comment="libssh2-1-1.4.3-17.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41683" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-06"/>
	<updated date="2019-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583962" comment="libssh2-1-1.4.3-17.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41684" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938945" ref_url="https://bugzilla.suse.com/938945" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- CVE-2015-4000: Disable 512-bit export-grade cryptography to prevent Logjam 
  vulnerability (bsc#938945) 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-26"/>
	<updated date="2016-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583963" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583963" comment="libtcnative-1-0-1.3.3-12.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41685" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1078679" ref_url="https://bugzilla.suse.com/1078679" source="BUGZILLA"/>
		<reference ref_id="1103347" ref_url="https://bugzilla.suse.com/1103347" source="BUGZILLA"/>
		<reference ref_id="1103348" ref_url="https://bugzilla.suse.com/1103348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698/" source="CVE"/>
		<reference ref_id="CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019/" source="CVE"/>
		<reference ref_id="CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html" source="SUSE-SU"/>
		<description>
This update for libtcnative-1-0 to version 1.1.34 fixes the following issues:

- CVE-2017-15698: Fixed an improper handling of fields with more than 127 bytes 
  which could allow invalid client certificates to be accepted (bsc#1078679).
- CVE-2018-8019: When using an OCSP responder did not correctly handle invalid
  responses. This allowed for revoked client certificates to be incorrectly
  identified. It was therefore possible for users to authenticate with revoked
  certificates when using mutual TLS (bsc#1103348).
- CVE-2018-8020: Did not properly check OCSP pre-produced responses. Revoked
  client certificates may have not been properly identified, allowing for users
  to authenticate with revoked certificates to connections that require mutual
  TLS (bsc#1103347).

For a complete list of changes please see
http://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583964" comment="libtcnative-1-0-1.3.4-12.5.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41686" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc, rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00080.html" source="SUSE-SU"/>
		<description>

This update for libtirpc and rpcbind fixes the following issues:

- CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-31"/>
	<updated date="2017-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583965" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583966" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583965" comment="libtirpc1-0.2.1-1.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583966" comment="rpcbind-0.1.6+git20080930-6.27.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41687" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004512.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

- Prevent remote crash of RPC services (bsc#968175)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583967" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583967" comment="libtirpc1-0.2.1-1.13.3.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41688" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106517" ref_url="https://bugzilla.suse.com/1106517" source="BUGZILLA"/>
		<reference ref_id="1106519" ref_url="https://bugzilla.suse.com/1106519" source="BUGZILLA"/>
		<reference ref_id="968175" ref_url="https://bugzilla.suse.com/968175" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14621" ref_url="https://www.suse.com/security/cve/CVE-2018-14621/" source="CVE"/>
		<reference ref_id="CVE-2018-14622" ref_url="https://www.suse.com/security/cve/CVE-2018-14622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004670.html" source="SUSE-SU"/>
		<description>
This update for libtirpc fixes the following issues:

Security issues fixed:

- CVE-2018-14621: libtirpc: Infinite loop in EMFILE case in svc_vc.c (bsc#1106519)
- CVE-2018-14622: libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c (bsc#1106517)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-15"/>
	<updated date="2018-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106517">SUSE bug 1106517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106519">SUSE bug 1106519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968175">SUSE bug 968175</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14621/">CVE-2018-14621</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14622/">CVE-2018-14622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583968" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583968" comment="libtirpc1-0.2.1-1.13.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41689" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="948516" ref_url="https://bugzilla.suse.com/948516" source="BUGZILLA"/>
		<reference ref_id="948686" ref_url="https://bugzilla.suse.com/948686" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="959094" ref_url="https://bugzilla.suse.com/959094" source="BUGZILLA"/>
		<reference ref_id="960305" ref_url="https://bugzilla.suse.com/960305" source="BUGZILLA"/>
		<reference ref_id="961173" ref_url="https://bugzilla.suse.com/961173" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issue:
- CVE-2015-5313: directory directory traversal privilege
  escalation vulnerability. (bsc#953110)

Bugs fixed:
- bsc#960305: xenxs: support parsing and formatting vif bandwidth
- bsc#961173: xen: use correct domctl version in domaininfolist union
- bsc#959094: xen: Disable building xen-inotify subdriver. It is unmaintained
  and contains bugs that can cause client connection failures.
- bsc#948686: qemu: Use PAUSED state for domains that are starting up
- bsc#948516: Fix profile_status to distringuish between errors and unconfined
  domains.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-01"/>
	<updated date="2016-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948516">SUSE bug 948516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948686">SUSE bug 948686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959094">SUSE bug 959094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960305">SUSE bug 960305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961173">SUSE bug 961173</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583969" comment="libvirt-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583970" comment="libvirt-client-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583971" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583972" comment="libvirt-doc-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583973" comment="libvirt-lock-sanlock-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583969" comment="libvirt-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583970" comment="libvirt-client-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583971" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583972" comment="libvirt-doc-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583973" comment="libvirt-lock-sanlock-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41690" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952889" ref_url="https://bugzilla.suse.com/952889" source="BUGZILLA"/>
		<reference ref_id="970906" ref_url="https://bugzilla.suse.com/970906" source="BUGZILLA"/>
		<reference ref_id="987527" ref_url="https://bugzilla.suse.com/987527" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002174.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issues fixed:
- CVE-2016-5008: empty VNC password disables authentication (bsc#987527)

Bugs fixed:
- bsc#970906: Fixed a race condition in xenstore event handling.
- bsc#952889: Change hap setting to align with Xen behavior.
- Fixed 'make check' failures.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-03"/>
	<updated date="2016-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952889">SUSE bug 952889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970906">SUSE bug 970906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583974" comment="libvirt-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583975" comment="libvirt-client-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583976" comment="libvirt-client-32bit-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583977" comment="libvirt-doc-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583978" comment="libvirt-lock-sanlock-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583979" comment="perl-Sys-Virt-1.2.5-4.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583974" comment="libvirt-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583975" comment="libvirt-client-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583976" comment="libvirt-client-32bit-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583977" comment="libvirt-doc-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583978" comment="libvirt-lock-sanlock-1.2.5-15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583979" comment="perl-Sys-Virt-1.2.5-4.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41691" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025340" ref_url="https://bugzilla.suse.com/1025340" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003278.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1025340: Use xend for nodeGetFreeMemory API
- bsc#1026236: Add support for tsc timers on xen
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025340">SUSE bug 1025340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583980" comment="libvirt-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583981" comment="libvirt-client-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583982" comment="libvirt-client-32bit-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583983" comment="libvirt-doc-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583984" comment="libvirt-lock-sanlock-1.2.5-23.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583980" comment="libvirt-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583981" comment="libvirt-client-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583982" comment="libvirt-client-32bit-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583983" comment="libvirt-doc-1.2.5-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583984" comment="libvirt-lock-sanlock-1.2.5-23.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41692" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1055365" ref_url="https://bugzilla.suse.com/1055365" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1083061" ref_url="https://bugzilla.suse.com/1083061" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).
- CVE-2018-5748: Fixed possible denial of service when reading from QEMU monitor (bsc#1076500).


Non-security issues fixed:

- bsc#1083061: Fixed 'dumpxml --migratable' exports domain id in output on SLES11 SP4.
- bsc#1055365: Improve performance when listing hundreds of interfaces. 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055365">SUSE bug 1055365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083061">SUSE bug 1083061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583985" comment="libvirt-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583986" comment="libvirt-client-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583987" comment="libvirt-client-32bit-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583988" comment="libvirt-doc-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583989" comment="libvirt-lock-sanlock-1.2.5-23.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583985" comment="libvirt-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583986" comment="libvirt-client-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583987" comment="libvirt-client-32bit-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583988" comment="libvirt-doc-1.2.5-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583989" comment="libvirt-lock-sanlock-1.2.5-23.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41693" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: Added support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583990" comment="libvirt-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583991" comment="libvirt-client-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583992" comment="libvirt-client-32bit-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583993" comment="libvirt-doc-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583994" comment="libvirt-lock-sanlock-1.2.5-23.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583990" comment="libvirt-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583991" comment="libvirt-client-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583992" comment="libvirt-client-32bit-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583993" comment="libvirt-doc-1.2.5-23.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583994" comment="libvirt-lock-sanlock-1.2.5-23.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41694" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).    
- CVE-2019-3886: Fixed a information exposure which allowed to retrieve the guest
  hostname under readonly mode (bsc#1131595).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009583995" comment="libvirt-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583996" comment="libvirt-client-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583997" comment="libvirt-client-32bit-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583998" comment="libvirt-doc-1.2.5-23.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009583999" comment="libvirt-lock-sanlock-1.2.5-23.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41695" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt and libvirt-python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1133150" ref_url="https://bugzilla.suse.com/1133150" source="BUGZILLA"/>
		<reference ref_id="1134783" ref_url="https://bugzilla.suse.com/1134783" source="BUGZILLA"/>
		<reference ref_id="1140252" ref_url="https://bugzilla.suse.com/1140252" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10746" ref_url="https://www.suse.com/security/cve/CVE-2016-10746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005815.html" source="SUSE-SU"/>
		<description>
This update for libvirt and libvirt-python fixes the following issues:

libvirt:

- CVE-2016-10746: Fixed an authentication bypass where a guest agent with a read only connection could call virDomainGetTime API calls (bsc#1133150).
- rpc: increase the size of REMOTE_MIGRATE_COOKIE_MAX (bsc#1134783).

libvirt-python:

- Fixes a memory leak in libvirt-python (bsc#1140252)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-15"/>
	<updated date="2019-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134783">SUSE bug 1134783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140252">SUSE bug 1140252</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-10746/">CVE-2016-10746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584000" comment="libvirt-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584001" comment="libvirt-client-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584002" comment="libvirt-client-32bit-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584003" comment="libvirt-doc-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584004" comment="libvirt-lock-sanlock-1.2.5-23.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584005" comment="libvirt-python-1.2.5-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41696" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578958" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41697" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584006" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584007" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584008" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584009" comment="libvorbis-x86-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584006" comment="libvorbis-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584007" comment="libvorbis-32bit-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584008" comment="libvorbis-doc-1.2.0-79.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584009" comment="libvorbis-x86-1.2.0-79.20.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41698" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584010" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584011" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584012" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584013" comment="libvorbis-x86-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584010" comment="libvorbis-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584011" comment="libvorbis-32bit-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584012" comment="libvorbis-doc-1.2.0-79.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584013" comment="libvorbis-x86-1.2.0-79.20.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41699" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059812" ref_url="https://bugzilla.suse.com/1059812" source="BUGZILLA"/>
		<reference ref_id="1091072" ref_url="https://bugzilla.suse.com/1091072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

Security issues fixed:

- CVE-2018-10393: Fixed stack-based buffer over-read in bark_noise_hybridm (bsc#1091072).
- CVE-2017-14160: Fixed out-of-bounds access inside bark_noise_hybridmp function (bsc#1059812).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-16"/>
	<updated date="2018-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584014" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584015" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584016" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584017" comment="libvorbis-x86-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584014" comment="libvorbis-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584015" comment="libvorbis-32bit-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584016" comment="libvorbis-doc-1.2.0-79.20.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584017" comment="libvorbis-x86-1.2.0-79.20.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41700" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1091070" ref_url="https://bugzilla.suse.com/1091070" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004157.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

The following security issue was fixed:

  - Fixed the validation of channels in mapping0_forward(), which previously
    allowed remote attackers to cause a denial of service via specially crafted
    files (CVE-2018-10392, bsc#1091070)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584018" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584019" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584020" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584021" comment="libvorbis-x86-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584018" comment="libvorbis-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584019" comment="libvorbis-32bit-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584020" comment="libvorbis-doc-1.2.0-79.20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584021" comment="libvorbis-x86-1.2.0-79.20.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41701" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="972335" ref_url="https://bugzilla.suse.com/972335" source="BUGZILLA"/>
		<reference ref_id="975947" ref_url="https://bugzilla.suse.com/975947" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes two security issues:

- libxml2 limits the number of recursions an XML document can contain so to protect against the 'Billion Laughs' denial-of-service attack. Unfortunately, the underlying counter was not incremented properly in all necessary locations. Therefore, specially crafted XML documents could exhaust all available stack space and crash the XML parser without running into the recursion limit. This vulnerability has been fixed. (bsc#975947)

- When running in recovery mode, certain invalid XML documents would trigger an infinite recursion in libxml2 that ran until all stack space was exhausted. This vulnerability could have been used to facilitate a denial-of-sevice attack. (CVE-2016-3627, bsc#972335)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-03"/>
	<updated date="2016-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584022" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584023" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584024" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584025" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584026" comment="libxml2-x86-2.7.6-0.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584022" comment="libxml2-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584023" comment="libxml2-32bit-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584024" comment="libxml2-doc-2.7.6-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584025" comment="libxml2-python-2.7.6-0.40.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584026" comment="libxml2-x86-2.7.6-0.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41702" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963963" ref_url="https://bugzilla.suse.com/963963" source="BUGZILLA"/>
		<reference ref_id="965283" ref_url="https://bugzilla.suse.com/965283" source="BUGZILLA"/>
		<reference ref_id="978395" ref_url="https://bugzilla.suse.com/978395" source="BUGZILLA"/>
		<reference ref_id="981040" ref_url="https://bugzilla.suse.com/981040" source="BUGZILLA"/>
		<reference ref_id="981041" ref_url="https://bugzilla.suse.com/981041" source="BUGZILLA"/>
		<reference ref_id="981108" ref_url="https://bugzilla.suse.com/981108" source="BUGZILLA"/>
		<reference ref_id="981109" ref_url="https://bugzilla.suse.com/981109" source="BUGZILLA"/>
		<reference ref_id="981111" ref_url="https://bugzilla.suse.com/981111" source="BUGZILLA"/>
		<reference ref_id="981112" ref_url="https://bugzilla.suse.com/981112" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="981115" ref_url="https://bugzilla.suse.com/981115" source="BUGZILLA"/>
		<reference ref_id="981548" ref_url="https://bugzilla.suse.com/981548" source="BUGZILLA"/>
		<reference ref_id="981549" ref_url="https://bugzilla.suse.com/981549" source="BUGZILLA"/>
		<reference ref_id="981550" ref_url="https://bugzilla.suse.com/981550" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8806" ref_url="https://www.suse.com/security/cve/CVE-2015-8806/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-2073" ref_url="https://www.suse.com/security/cve/CVE-2016-2073/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issues: 

- CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread
  was fixed in libxml2/dict.c  [bsc#963963, bsc#965283, bsc#981114].
- CVE-2016-4483: Code was added to avoid an out of bound access when
  serializing malformed strings [bsc#978395].
- CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040].
- CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041].
- CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108].
- CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109].
- CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral
  and htmlParseSystemiteral [bsc#981111].
- CVE-2016-1838: Fixed a heap-based buffer overread in
  xmlParserPrintFileContextInternal [bsc#981112].
- CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115].
- CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548].
- CVE-2016-4448: Fixed some format string warnings with possible format
  string vulnerability [bsc#981549],
- CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550].
- CVE-2016-3705: Fixed missing increment of recursion counter.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965283">SUSE bug 965283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8806/">CVE-2015-8806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2073/">CVE-2016-2073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584027" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584028" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584029" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584030" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584031" comment="libxml2-x86-2.7.6-0.44.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584027" comment="libxml2-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584028" comment="libxml2-32bit-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584029" comment="libxml2-doc-2.7.6-0.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584030" comment="libxml2-python-2.7.6-0.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584031" comment="libxml2-x86-2.7.6-0.44.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41703" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2016-4658: Use after free via namespace node in XPointer ranges (bsc#1005544).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-26"/>
	<updated date="2016-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584032" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584033" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584034" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584035" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584036" comment="libxml2-x86-2.7.6-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584032" comment="libxml2-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584033" comment="libxml2-32bit-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584034" comment="libxml2-doc-2.7.6-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584035" comment="libxml2-python-2.7.6-0.50.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584036" comment="libxml2-x86-2.7.6-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41704" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002563.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-9318: libxml2 did not offer a flag directly indicating that the current document may be read but other files may not be opened, which made it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document (bsc#1010675).
* Prevent NULL dereference in xpointer.c and xmlDumpElementContent, and infinite recursion in xmlParseConditionalSections when in recovery mode(bnc#1014873)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-16"/>
	<updated date="2017-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584037" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584038" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584039" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584040" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584041" comment="libxml2-x86-2.7.6-0.64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584037" comment="libxml2-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584038" comment="libxml2-32bit-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584039" comment="libxml2-doc-2.7.6-0.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584040" comment="libxml2-python-2.7.6-0.64.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584041" comment="libxml2-x86-2.7.6-0.64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41705" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

Security issues fixed:

- CVE-2017-9050: heap-based buffer overflow (xmlDictAddString func) [bsc#1039069, bsc#1039661]
- CVE-2017-9049: heap-based buffer overflow (xmlDictComputeFastKey func) [bsc#1039066]
- CVE-2017-9048: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039063]
- CVE-2017-9047: stack overflow vulnerability (xmlSnprintfElementContent func) [bsc#1039064]

A clarification for the previously released update: For CVE-2016-9318 we decided
not to ship a fix since it can break existing setups. Please take appropriate
actions if you parse untrusted XML files and use the new -noxxe flag if
possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-13"/>
	<updated date="2017-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584042" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584043" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584044" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584045" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584046" comment="libxml2-x86-2.7.6-0.69.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584042" comment="libxml2-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584043" comment="libxml2-32bit-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584044" comment="libxml2-doc-2.7.6-0.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584045" comment="libxml2-python-2.7.6-0.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584046" comment="libxml2-x86-2.7.6-0.69.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41706" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
* CVE-2017-7375: Prevented an unwanted external entity reference (bsc#1044894)
* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584047" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584048" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584049" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584050" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584051" comment="libxml2-x86-2.7.6-0.76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584047" comment="libxml2-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584048" comment="libxml2-32bit-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584049" comment="libxml2-doc-2.7.6-0.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584050" comment="libxml2-python-2.7.6-0.76.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584051" comment="libxml2-x86-2.7.6-0.76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41707" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003125.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2017-8872: Out-of-bounds read could lead to application crash (bsc#1038444)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584052" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584053" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584054" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584055" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584056" comment="libxml2-x86-2.7.6-0.77.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584052" comment="libxml2-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584053" comment="libxml2-32bit-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584054" comment="libxml2-doc-2.7.6-0.77.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584055" comment="libxml2-python-2.7.6-0.77.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584056" comment="libxml2-x86-2.7.6-0.77.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41708" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1069689" ref_url="https://bugzilla.suse.com/1069689" source="BUGZILLA"/>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes several issues.

Theses security issues were fixed:

- CVE-2017-16932: Fixed infinite recursion could lead to an infinite loop or
  memory exhaustion when expanding a parameter entity in a DTD (bsc#1069689).
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584057" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584058" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584059" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584060" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584061" comment="libxml2-x86-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584057" comment="libxml2-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584058" comment="libxml2-32bit-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584059" comment="libxml2-doc-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584060" comment="libxml2-python-2.7.6-0.77.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584061" comment="libxml2-x86-2.7.6-0.77.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41709" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1102046" ref_url="https://bugzilla.suse.com/1102046" source="BUGZILLA"/>
		<reference ref_id="1110146" ref_url="https://bugzilla.suse.com/1110146" source="BUGZILLA"/>
		<reference ref_id="1126613" ref_url="https://bugzilla.suse.com/1126613" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issue fixed:

- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
  function when parsing an invalid XPath expression in the XPATH_OP_AND or
  XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)

Other Issue fixed:

- Fixed a bug related to the fix for CVE-2016-9318 which allowed xsltproc to access 
  the internet even when --nonet was given and also was making docbook-xsl-stylesheets to have 
  incomplete xml catalog file (bsc#1010675, bsc#1126613 and bsc#1110146).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110146">SUSE bug 1110146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584062" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584063" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584064" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584065" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584066" comment="libxml2-x86-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584062" comment="libxml2-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584063" comment="libxml2-32bit-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584064" comment="libxml2-doc-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584065" comment="libxml2-python-2.7.6-0.77.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584066" comment="libxml2-x86-2.7.6-0.77.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41710" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1123919" ref_url="https://bugzilla.suse.com/1123919" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:14179-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914179-1.html" source="SUSE-SU"/>
		<description>

This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584067" comment="libxml2-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584068" comment="libxml2-32bit-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584069" comment="libxml2-doc-2.7.6-0.77.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584070" comment="libxml2-python-2.7.6-0.77.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41711" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159928" ref_url="https://bugzilla.suse.com/1159928" source="BUGZILLA"/>
		<reference ref_id="1161517" ref_url="https://bugzilla.suse.com/1161517" source="BUGZILLA"/>
		<reference ref_id="1161521" ref_url="https://bugzilla.suse.com/1161521" source="BUGZILLA"/>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:  

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in xmlEncodeEntitiesInternal() in entities.c (bsc#1185409)
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).	  
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
- CVE-2019-19956: Fixed a memory leak in xmlParseBalancedChunkMemoryRecover (bsc#1159928).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584071" comment="libxml2-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584072" comment="libxml2-32bit-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584073" comment="libxml2-doc-2.7.6-0.77.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584074" comment="libxml2-python-2.7.6-0.77.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41712" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010372.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670913" comment="libxml2-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670914" comment="libxml2-32bit-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670915" comment="libxml2-doc-2.7.6-0.77.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670916" comment="libxml2-python-2.7.6-0.77.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41713" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578971" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578972" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578973" comment="libxml2-doc-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578974" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578975" comment="libxml2-x86-2.7.6-0.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41714" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009578976" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578977" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578978" comment="libxml2-doc-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578979" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009578980" comment="libxml2-x86-2.7.6-0.37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41715" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<description>

 This update for libxslt fixes the following issues:
 
- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584075" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584076" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584077" comment="libxslt-x86-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584075" comment="libxslt-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584076" comment="libxslt-32bit-1.1.24-19.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584077" comment="libxslt-x86-1.1.24-19.33.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41716" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-20"/>
	<updated date="2016-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584078" comment="kernel-bigmem-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584079" comment="kernel-bigmem-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584080" comment="kernel-bigmem-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584081" comment="kernel-default-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584082" comment="kernel-default-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584083" comment="kernel-default-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584084" comment="kernel-default-man-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584085" comment="kernel-ec2-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584086" comment="kernel-ec2-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584087" comment="kernel-ec2-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584088" comment="kernel-pae-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584089" comment="kernel-pae-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584090" comment="kernel-pae-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584091" comment="kernel-ppc64-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584092" comment="kernel-ppc64-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584093" comment="kernel-ppc64-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584094" comment="kernel-source-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584095" comment="kernel-syms-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584096" comment="kernel-trace-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584097" comment="kernel-trace-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584098" comment="kernel-trace-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584099" comment="kernel-xen-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584100" comment="kernel-xen-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584101" comment="kernel-xen-devel-3.0.101-91.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584078" comment="kernel-bigmem-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584079" comment="kernel-bigmem-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584080" comment="kernel-bigmem-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584081" comment="kernel-default-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584082" comment="kernel-default-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584083" comment="kernel-default-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584084" comment="kernel-default-man-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584085" comment="kernel-ec2-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584086" comment="kernel-ec2-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584087" comment="kernel-ec2-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584088" comment="kernel-pae-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584089" comment="kernel-pae-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584090" comment="kernel-pae-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584091" comment="kernel-ppc64-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584092" comment="kernel-ppc64-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584093" comment="kernel-ppc64-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584094" comment="kernel-source-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584095" comment="kernel-syms-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584096" comment="kernel-trace-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584097" comment="kernel-trace-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584098" comment="kernel-trace-devel-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584099" comment="kernel-xen-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584100" comment="kernel-xen-base-3.0.101-91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584101" comment="kernel-xen-devel-3.0.101-91.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41717" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005651" ref_url="https://bugzilla.suse.com/1005651" source="BUGZILLA"/>
		<reference ref_id="1008374" ref_url="https://bugzilla.suse.com/1008374" source="BUGZILLA"/>
		<reference ref_id="1008893" ref_url="https://bugzilla.suse.com/1008893" source="BUGZILLA"/>
		<reference ref_id="1013018" ref_url="https://bugzilla.suse.com/1013018" source="BUGZILLA"/>
		<reference ref_id="1013070" ref_url="https://bugzilla.suse.com/1013070" source="BUGZILLA"/>
		<reference ref_id="1013800" ref_url="https://bugzilla.suse.com/1013800" source="BUGZILLA"/>
		<reference ref_id="1013862" ref_url="https://bugzilla.suse.com/1013862" source="BUGZILLA"/>
		<reference ref_id="1016489" ref_url="https://bugzilla.suse.com/1016489" source="BUGZILLA"/>
		<reference ref_id="1017143" ref_url="https://bugzilla.suse.com/1017143" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1020229" ref_url="https://bugzilla.suse.com/1020229" source="BUGZILLA"/>
		<reference ref_id="1021256" ref_url="https://bugzilla.suse.com/1021256" source="BUGZILLA"/>
		<reference ref_id="1021913" ref_url="https://bugzilla.suse.com/1021913" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023014" ref_url="https://bugzilla.suse.com/1023014" source="BUGZILLA"/>
		<reference ref_id="1023163" ref_url="https://bugzilla.suse.com/1023163" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024788" ref_url="https://bugzilla.suse.com/1024788" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="1025702" ref_url="https://bugzilla.suse.com/1025702" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026260" ref_url="https://bugzilla.suse.com/1026260" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1026914" ref_url="https://bugzilla.suse.com/1026914" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027178" ref_url="https://bugzilla.suse.com/1027178" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028880" ref_url="https://bugzilla.suse.com/1028880" source="BUGZILLA"/>
		<reference ref_id="1029212" ref_url="https://bugzilla.suse.com/1029212" source="BUGZILLA"/>
		<reference ref_id="1029770" ref_url="https://bugzilla.suse.com/1029770" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1033771" ref_url="https://bugzilla.suse.com/1033771" source="BUGZILLA"/>
		<reference ref_id="1033794" ref_url="https://bugzilla.suse.com/1033794" source="BUGZILLA"/>
		<reference ref_id="1033804" ref_url="https://bugzilla.suse.com/1033804" source="BUGZILLA"/>
		<reference ref_id="1033816" ref_url="https://bugzilla.suse.com/1033816" source="BUGZILLA"/>
		<reference ref_id="1034026" ref_url="https://bugzilla.suse.com/1034026" source="BUGZILLA"/>
		<reference ref_id="909486" ref_url="https://bugzilla.suse.com/909486" source="BUGZILLA"/>
		<reference ref_id="911105" ref_url="https://bugzilla.suse.com/911105" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="979021" ref_url="https://bugzilla.suse.com/979021" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="983212" ref_url="https://bugzilla.suse.com/983212" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="999245" ref_url="https://bugzilla.suse.com/999245" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-5243" ref_url="https://www.suse.com/security/cve/CVE-2016-5243/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Notable new features:

- Toleration of newer crypto hardware for z Systems
- USB 2.0 Link power management for Haswell-ULT

The following security bugs were fixed:

- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability (bsc#1030573).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1024938).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bsc#1033336).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178)
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914)
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bsc#979021).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application (bnc#1027066)
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235)
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c (bsc#1008374).

The following non-security bugs were fixed:

- NFSD: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783, bsc#1026260).
- SUNRPC: Clean up the slot table allocation (bsc#1013862).
- SUNRPC: Initalise the struct xprt upon allocation (bsc#1013862).
- USB: cdc-acm: fix broken runtime suspend (bsc#1033771).
- USB: cdc-acm: fix open and suspend race (bsc#1033771).
- USB: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).
- USB: cdc-acm: fix runtime PM for control messages (bsc#1033771).
- USB: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).
- USB: cdc-acm: fix shutdown and suspend race (bsc#1033771).
- USB: cdc-acm: fix write and resume race (bsc#1033771).
- USB: cdc-acm: fix write and suspend race (bsc#1033771).
- USB: hub: Fix crash after failure to read BOS descriptor
- USB: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).
- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- USB: serial: mos7720: fix NULL-deref at open (bsc#1033816).
- USB: serial: mos7720: fix parallel probe (bsc#1033816).
- USB: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).
- USB: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).
- USB: serial: mos7840: fix NULL-deref at open (bsc#1034026).
- USB: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).
- Update metadata for serial fixes (bsc#1013070)
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- clocksource: Remove 'weak' from clocksource_default_clock() declaration (bnc#1013018).
- dlm: backport 'fix lvb invalidation conditions' (bsc#1005651).
- drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)
- enic: set skb-&gt;hash type properly (bsc#911105).
- ext4: fix mballoc breakage with 64k block size (bsc#1013018).
- ext4: fix stack memory corruption with 64k block size (bsc#1013018).
- ext4: reject inodes with negative size (bsc#1013018).
- fuse: initialize fc-&gt;release before calling it (bsc#1013018).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- i40e: avoid null pointer dereference (bsc#909486).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508).
- kabi: fix (bsc#1008893).
- lockd: use init_utsname for id encoding (bsc#1033804).
- lockd: use rpc client's cl_nodename for id encoding (bsc#1033804).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md/linear: shutup lockdep warnning (bsc#1018446).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (bnc#931620).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).
- ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).
- ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018).
- ocfs2: null deref on allocation error (bsc#1013018).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: use pci_physfn() (bsc#999245).
- posix-timers: Fix stack info leak in timer_create() (bnc#1013018).
- powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).
- powerpc/vdso64: Use double word compare on pointers (bsc#1016489).
- rcu: Call out dangers of expedited RCU primitives (bsc#1008893).
- rcu: Direct algorithmic SRCU implementation (bsc#1008893).
- rcu: Flip -&gt;completed only once per SRCU grace period (bsc#1008893).
- rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893).
- rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893).
- rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893).
- s390/kmsg: add missing kmsg descriptions (bnc#1025702).
- s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702).
- s390/zcrypt: Introduce CEX6 toleration
- sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018).
- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).
- scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702).
- scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702).
- scsi: zfcp: fix use-after-'free' in FC ingress path after TMF (bnc#1025702).
- scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: Make xfs_icdinode-&gt;di_dmstate atomic_t (bsc#1024788).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: kill xfs_itruncate_start (bsc#1024788).
- xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788).
- xfs: remove the i_size field in struct xfs_inode (bsc#1024788).
- xfs: remove xfs_itruncate_data (bsc#1024788).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: split xfs_itruncate_finish (bsc#1024788).
- xfs: split xfs_setattr (bsc#1024788).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-15"/>
	<updated date="2017-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005651">SUSE bug 1005651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008893">SUSE bug 1008893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013018">SUSE bug 1013018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013070">SUSE bug 1013070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013800">SUSE bug 1013800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013862">SUSE bug 1013862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016489">SUSE bug 1016489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017143">SUSE bug 1017143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020229">SUSE bug 1020229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021913">SUSE bug 1021913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023014">SUSE bug 1023014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023163">SUSE bug 1023163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024788">SUSE bug 1024788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025702">SUSE bug 1025702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026260">SUSE bug 1026260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028880">SUSE bug 1028880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029212">SUSE bug 1029212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029770">SUSE bug 1029770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033771">SUSE bug 1033771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033794">SUSE bug 1033794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033804">SUSE bug 1033804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033816">SUSE bug 1033816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034026">SUSE bug 1034026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909486">SUSE bug 909486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911105">SUSE bug 911105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983212">SUSE bug 983212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999245">SUSE bug 999245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5243/">CVE-2016-5243</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584102" comment="kernel-bigmem-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584103" comment="kernel-bigmem-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584104" comment="kernel-bigmem-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584105" comment="kernel-default-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584106" comment="kernel-default-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584107" comment="kernel-default-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584108" comment="kernel-default-man-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584109" comment="kernel-ec2-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584110" comment="kernel-ec2-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584111" comment="kernel-ec2-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584112" comment="kernel-pae-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584113" comment="kernel-pae-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584114" comment="kernel-pae-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584115" comment="kernel-ppc64-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584116" comment="kernel-ppc64-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584117" comment="kernel-ppc64-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584118" comment="kernel-source-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584119" comment="kernel-syms-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584120" comment="kernel-trace-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584121" comment="kernel-trace-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584122" comment="kernel-trace-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584123" comment="kernel-xen-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584124" comment="kernel-xen-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584125" comment="kernel-xen-devel-3.0.101-100.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584102" comment="kernel-bigmem-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584103" comment="kernel-bigmem-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584104" comment="kernel-bigmem-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584105" comment="kernel-default-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584106" comment="kernel-default-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584107" comment="kernel-default-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584108" comment="kernel-default-man-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584109" comment="kernel-ec2-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584110" comment="kernel-ec2-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584111" comment="kernel-ec2-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584112" comment="kernel-pae-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584113" comment="kernel-pae-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584114" comment="kernel-pae-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584115" comment="kernel-ppc64-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584116" comment="kernel-ppc64-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584117" comment="kernel-ppc64-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584118" comment="kernel-source-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584119" comment="kernel-syms-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584120" comment="kernel-trace-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584121" comment="kernel-trace-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584122" comment="kernel-trace-devel-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584123" comment="kernel-xen-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584124" comment="kernel-xen-base-3.0.101-100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584125" comment="kernel-xen-devel-3.0.101-100.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41718" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006321.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009568460" comment="log4j-1.2.15-26.32.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41719" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009915.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660155" comment="log4j-1.2.15-26.32.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41720" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010085.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fixed deserialization flaw in the chainsaw component of log4j leading to malicious code execution. (bsc#1194844)
- CVE-2022-23305: Fixed SQL injection when application is configured to use JDBCAppender. (bsc#1194843)
- CVE-2022-23302: Fixed remote code execution when application is configured to use JMSSink. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664707" comment="log4j-1.2.15-26.32.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41721" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579000" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41722" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004172.html" source="SUSE-SU"/>
		<description>
This update for mailman to version 2.1.15 fixes the following issues:

- CVE-2016-6893: Prevent cross-site request forgery (CSRF) vulnerability in the
  user options page that allowed remote attackers to hijack the authentication of
  arbitrary users for requests that modify an option (bsc#995352).
- Various other hardenings against CSFR attacks

For details please see https://launchpad.net/mailman/+milestone/2.1.15
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-11"/>
	<updated date="2018-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584126" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584126" comment="mailman-2.1.15-9.6.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41723" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584127" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584127" comment="mailman-2.1.15-9.6.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41724" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1102416" ref_url="https://bugzilla.suse.com/1102416" source="BUGZILLA"/>
		<reference ref_id="997205" ref_url="https://bugzilla.suse.com/997205" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005519.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2016-6893: Fixed a Cross-site request forgery vulnerability in the admin web interface (bsc#997205).

Following bug was fixed:

- Allow CSRF check to pass in mailman web frontend if the list
  name contains a '+' (bsc#1102416)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102416">SUSE bug 1102416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584128" comment="mailman-2.1.15-9.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41725" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006168.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584129" comment="mailman-2.1.15-9.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41726" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006780.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584130" comment="mailman-2.1.15-9.6.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41727" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007138.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584131" comment="mailman-2.1.15-9.6.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41728" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000751" ref_url="https://bugzilla.suse.com/1000751" source="BUGZILLA"/>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026 bsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation (MFSA 2016-92  bsc#1012964)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)
    
The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000751">SUSE bug 1000751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584132" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584133" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584134" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584135" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584136" comment="libfreebl3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584137" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584138" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584139" comment="libsoftokn3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584140" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584141" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584142" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584143" comment="mozilla-nss-x86-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584132" comment="MozillaFirefox-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584133" comment="MozillaFirefox-translations-45.5.1esr-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584134" comment="libfreebl3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584135" comment="libfreebl3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584136" comment="libfreebl3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584137" comment="libsoftokn3-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584138" comment="libsoftokn3-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584139" comment="libsoftokn3-x86-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584140" comment="mozilla-nss-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584141" comment="mozilla-nss-32bit-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584142" comment="mozilla-nss-tools-3.21.3-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584143" comment="mozilla-nss-x86-3.21.3-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41729" version="1" class="patch">
	<metadata>
		<title>Security update for mgetty (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1108752" ref_url="https://bugzilla.suse.com/1108752" source="BUGZILLA"/>
		<reference ref_id="1108756" ref_url="https://bugzilla.suse.com/1108756" source="BUGZILLA"/>
		<reference ref_id="1108757" ref_url="https://bugzilla.suse.com/1108757" source="BUGZILLA"/>
		<reference ref_id="1108761" ref_url="https://bugzilla.suse.com/1108761" source="BUGZILLA"/>
		<reference ref_id="1108762" ref_url="https://bugzilla.suse.com/1108762" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004595.html" source="SUSE-SU"/>
		<description>
This update for mgetty fixes the following issues:

- CVE-2018-16741: The function do_activate() did not properly sanitize shell
  metacharacters to prevent command injection (bsc#1108752)
- CVE-2018-16745: The mail_to parameter was not sanitized, leading to a buffer
  overflow if long untrusted input reached it (bsc#1108756)
- CVE-2018-16744: The mail_to parameter was not sanitized, leading to command
  injection if untrusted input reached reach it (bsc#1108757)
- CVE-2018-16742: Prevent stack-based buffer overflow that could have been
  triggered via a command-line parameter (bsc#1108762)
- CVE-2018-16743: The command-line parameter username wsa passed unsanitized to
  strcpy(), which could have caused a stack-based buffer overflow (bsc#1108761)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108752">SUSE bug 1108752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108756">SUSE bug 1108756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108757">SUSE bug 1108757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108761">SUSE bug 1108761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108762">SUSE bug 1108762</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584144" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584145" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584144" comment="g3utils-1.1.36-28.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584145" comment="mgetty-1.1.36-28.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41730" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1075262" ref_url="https://bugzilla.suse.com/1075262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00033.html" source="SUSE-SU"/>
		<description>


Update to Intel microcode version 20180108 (bsc#1075262 CVE-2017-5715)

- The pre-released microcode fixing some important security issues
  is now officially published (and included in the added tarball).

Among other updates it contains:

- IVT C0          (06-3e-04:ed) 428-&gt;42a
- SKL-U/Y D0      (06-4e-03:c0) ba-&gt;c2
- BDW-U/Y E/F     (06-3d-04:c0) 25-&gt;28
- HSW-ULT Cx/Dx   (06-45-01:72) 20-&gt;21
- Crystalwell Cx  (06-46-01:32) 17-&gt;18
- BDW-H E/G       (06-47-01:22) 17-&gt;1b
- HSX-EX E0       (06-3f-04:80) 0f-&gt;10
- SKL-H/S R0      (06-5e-03:36) ba-&gt;c2
- HSW Cx/Dx       (06-3c-03:32) 22-&gt;23
- HSX C0          (06-3f-02:6f) 3a-&gt;3b
- BDX-DE V0/V1    (06-56-02:10) 0f-&gt;14
- BDX-DE V2       (06-56-03:10) 700000d-&gt;7000011
- KBL-U/Y H0      (06-8e-09:c0) 62-&gt;80
- KBL Y0 / CFL D0 (06-8e-0a:c0) 70-&gt;80
- KBL-H/S B0      (06-9e-09:2a) 5e-&gt;80
- CFL U0          (06-9e-0a:22) 70-&gt;80
- CFL B0          (06-9e-0b:02) 72-&gt;80
- SKX H0          (06-55-04:b7) 2000035-&gt;200003c
- GLK B0          (06-7a-01:01) 1e-&gt;22
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579011" comment="microcode_ctl-1.17-102.83.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41731" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00043.html" source="SUSE-SU"/>
		<description>

  
This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579012" comment="microcode_ctl-1.17-102.83.15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41732" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following security issue:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584146" comment="microcode_ctl-1.17-102.83.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584146" comment="microcode_ctl-1.17-102.83.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41733" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<description>

  
This update for microcode_ctl fixes the following issues:

The Intel CPU Microcode bundle was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and
helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)

More details can be found on:

  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New
---- updated platforms ------------------------------------
SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-26"/>
	<updated date="2018-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579014" comment="microcode_ctl-1.17-102.83.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41734" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the 
mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579015" comment="microcode_ctl-1.17-102.83.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41735" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
- CFL-H        R0       6-9e-d/22 000000b0-&gt;000000b8 Core Gen9 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584147" comment="microcode_ctl-1.17-102.83.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41736" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1141977" ref_url="https://bugzilla.suse.com/1141977" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded what missing in last update:
BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584148" comment="microcode_ctl-1.17-102.83.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41737" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-13"/>
	<updated date="2019-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584149" comment="microcode_ctl-1.17-102.83.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41738" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584150" comment="microcode_ctl-1.17-102.83.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41739" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584151" comment="microcode_ctl-1.17-102.83.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41740" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issue:

- Updated Intel CPU Microcode to 20201027 prerelease (bsc#1170446)

- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

  # New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584152" comment="microcode_ctl-1.17-102.83.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41741" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

- Updated Intel CPU Microcode to 20201110 official release.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile

  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584153" comment="microcode_ctl-1.17-102.83.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41742" version="1" class="patch">
	<metadata>
		<title>Security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<description>
This update for microcode_ctl fixes the following issues:

Updated to Intel CPU Microcode 20210525 release:

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (bsc#1179833)
- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (bsc#1179836)
- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837)
- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (bsc#1179839)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584154" comment="microcode_ctl-1.17-102.83.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41743" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002832.html" source="SUSE-SU"/>
		<description>

This update for minicom fixes the following issues:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code 
  execution (bsc#1033783)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584155" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584155" comment="minicom-2.3-27.24.6.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41744" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579024" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579025" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579026" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579027" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579028" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579029" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579030" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579031" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41745" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary
  code execution through the string-to-double parser implementation. (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU
  consumption due to lack of protection against predictable hash collisions when processing
  form parameters. (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-01"/>
	<updated date="2016-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584156" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584157" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584158" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584159" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584160" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584161" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584162" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584163" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584156" comment="mono-core-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584157" comment="mono-data-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584158" comment="mono-data-postgresql-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584159" comment="mono-data-sqlite-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584160" comment="mono-locale-extras-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584161" comment="mono-nunit-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584162" comment="mono-web-2.6.7-0.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584163" comment="mono-winforms-2.6.7-0.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41746" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579040" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579041" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579042" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579043" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579044" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579045" comment="libfreebl3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579046" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579047" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579048" comment="libsoftokn3-x86-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579049" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579050" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579051" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579052" comment="mozilla-nss-x86-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41747" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579053" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579054" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579055" comment="mozilla-nspr-x86-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41748" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579056" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579057" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579058" comment="libfreebl3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579059" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579060" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579061" comment="libsoftokn3-x86-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579062" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579063" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579064" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579065" comment="mozilla-nss-x86-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41749" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659260" comment="libfreebl3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659261" comment="libfreebl3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659262" comment="libsoftokn3-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659263" comment="libsoftokn3-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659264" comment="mozilla-nss-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659265" comment="mozilla-nss-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659266" comment="mozilla-nss-certs-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659267" comment="mozilla-nss-certs-32bit-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659268" comment="mozilla-nss-devel-3.68.1-47.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659269" comment="mozilla-nss-tools-3.68.1-47.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41750" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010660.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678417" comment="libfreebl3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678418" comment="libfreebl3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678419" comment="libsoftokn3-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678420" comment="libsoftokn3-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678421" comment="mozilla-nss-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678422" comment="mozilla-nss-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678423" comment="mozilla-nss-certs-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678424" comment="mozilla-nss-certs-32bit-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678425" comment="mozilla-nss-devel-3.68.3-47.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678426" comment="mozilla-nss-tools-3.68.3-47.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41751" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2019-11745: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11727: A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr was updated to version 4.25.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584164" comment="libfreebl3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572692" comment="libfreebl3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584165" comment="libsoftokn3-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572694" comment="libsoftokn3-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584166" comment="mozilla-nspr-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584167" comment="mozilla-nspr-32bit-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584168" comment="mozilla-nspr-devel-4.25-29.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584169" comment="mozilla-nss-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572698" comment="mozilla-nss-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584170" comment="mozilla-nss-certs-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009572700" comment="mozilla-nss-certs-32bit-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584171" comment="mozilla-nss-devel-3.53.1-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584172" comment="mozilla-nss-tools-3.53.1-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41752" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101567" ref_url="https://bugzilla.suse.com/1101567" source="BUGZILLA"/>
		<reference ref_id="1101570" ref_url="https://bugzilla.suse.com/1101570" source="BUGZILLA"/>
		<reference ref_id="1101571" ref_url="https://bugzilla.suse.com/1101571" source="BUGZILLA"/>
		<reference ref_id="1101573" ref_url="https://bugzilla.suse.com/1101573" source="BUGZILLA"/>
		<reference ref_id="1101576" ref_url="https://bugzilla.suse.com/1101576" source="BUGZILLA"/>
		<reference ref_id="1101577" ref_url="https://bugzilla.suse.com/1101577" source="BUGZILLA"/>
		<reference ref_id="1101578" ref_url="https://bugzilla.suse.com/1101578" source="BUGZILLA"/>
		<reference ref_id="1101581" ref_url="https://bugzilla.suse.com/1101581" source="BUGZILLA"/>
		<reference ref_id="1101582" ref_url="https://bugzilla.suse.com/1101582" source="BUGZILLA"/>
		<reference ref_id="1101588" ref_url="https://bugzilla.suse.com/1101588" source="BUGZILLA"/>
		<reference ref_id="1101589" ref_url="https://bugzilla.suse.com/1101589" source="BUGZILLA"/>
		<reference ref_id="936807" ref_url="https://bugzilla.suse.com/936807" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

Security issues fixed:

- CVE-2018-14352: Fix imap_quote_string in imap/util.c that does not leave room for quote characters (bsc#1101582).
- CVE-2018-14353: Fix imap_quote_string in imap/util.c that has an integer underflow (bsc#1101581).
- CVE-2018-14362: Fix pop.c that does not forbid characters that may have unsafe interaction with message-cache pathnames (bsc#1101567).
- CVE-2018-14354: Fix arbitrary command execution from remote IMAP servers via backquote characters (bsc#1101578).
- CVE-2018-14356: Fix pop.c that mishandles a zero-length UID (bsc#1101576).
- CVE-2018-14355: Fix imap/util.c that mishandles '..' directory traversal in a mailbox name (bsc#1101577).
- CVE-2018-14349: Fix imap/command.c that mishandles a NO response without a message (bsc#1101589).
- CVE-2018-14350: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along INTERNALDATE field (bsc#1101588).
- CVE-2018-14357: Fix that remote IMAP servers are allowed to execute arbitrary commands via backquote characters (bsc#1101573).
- CVE-2018-14359: Fix buffer overflow via base64 data (bsc#1101570).
- CVE-2018-14358: Fix imap/message.c that has a stack-based buffer overflow for a FETCH response with along RFC822.SIZE field (bsc#1101571).


Bug fixes:

- bsc#936807: On entering a 70 character subject line in mutt, a tab is added to the text after 67 characters.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101570">SUSE bug 1101570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101571">SUSE bug 1101571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101576">SUSE bug 1101576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101582">SUSE bug 1101582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101588">SUSE bug 1101588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936807">SUSE bug 936807</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584173" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584173" comment="mutt-1.5.17-42.43.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41753" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).	  
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584174" comment="mutt-1.5.17-42.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41754" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007894.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584175" comment="mutt-1.5.17-42.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41755" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563722" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563723" comment="libmysql55client_r18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579078" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579079" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579080" comment="libmysql55client18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579081" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563722" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563723" comment="libmysql55client_r18-x86-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579082" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579083" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579084" comment="mysql-tools-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41756" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563724" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563725" comment="libmysql55client_r18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579085" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579086" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579087" comment="libmysql55client18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579088" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563724" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563725" comment="libmysql55client_r18-x86-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579089" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579090" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579091" comment="mysql-tools-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41757" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563726" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563727" comment="libmysql55client_r18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579092" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579093" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579094" comment="libmysql55client18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579095" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563726" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563727" comment="libmysql55client_r18-x86-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579096" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579097" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579098" comment="mysql-tools-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41758" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="963806" ref_url="https://bugzilla.suse.com/963806" source="BUGZILLA"/>
		<reference ref_id="976341" ref_url="https://bugzilla.suse.com/976341" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<description>
mysql was updated to version 5.5.49 to fix 13 security issues.

These security issues were fixed:
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#976341).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#976341).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#976341).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#976341).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#976341).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#976341).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#976341).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#976341).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#976341).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#976341).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#976341).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

More details are available at
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584176" comment="libmysql55client18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584177" comment="libmysql55client18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584178" comment="libmysql55client18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584179" comment="libmysql55client_r18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564974" comment="libmysql55client_r18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564975" comment="libmysql55client_r18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584180" comment="mysql-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584181" comment="mysql-client-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584182" comment="mysql-tools-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584176" comment="libmysql55client18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584177" comment="libmysql55client18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584178" comment="libmysql55client18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584179" comment="libmysql55client_r18-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564974" comment="libmysql55client_r18-32bit-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564975" comment="libmysql55client_r18-x86-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584180" comment="mysql-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584181" comment="mysql-client-5.5.49-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584182" comment="mysql-tools-5.5.49-0.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41759" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="934789" ref_url="https://bugzilla.suse.com/934789" source="BUGZILLA"/>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<description>

This update for mysql fixes the following issues:

- bsc#959724: fix incorrect usage of sprintf/strcpy that caused possible buffer overflow issues at various places

On SUSE Linux Enterprise 11 SP4 this fix was not yet shipped:
- Increase the key length (to 2048 bits) used in vio/viosslfactories.c for creating
  Diffie-Hellman keys (Logjam Attack) [bnc#934789] [CVE-2015-4000]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-17"/>
	<updated date="2016-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584183" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584184" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584185" comment="libmysqlclient15-x86-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584186" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584183" comment="libmysqlclient15-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584184" comment="libmysqlclient15-32bit-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584185" comment="libmysqlclient15-x86-5.0.96-0.8.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584186" comment="libmysqlclient_r15-5.0.96-0.8.10.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41760" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="937258" ref_url="https://bugzilla.suse.com/937258" source="BUGZILLA"/>
		<reference ref_id="967374" ref_url="https://bugzilla.suse.com/967374" source="BUGZILLA"/>
		<reference ref_id="989913" ref_url="https://bugzilla.suse.com/989913" source="BUGZILLA"/>
		<reference ref_id="989919" ref_url="https://bugzilla.suse.com/989919" source="BUGZILLA"/>
		<reference ref_id="989922" ref_url="https://bugzilla.suse.com/989922" source="BUGZILLA"/>
		<reference ref_id="989926" ref_url="https://bugzilla.suse.com/989926" source="BUGZILLA"/>
		<reference ref_id="998309" ref_url="https://bugzilla.suse.com/998309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<description>

This mysql update to verson 5.5.52 fixes the following issues: 

Security issues fixed:
- CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913).
- CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919).
- CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922).
- CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926).
- CVE-2016-6662: A malicious user with SQL and filesystem access could create
  a my.cnf in the datadir and , under certain circumstances, execute
  arbitrary code as mysql (or even root) user. (bsc#998309)


More details can be found on:
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html
      http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html

Bugs fixed:
- bsc#967374: properly restart mysql multi instances during upgrade
- bnc#937258: multi script to restart after crash
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-20"/>
	<updated date="2016-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/937258">SUSE bug 937258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967374">SUSE bug 967374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584187" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584188" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584189" comment="libmysql55client18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584190" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564979" comment="libmysql55client_r18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564980" comment="libmysql55client_r18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584191" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584192" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584193" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584187" comment="libmysql55client18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584188" comment="libmysql55client18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584189" comment="libmysql55client18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584190" comment="libmysql55client_r18-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564979" comment="libmysql55client_r18-32bit-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564980" comment="libmysql55client_r18-x86-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584191" comment="mysql-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584192" comment="mysql-client-5.5.52-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584193" comment="mysql-tools-5.5.52-0.27.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41761" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005580" ref_url="https://bugzilla.suse.com/1005580" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.53 fixes the following issues:

- CVE-2016-6662: Unspecified vulnerability in subcomponent Logging (bsc#1005580)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)

Release Notes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-12"/>
	<updated date="2016-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584194" comment="libmysql55client18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584195" comment="libmysql55client18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584196" comment="libmysql55client18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584197" comment="libmysql55client_r18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564981" comment="libmysql55client_r18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564982" comment="libmysql55client_r18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584198" comment="mysql-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584199" comment="mysql-client-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584200" comment="mysql-tools-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584194" comment="libmysql55client18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584195" comment="libmysql55client18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584196" comment="libmysql55client18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584197" comment="libmysql55client_r18-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564981" comment="libmysql55client_r18-32bit-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564982" comment="libmysql55client_r18-x86-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584198" comment="mysql-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584199" comment="mysql-client-5.5.53-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584200" comment="mysql-tools-5.5.53-0.30.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41762" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<description>

This mysql version update to 5.5.54 fixes the following issues:

- CVE-2017-3318: Unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: Unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3313: Unspecified vulnerability affecting the MyISAM component (bsc#1020890)
- CVE-2017-3312: Insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: Unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: Unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: Unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3244: Unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: Unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: Unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

Release Notes: 
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584201" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584202" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584203" comment="libmysql55client18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584204" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564983" comment="libmysql55client_r18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564984" comment="libmysql55client_r18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584205" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584206" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584207" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584201" comment="libmysql55client18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584202" comment="libmysql55client18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584203" comment="libmysql55client18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584204" comment="libmysql55client_r18-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564983" comment="libmysql55client_r18-32bit-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564984" comment="libmysql55client_r18-x86-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584205" comment="mysql-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584206" comment="mysql-client-5.5.54-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584207" comment="mysql-tools-5.5.54-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41763" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1029014" ref_url="https://bugzilla.suse.com/1029014" source="BUGZILLA"/>
		<reference ref_id="1029396" ref_url="https://bugzilla.suse.com/1029396" source="BUGZILLA"/>
		<reference ref_id="1034850" ref_url="https://bugzilla.suse.com/1034850" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3329" ref_url="https://www.suse.com/security/cve/CVE-2017-3329/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3461" ref_url="https://www.suse.com/security/cve/CVE-2017-3461/" source="CVE"/>
		<reference ref_id="CVE-2017-3462" ref_url="https://www.suse.com/security/cve/CVE-2017-3462/" source="CVE"/>
		<reference ref_id="CVE-2017-3463" ref_url="https://www.suse.com/security/cve/CVE-2017-3463/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<description>

This update for mysql to version 5.5.55 fixes the following issues:

These security issues were fixed:

- CVE-2017-3308: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3309: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3329: Unspecified vulnerability in Server: Thread (bsc#1034850)
- CVE-2017-3600: Unspecified vulnerability in Client: mysqldump (bsc#1034850)
- CVE-2017-3453: Unspecified vulnerability in Server: Optimizer (bsc#1034850)
- CVE-2017-3456: Unspecified vulnerability in Server: DML (bsc#1034850)
- CVE-2017-3463: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3462: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3461: Unspecified vulnerability in Server: Security (bsc#1034850)
- CVE-2017-3464: Unspecified vulnerability in Server: DDL (bsc#1034850)
- CVE-2017-3305: MySQL client sent authentication request unencrypted even if SSL was required (aka Ridddle) (bsc#1029396).
- CVE-2016-5483: Mysqldump failed to properly quote certain identifiers in SQL statements written to the dump output, allowing for execution of arbitrary commands (bsc#1029014)
- '--ssl-mode=REQUIRED' can be specified to require a secure connection (it fails if a secure connection cannot be obtained)

This non-security issue was fixed:

- Set the default umask to 077 in rc.mysql-multi [bsc#1020976]

For additional changes please see
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-55.html

Note: The issue tracked in bsc#1022428 and fixed in the last update was
assigned CVE-2017-3302.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3329/">CVE-2017-3329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3461/">CVE-2017-3461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3462/">CVE-2017-3462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3463/">CVE-2017-3463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584208" comment="libmysql55client18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584209" comment="libmysql55client18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584210" comment="libmysql55client18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584211" comment="libmysql55client_r18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564985" comment="libmysql55client_r18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564986" comment="libmysql55client_r18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584212" comment="mysql-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584213" comment="mysql-client-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584214" comment="mysql-tools-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584208" comment="libmysql55client18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584209" comment="libmysql55client18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584210" comment="libmysql55client18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584211" comment="libmysql55client_r18-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564985" comment="libmysql55client_r18-32bit-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564986" comment="libmysql55client_r18-x86-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584212" comment="mysql-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584213" comment="mysql-client-5.5.55-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584214" comment="mysql-tools-5.5.55-0.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41764" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049398" ref_url="https://bugzilla.suse.com/1049398" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049411" ref_url="https://bugzilla.suse.com/1049411" source="BUGZILLA"/>
		<reference ref_id="1049415" ref_url="https://bugzilla.suse.com/1049415" source="BUGZILLA"/>
		<reference ref_id="1049416" ref_url="https://bugzilla.suse.com/1049416" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1049422" ref_url="https://bugzilla.suse.com/1049422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3635" ref_url="https://www.suse.com/security/cve/CVE-2017-3635/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3648" ref_url="https://www.suse.com/security/cve/CVE-2017-3648/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<reference ref_id="CVE-2017-3652" ref_url="https://www.suse.com/security/cve/CVE-2017-3652/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<description>
This update for mysql fixes the following issues:


- CVE-2017-3635: C API unspecified vulnerability (bsc#1049398) 
- CVE-2017-3636: Client programs unspecified vulnerability (bsc#1049399)
- CVE-2017-3641: DML unspecified vulnerability (bsc#1049404)
- CVE-2017-3648: Charsets unspecified vulnerability (bsc#1049411)
- CVE-2017-3651: Client mysqldump unspecified vulnerability (bsc#1049415)
- CVE-2017-3652: DDL unspecified vulnerability (bsc#1049416)
- CVE-2017-3653: DDL unspecified vulnerability (bsc#1049417)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049398">SUSE bug 1049398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3635/">CVE-2017-3635</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3648/">CVE-2017-3648</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3652/">CVE-2017-3652</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584215" comment="libmysql55client18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584216" comment="libmysql55client18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584217" comment="libmysql55client18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584218" comment="libmysql55client_r18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564987" comment="libmysql55client_r18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564988" comment="libmysql55client_r18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584219" comment="mysql-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584220" comment="mysql-client-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584221" comment="mysql-tools-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584215" comment="libmysql55client18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584216" comment="libmysql55client18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584217" comment="libmysql55client18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584218" comment="libmysql55client_r18-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564987" comment="libmysql55client_r18-32bit-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564988" comment="libmysql55client_r18-x86-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584219" comment="mysql-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584220" comment="mysql-client-5.5.57-0.39.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584221" comment="mysql-tools-5.5.57-0.39.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41765" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1064116" ref_url="https://bugzilla.suse.com/1064116" source="BUGZILLA"/>
		<reference ref_id="1064117" ref_url="https://bugzilla.suse.com/1064117" source="BUGZILLA"/>
		<reference ref_id="1064119" ref_url="https://bugzilla.suse.com/1064119" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<description>


This update for mysql to version 5.5.58 fixes the following issues:

Fixed security issues:

- CVE-2017-10268: issue inside subcomponent Server Replication [bsc#1064101] 
- CVE-2017-10378: issue inside subcomponent Server Optimizer [bsc#1064115] 
- CVE-2017-10379: issue inside subcomponent Client programs [bsc#1064116] 
- CVE-2017-10384: issue inside subcomponent Server DDL [bsc#1064117] 

For a full list of changes check:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584222" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584223" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584224" comment="libmysql55client18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584225" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564989" comment="libmysql55client_r18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564990" comment="libmysql55client_r18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584226" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584227" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584228" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584222" comment="libmysql55client18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584223" comment="libmysql55client18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584224" comment="libmysql55client18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584225" comment="libmysql55client_r18-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564989" comment="libmysql55client_r18-32bit-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564990" comment="libmysql55client_r18-x86-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584226" comment="mysql-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584227" comment="mysql-client-5.5.58-0.39.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584228" comment="mysql-tools-5.5.58-0.39.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41766" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076369" ref_url="https://bugzilla.suse.com/1076369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<description>
This update for mysql to version 5.5.59 fixes several issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369)
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server.  Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369)

For additional changes please see http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584229" comment="libmysql55client18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584230" comment="libmysql55client18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584231" comment="libmysql55client18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584232" comment="libmysql55client_r18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564991" comment="libmysql55client_r18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564992" comment="libmysql55client_r18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584233" comment="mysql-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584234" comment="mysql-client-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584235" comment="mysql-tools-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584229" comment="libmysql55client18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584230" comment="libmysql55client18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584231" comment="libmysql55client18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584232" comment="libmysql55client_r18-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564991" comment="libmysql55client_r18-32bit-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564992" comment="libmysql55client_r18-x86-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584233" comment="mysql-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584234" comment="mysql-client-5.5.59-0.39.9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584235" comment="mysql-tools-5.5.59-0.39.9.8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41767" version="1" class="patch">
	<metadata>
		<title>security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1089987" ref_url="https://bugzilla.suse.com/1089987" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2773" ref_url="https://www.suse.com/security/cve/CVE-2018-2773/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2818" ref_url="https://www.suse.com/security/cve/CVE-2018-2818/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<description>

  This update fixes the following issues:

  - Update to 5.5.60 in Oracle Apr2018 CPU (bsc#1089987).
  - CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
  - CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2818: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  - CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
  - CVE-2018-2773: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2773/">CVE-2018-2773</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2818/">CVE-2018-2818</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584236" comment="libmysql55client18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584237" comment="libmysql55client18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584238" comment="libmysql55client18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584239" comment="libmysql55client_r18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564993" comment="libmysql55client_r18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564994" comment="libmysql55client_r18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584240" comment="mysql-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584241" comment="mysql-client-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584242" comment="mysql-tools-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584236" comment="libmysql55client18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584237" comment="libmysql55client18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584238" comment="libmysql55client18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584239" comment="libmysql55client_r18-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564993" comment="libmysql55client_r18-32bit-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564994" comment="libmysql55client_r18-x86-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584240" comment="mysql-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584241" comment="mysql-client-5.5.60-0.39.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584242" comment="mysql-tools-5.5.60-0.39.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41768" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1101679" ref_url="https://bugzilla.suse.com/1101679" source="BUGZILLA"/>
		<reference ref_id="1101680" ref_url="https://bugzilla.suse.com/1101680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3070" ref_url="https://www.suse.com/security/cve/CVE-2018-3070/" source="CVE"/>
		<reference ref_id="CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<description>
This update for mysql to version 5.5.61 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-3066: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Client. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3063: Fixed an easily exploitable vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101677)

 You can find more detailed information about this update in the
 [release notes](http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101679">SUSE bug 1101679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3070/">CVE-2018-3070</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584243" comment="libmysql55client18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584244" comment="libmysql55client18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584245" comment="libmysql55client18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584246" comment="libmysql55client_r18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564995" comment="libmysql55client_r18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564996" comment="libmysql55client_r18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584247" comment="mysql-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584248" comment="mysql-client-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584249" comment="mysql-tools-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584243" comment="libmysql55client18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584244" comment="libmysql55client18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584245" comment="libmysql55client18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584246" comment="libmysql55client_r18-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564995" comment="libmysql55client_r18-32bit-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564996" comment="libmysql55client_r18-x86-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584247" comment="mysql-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584248" comment="mysql-client-5.5.61-0.39.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584249" comment="mysql-tools-5.5.61-0.39.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41769" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112369" ref_url="https://bugzilla.suse.com/1112369" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3133" ref_url="https://www.suse.com/security/cve/CVE-2018-3133/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<description>

  
MySQL server was updated to version 5.5.62, fixing bugs and security issues.

Changes:

    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html

Following security issues were fixed:

- CVE-2016-9843: The crc32_big function in zlib might have allowed context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. (bsc#1013882)
  Please note that SUSE uses the system zlib, not the embedded copy.

- CVE-2018-3133: Authenticated low privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112369)
- CVE-2018-3174: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112368)
- CVE-2018-3282: Authenticated high privilege attackers could cause denial of service attacks (hangs or crashes) against the mysql server (bsc#1112432)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-29"/>
	<updated date="2018-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112369">SUSE bug 1112369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3133/">CVE-2018-3133</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584250" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584251" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584252" comment="libmysql55client18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584253" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564997" comment="libmysql55client_r18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564998" comment="libmysql55client_r18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584254" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584255" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584256" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584250" comment="libmysql55client18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584251" comment="libmysql55client18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584252" comment="libmysql55client18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584253" comment="libmysql55client_r18-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564997" comment="libmysql55client_r18-32bit-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564998" comment="libmysql55client_r18-x86-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584254" comment="mysql-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584255" comment="mysql-client-5.5.62-0.39.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584256" comment="mysql-tools-5.5.62-0.39.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41770" version="1" class="patch">
	<metadata>
		<title>Security update for nagios (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1011630" ref_url="https://bugzilla.suse.com/1011630" source="BUGZILLA"/>
		<reference ref_id="1018047" ref_url="https://bugzilla.suse.com/1018047" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10089" ref_url="https://www.suse.com/security/cve/CVE-2016-10089/" source="CVE"/>
		<reference ref_id="CVE-2016-8641" ref_url="https://www.suse.com/security/cve/CVE-2016-8641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004743.html" source="SUSE-SU"/>
		<description>
This update for nagios fixes the following issues:

- CVE-2016-8641 / CVE-2016-10089: fixed possible symlink attacks for files/directories created by root (bsc#1011630 / bsc#1018047)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-19"/>
	<updated date="2018-10-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011630">SUSE bug 1011630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018047">SUSE bug 1018047</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10089/">CVE-2016-10089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8641/">CVE-2016-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584257" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584258" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584257" comment="nagios-3.0.6-1.25.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584258" comment="nagios-www-3.0.6-1.25.36.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41771" version="1" class="patch">
	<metadata>
		<title>Security update for nagios-nrpe (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938906" ref_url="https://bugzilla.suse.com/938906" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<description>
This update for nagios-nrpe fixes one issue.

This security issue was fixed:

- CVE-2015-4000: Prevent Logjam. The TLS protocol 1.2 and earlier, when a
  DHE_EXPORT ciphersuite is enabled on a server but not on a client, did not
  properly convey a DHE_EXPORT choice, which allowed man-in-the-middle attackers
  to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE
  replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT
  replaced by DHE (bsc#938906).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584259" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584260" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584261" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584259" comment="nagios-nrpe-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584260" comment="nagios-nrpe-doc-2.12-24.4.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584261" comment="nagios-plugins-nrpe-2.12-24.4.10.3.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41772" version="1" class="patch">
	<metadata>
		<title>Security update for nautilus (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1060031" ref_url="https://bugzilla.suse.com/1060031" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004191.html" source="SUSE-SU"/>
		<description>
This update for nautilus fixes the following security issue:

- CVE-2017-14604: Fixed a file type spoofing attack by adding a
  metadata::trusted attribute to a file once the user acknowledges the file as
  trusted, and also remove the 'trusted' content in the desktop file
  (bsc#1060031).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584262" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584263" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584264" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584265" comment="nautilus-x86-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584262" comment="nautilus-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584263" comment="nautilus-32bit-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584264" comment="nautilus-lang-2.28.4-1.16.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584265" comment="nautilus-x86-2.28.4-1.16.21.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41773" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00004.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584266" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584267" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584268" comment="libncurses5-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584269" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584270" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584271" comment="libncurses6-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584272" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584273" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584274" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584275" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584276" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584277" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584266" comment="libncurses5-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584267" comment="libncurses5-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584268" comment="libncurses5-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584269" comment="libncurses6-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584270" comment="libncurses6-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584271" comment="libncurses6-x86-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584272" comment="ncurses-devel-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584273" comment="ncurses-devel-32bit-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584274" comment="ncurses-utils-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584275" comment="tack-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584276" comment="terminfo-5.6-92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584277" comment="terminfo-base-5.6-92.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41774" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584278" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584279" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584280" comment="libncurses5-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584281" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584282" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584283" comment="libncurses6-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584284" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584285" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584286" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584287" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584288" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584289" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584278" comment="libncurses5-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584279" comment="libncurses5-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584280" comment="libncurses5-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584281" comment="libncurses6-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584282" comment="libncurses6-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584283" comment="libncurses6-x86-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584284" comment="ncurses-devel-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584285" comment="ncurses-devel-32bit-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584286" comment="ncurses-utils-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584287" comment="tack-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584288" comment="terminfo-5.6-93.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584289" comment="terminfo-base-5.6-93.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41775" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="1069530" ref_url="https://bugzilla.suse.com/1069530" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-16879: Fix stack-based buffer overflow in the _nc_write_entry() function (bsc#1069530).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584290" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584291" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584292" comment="libncurses5-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584293" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584294" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584295" comment="libncurses6-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584296" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584297" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584298" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584299" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584300" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584301" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584290" comment="libncurses5-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584291" comment="libncurses5-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584292" comment="libncurses5-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584293" comment="libncurses6-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584294" comment="libncurses6-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584295" comment="libncurses6-x86-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584296" comment="ncurses-devel-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584297" comment="ncurses-devel-32bit-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584298" comment="ncurses-utils-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584299" comment="tack-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584300" comment="terminfo-5.6-93.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584301" comment="terminfo-base-5.6-93.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41776" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003620.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issue fixed:

- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584302" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584303" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584304" comment="libncurses5-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584305" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584306" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584307" comment="libncurses6-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584308" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584309" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584310" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584311" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584312" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584313" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584302" comment="libncurses5-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584303" comment="libncurses5-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584304" comment="libncurses5-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584305" comment="libncurses6-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584306" comment="libncurses6-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584307" comment="libncurses6-x86-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584308" comment="ncurses-devel-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584309" comment="ncurses-devel-32bit-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584310" comment="ncurses-utils-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584311" comment="tack-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584312" comment="terminfo-5.6-93.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584313" comment="terminfo-base-5.6-93.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41777" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579172" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579173" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579174" comment="libsnmp15-x86-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579175" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579176" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579177" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41778" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002944.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following security issues:

- CVE-2017-2581: An out-of-bounds write in writeRasterPbm() could lead to memory corruption and potential code execution. (bsc#1024287)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-15"/>
	<updated date="2017-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584314" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584315" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584316" comment="libnetpbm10-x86-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584317" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584314" comment="libnetpbm10-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584315" comment="libnetpbm10-32bit-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584316" comment="libnetpbm10-x86-10.26.44-101.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584317" comment="netpbm-10.26.44-101.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41779" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1024288" ref_url="https://bugzilla.suse.com/1024288" source="BUGZILLA"/>
		<reference ref_id="1024291" ref_url="https://bugzilla.suse.com/1024291" source="BUGZILLA"/>
		<reference ref_id="1136936" ref_url="https://bugzilla.suse.com/1136936" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005614.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security issues fixed:

- CVE-2017-2579: Fixed out-of-bounds read in expandCodeOntoStack() (bsc#1024288).
- CVE-2017-2580: Fixed out-of-bounds write of heap data in addPixelToRaster() function (bsc#1024291).
- created a netpbm-vulnerable subpackage and move pstopnm there, as it uses ghostscript for conversion (bsc#1136936)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024288">SUSE bug 1024288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024291">SUSE bug 1024291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136936">SUSE bug 1136936</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584318" comment="libnetpbm10-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584319" comment="libnetpbm10-32bit-10.26.44-101.15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584320" comment="netpbm-10.26.44-101.15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41780" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<description>
This ntp update provides the following security and non security fixes:

- Update to 4.2.8p4 to fix several security issues (bsc#951608):
  * CVE-2015-7871: NAK to the Future: Symmetric association
    authentication bypass via crypto-NAK
  * CVE-2015-7855: decodenetnum() will ASSERT botch instead of
    returning FAIL on some bogus values
  * CVE-2015-7854: Password Length Memory Corruption Vulnerability
  * CVE-2015-7853: Invalid length data provided by a custom
    refclock driver could cause a buffer overflow
  * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
  * CVE-2015-7851 saveconfig Directory Traversal Vulnerability
  * CVE-2015-7850 remote config logfile-keyfile
  * CVE-2015-7849 trusted key use-after-free
  * CVE-2015-7848 mode 7 loop counter underrun
  * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
  * CVE-2015-7703 configuration directives 'pidfile' and
    'driftfile' should only be allowed locally
  * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
    validate the origin timestamp field
  * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
    data packet length checks
- Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
- Add a controlkey to ntp.conf to make the above work.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Fix the comment regarding addserver in ntp.conf (bnc#910063).
- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz.
  The rest is partially irrelevant, partially redundant and
  potentially outdated (bsc#942587).
- Remove 'kod' from the restrict line in ntp.conf (bsc#944300).
- Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
- Require perl-Socket6 (bsc#942441).
- Fix incomplete backporting of 'rcntp ntptimemset'.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584321" comment="ntp-4.2.8p4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584322" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584321" comment="ntp-4.2.8p4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584322" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41781" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="782060" ref_url="https://bugzilla.suse.com/782060" source="BUGZILLA"/>
		<reference ref_id="784760" ref_url="https://bugzilla.suse.com/784760" source="BUGZILLA"/>
		<reference ref_id="916617" ref_url="https://bugzilla.suse.com/916617" source="BUGZILLA"/>
		<reference ref_id="951559" ref_url="https://bugzilla.suse.com/951559" source="BUGZILLA"/>
		<reference ref_id="951629" ref_url="https://bugzilla.suse.com/951629" source="BUGZILLA"/>
		<reference ref_id="956773" ref_url="https://bugzilla.suse.com/956773" source="BUGZILLA"/>
		<reference ref_id="962318" ref_url="https://bugzilla.suse.com/962318" source="BUGZILLA"/>
		<reference ref_id="962784" ref_url="https://bugzilla.suse.com/962784" source="BUGZILLA"/>
		<reference ref_id="962802" ref_url="https://bugzilla.suse.com/962802" source="BUGZILLA"/>
		<reference ref_id="962960" ref_url="https://bugzilla.suse.com/962960" source="BUGZILLA"/>
		<reference ref_id="962966" ref_url="https://bugzilla.suse.com/962966" source="BUGZILLA"/>
		<reference ref_id="962970" ref_url="https://bugzilla.suse.com/962970" source="BUGZILLA"/>
		<reference ref_id="962988" ref_url="https://bugzilla.suse.com/962988" source="BUGZILLA"/>
		<reference ref_id="962994" ref_url="https://bugzilla.suse.com/962994" source="BUGZILLA"/>
		<reference ref_id="962995" ref_url="https://bugzilla.suse.com/962995" source="BUGZILLA"/>
		<reference ref_id="962997" ref_url="https://bugzilla.suse.com/962997" source="BUGZILLA"/>
		<reference ref_id="963000" ref_url="https://bugzilla.suse.com/963000" source="BUGZILLA"/>
		<reference ref_id="963002" ref_url="https://bugzilla.suse.com/963002" source="BUGZILLA"/>
		<reference ref_id="975496" ref_url="https://bugzilla.suse.com/975496" source="BUGZILLA"/>
		<reference ref_id="975981" ref_url="https://bugzilla.suse.com/975981" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p6 to fix 12 security issues.

These security issues were fixed:
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP
  (--enable-ntp-signd).  This replaces the w32 patches in 4.2.4 that added
  the authreg directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.
- bsc#784760: Remove local clock from default configuration
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-28"/>
	<updated date="2016-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/782060">SUSE bug 782060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784760">SUSE bug 784760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916617">SUSE bug 916617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951559">SUSE bug 951559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956773">SUSE bug 956773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962318">SUSE bug 962318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975496">SUSE bug 975496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975981">SUSE bug 975981</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584323" comment="ntp-4.2.8p6-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584324" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584323" comment="ntp-4.2.8p6-8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584324" comment="ntp-doc-4.2.8p6-8.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41782" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="957226" ref_url="https://bugzilla.suse.com/957226" source="BUGZILLA"/>
		<reference ref_id="977446" ref_url="https://bugzilla.suse.com/977446" source="BUGZILLA"/>
		<reference ref_id="977450" ref_url="https://bugzilla.suse.com/977450" source="BUGZILLA"/>
		<reference ref_id="977451" ref_url="https://bugzilla.suse.com/977451" source="BUGZILLA"/>
		<reference ref_id="977452" ref_url="https://bugzilla.suse.com/977452" source="BUGZILLA"/>
		<reference ref_id="977455" ref_url="https://bugzilla.suse.com/977455" source="BUGZILLA"/>
		<reference ref_id="977457" ref_url="https://bugzilla.suse.com/977457" source="BUGZILLA"/>
		<reference ref_id="977458" ref_url="https://bugzilla.suse.com/977458" source="BUGZILLA"/>
		<reference ref_id="977459" ref_url="https://bugzilla.suse.com/977459" source="BUGZILLA"/>
		<reference ref_id="977461" ref_url="https://bugzilla.suse.com/977461" source="BUGZILLA"/>
		<reference ref_id="977464" ref_url="https://bugzilla.suse.com/977464" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<description>

This update for ntp to 4.2.8p7 fixes the following issues:

* CVE-2016-1547, bsc#977459:
  Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
* CVE-2016-1548, bsc#977461: Interleave-pivot
* CVE-2016-1549, bsc#977451:
  Sybil vulnerability: ephemeral association attack.
* CVE-2016-1550, bsc#977464: Improve NTP security against buffer
  comparison timing attacks.
* CVE-2016-1551, bsc#977450:
  Refclock impersonation vulnerability
* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
  directives will cause an assertion botch in ntpd.
* CVE-2016-2517, bsc#977455: remote configuration trustedkey/
  requestkey/controlkey values are not properly validated.
* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode &gt; 7
  causes array wraparound with MATCH_ASSOC.
* CVE-2016-2519, bsc#977458: ctl_getitem() return value not
  always checked.
* This update also improves the fixes for:
  CVE-2015-7704, CVE-2015-7705, CVE-2015-7974

Bugs fixed:
- Restrict the parser in the startup script to the first
  occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-11"/>
	<updated date="2016-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/957226">SUSE bug 957226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584325" comment="ntp-4.2.8p7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584326" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584325" comment="ntp-4.2.8p7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584326" comment="ntp-doc-4.2.8p7-11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41783" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979302" ref_url="https://bugzilla.suse.com/979302" source="BUGZILLA"/>
		<reference ref_id="981422" ref_url="https://bugzilla.suse.com/981422" source="BUGZILLA"/>
		<reference ref_id="982056" ref_url="https://bugzilla.suse.com/982056" source="BUGZILLA"/>
		<reference ref_id="982064" ref_url="https://bugzilla.suse.com/982064" source="BUGZILLA"/>
		<reference ref_id="982065" ref_url="https://bugzilla.suse.com/982065" source="BUGZILLA"/>
		<reference ref_id="982066" ref_url="https://bugzilla.suse.com/982066" source="BUGZILLA"/>
		<reference ref_id="982067" ref_url="https://bugzilla.suse.com/982067" source="BUGZILLA"/>
		<reference ref_id="982068" ref_url="https://bugzilla.suse.com/982068" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<description>
ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:
- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
- CVE-2016-4954: Processing spoofed server packets (bsc#982066).
- CVE-2016-4955: Autokey association reset (bsc#982067).
- CVE-2016-4956: Broadcast interleave (bsc#982068).
- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:
- Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
- bsc#981422: Don't ignore SIGCHILD because it breaks wait().
- Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by 'rcntp addserver'.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-15"/>
	<updated date="2016-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979302">SUSE bug 979302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981422">SUSE bug 981422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584327" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584328" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584327" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584328" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41784" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="929414" ref_url="https://bugzilla.suse.com/929414" source="BUGZILLA"/>
		<reference ref_id="961491" ref_url="https://bugzilla.suse.com/961491" source="BUGZILLA"/>
		<reference ref_id="982779" ref_url="https://bugzilla.suse.com/982779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- Malformed asn1 definitions could have caused a segmentation fault in the asn1 definition parser (bsc#961491)
- CVE-2015-3622: Fixed invalid read in octet string decoding (bsc#929414)
- CVE-2016-4008: Fixed infinite loop while parsing DER certificates (bsc#982779)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-16"/>
	<updated date="2016-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584329" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584330" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584331" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584332" comment="libtasn1-3-x86-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584329" comment="libtasn1-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584330" comment="libtasn1-3-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584331" comment="libtasn1-3-32bit-1.5-1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584332" comment="libtasn1-3-x86-1.5-1.34.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41785" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

Security issues fixed (update to 4.2.8p9):

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).
- CVE-2015-8140: ntpq vulnerable to replay attacks.
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-19"/>
	<updated date="2016-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584333" comment="ntp-4.2.8p9-57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584334" comment="ntp-doc-4.2.8p9-57.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584333" comment="ntp-4.2.8p9-57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584334" comment="ntp-doc-4.2.8p9-57.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41786" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="1031085" ref_url="https://bugzilla.suse.com/1031085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
		<description>

This ntp update to version 4.2.8p10 fixes the following issues:

Security issues fixed (bsc#1030050):
- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:
- Remove spurious log messages (bsc#1014172).
- Fixing ppc and ppc64 linker issue (bsc#1031085).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031085">SUSE bug 1031085</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584335" comment="ntp-4.2.8p10-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584336" comment="ntp-doc-4.2.8p10-63.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584335" comment="ntp-4.2.8p10-63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584336" comment="ntp-doc-4.2.8p10-63.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41787" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issues fixed:

- CVE-2016-1549: Significant additional protections against CVE-2016-1549 that was fixed in ntp-4.2.8p7 (bsc#1082210).
- CVE-2018-7170: Ephemeral association time spoofing additional protection (bsc#1083424).
- CVE-2018-7182: Buffer read overrun leads information leak in ctl_getitem() (bsc#1083426).
- CVE-2018-7183: decodearr() can write beyond its buffer limit (bsc#1083417).
- CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state (bsc#1083422).
- CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association (bsc#1083420).

Bug fixes:

- bsc#1077445: Don't use libevent's cached time stamps in sntp.
- Disable CMAC in ntp when building against a version of OpenSSL that doesn't support it.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584337" comment="ntp-4.2.8p11-64.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584338" comment="ntp-doc-4.2.8p11-64.4.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584337" comment="ntp-4.2.8p11-64.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584338" comment="ntp-doc-4.2.8p11-64.4.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41788" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<description>

NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584339" comment="ntp-4.2.8p12-64.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584340" comment="ntp-doc-4.2.8p12-64.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584339" comment="ntp-4.2.8p12-64.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584340" comment="ntp-doc-4.2.8p12-64.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41789" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1001182" ref_url="https://bugzilla.suse.com/1001182" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005255.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other issues addressed:

- Make sure that SLE12 version is higher than the one in SLE11 (bsc#1001182). 
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001182">SUSE bug 1001182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584341" comment="ntp-4.2.8p13-64.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584342" comment="ntp-doc-4.2.8p13-64.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584341" comment="ntp-4.2.8p13-64.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584342" comment="ntp-doc-4.2.8p13-64.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41790" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-01"/>
	<updated date="2020-07-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584343" comment="ntp-4.2.8p15-64.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584344" comment="ntp-doc-4.2.8p15-64.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41791" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1006796" ref_url="https://bugzilla.suse.com/1006796" source="BUGZILLA"/>
		<reference ref_id="1007600" ref_url="https://bugzilla.suse.com/1007600" source="BUGZILLA"/>
		<reference ref_id="1011057" ref_url="https://bugzilla.suse.com/1011057" source="BUGZILLA"/>
		<reference ref_id="1013496" ref_url="https://bugzilla.suse.com/1013496" source="BUGZILLA"/>
		<reference ref_id="1024202" ref_url="https://bugzilla.suse.com/1024202" source="BUGZILLA"/>
		<reference ref_id="913727" ref_url="https://bugzilla.suse.com/913727" source="BUGZILLA"/>
		<reference ref_id="938593" ref_url="https://bugzilla.suse.com/938593" source="BUGZILLA"/>
		<reference ref_id="941384" ref_url="https://bugzilla.suse.com/941384" source="BUGZILLA"/>
		<reference ref_id="944615" ref_url="https://bugzilla.suse.com/944615" source="BUGZILLA"/>
		<reference ref_id="952645" ref_url="https://bugzilla.suse.com/952645" source="BUGZILLA"/>
		<reference ref_id="971031" ref_url="https://bugzilla.suse.com/971031" source="BUGZILLA"/>
		<reference ref_id="978424" ref_url="https://bugzilla.suse.com/978424" source="BUGZILLA"/>
		<reference ref_id="985110" ref_url="https://bugzilla.suse.com/985110" source="BUGZILLA"/>
		<reference ref_id="994598" ref_url="https://bugzilla.suse.com/994598" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002699.html" source="SUSE-SU"/>
		<description>

This update for open-vm-tools to 10.1.0 stable brings features, fixes bugs
and security issues:

- New vmware-namespace-cmd command line utility
- GTK3 support
- Common Agent Framework (CAF)
- Guest authentication with xmlsec1
- Sub-command to push updated network information to the host on demand
- Fix for quiesced snapshot failure leaving guest file system quiesced (bsc#1006796)
- Fix for CVE-2015-5191 (bsc#1007600)
- Report SLES for SAP 12 guest OS as SLES 12 (bsc#1013496)
- Add udev rule to increase VMware virtual disk timeout values (bsc#994598) 
- Fix vmtoolsd init script to run vmtoolsd in background (bsc#971031)
- Fix copy-n-paste and drag-n-drop regressions (bsc#978424)
- Add new vmblock-fuse.service
- Fix a suspend with systemd issue (bsc#913727)
- ESXi Serviceability
- GuestInfo Enhancements
- Compatibility with all supported versions of VMware vSphere, VMware Workstation 12.0
  and VMware Fusion 8.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006796">SUSE bug 1006796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011057">SUSE bug 1011057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013496">SUSE bug 1013496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024202">SUSE bug 1024202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913727">SUSE bug 913727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938593">SUSE bug 938593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941384">SUSE bug 941384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944615">SUSE bug 944615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952645">SUSE bug 952645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971031">SUSE bug 971031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978424">SUSE bug 978424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985110">SUSE bug 985110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994598">SUSE bug 994598</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584345" comment="libvmtools0-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584346" comment="open-vm-tools-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584347" comment="open-vm-tools-desktop-10.1.0-7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584345" comment="libvmtools0-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584346" comment="open-vm-tools-10.1.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584347" comment="open-vm-tools-desktop-10.1.0-7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41792" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579190" comment="compat-libldap-2_3-0-2.3.37-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579191" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579192" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579193" comment="libldap-2_4-2-x86-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579194" comment="openldap2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579195" comment="openldap2-back-meta-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579196" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41793" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584348" comment="compat-libldap-2_3-0-2.3.37-2.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584349" comment="libldap-2_4-2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584350" comment="libldap-2_4-2-32bit-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584351" comment="openldap2-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584352" comment="openldap2-back-meta-2.4.26-0.74.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584353" comment="openldap2-client-2.4.26-0.74.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41794" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584354" comment="compat-libldap-2_3-0-2.3.37-2.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584355" comment="libldap-2_4-2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584356" comment="libldap-2_4-2-32bit-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584357" comment="openldap2-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584358" comment="openldap2-back-meta-2.4.26-0.74.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584359" comment="openldap2-client-2.4.26-0.74.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41795" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584360" comment="compat-libldap-2_3-0-2.3.37-2.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584361" comment="libldap-2_4-2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584362" comment="libldap-2_4-2-32bit-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584363" comment="openldap2-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584364" comment="openldap2-back-meta-2.4.26-0.74.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584365" comment="openldap2-client-2.4.26-0.74.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41796" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="1184020" ref_url="https://bugzilla.suse.com/1184020" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
- resynchronise changelogs with subpackages (bsc#1184020).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184020">SUSE bug 1184020</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584366" comment="compat-libldap-2_3-0-2.3.37-2.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584367" comment="libldap-2_4-2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584368" comment="libldap-2_4-2-32bit-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584369" comment="openldap2-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584370" comment="openldap2-back-meta-2.4.26-0.74.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584371" comment="openldap2-client-2.4.26-0.74.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41797" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579264" comment="compat-libldap-2_3-0-2.3.37-2.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579265" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579266" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579267" comment="libldap-2_4-2-x86-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579268" comment="openldap2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579269" comment="openldap2-back-meta-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579270" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41798" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104812" ref_url="https://bugzilla.suse.com/1104812" source="BUGZILLA"/>
		<reference ref_id="1106998" ref_url="https://bugzilla.suse.com/1106998" source="BUGZILLA"/>
		<reference ref_id="1106999" ref_url="https://bugzilla.suse.com/1106999" source="BUGZILLA"/>
		<reference ref_id="1107033" ref_url="https://bugzilla.suse.com/1107033" source="BUGZILLA"/>
		<reference ref_id="1107037" ref_url="https://bugzilla.suse.com/1107037" source="BUGZILLA"/>
		<reference ref_id="1107038" ref_url="https://bugzilla.suse.com/1107038" source="BUGZILLA"/>
		<reference ref_id="1107039" ref_url="https://bugzilla.suse.com/1107039" source="BUGZILLA"/>
		<reference ref_id="1107107" ref_url="https://bugzilla.suse.com/1107107" source="BUGZILLA"/>
		<reference ref_id="1108318" ref_url="https://bugzilla.suse.com/1108318" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2018-16391: Fixed a denial of service when handling responses from a Muscle Card (bsc#1106998)
- CVE-2018-16392: Fixed a denial of service when handling responses from a TCOS Card (bsc#1106999)
- CVE-2018-16393: Fixed buffer overflows when handling responses from Gemsafe V1 Smartcards (bsc#1108318)
- CVE-2018-16418: Fixed buffer overflow when handling string concatenation in util_acl_to_str (bsc#1107039)
- CVE-2018-16419: Fixed several buffer overflows when handling responses from a Cryptoflex card (bsc#1107107)
- CVE-2018-16422: Fixed single byte buffer overflow when handling responses from an esteid Card (bsc#1107038)
- CVE-2018-16423: Fixed double free when handling responses from a smartcard (bsc#1107037)
- CVE-2018-16427: Fixed out of bounds reads when handling responses in OpenSC (bsc#1107033)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-05"/>
	<updated date="2018-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104812">SUSE bug 1104812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584372" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584373" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584374" comment="libopensc2-x86-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584375" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584376" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584377" comment="opensc-x86-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584372" comment="libopensc2-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584373" comment="libopensc2-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584374" comment="libopensc2-x86-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584375" comment="opensc-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584376" comment="opensc-32bit-0.11.6-5.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584377" comment="opensc-x86-0.11.6-5.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41799" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009681.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653638" comment="libopensc2-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653639" comment="libopensc2-32bit-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653640" comment="opensc-0.11.6-5.27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653641" comment="opensc-32bit-0.11.6-5.27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41800" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-09"/>
	<updated date="2018-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584378" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584379" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584380" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584381" comment="openslp-x86-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584378" comment="openslp-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584379" comment="openslp-32bit-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584380" comment="openslp-server-1.2.0-172.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584381" comment="openslp-x86-1.2.0-172.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41801" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="939932" ref_url="https://bugzilla.suse.com/939932" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945484" ref_url="https://bugzilla.suse.com/945484" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="947458" ref_url="https://bugzilla.suse.com/947458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<description>
OpenSSH was updated to fix several security issues and bugs.

Please note that due to a bug in the previous shipped openssh version, sshd might
not correctly restart. Please verify that the ssh daemon is running after installing
this update.

These security issues were fixed:

* CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode
  is not used, lacked a check of the refusal deadline for X connections,
  which made it easier for remote attackers to bypass intended access
  restrictions via a connection outside of the permitted time window.
  (bsc#936695)

* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd did not properly restrict the processing of keyboard-interactive
  devices within a single connection, which made it easier for remote
  attackers to conduct brute-force attacks or cause a denial of service
  (CPU consumption) via a long and duplicative list in the ssh
  -oKbdInteractiveDevices option, as demonstrated by a modified client
  that provides a different password for each pam element on this list.
  (bsc#938746)

* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM.
  (bsc#932483)

* Hardening patch to fix sftp RCE. (bsc#903649)

* CVE-2015-6563: The monitor component in sshd accepted extraneous username
  data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to
  conduct impersonation attacks by leveraging any SSH login access in
  conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM
  request, related to monitor.c and monitor_wrap.c.

* CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx
  function in monitor.c in sshd might have allowed local users to gain
  privileges by leveraging control of the sshd uid to send an unexpectedly
  early MONITOR_REQ_PAM_FREE_CTX request.

Additional a bug was fixed that could lead to openssh not working in 
chroot (bsc#947458).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939932">SUSE bug 939932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945484">SUSE bug 945484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947458">SUSE bug 947458</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584382" comment="openssh-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584383" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584384" comment="openssh-fips-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584385" comment="openssh-helpers-6.6p1-13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584382" comment="openssh-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584383" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584384" comment="openssh-fips-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584385" comment="openssh-helpers-6.6p1-13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41802" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="729190" ref_url="https://bugzilla.suse.com/729190" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="960414" ref_url="https://bugzilla.suse.com/960414" source="BUGZILLA"/>
		<reference ref_id="961368" ref_url="https://bugzilla.suse.com/961368" source="BUGZILLA"/>
		<reference ref_id="961494" ref_url="https://bugzilla.suse.com/961494" source="BUGZILLA"/>
		<reference ref_id="962313" ref_url="https://bugzilla.suse.com/962313" source="BUGZILLA"/>
		<reference ref_id="965576" ref_url="https://bugzilla.suse.com/965576" source="BUGZILLA"/>
		<reference ref_id="970632" ref_url="https://bugzilla.suse.com/970632" source="BUGZILLA"/>
		<reference ref_id="975865" ref_url="https://bugzilla.suse.com/975865" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix three security issues.

These security issues were fixed:
- CVE-2016-3115: Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH allowed remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions  (bsc#970632).
- CVE-2016-1908: Possible fallback from untrusted to trusted X11 forwarding (bsc#962313).
- CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes (bsc#975865).

These non-security issues were fixed:
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
- Allow empty Match blocks (bsc#961494) 
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-08"/>
	<updated date="2016-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/729190">SUSE bug 729190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960414">SUSE bug 960414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961368">SUSE bug 961368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961494">SUSE bug 961494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965576">SUSE bug 965576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584386" comment="openssh-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584387" comment="openssh-askpass-gnome-6.6p1-21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584388" comment="openssh-fips-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584389" comment="openssh-helpers-6.6p1-21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584386" comment="openssh-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584387" comment="openssh-askpass-gnome-6.6p1-21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584388" comment="openssh-fips-6.6p1-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584389" comment="openssh-helpers-6.6p1-21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41803" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="948902" ref_url="https://bugzilla.suse.com/948902" source="BUGZILLA"/>
		<reference ref_id="981654" ref_url="https://bugzilla.suse.com/981654" source="BUGZILLA"/>
		<reference ref_id="989363" ref_url="https://bugzilla.suse.com/989363" source="BUGZILLA"/>
		<reference ref_id="992533" ref_url="https://bugzilla.suse.com/992533" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-6210: Prevent user enumeration through the timing of password
  processing (bsc#989363)
  [-prevent_timing_user_enumeration]
- Allow lowering the DH groups parameter limit in server as well
  as when GSSAPI key exchange is used (bsc#948902)
- CVE-2016-6515: Limiting the accepted password length to prevent possible DoS
  (bsc#992533)

Bug fixes:
- avoid complaining about unset DISPLAY variable (bsc#981654)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948902">SUSE bug 948902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981654">SUSE bug 981654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584390" comment="openssh-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584391" comment="openssh-askpass-gnome-6.6p1-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584392" comment="openssh-fips-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584393" comment="openssh-helpers-6.6p1-28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584390" comment="openssh-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584391" comment="openssh-askpass-gnome-6.6p1-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584392" comment="openssh-fips-6.6p1-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584393" comment="openssh-helpers-6.6p1-28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41804" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

Security issues fixed:
- CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
- CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
- CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

Non security issues fixed:
- Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)
- fix suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-03"/>
	<updated date="2017-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584394" comment="openssh-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584395" comment="openssh-askpass-gnome-6.6p1-35.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584396" comment="openssh-fips-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584397" comment="openssh-helpers-6.6p1-35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584394" comment="openssh-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584395" comment="openssh-askpass-gnome-6.6p1-35.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584396" comment="openssh-fips-6.6p1-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584397" comment="openssh-helpers-6.6p1-35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41805" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="1017099" ref_url="https://bugzilla.suse.com/1017099" source="BUGZILLA"/>
		<reference ref_id="1023275" ref_url="https://bugzilla.suse.com/1023275" source="BUGZILLA"/>
		<reference ref_id="1053972" ref_url="https://bugzilla.suse.com/1053972" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issues fixed:

- CVE-2016-10012: Fix pre-auth compression checks that could be optimized away (bsc#1016370).
- CVE-2016-10708: Fix remote denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYSmessage (bsc#1076957).
- CVE-2017-15906: Fix r/o sftp-server zero byte file creation (bsc#1065000).
- CVE-2008-1483: Fix accidental re-introduction of CVE-2008-1483 (bsc#1069509).

Bug fixes:

- bsc#1017099: Match conditions with uppercase hostnames fail (bsc#1017099)
- bsc#1053972: supportedKeyExchanges diffie-hellman-group1-sha1 is duplicated (bsc#1053972)
- bsc#1023275: Messages suppressed after upgrade from SLES 11 SP3 to SP4 (bsc#1023275)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-09"/>
	<updated date="2018-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017099">SUSE bug 1017099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023275">SUSE bug 1023275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053972">SUSE bug 1053972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584398" comment="openssh-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584399" comment="openssh-askpass-gnome-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584400" comment="openssh-fips-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584401" comment="openssh-helpers-6.6p1-36.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584398" comment="openssh-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584399" comment="openssh-askpass-gnome-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584400" comment="openssh-fips-6.6p1-36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584401" comment="openssh-helpers-6.6p1-36.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41806" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="1106163" ref_url="https://bugzilla.suse.com/1106163" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="982273" ref_url="https://bugzilla.suse.com/982273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004857.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

Also the following security related hardening change was done:

- Removed arcfour,blowfish,cast from list of default ciphers as they are long discontinued and should no longer be used. (bsc#982273)

And the following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure (bsc#1091396)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982273">SUSE bug 982273</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584402" comment="openssh-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584403" comment="openssh-askpass-gnome-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584404" comment="openssh-fips-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584405" comment="openssh-helpers-6.6p1-36.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584402" comment="openssh-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584403" comment="openssh-askpass-gnome-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584404" comment="openssh-fips-6.6p1-36.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584405" comment="openssh-helpers-6.6p1-36.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41807" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-18"/>
	<updated date="2019-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584406" comment="openssh-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584407" comment="openssh-askpass-gnome-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584408" comment="openssh-fips-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584409" comment="openssh-helpers-6.6p1-36.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584406" comment="openssh-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584407" comment="openssh-askpass-gnome-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584408" comment="openssh-fips-6.6p1-36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584409" comment="openssh-helpers-6.6p1-36.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41808" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1115550" ref_url="https://bugzilla.suse.com/1115550" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed SSHD termination of multichannel sessions with non-root users (bsc#1115550).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115550">SUSE bug 1115550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584410" comment="openssh-6.6p1-36.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584411" comment="openssh-askpass-gnome-6.6p1-36.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584412" comment="openssh-fips-6.6p1-36.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584413" comment="openssh-helpers-6.6p1-36.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41809" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009807.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658399" comment="openssh-6.6p1-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658400" comment="openssh-askpass-gnome-6.6p1-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658401" comment="openssh-fips-6.6p1-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658402" comment="openssh-helpers-6.6p1-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41810" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584414" comment="openssh-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584415" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584416" comment="openssh-fips-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584417" comment="openssh-helpers-6.6p1-16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584414" comment="openssh-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584415" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584416" comment="openssh-fips-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584417" comment="openssh-helpers-6.6p1-16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41811" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579312" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579313" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579314" comment="libopenssl0_9_8-hmac-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579315" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579316" comment="libopenssl0_9_8-x86-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579317" comment="openssl-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579318" comment="openssl-doc-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41812" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584418" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584419" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584420" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584421" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584422" comment="libopenssl0_9_8-x86-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584423" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584424" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584418" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584419" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584420" comment="libopenssl0_9_8-hmac-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584421" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584422" comment="libopenssl0_9_8-x86-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584423" comment="openssl-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584424" comment="openssl-doc-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41813" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="889013" ref_url="https://bugzilla.suse.com/889013" source="BUGZILLA"/>
		<reference ref_id="968050" ref_url="https://bugzilla.suse.com/968050" source="BUGZILLA"/>
		<reference ref_id="976942" ref_url="https://bugzilla.suse.com/976942" source="BUGZILLA"/>
		<reference ref_id="976943" ref_url="https://bugzilla.suse.com/976943" source="BUGZILLA"/>
		<reference ref_id="977614" ref_url="https://bugzilla.suse.com/977614" source="BUGZILLA"/>
		<reference ref_id="977615" ref_url="https://bugzilla.suse.com/977615" source="BUGZILLA"/>
		<reference ref_id="977617" ref_url="https://bugzilla.suse.com/977617" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

Security issues fixed:
- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

Bugs fixed:
- fate#320304: build 32bit devel package
- bsc#976943: Fix buffer overrun in ASN1_parse
- bsc#973223: allow weak DH groups, vulnerable to the logjam attack,
  when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
- bsc#889013: Rename README.SuSE to the new spelling
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-12"/>
	<updated date="2016-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/889013">SUSE bug 889013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976943">SUSE bug 976943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584425" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584426" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584427" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584428" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584429" comment="libopenssl0_9_8-x86-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584430" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584431" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584425" comment="libopenssl0_9_8-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584426" comment="libopenssl0_9_8-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584427" comment="libopenssl0_9_8-hmac-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584428" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584429" comment="libopenssl0_9_8-x86-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584430" comment="openssl-0.9.8j-0.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584431" comment="openssl-doc-0.9.8j-0.97.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41814" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="979475" ref_url="https://bugzilla.suse.com/979475" source="BUGZILLA"/>
		<reference ref_id="982575" ref_url="https://bugzilla.suse.com/982575" source="BUGZILLA"/>
		<reference ref_id="983249" ref_url="https://bugzilla.suse.com/983249" source="BUGZILLA"/>
		<reference ref_id="993819" ref_url="https://bugzilla.suse.com/993819" source="BUGZILLA"/>
		<reference ref_id="994749" ref_url="https://bugzilla.suse.com/994749" source="BUGZILLA"/>
		<reference ref_id="994844" ref_url="https://bugzilla.suse.com/994844" source="BUGZILLA"/>
		<reference ref_id="995075" ref_url="https://bugzilla.suse.com/995075" source="BUGZILLA"/>
		<reference ref_id="995324" ref_url="https://bugzilla.suse.com/995324" source="BUGZILLA"/>
		<reference ref_id="995359" ref_url="https://bugzilla.suse.com/995359" source="BUGZILLA"/>
		<reference ref_id="995377" ref_url="https://bugzilla.suse.com/995377" source="BUGZILLA"/>
		<reference ref_id="998190" ref_url="https://bugzilla.suse.com/998190" source="BUGZILLA"/>
		<reference ref_id="999665" ref_url="https://bugzilla.suse.com/999665" source="BUGZILLA"/>
		<reference ref_id="999666" ref_url="https://bugzilla.suse.com/999666" source="BUGZILLA"/>
		<reference ref_id="999668" ref_url="https://bugzilla.suse.com/999668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behavior (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Bugs fixed:
* Update expired S/MIME certs (bsc#979475)
* Fix crash in print_notice (bsc#998190)
* Resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979475">SUSE bug 979475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995075">SUSE bug 995075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998190">SUSE bug 998190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584432" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584433" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584434" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584436" comment="libopenssl0_9_8-x86-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584437" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584438" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584432" comment="libopenssl0_9_8-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584433" comment="libopenssl0_9_8-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584434" comment="libopenssl0_9_8-hmac-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584435" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584436" comment="libopenssl0_9_8-x86-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584437" comment="openssl-0.9.8j-0.102.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584438" comment="openssl-doc-0.9.8j-0.102.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41815" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1004499" ref_url="https://bugzilla.suse.com/1004499" source="BUGZILLA"/>
		<reference ref_id="1005878" ref_url="https://bugzilla.suse.com/1005878" source="BUGZILLA"/>
		<reference ref_id="1019334" ref_url="https://bugzilla.suse.com/1019334" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="984663" ref_url="https://bugzilla.suse.com/984663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
  ID length is zero (bsc#984663)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-01"/>
	<updated date="2017-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984663">SUSE bug 984663</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584439" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584440" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584441" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584442" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584443" comment="libopenssl0_9_8-x86-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584444" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584445" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584439" comment="libopenssl0_9_8-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584440" comment="libopenssl0_9_8-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584441" comment="libopenssl0_9_8-hmac-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584442" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584443" comment="libopenssl0_9_8-x86-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584444" comment="openssl-0.9.8j-0.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584445" comment="openssl-doc-0.9.8j-0.105.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41816" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00013.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

-  CVE-2018-0739: Constructed ASN.1 types with a recursive definition could exceed
    the stack. This could result in a Denial Of Service attack. (bsc#1087102)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584446" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584447" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584448" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584449" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584450" comment="libopenssl0_9_8-x86-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584451" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584452" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584446" comment="libopenssl0_9_8-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584447" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584448" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584449" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584450" comment="libopenssl0_9_8-x86-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584451" comment="openssl-0.9.8j-0.106.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584452" comment="openssl-doc-0.9.8j-0.106.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41817" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584453" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584454" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584455" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584456" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584457" comment="libopenssl0_9_8-x86-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584458" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584459" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584453" comment="libopenssl0_9_8-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584454" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584455" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584456" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584457" comment="libopenssl0_9_8-x86-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584458" comment="openssl-0.9.8j-0.106.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584459" comment="openssl-doc-0.9.8j-0.106.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41818" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-23"/>
	<updated date="2018-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584460" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584461" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584462" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584463" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584464" comment="libopenssl0_9_8-x86-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584465" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584466" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584460" comment="libopenssl0_9_8-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584461" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584462" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584463" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584464" comment="libopenssl0_9_8-x86-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584465" comment="openssl-0.9.8j-0.106.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584466" comment="openssl-doc-0.9.8j-0.106.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41819" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1110018" ref_url="https://bugzilla.suse.com/1110018" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-27"/>
	<updated date="2018-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584467" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584468" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584469" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584470" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584471" comment="libopenssl0_9_8-x86-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584472" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584473" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584467" comment="libopenssl0_9_8-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584468" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584469" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584470" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584471" comment="libopenssl0_9_8-x86-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584472" comment="openssl-0.9.8j-0.106.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584473" comment="openssl-doc-0.9.8j-0.106.18.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41820" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Reject invalid EC point coordinates (bsc#1131291)
- Mitigate the 'The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations' attack (bsc#1117951)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-11"/>
	<updated date="2019-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584474" comment="libopenssl0_9_8-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584475" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584476" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584477" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584478" comment="openssl-0.9.8j-0.106.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584479" comment="openssl-doc-0.9.8j-0.106.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41821" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-19"/>
	<updated date="2019-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584480" comment="libopenssl0_9_8-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584481" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584482" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584483" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584484" comment="openssl-0.9.8j-0.106.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584485" comment="openssl-doc-0.9.8j-0.106.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41822" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1153785" ref_url="https://bugzilla.suse.com/1153785" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Included the missing cms and pk7 fixes of CVE-2019-1563 (bsc#1153785).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153785">SUSE bug 1153785</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584486" comment="libopenssl0_9_8-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584487" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584488" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584489" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584490" comment="openssl-0.9.8j-0.106.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584491" comment="openssl-doc-0.9.8j-0.106.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41823" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:14295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006542.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Add missing commits for fixing the security issue called 'The 9 Lives of Bleichenbacher's CAT'. (bsc#1117951)
- Fix a memory leak problem in function 'BN_copy()'. (bsc#1160163)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584492" comment="libopenssl0_9_8-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584493" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584494" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584495" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584496" comment="openssl-0.9.8j-0.106.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584497" comment="openssl-doc-0.9.8j-0.106.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41824" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1176331" ref_url="https://bugzilla.suse.com/1176331" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007429.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1968: Introduced hardening against the Raccoon attack by always generating fresh DH keys 
  and never reuse them across multiple TLS connections (bsc#1176331).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584498" comment="libopenssl0_9_8-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584499" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584500" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584501" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584502" comment="openssl-0.9.8j-0.106.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584503" comment="openssl-doc-0.9.8j-0.106.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41825" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584504" comment="libopenssl0_9_8-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584505" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584506" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584507" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584508" comment="openssl-0.9.8j-0.106.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584509" comment="openssl-doc-0.9.8j-0.106.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41826" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631752" comment="libopenssl0_9_8-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631753" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631754" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631755" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631756" comment="openssl-0.9.8j-0.106.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631757" comment="openssl-doc-0.9.8j-0.106.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41827" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632467" comment="libopenssl0_9_8-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632468" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632469" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632470" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632471" comment="openssl-0.9.8j-0.106.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632472" comment="openssl-doc-0.9.8j-0.106.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41828" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673436" comment="libopenssl0_9_8-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673437" comment="libopenssl0_9_8-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673438" comment="libopenssl0_9_8-hmac-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673439" comment="libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673440" comment="openssl-0.9.8j-0.106.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673441" comment="openssl-doc-0.9.8j-0.106.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41829" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00028.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584510" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584511" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584510" comment="openvpn-2.0.9-143.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584511" comment="openvpn-auth-pam-plugin-2.0.9-143.46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41830" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<description>


This update for openvpn fixes the following security issues:

- CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
- CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
- CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
- CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
- Some other hardening fixes have also been applied (bsc#1038713)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584512" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584513" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584512" comment="openvpn-2.0.9-143.47.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584513" comment="openvpn-auth-pam-plugin-2.0.9-143.47.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41831" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122623" ref_url="https://bugzilla.suse.com/1122623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<description>
This update for openwsman fixes the following issues:

Security issues fixed:

- CVE-2019-3816: Fixed a vulnerability in openwsmand deamon which could lead to arbitary file disclosure (bsc#1122623).
- CVE-2019-3833: Fixed a vulnerability in process_connection() which could allow an attacker to trigger an infinite
  loop which leads to Denial of Service (bsc#1122623).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-18"/>
	<updated date="2019-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584514" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584515" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584516" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584514" comment="libwsman1-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584515" comment="openwsman-client-2.2.3-0.16.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584516" comment="openwsman-server-2.2.3-0.16.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41832" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579362" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579363" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41833" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="854480" ref_url="https://bugzilla.suse.com/854480" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="962220" ref_url="https://bugzilla.suse.com/962220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7041" ref_url="https://www.suse.com/security/cve/CVE-2013-7041/" source="CVE"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<description>
This update for pam fixes two security issues.

These security issues were fixed:
- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- CVE-2013-7041: Compare password hashes case-sensitively (bsc#854480).

This non-security issue was fixed:
- bsc#962220: Don't fail when /var/log/btmp is corrupted
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-21"/>
	<updated date="2016-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/854480">SUSE bug 854480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962220">SUSE bug 962220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7041/">CVE-2013-7041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584517" comment="pam-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584518" comment="pam-32bit-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584519" comment="pam-doc-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584520" comment="pam-x86-1.1.5-0.17.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584517" comment="pam-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584518" comment="pam-32bit-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584519" comment="pam-doc-1.1.5-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584520" comment="pam-x86-1.1.5-0.17.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41834" version="1" class="patch">
	<metadata>
		<title>Security update for pam-modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="707645" ref_url="https://bugzilla.suse.com/707645" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004204.html" source="SUSE-SU"/>
		<description>
This update for pam-modules fixes the following security issue:

- CVE-2011-3172: Ensure that unix2_chkpwd calls pam_acct_mgmt to prevent usage
  of locked accounts (bsc#707645).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584521" comment="pam-modules-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584522" comment="pam-modules-32bit-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584523" comment="pam-modules-x86-11-1.27.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584521" comment="pam-modules-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584522" comment="pam-modules-32bit-11-1.27.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584523" comment="pam-modules-x86-11-1.27.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41835" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1105012" ref_url="https://bugzilla.suse.com/1105012" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004594.html" source="SUSE-SU"/>
		<description>
This update for pam_pkcs11 fixes the following security issues:

- It was possible to replay an authentication by using a specially prepared smartcard or token (bsc#1105012)
- Prevent buffer overflow if a user has a home directory with a length of more than 512 bytes (bsc#1105012)
- Memory not cleaned properly before free() (bsc#1105012)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1105012">SUSE bug 1105012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584524" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584525" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584526" comment="pam_pkcs11-x86-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584524" comment="pam_pkcs11-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584525" comment="pam_pkcs11-32bit-0.6.0-141.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584526" comment="pam_pkcs11-x86-0.6.0-141.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41836" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1059698" ref_url="https://bugzilla.suse.com/1059698" source="BUGZILLA"/>
		<reference ref_id="1080918" ref_url="https://bugzilla.suse.com/1080918" source="BUGZILLA"/>
		<reference ref_id="1088420" ref_url="https://bugzilla.suse.com/1088420" source="BUGZILLA"/>
		<reference ref_id="662957" ref_url="https://bugzilla.suse.com/662957" source="BUGZILLA"/>
		<reference ref_id="914891" ref_url="https://bugzilla.suse.com/914891" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2014-9637" ref_url="https://www.suse.com/security/cve/CVE-2014-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<description>
This update for patch fixes several issues.

These security issues were fixed:

- CVE-2018-1000156: patch: Malicious patch files cause ed to execute arbitrary commands (bsc#1088420).
- CVE-2014-9637: Prevent DoS by remote attackers (memory consumption and
  segmentation fault) via a crafted diff file (bsc#914891).
- CVE-2016-10713: Prevent out-of-bounds access within pch_write_line() that
  could have lead to DoS via a crafted input file (bsc#1080918).
- CVE-2010-4651: Fixed a directory traversal bug (bsc#662957):

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059698">SUSE bug 1059698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914891">SUSE bug 914891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9637/">CVE-2014-9637</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584527" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584527" comment="patch-2.5.9-252.22.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41837" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="929027" ref_url="https://bugzilla.suse.com/929027" source="BUGZILLA"/>
		<reference ref_id="967082" ref_url="https://bugzilla.suse.com/967082" source="BUGZILLA"/>
		<reference ref_id="987887" ref_url="https://bugzilla.suse.com/987887" source="BUGZILLA"/>
		<reference ref_id="988311" ref_url="https://bugzilla.suse.com/988311" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<description>

This update for perl fixes the following issues:

- CVE-2016-6185: xsloader looking at a '(eval)' directory [bsc#988311]
  
- CVE-2016-1238: searching current directory for optional modules [bsc#987887]

- CVE-2015-8853: regex engine hanging on bad utf8 [bnc976584]

- CVE-2016-2381: environment dup handling bug [bsc#967082]

- perl panic with utf8_mg_pos_cache_update [bsc#929027]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-06"/>
	<updated date="2016-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929027">SUSE bug 929027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584528" comment="perl-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584529" comment="perl-32bit-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584530" comment="perl-Module-Build-0.2808.01-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584531" comment="perl-Test-Simple-0.72-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584532" comment="perl-base-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584533" comment="perl-doc-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584534" comment="perl-x86-5.10.0-64.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584528" comment="perl-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584529" comment="perl-32bit-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584530" comment="perl-Module-Build-0.2808.01-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584531" comment="perl-Test-Simple-0.72-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584532" comment="perl-base-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584533" comment="perl-doc-5.10.0-64.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584534" comment="perl-x86-5.10.0-64.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41838" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003383.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the
  File-Path module before 2.13 for Perl allows attackers to set the mode on
  arbitrary files via vectors involving directory-permission loosening logic.
  (bnc#1047178)

Bug fixes:
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584535" comment="perl-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584536" comment="perl-32bit-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584537" comment="perl-Module-Build-0.2808.01-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584538" comment="perl-Test-Simple-0.72-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584539" comment="perl-base-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584540" comment="perl-doc-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584541" comment="perl-x86-5.10.0-64.81.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584535" comment="perl-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584536" comment="perl-32bit-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584537" comment="perl-Module-Build-0.2808.01-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584538" comment="perl-Test-Simple-0.72-0.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584539" comment="perl-base-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584540" comment="perl-doc-5.10.0-64.81.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584541" comment="perl-x86-5.10.0-64.81.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41839" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584542" comment="perl-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584543" comment="perl-32bit-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584544" comment="perl-Module-Build-0.2808.01-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584545" comment="perl-Test-Simple-0.72-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584546" comment="perl-base-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584547" comment="perl-doc-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584548" comment="perl-x86-5.10.0-64.81.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584542" comment="perl-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584543" comment="perl-32bit-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584544" comment="perl-Module-Build-0.2808.01-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584545" comment="perl-Test-Simple-0.72-0.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584546" comment="perl-base-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584547" comment="perl-doc-5.10.0-64.81.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584548" comment="perl-x86-5.10.0-64.81.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41840" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584549" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584550" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584551" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584552" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584553" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584554" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584555" comment="perl-x86-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584549" comment="perl-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584550" comment="perl-32bit-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584551" comment="perl-Module-Build-0.2808.01-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584552" comment="perl-Test-Simple-0.72-0.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584553" comment="perl-base-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584554" comment="perl-doc-5.10.0-64.81.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584555" comment="perl-x86-5.10.0-64.81.13.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41841" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Archive-Zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1099497" ref_url="https://bugzilla.suse.com/1099497" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004456.html" source="SUSE-SU"/>
		<description>
This update for perl-Archive-Zip fixes the following security issue:

- CVE-2018-10860: Prevent directory traversal caused by not properly sanitizing
  paths while extracting zip files. An attacker able to provide a specially
  crafted archive for processing could have used this flaw to write or overwrite
  arbitrary files in the context of the perl interpreter (bsc#1099497).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584556" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584556" comment="perl-Archive-Zip-1.24-4.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41842" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002543.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- Add patch to fix CVE-2016-1251 (bsc#1012546) use-after-free for repeated
  fetchrow_arrayref calls when mysql_server_prepare=1

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-04"/>
	<updated date="2017-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584557" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584557" comment="perl-DBD-mysql-4.008-6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41843" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002559.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584558" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584558" comment="perl-DBD-mysql-4.008-9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41844" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047059" ref_url="https://bugzilla.suse.com/1047059" source="BUGZILLA"/>
		<reference ref_id="1047095" ref_url="https://bugzilla.suse.com/1047095" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004092.html" source="SUSE-SU"/>
		<description>
This update for perl-DBD-mysql fixes the following issues:

- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional 
(even though this setting's documentation has a \'your communication with the server will be encrypted\' statement), 
which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, 
a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047095">SUSE bug 1047095</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584559" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584559" comment="perl-DBD-mysql-4.008-10.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41845" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584560" comment="perl-DBI-1.607-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41846" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1176493" ref_url="https://bugzilla.suse.com/1176493" source="BUGZILLA"/>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2013-7491" ref_url="https://www.suse.com/security/cve/CVE-2013-7491/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).	  
- CVE-2013-7491: Fixed a stack corruption when a user-defined function required a
  non-trivial amount of memory (bsc#1176493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176493">SUSE bug 1176493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7491/">CVE-2013-7491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584561" comment="perl-DBI-1.607-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41847" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00050.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
  execute arbitrary code by controlling the arguments to a replaceChild call
  (bsc#1046848)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584562" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584562" comment="perl-XML-LibXML-1.66-3.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41848" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3690: Fixed a privilege escalation through untrusted symlinks (bsc#1150734). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584563" comment="permissions-2013.1.7-0.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41849" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="938719" ref_url="https://bugzilla.suse.com/938719" source="BUGZILLA"/>
		<reference ref_id="938721" ref_url="https://bugzilla.suse.com/938721" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5589" ref_url="https://www.suse.com/security/cve/CVE-2015-5589/" source="CVE"/>
		<reference ref_id="CVE-2015-5590" ref_url="https://www.suse.com/security/cve/CVE-2015-5590/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001558.html" source="SUSE-SU"/>
		<description>
PHP was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-5589: PHP could be crashed when processing an invalid file with the 'phar' extension with a segfault in Phar::convertToData, leading to Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due to a buffer overlow in phar_fix_filepath (bsc#938719)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/938719">SUSE bug 938719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938721">SUSE bug 938721</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5589/">CVE-2015-5589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5590/">CVE-2015-5590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579405" comment="apache2-mod_php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579406" comment="php53-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579407" comment="php53-bcmath-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579408" comment="php53-bz2-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579409" comment="php53-calendar-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579410" comment="php53-ctype-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579411" comment="php53-curl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579412" comment="php53-dba-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579413" comment="php53-dom-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579414" comment="php53-exif-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579415" comment="php53-fastcgi-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579416" comment="php53-fileinfo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579417" comment="php53-ftp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579418" comment="php53-gd-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579419" comment="php53-gettext-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579420" comment="php53-gmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579421" comment="php53-iconv-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579422" comment="php53-intl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579423" comment="php53-json-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579424" comment="php53-ldap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579425" comment="php53-mbstring-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579426" comment="php53-mcrypt-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579427" comment="php53-mysql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579428" comment="php53-odbc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579429" comment="php53-openssl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579430" comment="php53-pcntl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579431" comment="php53-pdo-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579432" comment="php53-pear-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579433" comment="php53-pgsql-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579434" comment="php53-pspell-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579435" comment="php53-shmop-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579436" comment="php53-snmp-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579437" comment="php53-soap-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579438" comment="php53-suhosin-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579439" comment="php53-sysvmsg-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579440" comment="php53-sysvsem-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579441" comment="php53-sysvshm-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579442" comment="php53-tokenizer-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579443" comment="php53-wddx-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579444" comment="php53-xmlreader-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579445" comment="php53-xmlrpc-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579446" comment="php53-xmlwriter-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579447" comment="php53-xsl-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579448" comment="php53-zip-5.3.17-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579449" comment="php53-zlib-5.3.17-45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41850" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935074" ref_url="https://bugzilla.suse.com/935074" source="BUGZILLA"/>
		<reference ref_id="942291" ref_url="https://bugzilla.suse.com/942291" source="BUGZILLA"/>
		<reference ref_id="942294" ref_url="https://bugzilla.suse.com/942294" source="BUGZILLA"/>
		<reference ref_id="942295" ref_url="https://bugzilla.suse.com/942295" source="BUGZILLA"/>
		<reference ref_id="942296" ref_url="https://bugzilla.suse.com/942296" source="BUGZILLA"/>
		<reference ref_id="945412" ref_url="https://bugzilla.suse.com/945412" source="BUGZILLA"/>
		<reference ref_id="945428" ref_url="https://bugzilla.suse.com/945428" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6831" ref_url="https://www.suse.com/security/cve/CVE-2015-6831/" source="CVE"/>
		<reference ref_id="CVE-2015-6833" ref_url="https://www.suse.com/security/cve/CVE-2015-6833/" source="CVE"/>
		<reference ref_id="CVE-2015-6836" ref_url="https://www.suse.com/security/cve/CVE-2015-6836/" source="CVE"/>
		<reference ref_id="CVE-2015-6837" ref_url="https://www.suse.com/security/cve/CVE-2015-6837/" source="CVE"/>
		<reference ref_id="CVE-2015-6838" ref_url="https://www.suse.com/security/cve/CVE-2015-6838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00022.html" source="SUSE-SU"/>
		<description>

This update of PHP5 brings several security fixes.

Security fixes:
* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]

It also includes a bugfix for the odbc module:
* compare with SQL_NULL_DATA correctly [bnc#935074]
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942291">SUSE bug 942291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942294">SUSE bug 942294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942295">SUSE bug 942295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942296">SUSE bug 942296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945412">SUSE bug 945412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945428">SUSE bug 945428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6831/">CVE-2015-6831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6833/">CVE-2015-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6836/">CVE-2015-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6837/">CVE-2015-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6838/">CVE-2015-6838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009579450" comment="apache2-mod_php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579451" comment="php53-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579452" comment="php53-bcmath-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579453" comment="php53-bz2-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579454" comment="php53-calendar-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579455" comment="php53-ctype-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579456" comment="php53-curl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579457" comment="php53-dba-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579458" comment="php53-dom-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579459" comment="php53-exif-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579460" comment="php53-fastcgi-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579461" comment="php53-fileinfo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579462" comment="php53-ftp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579463" comment="php53-gd-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579464" comment="php53-gettext-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579465" comment="php53-gmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579466" comment="php53-iconv-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579467" comment="php53-intl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579468" comment="php53-json-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579469" comment="php53-ldap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579470" comment="php53-mbstring-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579471" comment="php53-mcrypt-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579472" comment="php53-mysql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579473" comment="php53-odbc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579474" comment="php53-openssl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579475" comment="php53-pcntl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579476" comment="php53-pdo-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579477" comment="php53-pear-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579478" comment="php53-pgsql-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579479" comment="php53-pspell-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579480" comment="php53-shmop-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579481" comment="php53-snmp-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579482" comment="php53-soap-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579483" comment="php53-suhosin-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579484" comment="php53-sysvmsg-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579485" comment="php53-sysvsem-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579486" comment="php53-sysvshm-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579487" comment="php53-tokenizer-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579488" comment="php53-wddx-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579489" comment="php53-xmlreader-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579490" comment="php53-xmlrpc-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579491" comment="php53-xmlwriter-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579492" comment="php53-xsl-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579493" comment="php53-zip-5.3.17-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009579494" comment="php53-zlib-5.3.17-48.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41851" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could lead to crashes. [bsc#968284]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar phar archives could potentially lead to code execution. [bsc#949961]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
  Note: we do not ship the phar extension currently, so we are not affected.
- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to
  overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-25"/>
	<updated date="2016-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584564" comment="apache2-mod_php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584565" comment="php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584566" comment="php53-bcmath-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584567" comment="php53-bz2-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584568" comment="php53-calendar-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584569" comment="php53-ctype-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584570" comment="php53-curl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584571" comment="php53-dba-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584572" comment="php53-dom-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584573" comment="php53-exif-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584574" comment="php53-fastcgi-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584575" comment="php53-fileinfo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584576" comment="php53-ftp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584577" comment="php53-gd-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584578" comment="php53-gettext-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584579" comment="php53-gmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584580" comment="php53-iconv-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584581" comment="php53-intl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584582" comment="php53-json-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584583" comment="php53-ldap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584584" comment="php53-mbstring-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584585" comment="php53-mcrypt-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584586" comment="php53-mysql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584587" comment="php53-odbc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584588" comment="php53-openssl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584589" comment="php53-pcntl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584590" comment="php53-pdo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584591" comment="php53-pear-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584592" comment="php53-pgsql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584593" comment="php53-pspell-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584594" comment="php53-shmop-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584595" comment="php53-snmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584596" comment="php53-soap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584597" comment="php53-suhosin-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584598" comment="php53-sysvmsg-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584599" comment="php53-sysvsem-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584600" comment="php53-sysvshm-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584601" comment="php53-tokenizer-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584602" comment="php53-wddx-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584603" comment="php53-xmlreader-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584604" comment="php53-xmlrpc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584605" comment="php53-xmlwriter-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584606" comment="php53-xsl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584607" comment="php53-zip-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584608" comment="php53-zlib-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584564" comment="apache2-mod_php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584565" comment="php53-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584566" comment="php53-bcmath-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584567" comment="php53-bz2-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584568" comment="php53-calendar-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584569" comment="php53-ctype-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584570" comment="php53-curl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584571" comment="php53-dba-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584572" comment="php53-dom-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584573" comment="php53-exif-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584574" comment="php53-fastcgi-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584575" comment="php53-fileinfo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584576" comment="php53-ftp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584577" comment="php53-gd-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584578" comment="php53-gettext-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584579" comment="php53-gmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584580" comment="php53-iconv-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584581" comment="php53-intl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584582" comment="php53-json-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584583" comment="php53-ldap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584584" comment="php53-mbstring-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584585" comment="php53-mcrypt-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584586" comment="php53-mysql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584587" comment="php53-odbc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584588" comment="php53-openssl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584589" comment="php53-pcntl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584590" comment="php53-pdo-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584591" comment="php53-pear-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584592" comment="php53-pgsql-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584593" comment="php53-pspell-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584594" comment="php53-shmop-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584595" comment="php53-snmp-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584596" comment="php53-soap-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584597" comment="php53-suhosin-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584598" comment="php53-sysvmsg-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584599" comment="php53-sysvsem-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584600" comment="php53-sysvshm-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584601" comment="php53-tokenizer-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584602" comment="php53-wddx-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584603" comment="php53-xmlreader-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584604" comment="php53-xmlrpc-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584605" comment="php53-xmlwriter-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584606" comment="php53-xsl-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584607" comment="php53-zip-5.3.17-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584608" comment="php53-zlib-5.3.17-59.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41852" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following security issues:

- CVE-2016-4073: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-17"/>
	<updated date="2016-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584609" comment="apache2-mod_php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584610" comment="php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584611" comment="php53-bcmath-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584612" comment="php53-bz2-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584613" comment="php53-calendar-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584614" comment="php53-ctype-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584615" comment="php53-curl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584616" comment="php53-dba-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584617" comment="php53-dom-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584618" comment="php53-exif-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584619" comment="php53-fastcgi-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584620" comment="php53-fileinfo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584621" comment="php53-ftp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584622" comment="php53-gd-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584623" comment="php53-gettext-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584624" comment="php53-gmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584625" comment="php53-iconv-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584626" comment="php53-intl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584627" comment="php53-json-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584628" comment="php53-ldap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584629" comment="php53-mbstring-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584630" comment="php53-mcrypt-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584631" comment="php53-mysql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584632" comment="php53-odbc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584633" comment="php53-openssl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584634" comment="php53-pcntl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584635" comment="php53-pdo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584636" comment="php53-pear-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584637" comment="php53-pgsql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584638" comment="php53-pspell-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584639" comment="php53-shmop-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584640" comment="php53-snmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584641" comment="php53-soap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584642" comment="php53-suhosin-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584643" comment="php53-sysvmsg-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584644" comment="php53-sysvsem-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584645" comment="php53-sysvshm-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584646" comment="php53-tokenizer-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584647" comment="php53-wddx-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584648" comment="php53-xmlreader-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584649" comment="php53-xmlrpc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584650" comment="php53-xmlwriter-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584651" comment="php53-xsl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584652" comment="php53-zip-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584653" comment="php53-zlib-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584609" comment="apache2-mod_php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584610" comment="php53-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584611" comment="php53-bcmath-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584612" comment="php53-bz2-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584613" comment="php53-calendar-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584614" comment="php53-ctype-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584615" comment="php53-curl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584616" comment="php53-dba-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584617" comment="php53-dom-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584618" comment="php53-exif-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584619" comment="php53-fastcgi-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584620" comment="php53-fileinfo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584621" comment="php53-ftp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584622" comment="php53-gd-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584623" comment="php53-gettext-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584624" comment="php53-gmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584625" comment="php53-iconv-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584626" comment="php53-intl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584627" comment="php53-json-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584628" comment="php53-ldap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584629" comment="php53-mbstring-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584630" comment="php53-mcrypt-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584631" comment="php53-mysql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584632" comment="php53-odbc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584633" comment="php53-openssl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584634" comment="php53-pcntl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584635" comment="php53-pdo-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584636" comment="php53-pear-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584637" comment="php53-pgsql-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584638" comment="php53-pspell-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584639" comment="php53-shmop-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584640" comment="php53-snmp-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584641" comment="php53-soap-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584642" comment="php53-suhosin-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584643" comment="php53-sysvmsg-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584644" comment="php53-sysvsem-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584645" comment="php53-sysvshm-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584646" comment="php53-tokenizer-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584647" comment="php53-wddx-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584648" comment="php53-xmlreader-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584649" comment="php53-xmlrpc-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584650" comment="php53-xmlwriter-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584651" comment="php53-xsl-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584652" comment="php53-zip-5.3.17-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584653" comment="php53-zlib-5.3.17-62.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41853" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949961" ref_url="https://bugzilla.suse.com/949961" source="BUGZILLA"/>
		<reference ref_id="968284" ref_url="https://bugzilla.suse.com/968284" source="BUGZILLA"/>
		<reference ref_id="969821" ref_url="https://bugzilla.suse.com/969821" source="BUGZILLA"/>
		<reference ref_id="971611" ref_url="https://bugzilla.suse.com/971611" source="BUGZILLA"/>
		<reference ref_id="971612" ref_url="https://bugzilla.suse.com/971612" source="BUGZILLA"/>
		<reference ref_id="971912" ref_url="https://bugzilla.suse.com/971912" source="BUGZILLA"/>
		<reference ref_id="973351" ref_url="https://bugzilla.suse.com/973351" source="BUGZILLA"/>
		<reference ref_id="973792" ref_url="https://bugzilla.suse.com/973792" source="BUGZILLA"/>
		<reference ref_id="976996" ref_url="https://bugzilla.suse.com/976996" source="BUGZILLA"/>
		<reference ref_id="976997" ref_url="https://bugzilla.suse.com/976997" source="BUGZILLA"/>
		<reference ref_id="977003" ref_url="https://bugzilla.suse.com/977003" source="BUGZILLA"/>
		<reference ref_id="977005" ref_url="https://bugzilla.suse.com/977005" source="BUGZILLA"/>
		<reference ref_id="977991" ref_url="https://bugzilla.suse.com/977991" source="BUGZILLA"/>
		<reference ref_id="977994" ref_url="https://bugzilla.suse.com/977994" source="BUGZILLA"/>
		<reference ref_id="978827" ref_url="https://bugzilla.suse.com/978827" source="BUGZILLA"/>
		<reference ref_id="978828" ref_url="https://bugzilla.suse.com/978828" source="BUGZILLA"/>
		<reference ref_id="978829" ref_url="https://bugzilla.suse.com/978829" source="BUGZILLA"/>
		<reference ref_id="978830" ref_url="https://bugzilla.suse.com/978830" source="BUGZILLA"/>
		<reference ref_id="980366" ref_url="https://bugzilla.suse.com/980366" source="BUGZILLA"/>
		<reference ref_id="980373" ref_url="https://bugzilla.suse.com/980373" source="BUGZILLA"/>
		<reference ref_id="980375" ref_url="https://bugzilla.suse.com/980375" source="BUGZILLA"/>
		<reference ref_id="981050" ref_url="https://bugzilla.suse.com/981050" source="BUGZILLA"/>
		<reference ref_id="982010" ref_url="https://bugzilla.suse.com/982010" source="BUGZILLA"/>
		<reference ref_id="982011" ref_url="https://bugzilla.suse.com/982011" source="BUGZILLA"/>
		<reference ref_id="982012" ref_url="https://bugzilla.suse.com/982012" source="BUGZILLA"/>
		<reference ref_id="982013" ref_url="https://bugzilla.suse.com/982013" source="BUGZILLA"/>
		<reference ref_id="982162" ref_url="https://bugzilla.suse.com/982162" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9767" ref_url="https://www.suse.com/security/cve/CVE-2014-9767/" source="CVE"/>
		<reference ref_id="CVE-2015-4116" ref_url="https://www.suse.com/security/cve/CVE-2015-4116/" source="CVE"/>
		<reference ref_id="CVE-2015-7803" ref_url="https://www.suse.com/security/cve/CVE-2015-7803/" source="CVE"/>
		<reference ref_id="CVE-2015-8835" ref_url="https://www.suse.com/security/cve/CVE-2015-8835/" source="CVE"/>
		<reference ref_id="CVE-2015-8838" ref_url="https://www.suse.com/security/cve/CVE-2015-8838/" source="CVE"/>
		<reference ref_id="CVE-2015-8866" ref_url="https://www.suse.com/security/cve/CVE-2015-8866/" source="CVE"/>
		<reference ref_id="CVE-2015-8867" ref_url="https://www.suse.com/security/cve/CVE-2015-8867/" source="CVE"/>
		<reference ref_id="CVE-2015-8873" ref_url="https://www.suse.com/security/cve/CVE-2015-8873/" source="CVE"/>
		<reference ref_id="CVE-2015-8874" ref_url="https://www.suse.com/security/cve/CVE-2015-8874/" source="CVE"/>
		<reference ref_id="CVE-2015-8879" ref_url="https://www.suse.com/security/cve/CVE-2015-8879/" source="CVE"/>
		<reference ref_id="CVE-2016-2554" ref_url="https://www.suse.com/security/cve/CVE-2016-2554/" source="CVE"/>
		<reference ref_id="CVE-2016-3141" ref_url="https://www.suse.com/security/cve/CVE-2016-3141/" source="CVE"/>
		<reference ref_id="CVE-2016-3142" ref_url="https://www.suse.com/security/cve/CVE-2016-3142/" source="CVE"/>
		<reference ref_id="CVE-2016-3185" ref_url="https://www.suse.com/security/cve/CVE-2016-3185/" source="CVE"/>
		<reference ref_id="CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070/" source="CVE"/>
		<reference ref_id="CVE-2016-4073" ref_url="https://www.suse.com/security/cve/CVE-2016-4073/" source="CVE"/>
		<reference ref_id="CVE-2016-4342" ref_url="https://www.suse.com/security/cve/CVE-2016-4342/" source="CVE"/>
		<reference ref_id="CVE-2016-4346" ref_url="https://www.suse.com/security/cve/CVE-2016-4346/" source="CVE"/>
		<reference ref_id="CVE-2016-4537" ref_url="https://www.suse.com/security/cve/CVE-2016-4537/" source="CVE"/>
		<reference ref_id="CVE-2016-4538" ref_url="https://www.suse.com/security/cve/CVE-2016-4538/" source="CVE"/>
		<reference ref_id="CVE-2016-4539" ref_url="https://www.suse.com/security/cve/CVE-2016-4539/" source="CVE"/>
		<reference ref_id="CVE-2016-4540" ref_url="https://www.suse.com/security/cve/CVE-2016-4540/" source="CVE"/>
		<reference ref_id="CVE-2016-4541" ref_url="https://www.suse.com/security/cve/CVE-2016-4541/" source="CVE"/>
		<reference ref_id="CVE-2016-4542" ref_url="https://www.suse.com/security/cve/CVE-2016-4542/" source="CVE"/>
		<reference ref_id="CVE-2016-4543" ref_url="https://www.suse.com/security/cve/CVE-2016-4543/" source="CVE"/>
		<reference ref_id="CVE-2016-4544" ref_url="https://www.suse.com/security/cve/CVE-2016-4544/" source="CVE"/>
		<reference ref_id="CVE-2016-5093" ref_url="https://www.suse.com/security/cve/CVE-2016-5093/" source="CVE"/>
		<reference ref_id="CVE-2016-5094" ref_url="https://www.suse.com/security/cve/CVE-2016-5094/" source="CVE"/>
		<reference ref_id="CVE-2016-5095" ref_url="https://www.suse.com/security/cve/CVE-2016-5095/" source="CVE"/>
		<reference ref_id="CVE-2016-5096" ref_url="https://www.suse.com/security/cve/CVE-2016-5096/" source="CVE"/>
		<reference ref_id="CVE-2016-5114" ref_url="https://www.suse.com/security/cve/CVE-2016-5114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-5093: A get_icu_value_internal out-of-bounds read could crash the php interpreter (bsc#982010)
- CVE-2016-5094,CVE-2016-5095: Don't allow creating strings with lengths outside int range, avoids overflows (bsc#982011,bsc#982012)
- CVE-2016-5096: A int/size_t confusion in fread could corrupt memory (bsc#982013)
- CVE-2016-5114: A fpm_log.c memory leak and buffer overflow could leak information out of the php process or overwrite a buffer by 1 byte (bsc#982162)
- CVE-2016-4346: A heap overflow was fixed in ext/standard/string.c (bsc#977994)
- CVE-2016-4342: A heap corruption was fixed in tar/zip/phar parser (bsc#977991)
- CVE-2016-4537, CVE-2016-4538: bcpowmod accepted negative scale causing heap buffer overflow corrupting _one_ definition (bsc#978827)
- CVE-2016-4539: Malformed input causes segmentation fault in xml_parse_into_struct() function (bsc#978828)
- CVE-2016-4540, CVE-2016-4541: Out-of-bounds memory read in zif_grapheme_stripos when given negative offset (bsc#978829)
- CVE-2016-4542, CVE-2016-4543, CVE-2016-4544: Out-of-bounds heap memory
  read in exif_read_data() caused by malformed input (bsc#978830)
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert
  function  (bsc#980366)
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c (bsc#980373)
- CVE-2015-8874: Stack consumption vulnerability in GD (bsc#980375)
- CVE-2015-8879: odbc_bindcols function in ext/odbc/php_odbc.c mishandles
  driver behavior for SQL_WVARCHAR (bsc#981050)

Also fixed previously on SUSE Linux Enterprise 11 SP4, but not yet shipped to SUSE Linux Enterprise Server 11 SP3 LTSS:
- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).
- CVE-2015-8835: SoapClient s_call method suffered from a type confusion
  issue that could have lead to crashes [bsc#973351]
- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could
  lead to crashes. [bsc#968284]
- CVE-2015-7803: A Stack overflow vulnerability when decompressing tar
  phar archives could potentially lead to code execution. [bsc#949961]
- CVE-2016-3141: A use-after-free / double-free in the WDDX
  deserialization could lead to crashes or potential code
  execution. [bsc#969821]
- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]
- CVE-2014-9767: A directory traversal when extracting zip files was
  fixed that could lead to overwritten files. [bsc#971612]
- CVE-2016-3185: A type confusion vulnerability in
  make_http_soap_request() could lead to crashes or potentially code
  execution. [bsc#971611]
- CVE-2016-4073: A remote attacker could have caused denial of service,
  or possibly execute arbitrary code, due to incorrect handling of string
  length calculations in mb_strcut() (bsc#977003)
- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not
  return cryptographically secure random bytes (bsc#977005)
- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared
  between threads, which could have resulted in XML external entity
  injection and entity expansion issues (bsc#976997)
- CVE-2015-8866: A remote attacker could have caused denial of service
  due to incorrect handling of large strings in php_raw_url_encode()
  (bsc#976996)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-14"/>
	<updated date="2016-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949961">SUSE bug 949961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968284">SUSE bug 968284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969821">SUSE bug 969821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971611">SUSE bug 971611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971612">SUSE bug 971612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971912">SUSE bug 971912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973351">SUSE bug 973351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973792">SUSE bug 973792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976996">SUSE bug 976996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977003">SUSE bug 977003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977005">SUSE bug 977005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977991">SUSE bug 977991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977994">SUSE bug 977994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978827">SUSE bug 978827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978828">SUSE bug 978828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978829">SUSE bug 978829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978830">SUSE bug 978830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980373">SUSE bug 980373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980375">SUSE bug 980375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981050">SUSE bug 981050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982010">SUSE bug 982010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982011">SUSE bug 982011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982012">SUSE bug 982012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982013">SUSE bug 982013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982162">SUSE bug 982162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9767/">CVE-2014-9767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4116/">CVE-2015-4116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7803/">CVE-2015-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8835/">CVE-2015-8835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8838/">CVE-2015-8838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8866/">CVE-2015-8866</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8867/">CVE-2015-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8873/">CVE-2015-8873</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8874/">CVE-2015-8874</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8879/">CVE-2015-8879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2554/">CVE-2016-2554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3141/">CVE-2016-3141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3142/">CVE-2016-3142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3185/">CVE-2016-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4073/">CVE-2016-4073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4342/">CVE-2016-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4346/">CVE-2016-4346</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4537/">CVE-2016-4537</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4538/">CVE-2016-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4539/">CVE-2016-4539</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4540/">CVE-2016-4540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4541/">CVE-2016-4541</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4542/">CVE-2016-4542</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4543/">CVE-2016-4543</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4544/">CVE-2016-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5093/">CVE-2016-5093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5094/">CVE-2016-5094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5095/">CVE-2016-5095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5096/">CVE-2016-5096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5114/">CVE-2016-5114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584654" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584655" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584656" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584657" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584658" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584659" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584660" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584661" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584662" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584663" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584664" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584665" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584666" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584667" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584668" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584669" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584670" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584671" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584672" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584673" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584674" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584675" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584676" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584677" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584678" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584679" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584680" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584681" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584682" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584683" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584684" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584685" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584686" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584687" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584688" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584689" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584690" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584691" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584692" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584693" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584694" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584695" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584696" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584697" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584698" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584654" comment="apache2-mod_php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584655" comment="php53-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584656" comment="php53-bcmath-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584657" comment="php53-bz2-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584658" comment="php53-calendar-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584659" comment="php53-ctype-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584660" comment="php53-curl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584661" comment="php53-dba-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584662" comment="php53-dom-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584663" comment="php53-exif-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584664" comment="php53-fastcgi-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584665" comment="php53-fileinfo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584666" comment="php53-ftp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584667" comment="php53-gd-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584668" comment="php53-gettext-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584669" comment="php53-gmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584670" comment="php53-iconv-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584671" comment="php53-intl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584672" comment="php53-json-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584673" comment="php53-ldap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584674" comment="php53-mbstring-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584675" comment="php53-mcrypt-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584676" comment="php53-mysql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584677" comment="php53-odbc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584678" comment="php53-openssl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584679" comment="php53-pcntl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584680" comment="php53-pdo-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584681" comment="php53-pear-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584682" comment="php53-pgsql-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584683" comment="php53-pspell-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584684" comment="php53-shmop-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584685" comment="php53-snmp-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584686" comment="php53-soap-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584687" comment="php53-suhosin-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584688" comment="php53-sysvmsg-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584689" comment="php53-sysvsem-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584690" comment="php53-sysvshm-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584691" comment="php53-tokenizer-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584692" comment="php53-wddx-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584693" comment="php53-xmlreader-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584694" comment="php53-xmlrpc-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584695" comment="php53-xmlwriter-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584696" comment="php53-xsl-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584697" comment="php53-zip-5.3.17-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584698" comment="php53-zlib-5.3.17-71.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41854" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="986004" ref_url="https://bugzilla.suse.com/986004" source="BUGZILLA"/>
		<reference ref_id="986244" ref_url="https://bugzilla.suse.com/986244" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="986388" ref_url="https://bugzilla.suse.com/986388" source="BUGZILLA"/>
		<reference ref_id="986393" ref_url="https://bugzilla.suse.com/986393" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8935" ref_url="https://www.suse.com/security/cve/CVE-2015-8935/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5769" ref_url="https://www.suse.com/security/cve/CVE-2016-5769/" source="CVE"/>
		<reference ref_id="CVE-2016-5772" ref_url="https://www.suse.com/security/cve/CVE-2016-5772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html" source="SUSE-SU"/>
		<description>
php53 was updated to fix five security issues.

These security issues were fixed:
- CVE-2016-5769: mcrypt: Heap Overflow due to integer overflows (bsc#986388).
- CVE-2015-8935: XSS in header() with Internet Explorer (bsc#986004).
- CVE-2016-5772: Double Free Courruption in wddx_deserialize (bsc#986244).
- CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow (bsc#986386).
- CVE-2016-5767: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow (bsc#986393).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-09"/>
	<updated date="2016-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/986004">SUSE bug 986004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986244">SUSE bug 986244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986388">SUSE bug 986388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8935/">CVE-2015-8935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5769/">CVE-2016-5769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5772/">CVE-2016-5772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584699" comment="apache2-mod_php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584700" comment="php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584701" comment="php53-bcmath-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584702" comment="php53-bz2-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584703" comment="php53-calendar-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584704" comment="php53-ctype-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584705" comment="php53-curl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584706" comment="php53-dba-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584707" comment="php53-dom-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584708" comment="php53-exif-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584709" comment="php53-fastcgi-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584710" comment="php53-fileinfo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584711" comment="php53-ftp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584712" comment="php53-gd-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584713" comment="php53-gettext-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584714" comment="php53-gmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584715" comment="php53-iconv-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584716" comment="php53-intl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584717" comment="php53-json-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584718" comment="php53-ldap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584719" comment="php53-mbstring-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584720" comment="php53-mcrypt-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584721" comment="php53-mysql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584722" comment="php53-odbc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584723" comment="php53-openssl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584724" comment="php53-pcntl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584725" comment="php53-pdo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584726" comment="php53-pear-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584727" comment="php53-pgsql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584728" comment="php53-pspell-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584729" comment="php53-shmop-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584730" comment="php53-snmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584731" comment="php53-soap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584732" comment="php53-suhosin-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584733" comment="php53-sysvmsg-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584734" comment="php53-sysvsem-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584735" comment="php53-sysvshm-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584736" comment="php53-tokenizer-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584737" comment="php53-wddx-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584738" comment="php53-xmlreader-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584739" comment="php53-xmlrpc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584740" comment="php53-xmlwriter-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584741" comment="php53-xsl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584742" comment="php53-zip-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584743" comment="php53-zlib-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584699" comment="apache2-mod_php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584700" comment="php53-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584701" comment="php53-bcmath-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584702" comment="php53-bz2-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584703" comment="php53-calendar-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584704" comment="php53-ctype-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584705" comment="php53-curl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584706" comment="php53-dba-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584707" comment="php53-dom-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584708" comment="php53-exif-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584709" comment="php53-fastcgi-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584710" comment="php53-fileinfo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584711" comment="php53-ftp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584712" comment="php53-gd-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584713" comment="php53-gettext-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584714" comment="php53-gmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584715" comment="php53-iconv-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584716" comment="php53-intl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584717" comment="php53-json-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584718" comment="php53-ldap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584719" comment="php53-mbstring-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584720" comment="php53-mcrypt-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584721" comment="php53-mysql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584722" comment="php53-odbc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584723" comment="php53-openssl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584724" comment="php53-pcntl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584725" comment="php53-pdo-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584726" comment="php53-pear-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584727" comment="php53-pgsql-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584728" comment="php53-pspell-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584729" comment="php53-shmop-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584730" comment="php53-snmp-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584731" comment="php53-soap-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584732" comment="php53-suhosin-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584733" comment="php53-sysvmsg-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584734" comment="php53-sysvsem-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584735" comment="php53-sysvshm-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584736" comment="php53-tokenizer-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584737" comment="php53-wddx-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584738" comment="php53-xmlreader-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584739" comment="php53-xmlrpc-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584740" comment="php53-xmlwriter-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584741" comment="php53-xsl-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584742" comment="php53-zip-5.3.17-74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584743" comment="php53-zlib-5.3.17-74.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41855" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="987530" ref_url="https://bugzilla.suse.com/987530" source="BUGZILLA"/>
		<reference ref_id="991426" ref_url="https://bugzilla.suse.com/991426" source="BUGZILLA"/>
		<reference ref_id="991427" ref_url="https://bugzilla.suse.com/991427" source="BUGZILLA"/>
		<reference ref_id="991428" ref_url="https://bugzilla.suse.com/991428" source="BUGZILLA"/>
		<reference ref_id="991429" ref_url="https://bugzilla.suse.com/991429" source="BUGZILLA"/>
		<reference ref_id="991430" ref_url="https://bugzilla.suse.com/991430" source="BUGZILLA"/>
		<reference ref_id="991433" ref_url="https://bugzilla.suse.com/991433" source="BUGZILLA"/>
		<reference ref_id="991437" ref_url="https://bugzilla.suse.com/991437" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-6288" ref_url="https://www.suse.com/security/cve/CVE-2016-6288/" source="CVE"/>
		<reference ref_id="CVE-2016-6289" ref_url="https://www.suse.com/security/cve/CVE-2016-6289/" source="CVE"/>
		<reference ref_id="CVE-2016-6290" ref_url="https://www.suse.com/security/cve/CVE-2016-6290/" source="CVE"/>
		<reference ref_id="CVE-2016-6291" ref_url="https://www.suse.com/security/cve/CVE-2016-6291/" source="CVE"/>
		<reference ref_id="CVE-2016-6296" ref_url="https://www.suse.com/security/cve/CVE-2016-6296/" source="CVE"/>
		<reference ref_id="CVE-2016-6297" ref_url="https://www.suse.com/security/cve/CVE-2016-6297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- security update:
  * CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]
  * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]
  * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]
  * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]
  * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]
  * CVE-2016-5399: Improper error handling in bzread() [bsc#991430]
  * CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]
  * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-01"/>
	<updated date="2016-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991426">SUSE bug 991426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991427">SUSE bug 991427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991428">SUSE bug 991428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991429">SUSE bug 991429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991433">SUSE bug 991433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991437">SUSE bug 991437</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6288/">CVE-2016-6288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6289/">CVE-2016-6289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6290/">CVE-2016-6290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6291/">CVE-2016-6291</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6296/">CVE-2016-6296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6297/">CVE-2016-6297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584744" comment="apache2-mod_php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584745" comment="php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584746" comment="php53-bcmath-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584747" comment="php53-bz2-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584748" comment="php53-calendar-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584749" comment="php53-ctype-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584750" comment="php53-curl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584751" comment="php53-dba-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584752" comment="php53-dom-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584753" comment="php53-exif-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584754" comment="php53-fastcgi-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584755" comment="php53-fileinfo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584756" comment="php53-ftp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584757" comment="php53-gd-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584758" comment="php53-gettext-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584759" comment="php53-gmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584760" comment="php53-iconv-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584761" comment="php53-intl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584762" comment="php53-json-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584763" comment="php53-ldap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584764" comment="php53-mbstring-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584765" comment="php53-mcrypt-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584766" comment="php53-mysql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584767" comment="php53-odbc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584768" comment="php53-openssl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584769" comment="php53-pcntl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584770" comment="php53-pdo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584771" comment="php53-pear-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584772" comment="php53-pgsql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584773" comment="php53-pspell-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584774" comment="php53-shmop-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584775" comment="php53-snmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584776" comment="php53-soap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584777" comment="php53-suhosin-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584778" comment="php53-sysvmsg-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584779" comment="php53-sysvsem-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584780" comment="php53-sysvshm-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584781" comment="php53-tokenizer-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584782" comment="php53-wddx-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584783" comment="php53-xmlreader-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584784" comment="php53-xmlrpc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584785" comment="php53-xmlwriter-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584786" comment="php53-xsl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584787" comment="php53-zip-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584788" comment="php53-zlib-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584744" comment="apache2-mod_php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584745" comment="php53-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584746" comment="php53-bcmath-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584747" comment="php53-bz2-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584748" comment="php53-calendar-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584749" comment="php53-ctype-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584750" comment="php53-curl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584751" comment="php53-dba-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584752" comment="php53-dom-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584753" comment="php53-exif-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584754" comment="php53-fastcgi-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584755" comment="php53-fileinfo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584756" comment="php53-ftp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584757" comment="php53-gd-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584758" comment="php53-gettext-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584759" comment="php53-gmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584760" comment="php53-iconv-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584761" comment="php53-intl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584762" comment="php53-json-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584763" comment="php53-ldap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584764" comment="php53-mbstring-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584765" comment="php53-mcrypt-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584766" comment="php53-mysql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584767" comment="php53-odbc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584768" comment="php53-openssl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584769" comment="php53-pcntl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584770" comment="php53-pdo-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584771" comment="php53-pear-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584772" comment="php53-pgsql-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584773" comment="php53-pspell-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584774" comment="php53-shmop-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584775" comment="php53-snmp-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584776" comment="php53-soap-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584777" comment="php53-suhosin-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584778" comment="php53-sysvmsg-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584779" comment="php53-sysvsem-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584780" comment="php53-sysvshm-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584781" comment="php53-tokenizer-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584782" comment="php53-wddx-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584783" comment="php53-xmlreader-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584784" comment="php53-xmlrpc-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584785" comment="php53-xmlwriter-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584786" comment="php53-xsl-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584787" comment="php53-zip-5.3.17-79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584788" comment="php53-zlib-5.3.17-79.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41856" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="997206" ref_url="https://bugzilla.suse.com/997206" source="BUGZILLA"/>
		<reference ref_id="997207" ref_url="https://bugzilla.suse.com/997207" source="BUGZILLA"/>
		<reference ref_id="997208" ref_url="https://bugzilla.suse.com/997208" source="BUGZILLA"/>
		<reference ref_id="997210" ref_url="https://bugzilla.suse.com/997210" source="BUGZILLA"/>
		<reference ref_id="997211" ref_url="https://bugzilla.suse.com/997211" source="BUGZILLA"/>
		<reference ref_id="997220" ref_url="https://bugzilla.suse.com/997220" source="BUGZILLA"/>
		<reference ref_id="997225" ref_url="https://bugzilla.suse.com/997225" source="BUGZILLA"/>
		<reference ref_id="997230" ref_url="https://bugzilla.suse.com/997230" source="BUGZILLA"/>
		<reference ref_id="997257" ref_url="https://bugzilla.suse.com/997257" source="BUGZILLA"/>
		<reference ref_id="999679" ref_url="https://bugzilla.suse.com/999679" source="BUGZILLA"/>
		<reference ref_id="999680" ref_url="https://bugzilla.suse.com/999680" source="BUGZILLA"/>
		<reference ref_id="999682" ref_url="https://bugzilla.suse.com/999682" source="BUGZILLA"/>
		<reference ref_id="999684" ref_url="https://bugzilla.suse.com/999684" source="BUGZILLA"/>
		<reference ref_id="999685" ref_url="https://bugzilla.suse.com/999685" source="BUGZILLA"/>
		<reference ref_id="999819" ref_url="https://bugzilla.suse.com/999819" source="BUGZILLA"/>
		<reference ref_id="999820" ref_url="https://bugzilla.suse.com/999820" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7124" ref_url="https://www.suse.com/security/cve/CVE-2016-7124/" source="CVE"/>
		<reference ref_id="CVE-2016-7125" ref_url="https://www.suse.com/security/cve/CVE-2016-7125/" source="CVE"/>
		<reference ref_id="CVE-2016-7126" ref_url="https://www.suse.com/security/cve/CVE-2016-7126/" source="CVE"/>
		<reference ref_id="CVE-2016-7127" ref_url="https://www.suse.com/security/cve/CVE-2016-7127/" source="CVE"/>
		<reference ref_id="CVE-2016-7128" ref_url="https://www.suse.com/security/cve/CVE-2016-7128/" source="CVE"/>
		<reference ref_id="CVE-2016-7129" ref_url="https://www.suse.com/security/cve/CVE-2016-7129/" source="CVE"/>
		<reference ref_id="CVE-2016-7130" ref_url="https://www.suse.com/security/cve/CVE-2016-7130/" source="CVE"/>
		<reference ref_id="CVE-2016-7131" ref_url="https://www.suse.com/security/cve/CVE-2016-7131/" source="CVE"/>
		<reference ref_id="CVE-2016-7132" ref_url="https://www.suse.com/security/cve/CVE-2016-7132/" source="CVE"/>
		<reference ref_id="CVE-2016-7411" ref_url="https://www.suse.com/security/cve/CVE-2016-7411/" source="CVE"/>
		<reference ref_id="CVE-2016-7412" ref_url="https://www.suse.com/security/cve/CVE-2016-7412/" source="CVE"/>
		<reference ref_id="CVE-2016-7413" ref_url="https://www.suse.com/security/cve/CVE-2016-7413/" source="CVE"/>
		<reference ref_id="CVE-2016-7414" ref_url="https://www.suse.com/security/cve/CVE-2016-7414/" source="CVE"/>
		<reference ref_id="CVE-2016-7416" ref_url="https://www.suse.com/security/cve/CVE-2016-7416/" source="CVE"/>
		<reference ref_id="CVE-2016-7417" ref_url="https://www.suse.com/security/cve/CVE-2016-7417/" source="CVE"/>
		<reference ref_id="CVE-2016-7418" ref_url="https://www.suse.com/security/cve/CVE-2016-7418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00006.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization
* CVE-2016-7125: PHP Session Data Injection Vulnerability
* CVE-2016-7126: select_colors write out-of-bounds
* CVE-2016-7127: imagegammacorrect allowed arbitrary write access
* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF
* CVE-2016-7129: wddx_deserialize allows illegal memory access
* CVE-2016-7130: wddx_deserialize null dereference
* CVE-2016-7131: wddx_deserialize null dereference with invalid xml
* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element
* CVE-2016-7411: php5: Memory corruption when destructing deserialized object
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-05"/>
	<updated date="2016-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/997206">SUSE bug 997206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997207">SUSE bug 997207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997208">SUSE bug 997208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997210">SUSE bug 997210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997211">SUSE bug 997211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997220">SUSE bug 997220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997225">SUSE bug 997225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997230">SUSE bug 997230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997257">SUSE bug 997257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999679">SUSE bug 999679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999680">SUSE bug 999680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999682">SUSE bug 999682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999684">SUSE bug 999684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999685">SUSE bug 999685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999819">SUSE bug 999819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999820">SUSE bug 999820</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7124/">CVE-2016-7124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7125/">CVE-2016-7125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7126/">CVE-2016-7126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7127/">CVE-2016-7127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7128/">CVE-2016-7128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7129/">CVE-2016-7129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7130/">CVE-2016-7130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7131/">CVE-2016-7131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7132/">CVE-2016-7132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7411/">CVE-2016-7411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7412/">CVE-2016-7412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7413/">CVE-2016-7413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7414/">CVE-2016-7414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7416/">CVE-2016-7416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7417/">CVE-2016-7417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7418/">CVE-2016-7418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584789" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584790" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584791" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584792" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584793" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584794" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584795" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584796" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584797" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584798" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584799" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584800" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584801" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584802" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584803" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584804" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584805" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584806" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584807" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584808" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584809" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584810" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584811" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584812" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584813" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584814" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584815" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584816" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584817" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584818" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584819" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584820" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584821" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584822" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584823" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584824" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584825" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584826" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584827" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584828" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584829" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584830" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584831" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584832" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584833" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584789" comment="apache2-mod_php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584790" comment="php53-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584791" comment="php53-bcmath-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584792" comment="php53-bz2-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584793" comment="php53-calendar-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584794" comment="php53-ctype-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584795" comment="php53-curl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584796" comment="php53-dba-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584797" comment="php53-dom-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584798" comment="php53-exif-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584799" comment="php53-fastcgi-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584800" comment="php53-fileinfo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584801" comment="php53-ftp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584802" comment="php53-gd-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584803" comment="php53-gettext-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584804" comment="php53-gmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584805" comment="php53-iconv-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584806" comment="php53-intl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584807" comment="php53-json-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584808" comment="php53-ldap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584809" comment="php53-mbstring-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584810" comment="php53-mcrypt-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584811" comment="php53-mysql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584812" comment="php53-odbc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584813" comment="php53-openssl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584814" comment="php53-pcntl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584815" comment="php53-pdo-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584816" comment="php53-pear-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584817" comment="php53-pgsql-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584818" comment="php53-pspell-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584819" comment="php53-shmop-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584820" comment="php53-snmp-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584821" comment="php53-soap-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584822" comment="php53-suhosin-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584823" comment="php53-sysvmsg-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584824" comment="php53-sysvsem-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584825" comment="php53-sysvshm-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584826" comment="php53-tokenizer-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584827" comment="php53-wddx-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584828" comment="php53-xmlreader-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584829" comment="php53-xmlrpc-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584830" comment="php53-xmlwriter-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584831" comment="php53-xsl-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584832" comment="php53-zip-5.3.17-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584833" comment="php53-zlib-5.3.17-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41857" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1004924" ref_url="https://bugzilla.suse.com/1004924" source="BUGZILLA"/>
		<reference ref_id="1005274" ref_url="https://bugzilla.suse.com/1005274" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6911" ref_url="https://www.suse.com/security/cve/CVE-2016-6911/" source="CVE"/>
		<reference ref_id="CVE-2016-8670" ref_url="https://www.suse.com/security/cve/CVE-2016-8670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002378.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf() (bsc#1005274)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-31"/>
	<updated date="2016-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004924">SUSE bug 1004924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005274">SUSE bug 1005274</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6911/">CVE-2016-6911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8670/">CVE-2016-8670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584834" comment="apache2-mod_php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584835" comment="php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584836" comment="php53-bcmath-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584837" comment="php53-bz2-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584838" comment="php53-calendar-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584839" comment="php53-ctype-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584840" comment="php53-curl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584841" comment="php53-dba-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584842" comment="php53-dom-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584843" comment="php53-exif-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584844" comment="php53-fastcgi-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584845" comment="php53-fileinfo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584846" comment="php53-ftp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584847" comment="php53-gd-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584848" comment="php53-gettext-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584849" comment="php53-gmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584850" comment="php53-iconv-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584851" comment="php53-intl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584852" comment="php53-json-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584853" comment="php53-ldap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584854" comment="php53-mbstring-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584855" comment="php53-mcrypt-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584856" comment="php53-mysql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584857" comment="php53-odbc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584858" comment="php53-openssl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584859" comment="php53-pcntl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584860" comment="php53-pdo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584861" comment="php53-pear-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584862" comment="php53-pgsql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584863" comment="php53-pspell-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584864" comment="php53-shmop-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584865" comment="php53-snmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584866" comment="php53-soap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584867" comment="php53-suhosin-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584868" comment="php53-sysvmsg-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584869" comment="php53-sysvsem-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584870" comment="php53-sysvshm-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584871" comment="php53-tokenizer-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584872" comment="php53-wddx-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584873" comment="php53-xmlreader-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584874" comment="php53-xmlrpc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584875" comment="php53-xmlwriter-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584876" comment="php53-xsl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584877" comment="php53-zip-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584878" comment="php53-zlib-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584834" comment="apache2-mod_php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584835" comment="php53-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584836" comment="php53-bcmath-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584837" comment="php53-bz2-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584838" comment="php53-calendar-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584839" comment="php53-ctype-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584840" comment="php53-curl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584841" comment="php53-dba-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584842" comment="php53-dom-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584843" comment="php53-exif-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584844" comment="php53-fastcgi-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584845" comment="php53-fileinfo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584846" comment="php53-ftp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584847" comment="php53-gd-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584848" comment="php53-gettext-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584849" comment="php53-gmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584850" comment="php53-iconv-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584851" comment="php53-intl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584852" comment="php53-json-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584853" comment="php53-ldap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584854" comment="php53-mbstring-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584855" comment="php53-mcrypt-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584856" comment="php53-mysql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584857" comment="php53-odbc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584858" comment="php53-openssl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584859" comment="php53-pcntl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584860" comment="php53-pdo-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584861" comment="php53-pear-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584862" comment="php53-pgsql-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584863" comment="php53-pspell-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584864" comment="php53-shmop-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584865" comment="php53-snmp-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584866" comment="php53-soap-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584867" comment="php53-suhosin-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584868" comment="php53-sysvmsg-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584869" comment="php53-sysvsem-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584870" comment="php53-sysvshm-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584871" comment="php53-tokenizer-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584872" comment="php53-wddx-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584873" comment="php53-xmlreader-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584874" comment="php53-xmlrpc-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584875" comment="php53-xmlwriter-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584876" comment="php53-xsl-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584877" comment="php53-zip-5.3.17-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584878" comment="php53-zlib-5.3.17-87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41858" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012232" ref_url="https://bugzilla.suse.com/1012232" source="BUGZILLA"/>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="1015188" ref_url="https://bugzilla.suse.com/1015188" source="BUGZILLA"/>
		<reference ref_id="1015189" ref_url="https://bugzilla.suse.com/1015189" source="BUGZILLA"/>
		<reference ref_id="974305" ref_url="https://bugzilla.suse.com/974305" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9912" ref_url="https://www.suse.com/security/cve/CVE-2014-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="CVE-2016-9934" ref_url="https://www.suse.com/security/cve/CVE-2016-9934/" source="CVE"/>
		<reference ref_id="CVE-2016-9935" ref_url="https://www.suse.com/security/cve/CVE-2016-9935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002552.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

* CVE-2014-9912: Stack-based buffer overflow in uloc_getDisplayName() [bsc#1012232]
* CVE-2016-9933: Possible stack overflow on truecolor images handling [bsc#1015187]
* CVE-2016-9934: Dereference from NULL pointer could lead to crash [bsc#1015188]
* CVE-2016-9935: Invalid read could lead to crash [bsc#1015189]
* Buffer overflow in libmagic, allowing attackers to crash the PHP interpreter [bsc#974305]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012232">SUSE bug 1012232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015188">SUSE bug 1015188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015189">SUSE bug 1015189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974305">SUSE bug 974305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9912/">CVE-2014-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9934/">CVE-2016-9934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9935/">CVE-2016-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584879" comment="apache2-mod_php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584880" comment="php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584881" comment="php53-bcmath-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584882" comment="php53-bz2-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584883" comment="php53-calendar-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584884" comment="php53-ctype-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584885" comment="php53-curl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584886" comment="php53-dba-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584887" comment="php53-dom-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584888" comment="php53-exif-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584889" comment="php53-fastcgi-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584890" comment="php53-fileinfo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584891" comment="php53-ftp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584892" comment="php53-gd-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584893" comment="php53-gettext-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584894" comment="php53-gmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584895" comment="php53-iconv-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584896" comment="php53-intl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584897" comment="php53-json-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584898" comment="php53-ldap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584899" comment="php53-mbstring-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584900" comment="php53-mcrypt-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584901" comment="php53-mysql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584902" comment="php53-odbc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584903" comment="php53-openssl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584904" comment="php53-pcntl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584905" comment="php53-pdo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584906" comment="php53-pear-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584907" comment="php53-pgsql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584908" comment="php53-pspell-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584909" comment="php53-shmop-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584910" comment="php53-snmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584911" comment="php53-soap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584912" comment="php53-suhosin-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584913" comment="php53-sysvmsg-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584914" comment="php53-sysvsem-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584915" comment="php53-sysvshm-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584916" comment="php53-tokenizer-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584917" comment="php53-wddx-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584918" comment="php53-xmlreader-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584919" comment="php53-xmlrpc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584920" comment="php53-xmlwriter-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584921" comment="php53-xsl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584922" comment="php53-zip-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584923" comment="php53-zlib-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584879" comment="apache2-mod_php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584880" comment="php53-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584881" comment="php53-bcmath-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584882" comment="php53-bz2-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584883" comment="php53-calendar-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584884" comment="php53-ctype-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584885" comment="php53-curl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584886" comment="php53-dba-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584887" comment="php53-dom-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584888" comment="php53-exif-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584889" comment="php53-fastcgi-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584890" comment="php53-fileinfo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584891" comment="php53-ftp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584892" comment="php53-gd-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584893" comment="php53-gettext-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584894" comment="php53-gmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584895" comment="php53-iconv-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584896" comment="php53-intl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584897" comment="php53-json-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584898" comment="php53-ldap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584899" comment="php53-mbstring-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584900" comment="php53-mcrypt-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584901" comment="php53-mysql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584902" comment="php53-odbc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584903" comment="php53-openssl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584904" comment="php53-pcntl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584905" comment="php53-pdo-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584906" comment="php53-pear-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584907" comment="php53-pgsql-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584908" comment="php53-pspell-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584909" comment="php53-shmop-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584910" comment="php53-snmp-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584911" comment="php53-soap-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584912" comment="php53-suhosin-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584913" comment="php53-sysvmsg-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584914" comment="php53-sysvsem-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584915" comment="php53-sysvshm-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584916" comment="php53-tokenizer-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584917" comment="php53-wddx-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584918" comment="php53-xmlreader-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584919" comment="php53-xmlrpc-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584920" comment="php53-xmlwriter-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584921" comment="php53-xsl-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584922" comment="php53-zip-5.3.17-94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584923" comment="php53-zlib-5.3.17-94.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41859" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019550" ref_url="https://bugzilla.suse.com/1019550" source="BUGZILLA"/>
		<reference ref_id="1022219" ref_url="https://bugzilla.suse.com/1022219" source="BUGZILLA"/>
		<reference ref_id="1022255" ref_url="https://bugzilla.suse.com/1022255" source="BUGZILLA"/>
		<reference ref_id="1022257" ref_url="https://bugzilla.suse.com/1022257" source="BUGZILLA"/>
		<reference ref_id="1022260" ref_url="https://bugzilla.suse.com/1022260" source="BUGZILLA"/>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10158" ref_url="https://www.suse.com/security/cve/CVE-2016-10158/" source="CVE"/>
		<reference ref_id="CVE-2016-10159" ref_url="https://www.suse.com/security/cve/CVE-2016-10159/" source="CVE"/>
		<reference ref_id="CVE-2016-10160" ref_url="https://www.suse.com/security/cve/CVE-2016-10160/" source="CVE"/>
		<reference ref_id="CVE-2016-10161" ref_url="https://www.suse.com/security/cve/CVE-2016-10161/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-7478" ref_url="https://www.suse.com/security/cve/CVE-2016-7478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following security issues:

- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite
  loop, causing denial of service (bsc#1019550)
- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c
  in PHP allowed remote attackers to cause a denial of service (application
  crash) via crafted EXIF data that triggers an attempt to divide the
  minimum representable negative integer by -1.  (bsc#1022219)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019550">SUSE bug 1019550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022219">SUSE bug 1022219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022255">SUSE bug 1022255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022257">SUSE bug 1022257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022260">SUSE bug 1022260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10158/">CVE-2016-10158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10159/">CVE-2016-10159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10160/">CVE-2016-10160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10161/">CVE-2016-10161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7478/">CVE-2016-7478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584924" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584925" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584926" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584927" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584928" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584929" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584930" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584931" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584932" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584933" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584934" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584935" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584936" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584937" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584938" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584939" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584940" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584941" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584942" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584943" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584944" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584945" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584946" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584947" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584948" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584949" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584950" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584951" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584952" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584953" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584954" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584955" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584956" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584957" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584958" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584959" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584960" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584961" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584962" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584963" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584964" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584965" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584966" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584967" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584968" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584924" comment="apache2-mod_php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584925" comment="php53-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584926" comment="php53-bcmath-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584927" comment="php53-bz2-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584928" comment="php53-calendar-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584929" comment="php53-ctype-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584930" comment="php53-curl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584931" comment="php53-dba-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584932" comment="php53-dom-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584933" comment="php53-exif-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584934" comment="php53-fastcgi-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584935" comment="php53-fileinfo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584936" comment="php53-ftp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584937" comment="php53-gd-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584938" comment="php53-gettext-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584939" comment="php53-gmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584940" comment="php53-iconv-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584941" comment="php53-intl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584942" comment="php53-json-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584943" comment="php53-ldap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584944" comment="php53-mbstring-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584945" comment="php53-mcrypt-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584946" comment="php53-mysql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584947" comment="php53-odbc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584948" comment="php53-openssl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584949" comment="php53-pcntl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584950" comment="php53-pdo-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584951" comment="php53-pear-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584952" comment="php53-pgsql-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584953" comment="php53-pspell-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584954" comment="php53-shmop-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584955" comment="php53-snmp-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584956" comment="php53-soap-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584957" comment="php53-suhosin-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584958" comment="php53-sysvmsg-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584959" comment="php53-sysvsem-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584960" comment="php53-sysvshm-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584961" comment="php53-tokenizer-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584962" comment="php53-wddx-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584963" comment="php53-xmlreader-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584964" comment="php53-xmlrpc-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584965" comment="php53-xmlwriter-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584966" comment="php53-xsl-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584967" comment="php53-zip-5.3.17-101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584968" comment="php53-zlib-5.3.17-101.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41860" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1035111" ref_url="https://bugzilla.suse.com/1035111" source="BUGZILLA"/>
		<reference ref_id="1040883" ref_url="https://bugzilla.suse.com/1040883" source="BUGZILLA"/>
		<reference ref_id="1040889" ref_url="https://bugzilla.suse.com/1040889" source="BUGZILLA"/>
		<reference ref_id="1040891" ref_url="https://bugzilla.suse.com/1040891" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6294" ref_url="https://www.suse.com/security/cve/CVE-2016-6294/" source="CVE"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="CVE-2017-9224" ref_url="https://www.suse.com/security/cve/CVE-2017-9224/" source="CVE"/>
		<reference ref_id="CVE-2017-9226" ref_url="https://www.suse.com/security/cve/CVE-2017-9226/" source="CVE"/>
		<reference ref_id="CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002949.html" source="SUSE-SU"/>
		<description>

This update for php53 fixes the following issues:

This security issue was fixed:

- CVE-2017-7272: PHP enabled potential SSRF in applications that accept an fsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax was recognized, fsockopen used the port number that is specified in the hostname argument, instead of the port number in the second argument of the function (bsc#1031246)
- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
- CVE-2017-9227: An issue was discovered in Oniguruma 6.2.0, as used in mbstring in PHP. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer. (bsc#1040883)
- CVE-2017-9226: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption. (bsc#1040889)
- CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in mbstring in PHP. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. (bsc#1040891)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040889">SUSE bug 1040889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040891">SUSE bug 1040891</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6294/">CVE-2016-6294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9224/">CVE-2017-9224</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9226/">CVE-2017-9226</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584969" comment="apache2-mod_php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584970" comment="php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584971" comment="php53-bcmath-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584972" comment="php53-bz2-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584973" comment="php53-calendar-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584974" comment="php53-ctype-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584975" comment="php53-curl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584976" comment="php53-dba-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584977" comment="php53-dom-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584978" comment="php53-exif-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584979" comment="php53-fastcgi-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584980" comment="php53-fileinfo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584981" comment="php53-ftp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584982" comment="php53-gd-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584983" comment="php53-gettext-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584984" comment="php53-gmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584985" comment="php53-iconv-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584986" comment="php53-intl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584987" comment="php53-json-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584988" comment="php53-ldap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584989" comment="php53-mbstring-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584990" comment="php53-mcrypt-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584991" comment="php53-mysql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584992" comment="php53-odbc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584993" comment="php53-openssl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584994" comment="php53-pcntl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584995" comment="php53-pdo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584996" comment="php53-pear-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584997" comment="php53-pgsql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584998" comment="php53-pspell-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584999" comment="php53-shmop-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585000" comment="php53-snmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585001" comment="php53-soap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585002" comment="php53-suhosin-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585003" comment="php53-sysvmsg-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585004" comment="php53-sysvsem-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585005" comment="php53-sysvshm-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585006" comment="php53-tokenizer-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585007" comment="php53-wddx-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585008" comment="php53-xmlreader-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585009" comment="php53-xmlrpc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585010" comment="php53-xmlwriter-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585011" comment="php53-xsl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585012" comment="php53-zip-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585013" comment="php53-zlib-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009584969" comment="apache2-mod_php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584970" comment="php53-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584971" comment="php53-bcmath-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584972" comment="php53-bz2-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584973" comment="php53-calendar-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584974" comment="php53-ctype-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584975" comment="php53-curl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584976" comment="php53-dba-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584977" comment="php53-dom-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584978" comment="php53-exif-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584979" comment="php53-fastcgi-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584980" comment="php53-fileinfo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584981" comment="php53-ftp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584982" comment="php53-gd-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584983" comment="php53-gettext-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584984" comment="php53-gmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584985" comment="php53-iconv-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584986" comment="php53-intl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584987" comment="php53-json-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584988" comment="php53-ldap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584989" comment="php53-mbstring-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584990" comment="php53-mcrypt-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584991" comment="php53-mysql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584992" comment="php53-odbc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584993" comment="php53-openssl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584994" comment="php53-pcntl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584995" comment="php53-pdo-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584996" comment="php53-pear-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584997" comment="php53-pgsql-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584998" comment="php53-pspell-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009584999" comment="php53-shmop-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585000" comment="php53-snmp-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585001" comment="php53-soap-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585002" comment="php53-suhosin-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585003" comment="php53-sysvmsg-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585004" comment="php53-sysvsem-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585005" comment="php53-sysvshm-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585006" comment="php53-tokenizer-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585007" comment="php53-wddx-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585008" comment="php53-xmlreader-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585009" comment="php53-xmlrpc-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585010" comment="php53-xmlwriter-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585011" comment="php53-xsl-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585012" comment="php53-zip-5.3.17-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585013" comment="php53-zlib-5.3.17-108.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41861" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1031246" ref_url="https://bugzilla.suse.com/1031246" source="BUGZILLA"/>
		<reference ref_id="1044976" ref_url="https://bugzilla.suse.com/1044976" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7272" ref_url="https://www.suse.com/security/cve/CVE-2017-7272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00039.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- The fix for CVE-2017-7272 was reverted, as it caused regressions in the mysql server connect module.  [bsc#1044976]
  The security fix tried to avoid a server side request forgery, and will be submitted when a better fix becomes available.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031246">SUSE bug 1031246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7272/">CVE-2017-7272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585014" comment="apache2-mod_php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585015" comment="php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585016" comment="php53-bcmath-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585017" comment="php53-bz2-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585018" comment="php53-calendar-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585019" comment="php53-ctype-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585020" comment="php53-curl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585021" comment="php53-dba-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585022" comment="php53-dom-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585023" comment="php53-exif-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585024" comment="php53-fastcgi-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585025" comment="php53-fileinfo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585026" comment="php53-ftp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585027" comment="php53-gd-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585028" comment="php53-gettext-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585029" comment="php53-gmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585030" comment="php53-iconv-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585031" comment="php53-intl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585032" comment="php53-json-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585033" comment="php53-ldap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585034" comment="php53-mbstring-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585035" comment="php53-mcrypt-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585036" comment="php53-mysql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585037" comment="php53-odbc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585038" comment="php53-openssl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585039" comment="php53-pcntl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585040" comment="php53-pdo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585041" comment="php53-pear-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585042" comment="php53-pgsql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585043" comment="php53-pspell-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585044" comment="php53-shmop-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585045" comment="php53-snmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585046" comment="php53-soap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585047" comment="php53-suhosin-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585048" comment="php53-sysvmsg-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585049" comment="php53-sysvsem-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585050" comment="php53-sysvshm-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585051" comment="php53-tokenizer-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585052" comment="php53-wddx-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585053" comment="php53-xmlreader-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585054" comment="php53-xmlrpc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585055" comment="php53-xmlwriter-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585056" comment="php53-xsl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585057" comment="php53-zip-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585058" comment="php53-zlib-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585014" comment="apache2-mod_php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585015" comment="php53-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585016" comment="php53-bcmath-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585017" comment="php53-bz2-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585018" comment="php53-calendar-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585019" comment="php53-ctype-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585020" comment="php53-curl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585021" comment="php53-dba-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585022" comment="php53-dom-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585023" comment="php53-exif-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585024" comment="php53-fastcgi-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585025" comment="php53-fileinfo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585026" comment="php53-ftp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585027" comment="php53-gd-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585028" comment="php53-gettext-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585029" comment="php53-gmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585030" comment="php53-iconv-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585031" comment="php53-intl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585032" comment="php53-json-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585033" comment="php53-ldap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585034" comment="php53-mbstring-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585035" comment="php53-mcrypt-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585036" comment="php53-mysql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585037" comment="php53-odbc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585038" comment="php53-openssl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585039" comment="php53-pcntl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585040" comment="php53-pdo-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585041" comment="php53-pear-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585042" comment="php53-pgsql-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585043" comment="php53-pspell-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585044" comment="php53-shmop-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585045" comment="php53-snmp-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585046" comment="php53-soap-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585047" comment="php53-suhosin-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585048" comment="php53-sysvmsg-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585049" comment="php53-sysvsem-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585050" comment="php53-sysvshm-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585051" comment="php53-tokenizer-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585052" comment="php53-wddx-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585053" comment="php53-xmlreader-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585054" comment="php53-xmlrpc-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585055" comment="php53-xmlwriter-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585056" comment="php53-xsl-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585057" comment="php53-zip-5.3.17-111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585058" comment="php53-zlib-5.3.17-111.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41862" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047454" ref_url="https://bugzilla.suse.com/1047454" source="BUGZILLA"/>
		<reference ref_id="1048094" ref_url="https://bugzilla.suse.com/1048094" source="BUGZILLA"/>
		<reference ref_id="1048096" ref_url="https://bugzilla.suse.com/1048096" source="BUGZILLA"/>
		<reference ref_id="1048111" ref_url="https://bugzilla.suse.com/1048111" source="BUGZILLA"/>
		<reference ref_id="1048112" ref_url="https://bugzilla.suse.com/1048112" source="BUGZILLA"/>
		<reference ref_id="1050241" ref_url="https://bugzilla.suse.com/1050241" source="BUGZILLA"/>
		<reference ref_id="1050726" ref_url="https://bugzilla.suse.com/1050726" source="BUGZILLA"/>
		<reference ref_id="1054430" ref_url="https://bugzilla.suse.com/1054430" source="BUGZILLA"/>
		<reference ref_id="986386" ref_url="https://bugzilla.suse.com/986386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-10397" ref_url="https://www.suse.com/security/cve/CVE-2016-10397/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2017-11144" ref_url="https://www.suse.com/security/cve/CVE-2017-11144/" source="CVE"/>
		<reference ref_id="CVE-2017-11145" ref_url="https://www.suse.com/security/cve/CVE-2017-11145/" source="CVE"/>
		<reference ref_id="CVE-2017-11146" ref_url="https://www.suse.com/security/cve/CVE-2017-11146/" source="CVE"/>
		<reference ref_id="CVE-2017-11147" ref_url="https://www.suse.com/security/cve/CVE-2017-11147/" source="CVE"/>
		<reference ref_id="CVE-2017-11628" ref_url="https://www.suse.com/security/cve/CVE-2017-11628/" source="CVE"/>
		<reference ref_id="CVE-2017-12933" ref_url="https://www.suse.com/security/cve/CVE-2017-12933/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the several issues.

These security issues were fixed:

- CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
- CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
- CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
- CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
- CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
- CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
- CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
- CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
- CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047454">SUSE bug 1047454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048094">SUSE bug 1048094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048096">SUSE bug 1048096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048111">SUSE bug 1048111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048112">SUSE bug 1048112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050726">SUSE bug 1050726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054430">SUSE bug 1054430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-10397/">CVE-2016-10397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11144/">CVE-2017-11144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11145/">CVE-2017-11145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11146/">CVE-2017-11146</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11147/">CVE-2017-11147</cve>
	<cve impact="low" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11628/">CVE-2017-11628</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12933/">CVE-2017-12933</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585059" comment="apache2-mod_php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585060" comment="php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585061" comment="php53-bcmath-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585062" comment="php53-bz2-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585063" comment="php53-calendar-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585064" comment="php53-ctype-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585065" comment="php53-curl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585066" comment="php53-dba-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585067" comment="php53-dom-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585068" comment="php53-exif-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585069" comment="php53-fastcgi-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585070" comment="php53-fileinfo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585071" comment="php53-ftp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585072" comment="php53-gd-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585073" comment="php53-gettext-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585074" comment="php53-gmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585075" comment="php53-iconv-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585076" comment="php53-intl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585077" comment="php53-json-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585078" comment="php53-ldap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585079" comment="php53-mbstring-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585080" comment="php53-mcrypt-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585081" comment="php53-mysql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585082" comment="php53-odbc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585083" comment="php53-openssl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585084" comment="php53-pcntl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585085" comment="php53-pdo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585086" comment="php53-pear-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585087" comment="php53-pgsql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585088" comment="php53-pspell-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585089" comment="php53-shmop-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585090" comment="php53-snmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585091" comment="php53-soap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585092" comment="php53-suhosin-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585093" comment="php53-sysvmsg-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585094" comment="php53-sysvsem-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585095" comment="php53-sysvshm-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585096" comment="php53-tokenizer-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585097" comment="php53-wddx-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585098" comment="php53-xmlreader-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585099" comment="php53-xmlrpc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585100" comment="php53-xmlwriter-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585101" comment="php53-xsl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585102" comment="php53-zip-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585103" comment="php53-zlib-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585059" comment="apache2-mod_php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585060" comment="php53-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585061" comment="php53-bcmath-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585062" comment="php53-bz2-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585063" comment="php53-calendar-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585064" comment="php53-ctype-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585065" comment="php53-curl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585066" comment="php53-dba-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585067" comment="php53-dom-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585068" comment="php53-exif-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585069" comment="php53-fastcgi-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585070" comment="php53-fileinfo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585071" comment="php53-ftp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585072" comment="php53-gd-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585073" comment="php53-gettext-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585074" comment="php53-gmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585075" comment="php53-iconv-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585076" comment="php53-intl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585077" comment="php53-json-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585078" comment="php53-ldap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585079" comment="php53-mbstring-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585080" comment="php53-mcrypt-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585081" comment="php53-mysql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585082" comment="php53-odbc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585083" comment="php53-openssl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585084" comment="php53-pcntl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585085" comment="php53-pdo-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585086" comment="php53-pear-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585087" comment="php53-pgsql-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585088" comment="php53-pspell-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585089" comment="php53-shmop-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585090" comment="php53-snmp-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585091" comment="php53-soap-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585092" comment="php53-suhosin-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585093" comment="php53-sysvmsg-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585094" comment="php53-sysvsem-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585095" comment="php53-sysvshm-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585096" comment="php53-tokenizer-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585097" comment="php53-wddx-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585098" comment="php53-xmlreader-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585099" comment="php53-xmlrpc-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585100" comment="php53-xmlwriter-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585101" comment="php53-xsl-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585102" comment="php53-zip-5.3.17-112.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585103" comment="php53-zlib-5.3.17-112.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41863" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1067441" ref_url="https://bugzilla.suse.com/1067441" source="BUGZILLA"/>
		<reference ref_id="1069606" ref_url="https://bugzilla.suse.com/1069606" source="BUGZILLA"/>
		<reference ref_id="1069631" ref_url="https://bugzilla.suse.com/1069631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16642" ref_url="https://www.suse.com/security/cve/CVE-2017-16642/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2017-16642: Fix timelib_meridian error that could be used to leak information from the interpreter (bsc#1067441).
- CVE-2017-9228: Fix heap out-of-bounds write that occurs in bitset_set_range() during regex compilation (bsc#1069606).
- CVE-2017-9229: Fix invalid pointer dereference in left_adjust_char_head() (bsc#1069631).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-02"/>
	<updated date="2018-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067441">SUSE bug 1067441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16642/">CVE-2017-16642</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585104" comment="apache2-mod_php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585105" comment="php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585106" comment="php53-bcmath-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585107" comment="php53-bz2-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585108" comment="php53-calendar-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585109" comment="php53-ctype-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585110" comment="php53-curl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585111" comment="php53-dba-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585112" comment="php53-dom-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585113" comment="php53-exif-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585114" comment="php53-fastcgi-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585115" comment="php53-fileinfo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585116" comment="php53-ftp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585117" comment="php53-gd-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585118" comment="php53-gettext-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585119" comment="php53-gmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585120" comment="php53-iconv-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585121" comment="php53-intl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585122" comment="php53-json-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585123" comment="php53-ldap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585124" comment="php53-mbstring-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585125" comment="php53-mcrypt-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585126" comment="php53-mysql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585127" comment="php53-odbc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585128" comment="php53-openssl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585129" comment="php53-pcntl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585130" comment="php53-pdo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585131" comment="php53-pear-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585132" comment="php53-pgsql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585133" comment="php53-pspell-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585134" comment="php53-shmop-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585135" comment="php53-snmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585136" comment="php53-soap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585137" comment="php53-suhosin-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585138" comment="php53-sysvmsg-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585139" comment="php53-sysvsem-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585140" comment="php53-sysvshm-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585141" comment="php53-tokenizer-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585142" comment="php53-wddx-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585143" comment="php53-xmlreader-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585144" comment="php53-xmlrpc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585145" comment="php53-xmlwriter-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585146" comment="php53-xsl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585147" comment="php53-zip-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585148" comment="php53-zlib-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585104" comment="apache2-mod_php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585105" comment="php53-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585106" comment="php53-bcmath-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585107" comment="php53-bz2-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585108" comment="php53-calendar-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585109" comment="php53-ctype-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585110" comment="php53-curl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585111" comment="php53-dba-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585112" comment="php53-dom-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585113" comment="php53-exif-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585114" comment="php53-fastcgi-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585115" comment="php53-fileinfo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585116" comment="php53-ftp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585117" comment="php53-gd-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585118" comment="php53-gettext-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585119" comment="php53-gmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585120" comment="php53-iconv-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585121" comment="php53-intl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585122" comment="php53-json-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585123" comment="php53-ldap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585124" comment="php53-mbstring-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585125" comment="php53-mcrypt-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585126" comment="php53-mysql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585127" comment="php53-odbc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585128" comment="php53-openssl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585129" comment="php53-pcntl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585130" comment="php53-pdo-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585131" comment="php53-pear-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585132" comment="php53-pgsql-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585133" comment="php53-pspell-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585134" comment="php53-shmop-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585135" comment="php53-snmp-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585136" comment="php53-soap-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585137" comment="php53-suhosin-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585138" comment="php53-sysvmsg-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585139" comment="php53-sysvsem-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585140" comment="php53-sysvshm-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585141" comment="php53-tokenizer-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585142" comment="php53-wddx-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585143" comment="php53-xmlreader-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585144" comment="php53-xmlrpc-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585145" comment="php53-xmlwriter-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585146" comment="php53-xsl-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585147" comment="php53-zip-5.3.17-112.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585148" comment="php53-zlib-5.3.17-112.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41864" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076220" ref_url="https://bugzilla.suse.com/1076220" source="BUGZILLA"/>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="1080234" ref_url="https://bugzilla.suse.com/1080234" source="BUGZILLA"/>
		<reference ref_id="1083639" ref_url="https://bugzilla.suse.com/1083639" source="BUGZILLA"/>
		<reference ref_id="986247" ref_url="https://bugzilla.suse.com/986247" source="BUGZILLA"/>
		<reference ref_id="986391" ref_url="https://bugzilla.suse.com/986391" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10712" ref_url="https://www.suse.com/security/cve/CVE-2016-10712/" source="CVE"/>
		<reference ref_id="CVE-2016-5771" ref_url="https://www.suse.com/security/cve/CVE-2016-5771/" source="CVE"/>
		<reference ref_id="CVE-2016-5773" ref_url="https://www.suse.com/security/cve/CVE-2016-5773/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes several issues.

These security issues were fixed:

- CVE-2016-10712: In PHP all of the return values of stream_get_meta_data
  could be controlled if the input can be controlled (e.g., during file
  uploads).  (bsc#1080234)
- CVE-2018-5712: Prevent reflected XSS on the PHAR 404 error page via the
  URI of a request for a .phar file that allowed for information disclosure
  (bsc#1076220)
- CVE-2018-5711: Prevent integer signedness error that could have lead
  to an infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
- CVE-2016-5773: php_zip.c in the zip extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data containing a ZipArchive object.  (bsc#986247)
- CVE-2016-5771: spl_array.c in the SPL extension in PHP improperly
  interacted with the unserialize implementation and garbage collection,
  which allowed remote attackers to execute arbitrary code or cause a
  denial of service (use-after-free and application crash) via crafted
  serialized data.  (bsc#986391)
- CVE-2018-7584: Fixed stack-based buffer under-read while parsing an
  HTTPresponse in the php_stream_url_wrap_http_ex.  (bsc#1083639)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080234">SUSE bug 1080234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986247">SUSE bug 986247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986391">SUSE bug 986391</bugzilla>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10712/">CVE-2016-10712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5771/">CVE-2016-5771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5773/">CVE-2016-5773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585149" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585150" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585151" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585152" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585153" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585154" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585155" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585156" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585157" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585158" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585159" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585160" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585161" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585162" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585163" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585164" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585165" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585166" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585167" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585168" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585169" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585170" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585171" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585172" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585173" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585174" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585175" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585176" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585177" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585178" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585179" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585180" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585181" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585182" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585183" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585184" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585185" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585186" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585187" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585188" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585189" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585190" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585191" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585192" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585193" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585149" comment="apache2-mod_php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585150" comment="php53-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585151" comment="php53-bcmath-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585152" comment="php53-bz2-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585153" comment="php53-calendar-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585154" comment="php53-ctype-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585155" comment="php53-curl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585156" comment="php53-dba-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585157" comment="php53-dom-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585158" comment="php53-exif-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585159" comment="php53-fastcgi-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585160" comment="php53-fileinfo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585161" comment="php53-ftp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585162" comment="php53-gd-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585163" comment="php53-gettext-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585164" comment="php53-gmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585165" comment="php53-iconv-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585166" comment="php53-intl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585167" comment="php53-json-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585168" comment="php53-ldap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585169" comment="php53-mbstring-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585170" comment="php53-mcrypt-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585171" comment="php53-mysql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585172" comment="php53-odbc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585173" comment="php53-openssl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585174" comment="php53-pcntl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585175" comment="php53-pdo-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585176" comment="php53-pear-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585177" comment="php53-pgsql-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585178" comment="php53-pspell-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585179" comment="php53-shmop-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585180" comment="php53-snmp-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585181" comment="php53-soap-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585182" comment="php53-suhosin-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585183" comment="php53-sysvmsg-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585184" comment="php53-sysvsem-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585185" comment="php53-sysvshm-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585186" comment="php53-tokenizer-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585187" comment="php53-wddx-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585188" comment="php53-xmlreader-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585189" comment="php53-xmlrpc-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585190" comment="php53-xmlwriter-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585191" comment="php53-xsl-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585192" comment="php53-zip-5.3.17-112.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585193" comment="php53-zlib-5.3.17-112.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41865" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1091355" ref_url="https://bugzilla.suse.com/1091355" source="BUGZILLA"/>
		<reference ref_id="1091362" ref_url="https://bugzilla.suse.com/1091362" source="BUGZILLA"/>
		<reference ref_id="1091363" ref_url="https://bugzilla.suse.com/1091363" source="BUGZILLA"/>
		<reference ref_id="1091367" ref_url="https://bugzilla.suse.com/1091367" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10545" ref_url="https://www.suse.com/security/cve/CVE-2018-10545/" source="CVE"/>
		<reference ref_id="CVE-2018-10546" ref_url="https://www.suse.com/security/cve/CVE-2018-10546/" source="CVE"/>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-10548" ref_url="https://www.suse.com/security/cve/CVE-2018-10548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2018-10545: Fix access controls in FPM child processes (bsc#1091367).
- CVE-2018-10547: Fix Reflected XSS on the PHAR 403 and 404 error pages (bsc#1091362).
- CVE-2018-10546: Fix an infinite loop exists in ext/iconv/iconv.c (bsc#1091363).
- CVE-2018-10548: Fix remote denial of service in ext/ldap/ldap.c (bsc#1091355).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-15"/>
	<updated date="2018-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1091355">SUSE bug 1091355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091363">SUSE bug 1091363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091367">SUSE bug 1091367</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10545/">CVE-2018-10545</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10546/">CVE-2018-10546</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10548/">CVE-2018-10548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585194" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585195" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585196" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585197" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585198" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585199" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585200" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585201" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585202" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585203" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585204" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585205" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585206" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585207" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585208" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585209" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585210" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585211" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585212" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585213" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585214" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585215" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585216" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585217" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585218" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585219" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585220" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585221" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585222" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585223" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585224" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585225" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585226" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585227" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585228" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585229" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585230" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585231" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585232" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585233" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585234" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585235" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585236" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585237" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585238" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585194" comment="apache2-mod_php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585195" comment="php53-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585196" comment="php53-bcmath-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585197" comment="php53-bz2-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585198" comment="php53-calendar-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585199" comment="php53-ctype-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585200" comment="php53-curl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585201" comment="php53-dba-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585202" comment="php53-dom-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585203" comment="php53-exif-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585204" comment="php53-fastcgi-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585205" comment="php53-fileinfo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585206" comment="php53-ftp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585207" comment="php53-gd-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585208" comment="php53-gettext-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585209" comment="php53-gmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585210" comment="php53-iconv-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585211" comment="php53-intl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585212" comment="php53-json-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585213" comment="php53-ldap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585214" comment="php53-mbstring-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585215" comment="php53-mcrypt-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585216" comment="php53-mysql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585217" comment="php53-odbc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585218" comment="php53-openssl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585219" comment="php53-pcntl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585220" comment="php53-pdo-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585221" comment="php53-pear-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585222" comment="php53-pgsql-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585223" comment="php53-pspell-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585224" comment="php53-shmop-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585225" comment="php53-snmp-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585226" comment="php53-soap-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585227" comment="php53-suhosin-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585228" comment="php53-sysvmsg-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585229" comment="php53-sysvsem-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585230" comment="php53-sysvshm-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585231" comment="php53-tokenizer-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585232" comment="php53-wddx-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585233" comment="php53-xmlreader-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585234" comment="php53-xmlrpc-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585235" comment="php53-xmlwriter-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585236" comment="php53-xsl-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585237" comment="php53-zip-5.3.17-112.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585238" comment="php53-zlib-5.3.17-112.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41866" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1096984" ref_url="https://bugzilla.suse.com/1096984" source="BUGZILLA"/>
		<reference ref_id="1099098" ref_url="https://bugzilla.suse.com/1099098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004301.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

The following security issue was fixed:

- An out-of-bounds read in the do_core_note function in readelf.c in libmagic.a
  allowed remote attackers to cause a denial of service via a crafted ELF file
  (CVE-2018-10360, bsc#1096984)
- CVE-2018-12882: exif_read_from_impl allowed attackers to trigger a
  use-after-free (in exif_read_from_file) because it closed a stream that it is
  not responsible for closing (bsc#1099098)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099098">SUSE bug 1099098</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585239" comment="apache2-mod_php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585240" comment="php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585241" comment="php53-bcmath-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585242" comment="php53-bz2-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585243" comment="php53-calendar-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585244" comment="php53-ctype-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585245" comment="php53-curl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585246" comment="php53-dba-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585247" comment="php53-dom-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585248" comment="php53-exif-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585249" comment="php53-fastcgi-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585250" comment="php53-fileinfo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585251" comment="php53-ftp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585252" comment="php53-gd-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585253" comment="php53-gettext-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585254" comment="php53-gmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585255" comment="php53-iconv-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585256" comment="php53-intl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585257" comment="php53-json-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585258" comment="php53-ldap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585259" comment="php53-mbstring-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585260" comment="php53-mcrypt-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585261" comment="php53-mysql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585262" comment="php53-odbc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585263" comment="php53-openssl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585264" comment="php53-pcntl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585265" comment="php53-pdo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585266" comment="php53-pear-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585267" comment="php53-pgsql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585268" comment="php53-pspell-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585269" comment="php53-shmop-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585270" comment="php53-snmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585271" comment="php53-soap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585272" comment="php53-suhosin-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585273" comment="php53-sysvmsg-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585274" comment="php53-sysvsem-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585275" comment="php53-sysvshm-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585276" comment="php53-tokenizer-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585277" comment="php53-wddx-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585278" comment="php53-xmlreader-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585279" comment="php53-xmlrpc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585280" comment="php53-xmlwriter-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585281" comment="php53-xsl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585282" comment="php53-zip-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585283" comment="php53-zlib-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585239" comment="apache2-mod_php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585240" comment="php53-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585241" comment="php53-bcmath-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585242" comment="php53-bz2-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585243" comment="php53-calendar-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585244" comment="php53-ctype-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585245" comment="php53-curl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585246" comment="php53-dba-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585247" comment="php53-dom-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585248" comment="php53-exif-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585249" comment="php53-fastcgi-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585250" comment="php53-fileinfo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585251" comment="php53-ftp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585252" comment="php53-gd-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585253" comment="php53-gettext-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585254" comment="php53-gmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585255" comment="php53-iconv-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585256" comment="php53-intl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585257" comment="php53-json-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585258" comment="php53-ldap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585259" comment="php53-mbstring-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585260" comment="php53-mcrypt-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585261" comment="php53-mysql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585262" comment="php53-odbc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585263" comment="php53-openssl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585264" comment="php53-pcntl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585265" comment="php53-pdo-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585266" comment="php53-pear-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585267" comment="php53-pgsql-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585268" comment="php53-pspell-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585269" comment="php53-shmop-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585270" comment="php53-snmp-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585271" comment="php53-soap-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585272" comment="php53-suhosin-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585273" comment="php53-sysvmsg-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585274" comment="php53-sysvsem-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585275" comment="php53-sysvshm-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585276" comment="php53-tokenizer-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585277" comment="php53-wddx-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585278" comment="php53-xmlreader-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585279" comment="php53-xmlrpc-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585280" comment="php53-xmlwriter-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585281" comment="php53-xsl-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585282" comment="php53-zip-5.3.17-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585283" comment="php53-zlib-5.3.17-112.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41867" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103659" ref_url="https://bugzilla.suse.com/1103659" source="BUGZILLA"/>
		<reference ref_id="1103836" ref_url="https://bugzilla.suse.com/1103836" source="BUGZILLA"/>
		<reference ref_id="1105466" ref_url="https://bugzilla.suse.com/1105466" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9118" ref_url="https://www.suse.com/security/cve/CVE-2017-9118/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-14883" ref_url="https://www.suse.com/security/cve/CVE-2018-14883/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004547.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

The following security issues were fixed:

- CVE-2018-14851: Fixed an out-of-bound read in exif_process_IFD_in_MAKERNOTE,
  which could be exploited by an attacker via crafted JPG files, and could
  result in an application crash. (bsc#1103659)
- CVE-2018-14883: Fixed an integer overflow leading to a heap based buffer
  over-read in exif_thumbnail_extract of exif.c. (bsc#1103836)
- CVE-2017-9118: Fixed an out of bounds access in php_pcre_replace_impl via a
  crafted preg_replace call (bsc#1105466)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103659">SUSE bug 1103659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103836">SUSE bug 1103836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105466">SUSE bug 1105466</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9118/">CVE-2017-9118</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14883/">CVE-2018-14883</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585284" comment="apache2-mod_php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585285" comment="php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585286" comment="php53-bcmath-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585287" comment="php53-bz2-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585288" comment="php53-calendar-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585289" comment="php53-ctype-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585290" comment="php53-curl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585291" comment="php53-dba-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585292" comment="php53-dom-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585293" comment="php53-exif-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585294" comment="php53-fastcgi-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585295" comment="php53-fileinfo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585296" comment="php53-ftp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585297" comment="php53-gd-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585298" comment="php53-gettext-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585299" comment="php53-gmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585300" comment="php53-iconv-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585301" comment="php53-intl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585302" comment="php53-json-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585303" comment="php53-ldap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585304" comment="php53-mbstring-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585305" comment="php53-mcrypt-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585306" comment="php53-mysql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585307" comment="php53-odbc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585308" comment="php53-openssl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585309" comment="php53-pcntl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585310" comment="php53-pdo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585311" comment="php53-pear-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585312" comment="php53-pgsql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585313" comment="php53-pspell-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585314" comment="php53-shmop-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585315" comment="php53-snmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585316" comment="php53-soap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585317" comment="php53-suhosin-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585318" comment="php53-sysvmsg-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585319" comment="php53-sysvsem-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585320" comment="php53-sysvshm-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585321" comment="php53-tokenizer-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585322" comment="php53-wddx-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585323" comment="php53-xmlreader-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585324" comment="php53-xmlrpc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585325" comment="php53-xmlwriter-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585326" comment="php53-xsl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585327" comment="php53-zip-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585328" comment="php53-zlib-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585284" comment="apache2-mod_php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585285" comment="php53-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585286" comment="php53-bcmath-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585287" comment="php53-bz2-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585288" comment="php53-calendar-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585289" comment="php53-ctype-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585290" comment="php53-curl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585291" comment="php53-dba-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585292" comment="php53-dom-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585293" comment="php53-exif-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585294" comment="php53-fastcgi-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585295" comment="php53-fileinfo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585296" comment="php53-ftp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585297" comment="php53-gd-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585298" comment="php53-gettext-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585299" comment="php53-gmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585300" comment="php53-iconv-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585301" comment="php53-intl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585302" comment="php53-json-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585303" comment="php53-ldap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585304" comment="php53-mbstring-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585305" comment="php53-mcrypt-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585306" comment="php53-mysql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585307" comment="php53-odbc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585308" comment="php53-openssl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585309" comment="php53-pcntl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585310" comment="php53-pdo-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585311" comment="php53-pear-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585312" comment="php53-pgsql-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585313" comment="php53-pspell-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585314" comment="php53-shmop-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585315" comment="php53-snmp-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585316" comment="php53-soap-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585317" comment="php53-suhosin-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585318" comment="php53-sysvmsg-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585319" comment="php53-sysvsem-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585320" comment="php53-sysvshm-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585321" comment="php53-tokenizer-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585322" comment="php53-wddx-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585323" comment="php53-xmlreader-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585324" comment="php53-xmlrpc-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585325" comment="php53-xmlwriter-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585326" comment="php53-xsl-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585327" comment="php53-zip-5.3.17-112.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585328" comment="php53-zlib-5.3.17-112.38.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41868" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1108753" ref_url="https://bugzilla.suse.com/1108753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004644.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issue:

- CVE-2018-17082: The Apache2 component in PHP allowed XSS via the body of a
  'Transfer-Encoding: chunked' request, because the bucket brigade was mishandled
  in the php_handler function (bsc#1108753)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-05"/>
	<updated date="2018-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108753">SUSE bug 1108753</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585329" comment="apache2-mod_php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585330" comment="php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585331" comment="php53-bcmath-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585332" comment="php53-bz2-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585333" comment="php53-calendar-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585334" comment="php53-ctype-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585335" comment="php53-curl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585336" comment="php53-dba-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585337" comment="php53-dom-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585338" comment="php53-exif-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585339" comment="php53-fastcgi-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585340" comment="php53-fileinfo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585341" comment="php53-ftp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585342" comment="php53-gd-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585343" comment="php53-gettext-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585344" comment="php53-gmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585345" comment="php53-iconv-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585346" comment="php53-intl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585347" comment="php53-json-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585348" comment="php53-ldap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585349" comment="php53-mbstring-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585350" comment="php53-mcrypt-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585351" comment="php53-mysql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585352" comment="php53-odbc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585353" comment="php53-openssl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585354" comment="php53-pcntl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585355" comment="php53-pdo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585356" comment="php53-pear-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585357" comment="php53-pgsql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585358" comment="php53-pspell-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585359" comment="php53-shmop-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585360" comment="php53-snmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585361" comment="php53-soap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585362" comment="php53-suhosin-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585363" comment="php53-sysvmsg-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585364" comment="php53-sysvsem-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585365" comment="php53-sysvshm-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585366" comment="php53-tokenizer-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585367" comment="php53-wddx-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585368" comment="php53-xmlreader-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585369" comment="php53-xmlrpc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585370" comment="php53-xmlwriter-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585371" comment="php53-xsl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585372" comment="php53-zip-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585373" comment="php53-zlib-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585329" comment="apache2-mod_php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585330" comment="php53-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585331" comment="php53-bcmath-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585332" comment="php53-bz2-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585333" comment="php53-calendar-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585334" comment="php53-ctype-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585335" comment="php53-curl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585336" comment="php53-dba-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585337" comment="php53-dom-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585338" comment="php53-exif-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585339" comment="php53-fastcgi-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585340" comment="php53-fileinfo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585341" comment="php53-ftp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585342" comment="php53-gd-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585343" comment="php53-gettext-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585344" comment="php53-gmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585345" comment="php53-iconv-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585346" comment="php53-intl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585347" comment="php53-json-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585348" comment="php53-ldap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585349" comment="php53-mbstring-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585350" comment="php53-mcrypt-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585351" comment="php53-mysql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585352" comment="php53-odbc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585353" comment="php53-openssl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585354" comment="php53-pcntl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585355" comment="php53-pdo-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585356" comment="php53-pear-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585357" comment="php53-pgsql-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585358" comment="php53-pspell-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585359" comment="php53-shmop-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585360" comment="php53-snmp-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585361" comment="php53-soap-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585362" comment="php53-suhosin-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585363" comment="php53-sysvmsg-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585364" comment="php53-sysvsem-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585365" comment="php53-sysvshm-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585366" comment="php53-tokenizer-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585367" comment="php53-wddx-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585368" comment="php53-xmlreader-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585369" comment="php53-xmlrpc-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585370" comment="php53-xmlwriter-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585371" comment="php53-xsl-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585372" comment="php53-zip-5.3.17-112.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585373" comment="php53-zlib-5.3.17-112.41.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41869" version="1" class="patch">
	<metadata>
		<title>Recommended update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1117107" ref_url="https://bugzilla.suse.com/1117107" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19518" ref_url="https://www.suse.com/security/cve/CVE-2018-19518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004920.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issue fixed:
    
- CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-05"/>
	<updated date="2018-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117107">SUSE bug 1117107</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19518/">CVE-2018-19518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585374" comment="apache2-mod_php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585375" comment="php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585376" comment="php53-bcmath-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585377" comment="php53-bz2-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585378" comment="php53-calendar-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585379" comment="php53-ctype-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585380" comment="php53-curl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585381" comment="php53-dba-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585382" comment="php53-dom-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585383" comment="php53-exif-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585384" comment="php53-fastcgi-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585385" comment="php53-fileinfo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585386" comment="php53-ftp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585387" comment="php53-gd-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585388" comment="php53-gettext-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585389" comment="php53-gmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585390" comment="php53-iconv-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585391" comment="php53-intl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585392" comment="php53-json-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585393" comment="php53-ldap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585394" comment="php53-mbstring-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585395" comment="php53-mcrypt-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585396" comment="php53-mysql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585397" comment="php53-odbc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585398" comment="php53-openssl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585399" comment="php53-pcntl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585400" comment="php53-pdo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585401" comment="php53-pear-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585402" comment="php53-pgsql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585403" comment="php53-pspell-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585404" comment="php53-shmop-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585405" comment="php53-snmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585406" comment="php53-soap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585407" comment="php53-suhosin-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585408" comment="php53-sysvmsg-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585409" comment="php53-sysvsem-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585410" comment="php53-sysvshm-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585411" comment="php53-tokenizer-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585412" comment="php53-wddx-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585413" comment="php53-xmlreader-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585414" comment="php53-xmlrpc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585415" comment="php53-xmlwriter-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585416" comment="php53-xsl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585417" comment="php53-zip-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585418" comment="php53-zlib-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585374" comment="apache2-mod_php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585375" comment="php53-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585376" comment="php53-bcmath-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585377" comment="php53-bz2-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585378" comment="php53-calendar-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585379" comment="php53-ctype-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585380" comment="php53-curl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585381" comment="php53-dba-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585382" comment="php53-dom-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585383" comment="php53-exif-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585384" comment="php53-fastcgi-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585385" comment="php53-fileinfo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585386" comment="php53-ftp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585387" comment="php53-gd-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585388" comment="php53-gettext-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585389" comment="php53-gmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585390" comment="php53-iconv-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585391" comment="php53-intl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585392" comment="php53-json-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585393" comment="php53-ldap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585394" comment="php53-mbstring-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585395" comment="php53-mcrypt-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585396" comment="php53-mysql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585397" comment="php53-odbc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585398" comment="php53-openssl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585399" comment="php53-pcntl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585400" comment="php53-pdo-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585401" comment="php53-pear-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585402" comment="php53-pgsql-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585403" comment="php53-pspell-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585404" comment="php53-shmop-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585405" comment="php53-snmp-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585406" comment="php53-soap-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585407" comment="php53-suhosin-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585408" comment="php53-sysvmsg-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585409" comment="php53-sysvsem-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585410" comment="php53-sysvshm-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585411" comment="php53-tokenizer-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585412" comment="php53-wddx-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585413" comment="php53-xmlreader-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585414" comment="php53-xmlrpc-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585415" comment="php53-xmlwriter-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585416" comment="php53-xsl-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585417" comment="php53-zip-5.3.17-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585418" comment="php53-zlib-5.3.17-112.45.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41870" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1123354" ref_url="https://bugzilla.suse.com/1123354" source="BUGZILLA"/>
		<reference ref_id="1123522" ref_url="https://bugzilla.suse.com/1123522" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005123.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-6977: Fixed a heap-based buffer overflow the GD Graphics Library used in the imagecolormatch function (bsc#1123354).
- CVE-2019-6978: Fixed a double free in the gdImage*Ptr() functions (bsc#1123522).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123354">SUSE bug 1123354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585419" comment="apache2-mod_php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585420" comment="php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585421" comment="php53-bcmath-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585422" comment="php53-bz2-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585423" comment="php53-calendar-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585424" comment="php53-ctype-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585425" comment="php53-curl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585426" comment="php53-dba-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585427" comment="php53-dom-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585428" comment="php53-exif-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585429" comment="php53-fastcgi-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585430" comment="php53-fileinfo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585431" comment="php53-ftp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585432" comment="php53-gd-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585433" comment="php53-gettext-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585434" comment="php53-gmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585435" comment="php53-iconv-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585436" comment="php53-intl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585437" comment="php53-json-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585438" comment="php53-ldap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585439" comment="php53-mbstring-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585440" comment="php53-mcrypt-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585441" comment="php53-mysql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585442" comment="php53-odbc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585443" comment="php53-openssl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585444" comment="php53-pcntl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585445" comment="php53-pdo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585446" comment="php53-pear-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585447" comment="php53-pgsql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585448" comment="php53-pspell-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585449" comment="php53-shmop-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585450" comment="php53-snmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585451" comment="php53-soap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585452" comment="php53-suhosin-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585453" comment="php53-sysvmsg-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585454" comment="php53-sysvsem-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585455" comment="php53-sysvshm-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585456" comment="php53-tokenizer-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585457" comment="php53-wddx-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585458" comment="php53-xmlreader-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585459" comment="php53-xmlrpc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585460" comment="php53-xmlwriter-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585461" comment="php53-xsl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585462" comment="php53-zip-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585463" comment="php53-zlib-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585419" comment="apache2-mod_php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585420" comment="php53-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585421" comment="php53-bcmath-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585422" comment="php53-bz2-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585423" comment="php53-calendar-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585424" comment="php53-ctype-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585425" comment="php53-curl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585426" comment="php53-dba-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585427" comment="php53-dom-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585428" comment="php53-exif-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585429" comment="php53-fastcgi-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585430" comment="php53-fileinfo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585431" comment="php53-ftp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585432" comment="php53-gd-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585433" comment="php53-gettext-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585434" comment="php53-gmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585435" comment="php53-iconv-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585436" comment="php53-intl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585437" comment="php53-json-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585438" comment="php53-ldap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585439" comment="php53-mbstring-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585440" comment="php53-mcrypt-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585441" comment="php53-mysql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585442" comment="php53-odbc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585443" comment="php53-openssl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585444" comment="php53-pcntl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585445" comment="php53-pdo-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585446" comment="php53-pear-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585447" comment="php53-pgsql-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585448" comment="php53-pspell-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585449" comment="php53-shmop-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585450" comment="php53-snmp-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585451" comment="php53-soap-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585452" comment="php53-suhosin-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585453" comment="php53-sysvmsg-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585454" comment="php53-sysvsem-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585455" comment="php53-sysvshm-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585456" comment="php53-tokenizer-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585457" comment="php53-wddx-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585458" comment="php53-xmlreader-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585459" comment="php53-xmlrpc-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585460" comment="php53-xmlwriter-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585461" comment="php53-xsl-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585462" comment="php53-zip-5.3.17-112.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585463" comment="php53-zlib-5.3.17-112.53.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41871" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1126711" ref_url="https://bugzilla.suse.com/1126711" source="BUGZILLA"/>
		<reference ref_id="1126713" ref_url="https://bugzilla.suse.com/1126713" source="BUGZILLA"/>
		<reference ref_id="1126821" ref_url="https://bugzilla.suse.com/1126821" source="BUGZILLA"/>
		<reference ref_id="1126823" ref_url="https://bugzilla.suse.com/1126823" source="BUGZILLA"/>
		<reference ref_id="1127122" ref_url="https://bugzilla.suse.com/1127122" source="BUGZILLA"/>
		<reference ref_id="1128722" ref_url="https://bugzilla.suse.com/1128722" source="BUGZILLA"/>
		<reference ref_id="1128883" ref_url="https://bugzilla.suse.com/1128883" source="BUGZILLA"/>
		<reference ref_id="1128886" ref_url="https://bugzilla.suse.com/1128886" source="BUGZILLA"/>
		<reference ref_id="1128887" ref_url="https://bugzilla.suse.com/1128887" source="BUGZILLA"/>
		<reference ref_id="1128889" ref_url="https://bugzilla.suse.com/1128889" source="BUGZILLA"/>
		<reference ref_id="1128892" ref_url="https://bugzilla.suse.com/1128892" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-9637: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128892).
- CVE-2019-9675: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128886).
- CVE-2019-9638: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension ((bsc#1128889).
- CVE-2019-9639: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128887).
- CVE-2019-9640: Fixed improper implementation of rename function and multiple invalid memory access in EXIF extension (bsc#1128883).
- CVE-2019-9024: Fixed a vulnerability in xmlrpc_decode function which could allow to a hostile XMLRPC server
  to cause memory read outside the allocated areas (bsc#1126821).
- CVE-2019-9020: Fixed a heap out of bounds in xmlrpc_decode function (bsc#1126711).
- CVE-2018-20783: Fixed a buffer over-read in PHAR reading functions which could allow an attacker to read 
  allocated and unallocated memory when parsing a phar file (bsc#1127122).
- CVE-2019-9021: Fixed a heap buffer-based buffer over-read in PHAR reading functions which could allow an 
  attacker to read allocated and unallocated memory when parsing a phar file (bsc#1126713).
- CVE-2019-9023: Fixed multiple heap-based buffer over-read instances in mbstring regular expression functions (bsc#1126823).
- CVE-2019-9641: Fixed multiple invalid memory access in EXIF extension and improved insecure implementation 
  of rename function (bsc#1128722).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-05"/>
	<updated date="2019-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126711">SUSE bug 1126711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126713">SUSE bug 1126713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126823">SUSE bug 1126823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127122">SUSE bug 1127122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128722">SUSE bug 1128722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128883">SUSE bug 1128883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128886">SUSE bug 1128886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128887">SUSE bug 1128887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128889">SUSE bug 1128889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128892">SUSE bug 1128892</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585464" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585465" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585466" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585467" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585468" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585469" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585470" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585471" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585472" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585473" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585474" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585475" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585476" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585477" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585478" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585479" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585480" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585481" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585482" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585483" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585484" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585485" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585486" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585487" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585488" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585489" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585490" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585491" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585492" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585493" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585494" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585495" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585496" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585497" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585498" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585499" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585500" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585501" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585502" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585503" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585504" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585505" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585506" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585507" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585508" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585464" comment="apache2-mod_php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585465" comment="php53-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585466" comment="php53-bcmath-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585467" comment="php53-bz2-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585468" comment="php53-calendar-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585469" comment="php53-ctype-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585470" comment="php53-curl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585471" comment="php53-dba-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585472" comment="php53-dom-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585473" comment="php53-exif-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585474" comment="php53-fastcgi-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585475" comment="php53-fileinfo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585476" comment="php53-ftp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585477" comment="php53-gd-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585478" comment="php53-gettext-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585479" comment="php53-gmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585480" comment="php53-iconv-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585481" comment="php53-intl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585482" comment="php53-json-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585483" comment="php53-ldap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585484" comment="php53-mbstring-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585485" comment="php53-mcrypt-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585486" comment="php53-mysql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585487" comment="php53-odbc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585488" comment="php53-openssl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585489" comment="php53-pcntl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585490" comment="php53-pdo-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585491" comment="php53-pear-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585492" comment="php53-pgsql-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585493" comment="php53-pspell-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585494" comment="php53-shmop-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585495" comment="php53-snmp-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585496" comment="php53-soap-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585497" comment="php53-suhosin-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585498" comment="php53-sysvmsg-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585499" comment="php53-sysvsem-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585500" comment="php53-sysvshm-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585501" comment="php53-tokenizer-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585502" comment="php53-wddx-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585503" comment="php53-xmlreader-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585504" comment="php53-xmlrpc-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585505" comment="php53-xmlwriter-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585506" comment="php53-xsl-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585507" comment="php53-zip-5.3.17-112.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585508" comment="php53-zlib-5.3.17-112.58.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41872" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1140118" ref_url="https://bugzilla.suse.com/1140118" source="BUGZILLA"/>
		<reference ref_id="1145095" ref_url="https://bugzilla.suse.com/1145095" source="BUGZILLA"/>
		<reference ref_id="1146360" ref_url="https://bugzilla.suse.com/1146360" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005875.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2019-11038: Fixed a information disclosure in gdImageCreateFromXbm() (bsc#1140118).
- CVE-2019-11041: Fixed heap buffer over-read in exif_scan_thumbnail() (bsc#1146360). 
- CVE-2019-11042: Fixed heap buffer over-read in exif_process_user_comment() (bsc#1145095).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-03"/>
	<updated date="2019-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140118">SUSE bug 1140118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145095">SUSE bug 1145095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146360">SUSE bug 1146360</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585509" comment="apache2-mod_php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585510" comment="php53-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585511" comment="php53-bcmath-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585512" comment="php53-bz2-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585513" comment="php53-calendar-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585514" comment="php53-ctype-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585515" comment="php53-curl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585516" comment="php53-dba-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585517" comment="php53-dom-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585518" comment="php53-exif-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585519" comment="php53-fastcgi-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585520" comment="php53-fileinfo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585521" comment="php53-ftp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585522" comment="php53-gd-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585523" comment="php53-gettext-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585524" comment="php53-gmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585525" comment="php53-iconv-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585526" comment="php53-intl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585527" comment="php53-json-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585528" comment="php53-ldap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585529" comment="php53-mbstring-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585530" comment="php53-mcrypt-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585531" comment="php53-mysql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585532" comment="php53-odbc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585533" comment="php53-openssl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585534" comment="php53-pcntl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585535" comment="php53-pdo-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585536" comment="php53-pear-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585537" comment="php53-pgsql-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585538" comment="php53-pspell-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585539" comment="php53-shmop-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585540" comment="php53-snmp-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585541" comment="php53-soap-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585542" comment="php53-suhosin-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585543" comment="php53-sysvmsg-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585544" comment="php53-sysvsem-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585545" comment="php53-sysvshm-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585546" comment="php53-tokenizer-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585547" comment="php53-wddx-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585548" comment="php53-xmlreader-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585549" comment="php53-xmlrpc-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585550" comment="php53-xmlwriter-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585551" comment="php53-xsl-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585552" comment="php53-zip-5.3.17-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585553" comment="php53-zlib-5.3.17-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41873" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1159922" ref_url="https://bugzilla.suse.com/1159922" source="BUGZILLA"/>
		<reference ref_id="1159923" ref_url="https://bugzilla.suse.com/1159923" source="BUGZILLA"/>
		<reference ref_id="1159924" ref_url="https://bugzilla.suse.com/1159924" source="BUGZILLA"/>
		<reference ref_id="1159927" ref_url="https://bugzilla.suse.com/1159927" source="BUGZILLA"/>
		<reference ref_id="1161982" ref_url="https://bugzilla.suse.com/1161982" source="BUGZILLA"/>
		<reference ref_id="1162629" ref_url="https://bugzilla.suse.com/1162629" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

Security issues fixed:

- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2019-11045: Fixed an issue with the PHP DirectoryIterator class that accepts filenames with embedded \0 bytes (bsc#1159923).
- CVE-2019-11046: Fixed an out-of-bounds read in bc_shift_addsub (bsc#1159924).
- CVE-2019-11047: Fixed an information disclosure in exif_read_data (bsc#1159922).
- CVE-2019-11050: Fixed a buffer over-read in the EXIF extension (bsc#1159927).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-24"/>
	<updated date="2020-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159922">SUSE bug 1159922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159923">SUSE bug 1159923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159924">SUSE bug 1159924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159927">SUSE bug 1159927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162629">SUSE bug 1162629</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585554" comment="apache2-mod_php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585555" comment="php53-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585556" comment="php53-bcmath-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585557" comment="php53-bz2-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585558" comment="php53-calendar-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585559" comment="php53-ctype-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585560" comment="php53-curl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585561" comment="php53-dba-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585562" comment="php53-dom-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585563" comment="php53-exif-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585564" comment="php53-fastcgi-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585565" comment="php53-fileinfo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585566" comment="php53-ftp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585567" comment="php53-gd-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585568" comment="php53-gettext-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585569" comment="php53-gmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585570" comment="php53-iconv-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585571" comment="php53-intl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585572" comment="php53-json-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585573" comment="php53-ldap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585574" comment="php53-mbstring-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585575" comment="php53-mcrypt-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585576" comment="php53-mysql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585577" comment="php53-odbc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585578" comment="php53-openssl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585579" comment="php53-pcntl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585580" comment="php53-pdo-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585581" comment="php53-pear-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585582" comment="php53-pgsql-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585583" comment="php53-pspell-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585584" comment="php53-shmop-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585585" comment="php53-snmp-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585586" comment="php53-soap-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585587" comment="php53-suhosin-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585588" comment="php53-sysvmsg-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585589" comment="php53-sysvsem-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585590" comment="php53-sysvshm-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585591" comment="php53-tokenizer-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585592" comment="php53-wddx-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585593" comment="php53-xmlreader-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585594" comment="php53-xmlrpc-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585595" comment="php53-xmlwriter-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585596" comment="php53-xsl-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585597" comment="php53-zip-5.3.17-112.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585598" comment="php53-zlib-5.3.17-112.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41874" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007557.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-14"/>
	<updated date="2020-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585599" comment="apache2-mod_php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585600" comment="php53-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585601" comment="php53-bcmath-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585602" comment="php53-bz2-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585603" comment="php53-calendar-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585604" comment="php53-ctype-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585605" comment="php53-curl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585606" comment="php53-dba-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585607" comment="php53-dom-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585608" comment="php53-exif-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585609" comment="php53-fastcgi-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585610" comment="php53-fileinfo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585611" comment="php53-ftp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585612" comment="php53-gd-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585613" comment="php53-gettext-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585614" comment="php53-gmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585615" comment="php53-iconv-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585616" comment="php53-intl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585617" comment="php53-json-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585618" comment="php53-ldap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585619" comment="php53-mbstring-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585620" comment="php53-mcrypt-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585621" comment="php53-mysql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585622" comment="php53-odbc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585623" comment="php53-openssl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585624" comment="php53-pcntl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585625" comment="php53-pdo-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585626" comment="php53-pear-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585627" comment="php53-pgsql-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585628" comment="php53-pspell-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585629" comment="php53-shmop-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585630" comment="php53-snmp-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585631" comment="php53-soap-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585632" comment="php53-suhosin-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585633" comment="php53-sysvmsg-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585634" comment="php53-sysvsem-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585635" comment="php53-sysvshm-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585636" comment="php53-tokenizer-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585637" comment="php53-wddx-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585638" comment="php53-xmlreader-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585639" comment="php53-xmlrpc-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585640" comment="php53-xmlwriter-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585641" comment="php53-xsl-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585642" comment="php53-zip-5.3.17-112.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585643" comment="php53-zlib-5.3.17-112.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41875" version="1" class="patch">
	<metadata>
		<title>Security update for php53 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008508.html" source="SUSE-SU"/>
		<description>
This update for php53 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585644" comment="apache2-mod_php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585645" comment="php53-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585646" comment="php53-bcmath-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585647" comment="php53-bz2-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585648" comment="php53-calendar-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585649" comment="php53-ctype-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585650" comment="php53-curl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585651" comment="php53-dba-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585652" comment="php53-dom-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585653" comment="php53-exif-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585654" comment="php53-fastcgi-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585655" comment="php53-fileinfo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585656" comment="php53-ftp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585657" comment="php53-gd-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585658" comment="php53-gettext-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585659" comment="php53-gmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585660" comment="php53-iconv-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585661" comment="php53-intl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585662" comment="php53-json-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585663" comment="php53-ldap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585664" comment="php53-mbstring-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585665" comment="php53-mcrypt-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585666" comment="php53-mysql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585667" comment="php53-odbc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585668" comment="php53-openssl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585669" comment="php53-pcntl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585670" comment="php53-pdo-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585671" comment="php53-pear-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585672" comment="php53-pgsql-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585673" comment="php53-pspell-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585674" comment="php53-shmop-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585675" comment="php53-snmp-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585676" comment="php53-soap-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585677" comment="php53-suhosin-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585678" comment="php53-sysvmsg-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585679" comment="php53-sysvsem-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585680" comment="php53-sysvshm-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585681" comment="php53-tokenizer-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585682" comment="php53-wddx-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585683" comment="php53-xmlreader-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585684" comment="php53-xmlrpc-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585685" comment="php53-xmlwriter-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585686" comment="php53-xsl-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585687" comment="php53-zip-5.3.17-112.99.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585688" comment="php53-zlib-5.3.17-112.99.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41876" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002611.html" source="SUSE-SU"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585689" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585689" comment="policycoreutils-2.0.79-4.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41877" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003888.html" source="SUSE-SU"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Prevent chcon from following symlinks in /tmp, /var/tmp,
  /var/run and /var/lib/debug (bsc#1083624).  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585690" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585690" comment="policycoreutils-2.0.79-4.9.3.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41878" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976844" ref_url="https://bugzilla.suse.com/976844" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002107.html" source="SUSE-SU"/>
		<description>

This update for poppler fixes the following issues: 

Security issues fixed:
- CVE-2015-8868: Corrupted PDF file can corrupt heap, causing DoS (bsc#976844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-10"/>
	<updated date="2016-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585691" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585692" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585693" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585694" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585691" comment="libpoppler-glib4-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585692" comment="libpoppler-qt4-3-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585693" comment="libpoppler5-0.12.3-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585694" comment="poppler-tools-0.12.3-1.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41879" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="1064593" ref_url="https://bugzilla.suse.com/1064593" source="BUGZILLA"/>
		<reference ref_id="1074453" ref_url="https://bugzilla.suse.com/1074453" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000456" ref_url="https://www.suse.com/security/cve/CVE-2017-1000456/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="CVE-2017-15565" ref_url="https://www.suse.com/security/cve/CVE-2017-15565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred due to
  lack of validation of a table pointer, which allows an attacker to launch a
  denial of service attack. (bsc#1061265)
- CVE-2017-1000456: Validate boundaries in TextPool::addWord to prevent
  overflows in subsequent calculations (bsc#1074453)
- CVE-2017-15565: Prevent NULL Pointer dereference in the
  GfxImageColorMap::getGrayLine() function via a crafted PDF document
  (bsc#1064593)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064593">SUSE bug 1064593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074453">SUSE bug 1074453</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000456/">CVE-2017-1000456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15565/">CVE-2017-15565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585695" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585696" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585697" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585698" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585695" comment="libpoppler-glib4-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585696" comment="libpoppler-qt4-3-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585697" comment="libpoppler5-0.12.3-1.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585698" comment="poppler-tools-0.12.3-1.13.3.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41880" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009580941" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580942" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580943" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580944" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580945" comment="postgresql94-contrib-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580946" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009580947" comment="postgresql94-server-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41881" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062722" ref_url="https://bugzilla.suse.com/1062722" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003420.html" source="SUSE-SU"/>
		<description>
This update for postgresql-init fixes the following issues:

- CVE-2017-14798: A race condition in the init script could be used by attackers able to access the postgresql account to escalate their privileges to root (bsc#1062722)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009574412" comment="postgresql-init-9.4-0.5.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41882" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585699" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585700" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585701" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585702" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585703" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585704" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585705" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585699" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585700" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585701" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585702" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585703" comment="postgresql94-contrib-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585704" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585705" comment="postgresql94-server-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41883" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="993453" ref_url="https://bugzilla.suse.com/993453" source="BUGZILLA"/>
		<reference ref_id="993454" ref_url="https://bugzilla.suse.com/993454" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00036.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to version 9.4.9 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

For the non-security issues please refer to 
- http://www.postgresql.org/docs/9.4/static/release-9-4-9.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-8.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-7.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-29"/>
	<updated date="2016-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585706" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585707" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585708" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585709" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585710" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585711" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585712" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585706" comment="libecpg6-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585707" comment="libpq5-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585708" comment="libpq5-32bit-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585709" comment="postgresql94-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585710" comment="postgresql94-contrib-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585711" comment="postgresql94-docs-9.4.9-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585712" comment="postgresql94-server-9.4.9-0.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41884" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1029547" ref_url="https://bugzilla.suse.com/1029547" source="BUGZILLA"/>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<description>

This update for postgresql93 fixes the following issues:

- bsc#1029547: Fix tests with timezone 2017a 
- CVE-2017-7486: Restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options. (bsc#1037624) 
- CVE-2017-7485: Recognize PGREQUIRESSL variable again. (bsc#1038293)
- CVE-2017-7484: Prevent exposure of statistical information via leaky operators. (bsc#1037603)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-05"/>
	<updated date="2017-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029547">SUSE bug 1029547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585713" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585714" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585715" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585716" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585717" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585718" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585719" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585713" comment="libecpg6-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585714" comment="libpq5-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585715" comment="libpq5-32bit-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585716" comment="postgresql94-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585717" comment="postgresql94-contrib-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585718" comment="postgresql94-docs-9.4.12-0.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585719" comment="postgresql94-server-9.4.12-0.22.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41885" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<description>
Postgresql94 was updated to 9.4.13 to fix the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.4/static/release-9-4-13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585720" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585721" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585722" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585723" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585724" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585725" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585726" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585720" comment="libecpg6-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585721" comment="libpq5-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585722" comment="libpq5-32bit-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585723" comment="postgresql94-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585724" comment="postgresql94-contrib-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585725" comment="postgresql94-docs-9.4.13-0.23.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585726" comment="postgresql94-server-9.4.13-0.23.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41886" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585727" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585728" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585729" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585730" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585731" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585732" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585733" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585727" comment="libecpg6-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585728" comment="libpq5-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585729" comment="libpq5-32bit-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585730" comment="postgresql94-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585731" comment="postgresql94-contrib-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585732" comment="postgresql94-docs-9.4.15-0.23.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585733" comment="postgresql94-server-9.4.15-0.23.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41887" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003745.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.16, full release notes:

	https://www.postgresql.org/docs/9.4/static/release-9-4-16.html

Security issues fixed:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585734" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585735" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585736" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585737" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585738" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585739" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585740" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585734" comment="libecpg6-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585735" comment="libpq5-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585736" comment="libpq5-32bit-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585737" comment="postgresql94-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585738" comment="postgresql94-contrib-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585739" comment="postgresql94-docs-9.4.16-0.23.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585740" comment="postgresql94-server-9.4.16-0.23.13.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41888" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003828.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585741" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585742" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585743" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585744" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585745" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585746" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585747" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585741" comment="libecpg6-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585742" comment="libpq5-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585743" comment="libpq5-32bit-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585744" comment="postgresql94-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585745" comment="postgresql94-contrib-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585746" comment="postgresql94-docs-9.4.17-0.23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585747" comment="postgresql94-server-9.4.17-0.23.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41889" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

postgresql was updated to 9.4.19:

  https://www.postgresql.org/docs/current/static/release-9-4-19.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.

postgresql was updated to 9.4.18:

- https://www.postgresql.org/about/news/1851/
- https://www.postgresql.org/docs/current/static/release-9-4-18.html
  A dump/restore is not required for those running 9.4.X.
  However, if the function marking mistakes mentioned in the first
  changelog entry below affect you, you will want to take steps to
  correct your database catalogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-22"/>
	<updated date="2018-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585748" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585749" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585750" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585751" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585752" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585753" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585754" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585748" comment="libecpg6-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585749" comment="libpq5-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585750" comment="libpq5-32bit-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585751" comment="postgresql94-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585752" comment="postgresql94-contrib-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585753" comment="postgresql94-docs-9.4.19-0.23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585754" comment="postgresql94-server-9.4.19-0.23.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41890" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002648.html" source="SUSE-SU"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585755" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585755" comment="ppp-2.4.5.git-2.31.7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41891" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585756" comment="ppp-2.4.5.git-2.32.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41892" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003477.html" source="SUSE-SU"/>
		<description>
This update for procmail fixes the following issues:

Security issue fixed:

- CVE-2017-16844: Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. (bnc#1068648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585757" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585757" comment="procmail-3.22-240.8.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41893" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585758" comment="procps-3.2.7-152.31.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585758" comment="procps-3.2.7-152.31.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41894" version="1" class="patch">
	<metadata>
		<title>Security update for puppet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1040151" ref_url="https://bugzilla.suse.com/1040151" source="BUGZILLA"/>
		<reference ref_id="1077767" ref_url="https://bugzilla.suse.com/1077767" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2295" ref_url="https://www.suse.com/security/cve/CVE-2017-2295/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003783.html" source="SUSE-SU"/>
		<description>
This update for puppet fixes the following issues:

- CVE-2017-2295: Fixed a security vulnerability where an attacker could
  force YAML deserialization in an unsafe manner, which would lead to
  remote code execution.

In default, this update would break a backwards compatibility
with Puppet agents older than 3.2.2 as the SLE11 master doesn't
support other fact formats than pson in default anymore.
In order to allow users to continue using their SLE11 agents
a patch was added that enables sending PSON from agents.

For non-SUSE clients older that 3.2.2 a new puppet master boolean option
'dangerous_fact_formats' was added. When it's set to true it
enables using dangerous fact formats (e.g. YAML). When it's set
to false, only PSON fact format is accepted. (bsc#1040151),
(bsc#1077767)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077767">SUSE bug 1077767</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2295/">CVE-2017-2295</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585759" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585760" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585759" comment="puppet-2.7.26-0.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585760" comment="puppet-server-2.7.26-0.5.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41895" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<description>

This update for python fixes the following issues:

- CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751)
- CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348)
- CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY
  when REQUEST_METHOD is also set (bsc#989523)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-09"/>
	<updated date="2016-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585761" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585762" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585763" comment="libpython2_6-1_0-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585764" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585765" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585766" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585767" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585768" comment="python-base-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585769" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585770" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585771" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585772" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585773" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585774" comment="python-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585775" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585761" comment="libpython2_6-1_0-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585762" comment="libpython2_6-1_0-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585763" comment="libpython2_6-1_0-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585764" comment="python-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585765" comment="python-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585766" comment="python-base-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585767" comment="python-base-32bit-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585768" comment="python-base-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585769" comment="python-curses-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585770" comment="python-demo-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565248" comment="python-doc-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565249" comment="python-doc-pdf-2.6-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585771" comment="python-gdbm-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585772" comment="python-idle-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585773" comment="python-tk-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585774" comment="python-x86-2.6.9-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585775" comment="python-xml-2.6.9-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41896" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0768-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180768-1.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2017-1000158: Fixed integer overflow in thePyString_DecodeEscape function (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585776" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585777" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585778" comment="libpython2_6-1_0-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585779" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585780" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585781" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585782" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585783" comment="python-base-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585784" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585785" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585786" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585787" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585788" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585789" comment="python-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585790" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585776" comment="libpython2_6-1_0-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585777" comment="libpython2_6-1_0-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585778" comment="libpython2_6-1_0-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585779" comment="python-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585780" comment="python-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585781" comment="python-base-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585782" comment="python-base-32bit-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585783" comment="python-base-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585784" comment="python-curses-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585785" comment="python-demo-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565256" comment="python-doc-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565257" comment="python-doc-pdf-2.6-8.40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585786" comment="python-gdbm-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585787" comment="python-idle-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585788" comment="python-tk-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585789" comment="python-x86-2.6.9-40.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585790" comment="python-xml-2.6.9-40.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41897" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1083507" ref_url="https://bugzilla.suse.com/1083507" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004216.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

The following security vulnerabilities were addressed:

- Add a check to Lib/wave.py that verifies that at least one channel is
  provided. Prior to this, attackers could cause a denial of service via a
  crafted wav format audio file. [bsc#1083507, CVE-2017-18207]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585791" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585792" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585793" comment="libpython2_6-1_0-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585794" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585795" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585796" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585797" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585798" comment="python-base-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585799" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585800" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585801" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585802" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585803" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585804" comment="python-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585805" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585791" comment="libpython2_6-1_0-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585792" comment="libpython2_6-1_0-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585793" comment="libpython2_6-1_0-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585794" comment="python-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585795" comment="python-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585796" comment="python-base-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585797" comment="python-base-32bit-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585798" comment="python-base-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585799" comment="python-curses-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585800" comment="python-demo-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565264" comment="python-doc-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565265" comment="python-doc-pdf-2.6-8.40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585801" comment="python-gdbm-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585802" comment="python-idle-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585803" comment="python-tk-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585804" comment="python-x86-2.6.9-40.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585805" comment="python-xml-2.6.9-40.6.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41898" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<description>
This update for python-base fixes the following issues:

Security issues fixed:

- CVE-2018-1061: Fixed DoS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic backtracking in apop() method in pop3lib (bsc#1088009).
- CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

Bug fixes:

- bsc#1086001: python tarfile uses random order.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585806" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585807" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585808" comment="libpython2_6-1_0-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585809" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585810" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585811" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585812" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585813" comment="python-base-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585814" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585815" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585816" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585817" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585818" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585819" comment="python-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585820" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585806" comment="libpython2_6-1_0-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585807" comment="libpython2_6-1_0-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585808" comment="libpython2_6-1_0-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585809" comment="python-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585810" comment="python-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585811" comment="python-base-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585812" comment="python-base-32bit-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585813" comment="python-base-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585814" comment="python-curses-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585815" comment="python-demo-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565272" comment="python-doc-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565273" comment="python-doc-pdf-2.6-8.40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585816" comment="python-gdbm-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585817" comment="python-idle-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585818" comment="python-tk-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585819" comment="python-x86-2.6.9-40.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585820" comment="python-xml-2.6.9-40.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41899" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issue:

- CVE-2018-14647: Python's elementtree C accelerator failed to initialise
  Expat's hash salt during initialization. This could make it easy to conduct
  denial of service attacks against Expat by constructing an XML document that
  would cause pathological hash collisions in Expat's internal data structures,
  consuming large amounts CPU and RAM (bsc#1109847)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585821" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585822" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585823" comment="libpython2_6-1_0-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585824" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585825" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585826" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585827" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585828" comment="python-base-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585829" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585830" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585831" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585832" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585833" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585834" comment="python-x86-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585835" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585821" comment="libpython2_6-1_0-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585822" comment="libpython2_6-1_0-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585823" comment="libpython2_6-1_0-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585824" comment="python-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585825" comment="python-32bit-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585826" comment="python-base-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585827" comment="python-base-32bit-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585828" comment="python-base-x86-2.6.9-40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585829" comment="python-curses-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585830" comment="python-demo-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565280" comment="python-doc-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565281" comment="python-doc-pdf-2.6-8.40.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585831" comment="python-gdbm-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585832" comment="python-idle-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585833" comment="python-tk-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585834" comment="python-x86-2.6.9-40.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585835" comment="python-xml-2.6.9-40.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41900" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-15"/>
	<updated date="2019-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585836" comment="libpython2_6-1_0-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585837" comment="libpython2_6-1_0-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585838" comment="python-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585839" comment="python-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585840" comment="python-base-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585841" comment="python-base-32bit-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585842" comment="python-curses-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585843" comment="python-demo-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569038" comment="python-doc-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569039" comment="python-doc-pdf-2.6-8.40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585844" comment="python-gdbm-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585845" comment="python-idle-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585846" comment="python-tk-2.6.9-40.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585847" comment="python-xml-2.6.9-40.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41901" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585848" comment="libpython2_6-1_0-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585849" comment="libpython2_6-1_0-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585850" comment="python-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585851" comment="python-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585852" comment="python-base-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585853" comment="python-base-32bit-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585854" comment="python-curses-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585855" comment="python-demo-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569049" comment="python-doc-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569050" comment="python-doc-pdf-2.6-8.40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585856" comment="python-gdbm-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585857" comment="python-idle-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585858" comment="python-tk-2.6.9-40.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585859" comment="python-xml-2.6.9-40.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41902" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issue fixed:

- CVE-2019-16056: Fixed a parser issue in the email module. (bsc#1149955)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585860" comment="libpython2_6-1_0-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585861" comment="libpython2_6-1_0-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585862" comment="python-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585863" comment="python-32bit-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585864" comment="python-base-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585865" comment="python-base-32bit-2.6.9-40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585866" comment="python-curses-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585867" comment="python-demo-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569060" comment="python-doc-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569061" comment="python-doc-pdf-2.6-8.40.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585868" comment="python-gdbm-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585869" comment="python-idle-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585870" comment="python-tk-2.6.9-40.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585871" comment="python-xml-2.6.9-40.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41903" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following security issue:

- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585872" comment="libpython2_6-1_0-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585873" comment="libpython2_6-1_0-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585874" comment="python-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585875" comment="python-32bit-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585876" comment="python-base-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585877" comment="python-base-32bit-2.6.9-40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585878" comment="python-curses-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585879" comment="python-demo-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569071" comment="python-doc-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569072" comment="python-doc-pdf-2.6-8.40.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585880" comment="python-gdbm-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585881" comment="python-idle-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585882" comment="python-tk-2.6.9-40.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585883" comment="python-xml-2.6.9-40.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41904" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585884" comment="libpython2_6-1_0-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585885" comment="libpython2_6-1_0-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585886" comment="python-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585887" comment="python-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585888" comment="python-base-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585889" comment="python-base-32bit-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585890" comment="python-curses-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585891" comment="python-demo-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569082" comment="python-doc-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569083" comment="python-doc-pdf-2.6-8.40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585892" comment="python-gdbm-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585893" comment="python-idle-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585894" comment="python-tk-2.6.9-40.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585895" comment="python-xml-2.6.9-40.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41905" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122208" ref_url="https://bugzilla.suse.com/1122208" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005104.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issues:

Security issue fixed:

- CVE-2019-6446: Set allow_pickle to false by default to restrict loading untrusted content (bsc#1122208).
  With this update we decrease the possibility of allowing remote attackers to execute arbitrary code by
  misusing numpy.load(). A warning during runtime will show-up when the allow_pickle is not explicitly set.
  
NOTE: By applying this update the behavior of python-numpy changes, which might break your application.
In order to get the old behaviour back, you have to explicitly set `allow_pickle` to True. Be aware
that this should only be done for trusted input, as loading untrusted input might lead to arbitrary code
execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122208">SUSE bug 1122208</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585896" comment="python-numpy-1.8.0-6.4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585896" comment="python-numpy-1.8.0-6.4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41906" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="970952" ref_url="https://bugzilla.suse.com/970952" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001980.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following security issue:

- CVE-2016-2342: Quagga was extended the prefixlen check to ensure it is
  within the bound of the NLRI packet data and the on-stack prefix structure
  and the maximum size for the address family (bsc#970952).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-04"/>
	<updated date="2016-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585897" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585897" comment="quagga-0.99.15-0.16.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41907" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="770619" ref_url="https://bugzilla.suse.com/770619" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001982.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes one security issue:

- bsc#770619: Disallow unprivileged users to enter config directory /etc/quagga
  (group: quagga, mode: 750) and read configuration files installed
  there (group: quagga, mode: 640).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/770619">SUSE bug 770619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585898" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585898" comment="quagga-0.99.15-0.21.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41908" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="977012" ref_url="https://bugzilla.suse.com/977012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002093.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following issue:

Security issue fixed:
- CVE-2016-4049: Fix for a buffer overflow error in bgp_dump_routes_func. (bsc#977012)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-03"/>
	<updated date="2016-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585899" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585899" comment="quagga-0.99.15-0.24.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41909" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2569-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00032.html" source="SUSE-SU"/>
		<description>

This update for quagga fixes the following issues:

- CVE-2016-1245: Fix for a zebra stack overrun in IPv6 RA receive code (bsc#1005258).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-19"/>
	<updated date="2016-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585900" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585900" comment="quagga-0.99.15-0.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41910" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]

- The Quagga daemon's telnet 'vty' CLI contains an unbounded memory allocation
  bug that could be exploited for a denial-of-service attack on the daemon.
  This issue has been fixed. [CVE-2017-5495, bsc#1021669]

- The telnet 'vty' CLI of the Quagga daemon is no longer enabled by default,
  because the passwords in the default 'zebra.conf' config file are now
  disabled. The vty interface is available via 'vtysh' utility using pam
  authentication to permit management access for root without password.
  [bsc#1021669]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585901" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585901" comment="quagga-0.99.15-0.30.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41911" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581108" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41912" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581109" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41913" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002164.html" source="SUSE-SU"/>
		<description>
rsync was updated to fix one security issue.

- CVE-2014-9512: rsync allowed remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path (bsc#915410).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-07-25"/>
	<updated date="2016-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585902" comment="rsync-3.0.4-2.52.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585902" comment="rsync-3.0.4-2.52.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41914" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

Security issues fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585903" comment="rsync-3.0.4-2.53.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585903" comment="rsync-3.0.4-2.53.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41915" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003617.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585904" comment="rsync-3.0.4-2.53.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585904" comment="rsync-3.0.4-2.53.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41916" version="1" class="patch">
	<metadata>
		<title>Security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<description>

This update for ruby fixes the following issues:

Secuirty issues fixed:
- CVE-2015-1855: Ruby OpenSSL Hostname Verification (bsc#926974)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)

Bugfixes:
- fix small mistake in the backport for (bsc#986630)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585905" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565297" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565301" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585905" comment="ruby-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565297" comment="ruby-doc-html-1.8.7.p357-0.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565301" comment="ruby-tk-1.8.7.p357-0.9.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41917" version="1" class="patch">
	<metadata>
		<title>Security update for rzsz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1076576" ref_url="https://bugzilla.suse.com/1076576" source="BUGZILLA"/>
		<reference ref_id="1086416" ref_url="https://bugzilla.suse.com/1086416" source="BUGZILLA"/>
		<reference ref_id="1090051" ref_url="https://bugzilla.suse.com/1090051" source="BUGZILLA"/>
		<reference ref_id="529899" ref_url="https://bugzilla.suse.com/529899" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html" source="SUSE-SU"/>
		<description>
This update for rzsz fixes the following issues:

- L3: sz of rzsz segfaults in zsdata() (bsc#1086416)
- VUL-0: CVE-2018-10195: rzsz: sz can leak data to receiving side (bsc#1090051)
- rzsz-0.12.20-976.7: illegal use of freed variable (bsc#529899)
- /usr/bin/lsb segfaults [rzsz] (bsc#1076576)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-24"/>
	<updated date="2018-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076576">SUSE bug 1076576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086416">SUSE bug 1086416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529899">SUSE bug 529899</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585906" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585906" comment="rzsz-0.12.21~rc-936.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41918" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585907" comment="ldapsmb-1.34b-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585908" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585909" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585910" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585911" comment="libsmbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585912" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585913" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585914" comment="libtalloc2-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585915" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585916" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585917" comment="libtdb1-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585918" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585919" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585920" comment="libtevent0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585921" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585922" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585923" comment="libwbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585924" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585925" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585926" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585927" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585928" comment="samba-client-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585929" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585930" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585931" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585932" comment="samba-winbind-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585933" comment="samba-x86-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585907" comment="ldapsmb-1.34b-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585908" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585909" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585910" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585911" comment="libsmbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585912" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585913" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585914" comment="libtalloc2-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585915" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585916" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585917" comment="libtdb1-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585918" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585919" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585920" comment="libtevent0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585921" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585922" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585923" comment="libwbclient0-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585924" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585925" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585926" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585927" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585928" comment="samba-client-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585929" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585930" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585931" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585932" comment="samba-winbind-x86-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585933" comment="samba-x86-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41919" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="936862" ref_url="https://bugzilla.suse.com/936862" source="BUGZILLA"/>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="971965" ref_url="https://bugzilla.suse.com/971965" source="BUGZILLA"/>
		<reference ref_id="973031" ref_url="https://bugzilla.suse.com/973031" source="BUGZILLA"/>
		<reference ref_id="973032" ref_url="https://bugzilla.suse.com/973032" source="BUGZILLA"/>
		<reference ref_id="973033" ref_url="https://bugzilla.suse.com/973033" source="BUGZILLA"/>
		<reference ref_id="973034" ref_url="https://bugzilla.suse.com/973034" source="BUGZILLA"/>
		<reference ref_id="973036" ref_url="https://bugzilla.suse.com/973036" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<description>
samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks (bsc#973036).
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint function
- Getting and setting Windows ACLs on symlinks can change permissions on link
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-12"/>
	<updated date="2016-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585934" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585935" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585936" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585937" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585938" comment="libsmbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585939" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585940" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585941" comment="libtalloc2-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585942" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585943" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585944" comment="libtdb1-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585945" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585946" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585947" comment="libtevent0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585948" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585949" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585950" comment="libwbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585951" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585952" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585953" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585954" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585955" comment="samba-client-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585956" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585957" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585958" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585959" comment="samba-winbind-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585960" comment="samba-x86-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585934" comment="ldapsmb-1.34b-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585935" comment="libldb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585936" comment="libsmbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585937" comment="libsmbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585938" comment="libsmbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585939" comment="libtalloc2-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585940" comment="libtalloc2-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585941" comment="libtalloc2-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585942" comment="libtdb1-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585943" comment="libtdb1-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585944" comment="libtdb1-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585945" comment="libtevent0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585946" comment="libtevent0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585947" comment="libtevent0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585948" comment="libwbclient0-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585949" comment="libwbclient0-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585950" comment="libwbclient0-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585951" comment="samba-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585952" comment="samba-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585953" comment="samba-client-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585954" comment="samba-client-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585955" comment="samba-client-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581161" comment="samba-doc-3.6.3-76.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585956" comment="samba-krb-printing-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585957" comment="samba-winbind-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585958" comment="samba-winbind-32bit-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585959" comment="samba-winbind-x86-3.6.3-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585960" comment="samba-x86-3.6.3-76.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41920" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003731" ref_url="https://bugzilla.suse.com/1003731" source="BUGZILLA"/>
		<reference ref_id="1009711" ref_url="https://bugzilla.suse.com/1009711" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<description>

This update for samba provides the following fixes:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441)
- CVE-2016-2126: Prevent denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442)

Non security issues fixed:

- Allow SESSION KEY setup without signing. (bsc#1009711)
- Fix crash bug in tevent_queue_immediate_trigger(). (bsc#1003731)
- Don't fail when using default domain with user@domain.com format. (bsc#997833)
- Prevent core, make sure response-&gt;extra_data.data is always cleared out. (bsc#993692)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003731">SUSE bug 1003731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585961" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585962" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585963" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585964" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585965" comment="libsmbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585966" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585967" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585968" comment="libtalloc2-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585969" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585970" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585971" comment="libtdb1-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585972" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585973" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585974" comment="libtevent0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585975" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585976" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585977" comment="libwbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585978" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585979" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585980" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585981" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585982" comment="samba-client-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585983" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585984" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585985" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585986" comment="samba-winbind-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585987" comment="samba-x86-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585961" comment="ldapsmb-1.34b-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585962" comment="libldb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585963" comment="libsmbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585964" comment="libsmbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585965" comment="libsmbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585966" comment="libtalloc2-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585967" comment="libtalloc2-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585968" comment="libtalloc2-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585969" comment="libtdb1-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585970" comment="libtdb1-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585971" comment="libtdb1-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585972" comment="libtevent0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585973" comment="libtevent0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585974" comment="libtevent0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585975" comment="libwbclient0-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585976" comment="libwbclient0-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585977" comment="libwbclient0-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585978" comment="samba-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585979" comment="samba-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585980" comment="samba-client-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585981" comment="samba-client-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585982" comment="samba-client-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569099" comment="samba-doc-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585983" comment="samba-krb-printing-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585984" comment="samba-winbind-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585985" comment="samba-winbind-32bit-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585986" comment="samba-winbind-x86-3.6.3-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585987" comment="samba-x86-3.6.3-84.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41921" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00043.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585988" comment="ldapsmb-1.34b-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585989" comment="libldb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585990" comment="libsmbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585991" comment="libsmbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585992" comment="libsmbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585993" comment="libtalloc2-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585994" comment="libtalloc2-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585995" comment="libtalloc2-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585996" comment="libtdb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585997" comment="libtdb1-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585998" comment="libtdb1-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585999" comment="libtevent0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586000" comment="libtevent0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586001" comment="libtevent0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586002" comment="libwbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586003" comment="libwbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586004" comment="libwbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586005" comment="samba-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586006" comment="samba-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586007" comment="samba-client-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586008" comment="samba-client-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586009" comment="samba-client-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581200" comment="samba-doc-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586010" comment="samba-krb-printing-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586011" comment="samba-winbind-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586012" comment="samba-winbind-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586013" comment="samba-winbind-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586014" comment="samba-x86-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009585988" comment="ldapsmb-1.34b-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585989" comment="libldb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585990" comment="libsmbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585991" comment="libsmbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585992" comment="libsmbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585993" comment="libtalloc2-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585994" comment="libtalloc2-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585995" comment="libtalloc2-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585996" comment="libtdb1-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585997" comment="libtdb1-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585998" comment="libtdb1-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009585999" comment="libtevent0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586000" comment="libtevent0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586001" comment="libtevent0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586002" comment="libwbclient0-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586003" comment="libwbclient0-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586004" comment="libwbclient0-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586005" comment="samba-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586006" comment="samba-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586007" comment="samba-client-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586008" comment="samba-client-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586009" comment="samba-client-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581200" comment="samba-doc-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586010" comment="samba-krb-printing-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586011" comment="samba-winbind-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586012" comment="samba-winbind-32bit-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586013" comment="samba-winbind-x86-3.6.3-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586014" comment="samba-x86-3.6.3-87.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41922" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="1036283" ref_url="https://bugzilla.suse.com/1036283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00017.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2017-2619: symlink race permits opening files outside share directory (bsc#1027147).
  For SUSE Linux Enterprise 11 SP4 this is a re-issue of the update, a regression
  in the fix has been addressed (bsc#1036283, bso#12721).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-08"/>
	<updated date="2017-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586015" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586016" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586017" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586018" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586019" comment="libsmbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586020" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586021" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586022" comment="libtalloc2-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586023" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586024" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586025" comment="libtdb1-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586026" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586027" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586028" comment="libtevent0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586029" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586030" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586031" comment="libwbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586032" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586033" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586034" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586035" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586036" comment="samba-client-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586037" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586038" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586039" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586040" comment="samba-winbind-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586041" comment="samba-x86-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586015" comment="ldapsmb-1.34b-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586016" comment="libldb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586017" comment="libsmbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586018" comment="libsmbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586019" comment="libsmbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586020" comment="libtalloc2-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586021" comment="libtalloc2-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586022" comment="libtalloc2-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586023" comment="libtdb1-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586024" comment="libtdb1-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586025" comment="libtdb1-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586026" comment="libtevent0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586027" comment="libtevent0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586028" comment="libtevent0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586029" comment="libwbclient0-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586030" comment="libwbclient0-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586031" comment="libwbclient0-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586032" comment="samba-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586033" comment="samba-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586034" comment="samba-client-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586035" comment="samba-client-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586036" comment="samba-client-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569111" comment="samba-doc-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586037" comment="samba-krb-printing-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586038" comment="samba-winbind-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586039" comment="samba-winbind-32bit-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586040" comment="samba-winbind-x86-3.6.3-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586041" comment="samba-x86-3.6.3-90.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41923" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00064.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586042" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586043" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586044" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586045" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586046" comment="libsmbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586047" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586048" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586049" comment="libtalloc2-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586050" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586051" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586052" comment="libtdb1-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586053" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586054" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586055" comment="libtevent0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586056" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586057" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586058" comment="libwbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586059" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586060" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586061" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586062" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586063" comment="samba-client-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586064" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586065" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586066" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586067" comment="samba-winbind-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586068" comment="samba-x86-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586042" comment="ldapsmb-1.34b-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586043" comment="libldb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586044" comment="libsmbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586045" comment="libsmbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586046" comment="libsmbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586047" comment="libtalloc2-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586048" comment="libtalloc2-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586049" comment="libtalloc2-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586050" comment="libtdb1-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586051" comment="libtdb1-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586052" comment="libtdb1-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586053" comment="libtevent0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586054" comment="libtevent0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586055" comment="libtevent0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586056" comment="libwbclient0-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586057" comment="libwbclient0-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586058" comment="libwbclient0-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586059" comment="samba-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586060" comment="samba-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586061" comment="samba-client-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586062" comment="samba-client-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586063" comment="samba-client-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569123" comment="samba-doc-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586064" comment="samba-krb-printing-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586065" comment="samba-winbind-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586066" comment="samba-winbind-32bit-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586067" comment="samba-winbind-x86-3.6.3-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586068" comment="samba-x86-3.6.3-93.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41924" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed: 

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624)
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622)

This non-security issue was fixed: 

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586069" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586070" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586071" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586072" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586073" comment="libsmbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586074" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586075" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586076" comment="libtalloc2-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586077" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586078" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586079" comment="libtdb1-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586080" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586081" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586082" comment="libtevent0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586083" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586084" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586085" comment="libwbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586086" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586087" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586088" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586089" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586090" comment="samba-client-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586091" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586092" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586093" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586094" comment="samba-winbind-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586095" comment="samba-x86-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586069" comment="ldapsmb-1.34b-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586070" comment="libldb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586071" comment="libsmbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586072" comment="libsmbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586073" comment="libsmbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586074" comment="libtalloc2-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586075" comment="libtalloc2-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586076" comment="libtalloc2-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586077" comment="libtdb1-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586078" comment="libtdb1-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586079" comment="libtdb1-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586080" comment="libtevent0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586081" comment="libtevent0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586082" comment="libtevent0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586083" comment="libwbclient0-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586084" comment="libwbclient0-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586085" comment="libwbclient0-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586086" comment="samba-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586087" comment="samba-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586088" comment="samba-client-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586089" comment="samba-client-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586090" comment="samba-client-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569135" comment="samba-doc-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586091" comment="samba-krb-printing-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586092" comment="samba-winbind-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586093" comment="samba-winbind-32bit-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586094" comment="samba-winbind-x86-3.6.3-94.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586095" comment="samba-x86-3.6.3-94.5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41925" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016531" ref_url="https://bugzilla.suse.com/1016531" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2017-15275: s3: smbd: Chain code can return uninitialized
  memory when talloc buffer is grown; (bsc#1063008); (bso#13077);


- s3/libads: fix seal/signed ldap connections so they are reused;
  (bsc#1016531).		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016531">SUSE bug 1016531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586096" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586097" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586098" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586099" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586100" comment="libsmbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586101" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586102" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586103" comment="libtalloc2-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586104" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586105" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586106" comment="libtdb1-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586107" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586108" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586109" comment="libtevent0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586110" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586111" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586112" comment="libwbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586113" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586114" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586115" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586116" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586117" comment="samba-client-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586118" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586119" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586120" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586121" comment="samba-winbind-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586122" comment="samba-x86-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586096" comment="ldapsmb-1.34b-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586097" comment="libldb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586098" comment="libsmbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586099" comment="libsmbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586100" comment="libsmbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586101" comment="libtalloc2-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586102" comment="libtalloc2-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586103" comment="libtalloc2-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586104" comment="libtdb1-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586105" comment="libtdb1-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586106" comment="libtdb1-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586107" comment="libtevent0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586108" comment="libtevent0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586109" comment="libtevent0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586110" comment="libwbclient0-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586111" comment="libwbclient0-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586112" comment="libwbclient0-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586113" comment="samba-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586114" comment="samba-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586115" comment="samba-client-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586116" comment="samba-client-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586117" comment="samba-client-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569147" comment="samba-doc-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586118" comment="samba-krb-printing-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586119" comment="samba-winbind-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586120" comment="samba-winbind-32bit-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586121" comment="samba-winbind-x86-3.6.3-94.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586122" comment="samba-x86-3.6.3-94.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41926" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0774-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180774-1.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586123" comment="ldapsmb-1.34b-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586124" comment="libldb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586125" comment="libsmbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586126" comment="libsmbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586127" comment="libsmbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586128" comment="libtalloc2-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586129" comment="libtalloc2-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586130" comment="libtalloc2-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586131" comment="libtdb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586132" comment="libtdb1-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586133" comment="libtdb1-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586134" comment="libtevent0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586135" comment="libtevent0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586136" comment="libtevent0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586137" comment="libwbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586138" comment="libwbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586139" comment="libwbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586140" comment="samba-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586141" comment="samba-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586142" comment="samba-client-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586143" comment="samba-client-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586144" comment="samba-client-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581296" comment="samba-doc-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586145" comment="samba-krb-printing-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586146" comment="samba-winbind-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586147" comment="samba-winbind-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586148" comment="samba-winbind-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586149" comment="samba-x86-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586123" comment="ldapsmb-1.34b-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586124" comment="libldb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586125" comment="libsmbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586126" comment="libsmbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586127" comment="libsmbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586128" comment="libtalloc2-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586129" comment="libtalloc2-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586130" comment="libtalloc2-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586131" comment="libtdb1-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586132" comment="libtdb1-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586133" comment="libtdb1-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586134" comment="libtevent0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586135" comment="libtevent0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586136" comment="libtevent0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586137" comment="libwbclient0-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586138" comment="libwbclient0-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586139" comment="libwbclient0-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586140" comment="samba-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586141" comment="samba-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586142" comment="samba-client-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586143" comment="samba-client-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586144" comment="samba-client-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581296" comment="samba-doc-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586145" comment="samba-krb-printing-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586146" comment="samba-winbind-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586147" comment="samba-winbind-32bit-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586148" comment="samba-winbind-x86-3.6.3-94.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586149" comment="samba-x86-3.6.3-94.11.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41927" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1079449" ref_url="https://bugzilla.suse.com/1079449" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-10858: Insufficient input validation on client directory listing in libsmbclient (bsc#1103411).
  
The following other bugs were fixed:

- s3:winbindd: allow a fallback to NTLMSSP for LDAP connections (bsc#1079449)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079449">SUSE bug 1079449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586150" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586151" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586152" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586153" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586154" comment="libsmbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586155" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586156" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586157" comment="libtalloc2-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586158" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586159" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586160" comment="libtdb1-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586161" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586162" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586163" comment="libtevent0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586164" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586165" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586166" comment="libwbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586167" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586168" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586169" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586170" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586171" comment="samba-client-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586172" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586173" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586174" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586175" comment="samba-winbind-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586176" comment="samba-x86-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586150" comment="ldapsmb-1.34b-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586151" comment="libldb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586152" comment="libsmbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586153" comment="libsmbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586154" comment="libsmbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586155" comment="libtalloc2-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586156" comment="libtalloc2-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586157" comment="libtalloc2-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586158" comment="libtdb1-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586159" comment="libtdb1-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586160" comment="libtdb1-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586161" comment="libtevent0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586162" comment="libtevent0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586163" comment="libtevent0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586164" comment="libwbclient0-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586165" comment="libwbclient0-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586166" comment="libwbclient0-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586167" comment="samba-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586168" comment="samba-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586169" comment="samba-client-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586170" comment="samba-client-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586171" comment="samba-client-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569159" comment="samba-doc-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586172" comment="samba-krb-printing-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586173" comment="samba-winbind-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586174" comment="samba-winbind-32bit-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586175" comment="samba-winbind-x86-3.6.3-94.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586176" comment="samba-x86-3.6.3-94.14.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41928" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1101499" ref_url="https://bugzilla.suse.com/1101499" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005435.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issue fixed:

- Make init scripts create log directories before running daemons (bsc#1101499)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1101499">SUSE bug 1101499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586177" comment="ldapsmb-1.34b-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586178" comment="libldb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586179" comment="libsmbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586180" comment="libsmbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586181" comment="libtalloc2-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586182" comment="libtalloc2-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586183" comment="libtdb1-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586184" comment="libtdb1-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586185" comment="libtevent0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586186" comment="libtevent0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586187" comment="libwbclient0-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586188" comment="libwbclient0-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586189" comment="samba-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586190" comment="samba-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586191" comment="samba-client-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586192" comment="samba-client-32bit-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569171" comment="samba-doc-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586193" comment="samba-krb-printing-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586194" comment="samba-winbind-3.6.3-94.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586195" comment="samba-winbind-32bit-3.6.3-94.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41929" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-29"/>
	<updated date="2019-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586196" comment="ldapsmb-1.34b-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586197" comment="libldb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586198" comment="libsmbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586199" comment="libsmbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586200" comment="libtalloc2-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586201" comment="libtalloc2-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586202" comment="libtdb1-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586203" comment="libtdb1-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586204" comment="libtevent0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586205" comment="libtevent0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586206" comment="libwbclient0-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586207" comment="libwbclient0-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586208" comment="samba-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586209" comment="samba-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586210" comment="samba-client-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586211" comment="samba-client-32bit-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569183" comment="samba-doc-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586212" comment="samba-krb-printing-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586213" comment="samba-winbind-3.6.3-94.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586214" comment="samba-winbind-32bit-3.6.3-94.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41930" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007175.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586215" comment="ldapsmb-1.34b-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586216" comment="libldb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586217" comment="libsmbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586218" comment="libsmbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586219" comment="libtalloc2-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586220" comment="libtalloc2-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586221" comment="libtdb1-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586222" comment="libtdb1-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586223" comment="libtevent0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586224" comment="libtevent0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586225" comment="libwbclient0-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586226" comment="libwbclient0-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586227" comment="samba-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586228" comment="samba-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586229" comment="samba-client-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586230" comment="samba-client-32bit-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569195" comment="samba-doc-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586231" comment="samba-krb-printing-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586232" comment="samba-winbind-3.6.3-94.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586233" comment="samba-winbind-32bit-3.6.3-94.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41931" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-30"/>
	<updated date="2020-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586234" comment="ldapsmb-1.34b-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586235" comment="libldb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586236" comment="libsmbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586237" comment="libsmbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586238" comment="libtalloc2-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586239" comment="libtalloc2-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586240" comment="libtdb1-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586241" comment="libtdb1-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586242" comment="libtevent0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586243" comment="libtevent0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586244" comment="libwbclient0-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586245" comment="libwbclient0-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586246" comment="samba-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586247" comment="samba-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586248" comment="samba-client-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586249" comment="samba-client-32bit-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569207" comment="samba-doc-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586250" comment="samba-krb-printing-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586251" comment="samba-winbind-3.6.3-94.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586252" comment="samba-winbind-32bit-3.6.3-94.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41932" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586253" comment="ldapsmb-1.34b-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586254" comment="libldb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586255" comment="libsmbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586256" comment="libsmbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586257" comment="libtalloc2-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586258" comment="libtalloc2-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586259" comment="libtdb1-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586260" comment="libtdb1-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586261" comment="libtevent0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586262" comment="libtevent0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586263" comment="libwbclient0-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586264" comment="libwbclient0-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586265" comment="samba-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586266" comment="samba-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586267" comment="samba-client-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586268" comment="samba-client-32bit-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569219" comment="samba-doc-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586269" comment="samba-krb-printing-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586270" comment="samba-winbind-3.6.3-94.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586271" comment="samba-winbind-32bit-3.6.3-94.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41933" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586272" comment="libtevent0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581440" comment="ldapsmb-1.34b-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581441" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581442" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581443" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581444" comment="libsmbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581445" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581446" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581447" comment="libtalloc2-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581448" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581449" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581450" comment="libtdb1-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581451" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581452" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586272" comment="libtevent0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581453" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581454" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581455" comment="libwbclient0-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581456" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581457" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581458" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581459" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581460" comment="samba-client-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581461" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581462" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581463" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581464" comment="samba-winbind-x86-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581465" comment="samba-x86-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41934" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002704.html" source="SUSE-SU"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586273" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586273" comment="sane-backends-1.0.20-7.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41935" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581466" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41936" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1008130" ref_url="https://bugzilla.suse.com/1008130" source="BUGZILLA"/>
		<reference ref_id="1012814" ref_url="https://bugzilla.suse.com/1012814" source="BUGZILLA"/>
		<reference ref_id="923349" ref_url="https://bugzilla.suse.com/923349" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002800.html" source="SUSE-SU"/>
		<description>

This update for sblim-sfcb fixes the following issues:

Feature enhancements:
- A seperate sblim-sfcb-openssl1 package was added to the SECURITY Module.
  (fate#322032/bsc#1012814)

  This package can be installed additionaly, and the SysV Init script will
  pick the openssl1 variant on the next start, offering TLS 1.2 support
  on the WBEM SSL socket.

Bugfixes:
-  Add sslNoSSLv3 and sslNoTLSv1 configuration options (bsc#923349, bsc#1008130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008130">SUSE bug 1008130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012814">SUSE bug 1012814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923349">SUSE bug 923349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586274" comment="sblim-sfcb-1.3.11-0.28.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586274" comment="sblim-sfcb-1.3.11-0.28.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41937" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007428.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from or after July / August 2020 are applied.

Also fixed:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-15"/>
	<updated date="2020-09-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581469" comment="shim-15+git47-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41938" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586275" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586275" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41939" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="944460" ref_url="https://bugzilla.suse.com/944460" source="BUGZILLA"/>
		<reference ref_id="944787" ref_url="https://bugzilla.suse.com/944787" source="BUGZILLA"/>
		<reference ref_id="948976" ref_url="https://bugzilla.suse.com/948976" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<description>
Spice was updated to fix three security issues.
    
The following vulnerabilities were fixed:  
  
* CVE-2015-3247: heap corruption in the spice server (bsc#944460)
* CVE-2015-5261: Guest could have accessed host memory using crafted images (bsc#948976)
* CVE-2015-5260: Insufficient validation of surface_id parameter could have caused a crash (bsc#944787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-07"/>
	<updated date="2016-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586276" comment="libspice-server1-0.12.4-5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586276" comment="libspice-server1-0.12.4-5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41940" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1023078" ref_url="https://bugzilla.suse.com/1023078" source="BUGZILLA"/>
		<reference ref_id="1023079" ref_url="https://bugzilla.suse.com/1023079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00008.html" source="SUSE-SU"/>
		<description>

This security update for spice fixes the following issues:

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used 
by unauthenticated attackers to execute arbitrary code. (bsc#1023078)
CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message. (bsc#1023079)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586277" comment="libspice-server1-0.12.4-8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586277" comment="libspice-server1-0.12.4-8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41941" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00014.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2017-7506: A possible buffer overflow via invalid monitor configurations (bsc#1046779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586278" comment="libspice-server1-0.12.4-11.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586278" comment="libspice-server1-0.12.4-11.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41942" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issues fixed:

- CVE-2018-10873: Fix potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Avoid buffer overflow on image lz checks (bsc#1101295)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-30"/>
	<updated date="2018-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586279" comment="libspice-server1-0.12.4-15.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586279" comment="libspice-server1-0.12.4-15.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41943" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed an out-of-bounds read in the memslot_get_virt function 
  that could lead to denial-of-service or code-execution (bsc#1122706).
 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-07"/>
	<updated date="2019-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586280" comment="libspice-server1-0.12.4-18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586280" comment="libspice-server1-0.12.4-18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41944" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="982386" ref_url="https://bugzilla.suse.com/982386" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC decoding code (bsc#1177158)
- CVE-2016-2150: Fixed a guest escape using crafted primary surface parameters (bsc#982386)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586281" comment="libspice-server1-0.12.4-21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41945" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="987394" ref_url="https://bugzilla.suse.com/987394" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002203.html" source="SUSE-SU"/>
		<description>

This update for sqlite3 fixes the following issues: 

The following security issue was fixed:
- CVE-2016-6153: Fixed a tempdir selection vulnerability (bsc#987394)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-10"/>
	<updated date="2016-08-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586282" comment="libsqlite3-0-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586283" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586284" comment="libsqlite3-0-x86-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586285" comment="sqlite3-3.7.6.3-1.4.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586282" comment="libsqlite3-0-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586283" comment="libsqlite3-0-32bit-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586284" comment="libsqlite3-0-x86-3.7.6.3-1.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586285" comment="sqlite3-3.7.6.3-1.4.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41946" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586286" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586287" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586288" comment="libsqlite3-0-x86-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586289" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586286" comment="libsqlite3-0-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586287" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586288" comment="libsqlite3-0-x86-3.7.6.3-1.4.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586289" comment="sqlite3-3.7.6.3-1.4.7.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41947" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005562.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issue:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-14"/>
	<updated date="2019-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586290" comment="libsqlite3-0-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586291" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586292" comment="sqlite3-3.7.6.3-1.4.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41948" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006166.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:
	  
- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586293" comment="libsqlite3-0-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586294" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586295" comment="sqlite3-3.7.6.3-1.4.7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41949" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2019-20218: Fixed a stack unwinding flaw in the selectExpander after a parsing error. (bsc#1160439)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-29"/>
	<updated date="2021-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626556" comment="libsqlite3-0-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626557" comment="libsqlite3-0-32bit-3.7.6.3-1.4.7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626558" comment="sqlite3-3.7.6.3-1.4.7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41950" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001678.html" source="SUSE-SU"/>
		<description>
squid was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-6270: Fixed an off by one in snmp subsystem (bsc#895773).
- CVE-2014-9749: Fixed a nonce replay vulnerability in Digest authentication (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-13"/>
	<updated date="2015-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581486" comment="squid-2.7.STABLE5-2.12.24.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41951" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html" source="SUSE-SU"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-4051: backport fix buffer overflow in cachemgr.cgi (bsc#976553)
- CVE-2016-4554: backport fix for header smuggling issue in HTTP Request processing (bsc#979010)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-24"/>
	<updated date="2016-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586296" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586296" comment="squid-2.7.STABLE5-2.12.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41952" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15810: Fixed a HTTP Request Smuggling that could have resulted in cache poisoning (bsc#1175664).
- CVE-2019-12523: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
- CVE-2019-18676: Disabled urn parsing and parsing of unknown schemes (bsc#1156329).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670263" comment="squid-2.7.STABLE5-2.12.30.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41953" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="895773" ref_url="https://bugzilla.suse.com/895773" source="BUGZILLA"/>
		<reference ref_id="902197" ref_url="https://bugzilla.suse.com/902197" source="BUGZILLA"/>
		<reference ref_id="938715" ref_url="https://bugzilla.suse.com/938715" source="BUGZILLA"/>
		<reference ref_id="963539" ref_url="https://bugzilla.suse.com/963539" source="BUGZILLA"/>
		<reference ref_id="967011" ref_url="https://bugzilla.suse.com/967011" source="BUGZILLA"/>
		<reference ref_id="968392" ref_url="https://bugzilla.suse.com/968392" source="BUGZILLA"/>
		<reference ref_id="968393" ref_url="https://bugzilla.suse.com/968393" source="BUGZILLA"/>
		<reference ref_id="968394" ref_url="https://bugzilla.suse.com/968394" source="BUGZILLA"/>
		<reference ref_id="968395" ref_url="https://bugzilla.suse.com/968395" source="BUGZILLA"/>
		<reference ref_id="973782" ref_url="https://bugzilla.suse.com/973782" source="BUGZILLA"/>
		<reference ref_id="973783" ref_url="https://bugzilla.suse.com/973783" source="BUGZILLA"/>
		<reference ref_id="976553" ref_url="https://bugzilla.suse.com/976553" source="BUGZILLA"/>
		<reference ref_id="976556" ref_url="https://bugzilla.suse.com/976556" source="BUGZILLA"/>
		<reference ref_id="976708" ref_url="https://bugzilla.suse.com/976708" source="BUGZILLA"/>
		<reference ref_id="979008" ref_url="https://bugzilla.suse.com/979008" source="BUGZILLA"/>
		<reference ref_id="979009" ref_url="https://bugzilla.suse.com/979009" source="BUGZILLA"/>
		<reference ref_id="979010" ref_url="https://bugzilla.suse.com/979010" source="BUGZILLA"/>
		<reference ref_id="979011" ref_url="https://bugzilla.suse.com/979011" source="BUGZILLA"/>
		<reference ref_id="993299" ref_url="https://bugzilla.suse.com/993299" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3205" ref_url="https://www.suse.com/security/cve/CVE-2011-3205/" source="CVE"/>
		<reference ref_id="CVE-2011-4096" ref_url="https://www.suse.com/security/cve/CVE-2011-4096/" source="CVE"/>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2013-0188" ref_url="https://www.suse.com/security/cve/CVE-2013-0188/" source="CVE"/>
		<reference ref_id="CVE-2013-4115" ref_url="https://www.suse.com/security/cve/CVE-2013-4115/" source="CVE"/>
		<reference ref_id="CVE-2014-0128" ref_url="https://www.suse.com/security/cve/CVE-2014-0128/" source="CVE"/>
		<reference ref_id="CVE-2014-6270" ref_url="https://www.suse.com/security/cve/CVE-2014-6270/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<description>


This update for squid3 fixes the following issues:

- Multiple issues in pinger ICMP processing.  (CVE-2014-7141, CVE-2014-7142) 

- CVE-2016-3947: Buffer overrun issue in pinger
    ICMPv6 processing. (bsc#973782)

-  CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response processing.
    (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572,
     bsc#968392, bsc#968393, bsc#968394, bsc#968395)
- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054:
  * fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773)

- Memory leak in squid3 when using external_acl (bsc#976708)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-16"/>
	<updated date="2016-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902197">SUSE bug 902197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963539">SUSE bug 963539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976708">SUSE bug 976708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3205/">CVE-2011-3205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4096/">CVE-2011-4096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0188/">CVE-2013-0188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4115/">CVE-2013-4115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0128/">CVE-2014-0128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6270/">CVE-2014-6270</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586297" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586297" comment="squid3-3.1.23-8.16.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41954" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002553.html" source="SUSE-SU"/>
		<description>

This update for squid3 fixes the following issues:

- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168)
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586298" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586298" comment="squid3-3.1.23-8.16.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41955" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003826.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586299" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586299" comment="squid3-3.1.23-8.16.37.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41956" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1090089" ref_url="https://bugzilla.suse.com/1090089" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004069.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2018-1172: Fixed a DoS caused by incorrect handling of ESI responses. (bsc#1090089, SQUID-2018:3)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586300" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586300" comment="squid3-3.1.23-8.16.37.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41957" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1113668" ref_url="https://bugzilla.suse.com/1113668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004861.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

Security issue fixed:

- CVE-2018-19131: Fixed Cross-Site-Scripting vulnerability in the TLS error handling (bsc#1113668).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586301" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586301" comment="squid3-3.1.23-8.16.37.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41958" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- Fixed a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
- Fixed incorrect buffer handling that can
  result in cache poisoning, remote execution, and
  denial of service attacks when processing ESI responses
  (CVE-2019-12519, CVE-2019-12521, bsc#1169659)

- Fixed handling of hostname in
  cachemgr.cgi (CVE-2019-18860, bsc#1167373)
- Fixed a potential remote execution vulnerability
  when using HTTP Digest Authentication (CVE-2020-11945, bsc#1170313)
- Fixed a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (CVE-2019-12520, CVE-2019-12524, bsc#1170423)
- Fixed a potential denial of service when
  processing TLS certificates during HTTPS connections
  (CVE-2020-14059, bsc#1173304)

- Fixed a potential denial of service associated
  with incorrect buffer management of HTTP Basic Authentication
  credentials (bsc#1141329, CVE-2019-12529)
- Fixed an incorrect buffer management resulting
  in vulnerability to a denial of service during processing of
  HTTP Digest Authentication credentials (bsc#1141332, CVE-2019-12525)
- Fix XSS via user_name or auth parameter
  in cachemgr.cgi (bsc#1140738, CVE-2019-13345)
- Fixed a potential code execution vulnerability
  (CVE-2019-12526, bsc#1156326)
- Fixed HTTP Request Splitting in HTTP
  message processing and information disclosure in
  HTTP Digest Authentication
  (CVE-2019-18678, CVE-2019-18679, bsc#1156323, bsc#1156324)
- Fixed a security issue allowing a remote
  client ability to cause use a buffer overflow when squid is
  acting as reverse-proxy.
  (CVE-2020-8449, CVE-2020-8450, bsc#1162687)
- Fixed a security issue allowing for information
  disclosure in FTP gateway (CVE-2019-12528, bsc#1162689)
- Fixed a security issue in ext_lm_group_acl
  when processing NTLM Authentication credentials.
  (CVE-2020-8517, bsc#1162691)

- Fixed Cross-Site Request Forgery in
  HTTP Request processing (CVE-2019-18677, bsc#1156328)

- Disable urn parsing and parsing of
  unknown schemes (bsc#1156329, CVE-2019-12523, CVE-2019-18676)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586302" comment="squid3-3.1.23-8.16.37.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41959" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2020-15811: Fixed an HTTP request splitting vulnerability (bsc#1175665).
- CVE-2020-24606: Fixed a DoS vulnerability when processing Cache Digest Responses (bsc#1175671).
- CVE-2020-15810: Fixed an HTTP request smuggling vulnerability (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-30"/>
	<updated date="2020-12-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586303" comment="squid3-3.1.23-8.16.37.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41960" version="1" class="patch">
	<metadata>
		<title>Security update for squid3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<description>
This update for squid3 fixes the following issues:

- CVE-2021-28651: Fixed a denial of service issue when processing URN
  resource identifiers (bsc#1185921).
- CVE-2020-25097: Fixed an HTTP request smuggling issue (bsc#1183436).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671880" comment="squid3-3.1.23-8.16.37.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41961" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002327.html" source="SUSE-SU"/>
		<description>
squidGuard was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586304" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586305" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586304" comment="squidGuard-1.4-13.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586305" comment="squidGuard-doc-1.4-13.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41962" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="933591" ref_url="https://bugzilla.suse.com/933591" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001641.html" source="SUSE-SU"/>
		<description>
strongswan was updated to fix one security issue.
	  
This security issue was fixed:
- CVE-2015-4171: A problem that could enable rogue servers to gain user credentials from a client in certain IKEv2 setups. (bsc#933591)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586306" comment="strongswan-4.4.0-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586307" comment="strongswan-doc-4.4.0-6.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586306" comment="strongswan-4.4.0-6.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586307" comment="strongswan-doc-4.4.0-6.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41963" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581490" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581491" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41964" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00000.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586308" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586309" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586308" comment="strongswan-4.4.0-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586309" comment="strongswan-doc-4.4.0-6.35.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41965" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003167.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586310" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586311" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586310" comment="strongswan-4.4.0-6.36.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586311" comment="strongswan-doc-4.4.0-6.36.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41966" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652842" comment="strongswan-4.4.0-6.36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652843" comment="strongswan-doc-4.4.0-6.36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41967" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:
	  
- CVE-2018-16151: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-16152: Fixed flaws in gmp plugin that could lead to authorization bypass. (bsc#1107874)
- CVE-2018-17540: Fixed insufficient input validation in gmp plugin. (bsc#1109845)
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664949" comment="strongswan-4.4.0-6.36.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664950" comment="strongswan-doc-4.4.0-6.36.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41968" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="1008043" ref_url="https://bugzilla.suse.com/1008043" source="BUGZILLA"/>
		<reference ref_id="948973" ref_url="https://bugzilla.suse.com/948973" source="BUGZILLA"/>
		<reference ref_id="966755" ref_url="https://bugzilla.suse.com/966755" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

- Fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]

- The SSSD plugin would occasionally crash sudo with an 'internal error'.
  This issue has been fixed. [bsc#948973]

- The SSSD plugin would occasionally apply @netgroups rules from LDAP to all
  users rather than the @netgroup. This issue is now fixed. [bsc#966755]

- When the SSSD plugin was used and a local user ran sudo, an e-mail used to be
  sent to administrator because SSSD did not support sudo rules for local
  users. This message did not signify an error, however, it was only noise.
  [bsc#1008043]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008043">SUSE bug 1008043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948973">SUSE bug 948973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966755">SUSE bug 966755</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586312" comment="sudo-1.7.6p2-0.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586312" comment="sudo-1.7.6p2-0.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41969" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-18"/>
	<updated date="2019-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586313" comment="sudo-1.7.6p2-0.30.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41970" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="980670" ref_url="https://bugzilla.suse.com/980670" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002102.html" source="SUSE-SU"/>
		<description>
supportutils was updated to fix one security issue.

This security issue was fixed:
- CVE-2016-1602: Code injection and privilege escalation via unescaped filenames (bsc#980670).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-06-07"/>
	<updated date="2016-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581495" comment="supportutils-1.20-121.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581495" comment="supportutils-1.20-121.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41971" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19636: Local root exploit via inclusion of attacker controlled shell script (bsc#1117751)
- CVE-2018-19640: Users can kill arbitrary processes (bsc#1118463)
- CVE-2018-19638: User can overwrite arbitrary log files in support tar (bsc#1118460)
- CVE-2018-19639: Code execution if run with -v (bsc#1118462)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-12"/>
	<updated date="2019-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569231" comment="supportutils-1.20-122.9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41972" version="1" class="patch">
	<metadata>
		<title>Security update for syslog-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1169385" ref_url="https://bugzilla.suse.com/1169385" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8019" ref_url="https://www.suse.com/security/cve/CVE-2020-8019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006818.html" source="SUSE-SU"/>
		<description>
This update for syslog-ng fixes the following issues:

- CVE-2020-8019: Fixed a local privilege escalation during package update (bsc#1169385).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-14"/>
	<updated date="2020-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169385">SUSE bug 1169385</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8019/">CVE-2020-8019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586314" comment="syslog-ng-2.0.9-27.34.40.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41973" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002416.html" source="SUSE-SU"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked
  into extracting files and directories in the given destination, regardless
  of the path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586315" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586315" comment="tar-1.26-1.2.10.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41974" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1152736" ref_url="https://bugzilla.suse.com/1152736" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006107.html" source="SUSE-SU"/>
		<description>
This update for tar to version 1.27.1 fixes the following issues:

tar 1.27.1 brings following changes (jsc#ECO-339)

* Sparse files with large data
* No backticks in quoting
* --owner and --group names and numbers
* Support for POSIX ACLs, extended attributes and SELinux context.
* Passing command line arguments to external commands.
* New configure option --enable-gcc-warnings, intended for debugging.
* New warning control option --warning=[no-]record-size
* New command line option --keep-directory-symlink
* Fix unquoting of file names obtained via the -T option.
* Fix GNU long link header timestamp (backward compatibility).

Security issues fixed:

- CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
- CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-11"/>
	<updated date="2019-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152736">SUSE bug 1152736</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586316" comment="tar-1.27.1-14.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41975" version="1" class="patch">
	<metadata>
		<title>Recommended update for tboot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1057555" ref_url="https://bugzilla.suse.com/1057555" source="BUGZILLA"/>
		<reference ref_id="889339" ref_url="https://bugzilla.suse.com/889339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5118" ref_url="https://www.suse.com/security/cve/CVE-2014-5118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003421.html" source="SUSE-SU"/>
		<description>
This update for tboot provides the following fix:

Security issue fixed:

- CVE-2014-5118: tboot: bypass of measured boot (bsc#889339)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon 'Purley 8s' processors. The
  following error message showed: 'TBOOT: wait-for-sipi loop timed-out'. Booting continued
  but 'TXT measured launch' was wrongly reported as FALSE. (bsc#1057555)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-29"/>
	<updated date="2017-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057555">SUSE bug 1057555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889339">SUSE bug 889339</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5118/">CVE-2014-5118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586317" comment="tboot-20120115_1.7.0-0.5.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586317" comment="tboot-20120115_1.7.0-0.5.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41976" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<description>

This update for tcpdump fixes the following issues:

Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults in function udp_print(). 
- CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-10"/>
	<updated date="2017-03-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586318" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586318" comment="tcpdump-3.9.8-1.29.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41977" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
- CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
- CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
- CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
- CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586319" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586319" comment="tcpdump-3.9.8-1.30.5.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41978" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="1153098" ref_url="https://bugzilla.suse.com/1153098" source="BUGZILLA"/>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

Security issues fixed:

- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586320" comment="tcpdump-3.9.8-1.30.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41979" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010249.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668245" comment="tcpdump-3.9.8-1.30.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41980" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581498" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581499" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581500" comment="libtiff3-x86-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581501" comment="tiff-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41981" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586321" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586322" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586323" comment="libtiff3-x86-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586324" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586321" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586322" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586323" comment="libtiff3-x86-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586324" comment="tiff-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41982" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="973340" ref_url="https://bugzilla.suse.com/973340" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974614" ref_url="https://bugzilla.suse.com/974614" source="BUGZILLA"/>
		<reference ref_id="974618" ref_url="https://bugzilla.suse.com/974618" source="BUGZILLA"/>
		<reference ref_id="975069" ref_url="https://bugzilla.suse.com/975069" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="984837" ref_url="https://bugzilla.suse.com/984837" source="BUGZILLA"/>
		<reference ref_id="984842" ref_url="https://bugzilla.suse.com/984842" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-13"/>
	<updated date="2016-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586325" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586326" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586327" comment="libtiff3-x86-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586328" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586325" comment="libtiff3-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586326" comment="libtiff3-32bit-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586327" comment="libtiff3-x86-3.8.2-141.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586328" comment="tiff-3.8.2-141.168.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41983" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="1011845" ref_url="https://bugzilla.suse.com/1011845" source="BUGZILLA"/>
		<reference ref_id="1017688" ref_url="https://bugzilla.suse.com/1017688" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1017691" ref_url="https://bugzilla.suse.com/1017691" source="BUGZILLA"/>
		<reference ref_id="1017692" ref_url="https://bugzilla.suse.com/1017692" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1046077" ref_url="https://bugzilla.suse.com/1046077" source="BUGZILLA"/>
		<reference ref_id="1048937" ref_url="https://bugzilla.suse.com/1048937" source="BUGZILLA"/>
		<reference ref_id="1074318" ref_url="https://bugzilla.suse.com/1074318" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2017-11335" ref_url="https://www.suse.com/security/cve/CVE-2017-11335/" source="CVE"/>
		<reference ref_id="CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<description>

  
This update for tiff fixes the following issues:

- CVE-2016-9453: The t2p_readwrite_pdf_image_tile function allowed remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one (bsc#1011107).
- CVE-2016-5652: An exploitable heap-based buffer overflow existed in the handling of TIFF images in the TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means (bsc#1007280).
- CVE-2017-11335: There is a heap based buffer overflow in tools/tiff2pdf.c via a PlanarConfig=Contig image, which caused a more than one hundred bytes out-of-bounds write (related to the ZIPDecode function in tif_zip.c). A crafted input may lead to a remote denial of service attack or an arbitrary code execution attack (bsc#1048937).
- CVE-2016-9536: tools/tiff2pdf.c had an out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.'  (bsc#1011845)
- CVE-2017-9935: In LibTIFF, there was a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution (bsc#1046077).
- CVE-2017-17973: There is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. (bsc#1074318)
- CVE-2015-7554: The _TIFFVGetField function in tif_dir.c allowed attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image (bsc#960341).
- CVE-2016-5318: Stack-based buffer overflow in the _TIFFVGetField function allowed remote attackers to crash the application via a crafted tiff (bsc#983436).
- CVE-2016-10095: Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c allowed remote attackers to cause a denial of service (crash) via a crafted TIFF file (bsc#1017690,).
- CVE-2016-10268: tools/tiffcp.c allowed remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23 (bsc#1031255)
- An overlapping of memcpy parameters was fixed which could lead to content corruption (bsc#1017691).
- Fixed an invalid memory read which could lead to a crash (bsc#1017692).
- Fixed a NULL pointer dereference in TIFFReadRawData (tiffinfo.c) that could crash the decoder (bsc#1017688).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017688">SUSE bug 1017688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017691">SUSE bug 1017691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017692">SUSE bug 1017692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048937">SUSE bug 1048937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11335/">CVE-2017-11335</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586329" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586330" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586331" comment="libtiff3-x86-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586332" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586329" comment="libtiff3-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586330" comment="libtiff3-32bit-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586331" comment="libtiff3-x86-3.8.2-141.169.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586332" comment="tiff-3.8.2-141.169.3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41984" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017694" ref_url="https://bugzilla.suse.com/1017694" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1074317" ref_url="https://bugzilla.suse.com/1074317" source="BUGZILLA"/>
		<reference ref_id="984808" ref_url="https://bugzilla.suse.com/984808" source="BUGZILLA"/>
		<reference ref_id="984809" ref_url="https://bugzilla.suse.com/984809" source="BUGZILLA"/>
		<reference ref_id="984831" ref_url="https://bugzilla.suse.com/984831" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5315" ref_url="https://www.suse.com/security/cve/CVE-2016-5315/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.  (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.  (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2.  (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22.  (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.  (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image.  (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.  (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.  (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.  (bsc#987351 bsc#984808 bsc#984831)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-30"/>
	<updated date="2018-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5315/">CVE-2016-5315</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586333" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586334" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586335" comment="libtiff3-x86-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586336" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586333" comment="libtiff3-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586334" comment="libtiff3-32bit-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586335" comment="libtiff3-x86-3.8.2-141.169.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586336" comment="tiff-3.8.2-141.169.6.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41985" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007276" ref_url="https://bugzilla.suse.com/1007276" source="BUGZILLA"/>
		<reference ref_id="1011839" ref_url="https://bugzilla.suse.com/1011839" source="BUGZILLA"/>
		<reference ref_id="1011846" ref_url="https://bugzilla.suse.com/1011846" source="BUGZILLA"/>
		<reference ref_id="1017689" ref_url="https://bugzilla.suse.com/1017689" source="BUGZILLA"/>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="1082332" ref_url="https://bugzilla.suse.com/1082332" source="BUGZILLA"/>
		<reference ref_id="1082825" ref_url="https://bugzilla.suse.com/1082825" source="BUGZILLA"/>
		<reference ref_id="1086408" ref_url="https://bugzilla.suse.com/1086408" source="BUGZILLA"/>
		<reference ref_id="974621" ref_url="https://bugzilla.suse.com/974621" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following security issues:

- CVE-2017-5225: Prevent heap buffer overflow in the tools/tiffcp that could
  have caused DoS or code execution via a crafted BitsPerSample value
  (bsc#1019611)
- CVE-2018-7456: Prevent a NULL Pointer dereference in the function
  TIFFPrintDirectory when using the tiffinfo tool to print crafted TIFF
  information, a different vulnerability than CVE-2017-18013 (bsc#1082825)
- CVE-2017-11613: Prevent denial of service in the TIFFOpen function. During
  the TIFFOpen process, td_imagelength is not checked. The value of
  td_imagelength can be directly controlled by an input file. In the
  ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called
  based on td_imagelength. If the value of td_imagelength is set close to the
  amount of system memory, it will hang the system or trigger the OOM killer
  (bsc#1082332)
- CVE-2016-10266: Prevent remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related
  to libtiff/tif_read.c:351:22 (bsc#1031263)
- CVE-2018-8905: Prevent heap-based buffer overflow in the function
  LZWDecodeCompat via a crafted TIFF file (bsc#1086408)
- CVE-2016-9540: Prevent out-of-bounds write on tiled images with odd tile
  width versus image width (bsc#1011839).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- CVE-2016-9535: tif_predict.h and tif_predict.c had assertions that could have
  lead to assertion failures in debug mode, or buffer overflows in release mode,
  when dealing with unusual tile size like YCbCr with subsampling (bsc#1011846).
- Removed assert in readSeparateTilesIntoBuffer() function (bsc#1017689).
- CVE-2016-10095: Prevent stack-based buffer overflow in the _TIFFVGetField
  function that allowed remote attackers to cause a denial of service (crash) via
  a crafted TIFF file (bsc#1017690).
- CVE-2016-8331: Prevent remote code execution because of incorrect handling of
  TIFF images. A crafted TIFF document could have lead to a type confusion
  vulnerability resulting in remote code execution. This vulnerability could have
  been be triggered via a TIFF file delivered to the application using LibTIFF's
  tag extension functionality (bsc#1007276).
- CVE-2016-3632: The _TIFFVGetField function allowed remote attackers to cause
  a denial of service (out-of-bounds write) or execute arbitrary code via a
  crafted TIFF image (bsc#974621).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-28"/>
	<updated date="2018-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017689">SUSE bug 1017689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586337" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586338" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586339" comment="libtiff3-x86-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586340" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586337" comment="libtiff3-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586338" comment="libtiff3-32bit-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586339" comment="libtiff3-x86-3.8.2-141.169.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586340" comment="tiff-3.8.2-141.169.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41986" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1092480" ref_url="https://bugzilla.suse.com/1092480" source="BUGZILLA"/>
		<reference ref_id="960589" ref_url="https://bugzilla.suse.com/960589" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode
  function in tif_packbits.c in bmp2tiff, which allowed remote attackers to
  execute arbitrary code or cause a denial of service via a large width field
  in a specially crafted BMP image. (bsc#960589)
- CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in
  tif_write.c (bsc#1092480)
- CVE-2017-17942: Fixed a heap-based buffer overflow in the function
  PackBitsEncode in tif_packbits.c. (bsc#1074186)
- CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-10"/>
	<updated date="2018-09-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586341" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586342" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586343" comment="libtiff3-x86-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586344" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586341" comment="libtiff3-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586342" comment="libtiff3-32bit-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586343" comment="libtiff3-x86-3.8.2-141.169.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586344" comment="tiff-3.8.2-141.169.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41987" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106853" ref_url="https://bugzilla.suse.com/1106853" source="BUGZILLA"/>
		<reference ref_id="1108627" ref_url="https://bugzilla.suse.com/1108627" source="BUGZILLA"/>
		<reference ref_id="1108637" ref_url="https://bugzilla.suse.com/1108637" source="BUGZILLA"/>
		<reference ref_id="1110358" ref_url="https://bugzilla.suse.com/1110358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2018-17100: There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108637)
- CVE-2018-17101: There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file. (bsc#1108627)
- CVE-2018-17795: The function t2p_write_pdf in tiff2pdf.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935. (bsc#1110358)
- CVE-2018-16335: newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209. (bsc#1106853)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586345" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586346" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586347" comment="libtiff3-x86-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586348" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586345" comment="libtiff3-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586346" comment="libtiff3-32bit-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586347" comment="libtiff3-x86-3.8.2-141.169.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586348" comment="tiff-3.8.2-141.169.19.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41988" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1014461" ref_url="https://bugzilla.suse.com/1014461" source="BUGZILLA"/>
		<reference ref_id="1040080" ref_url="https://bugzilla.suse.com/1040080" source="BUGZILLA"/>
		<reference ref_id="1040322" ref_url="https://bugzilla.suse.com/1040322" source="BUGZILLA"/>
		<reference ref_id="1074186" ref_url="https://bugzilla.suse.com/1074186" source="BUGZILLA"/>
		<reference ref_id="1099257" ref_url="https://bugzilla.suse.com/1099257" source="BUGZILLA"/>
		<reference ref_id="1113672" ref_url="https://bugzilla.suse.com/1113672" source="BUGZILLA"/>
		<reference ref_id="974446" ref_url="https://bugzilla.suse.com/974446" source="BUGZILLA"/>
		<reference ref_id="974447" ref_url="https://bugzilla.suse.com/974447" source="BUGZILLA"/>
		<reference ref_id="974448" ref_url="https://bugzilla.suse.com/974448" source="BUGZILLA"/>
		<reference ref_id="983440" ref_url="https://bugzilla.suse.com/983440" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-3619" ref_url="https://www.suse.com/security/cve/CVE-2016-3619/" source="CVE"/>
		<reference ref_id="CVE-2016-3620" ref_url="https://www.suse.com/security/cve/CVE-2016-3620/" source="CVE"/>
		<reference ref_id="CVE-2016-3621" ref_url="https://www.suse.com/security/cve/CVE-2016-3621/" source="CVE"/>
		<reference ref_id="CVE-2016-5319" ref_url="https://www.suse.com/security/cve/CVE-2016-5319/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942/" source="CVE"/>
		<reference ref_id="CVE-2017-9117" ref_url="https://www.suse.com/security/cve/CVE-2017-9117/" source="CVE"/>
		<reference ref_id="CVE-2017-9147" ref_url="https://www.suse.com/security/cve/CVE-2017-9147/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-18661: Fixed NULL pointer dereference in the function LZWDecode in the file tif_lzw.c (bsc#1113672).
- CVE-2018-12900: Fixed heap-based buffer overflow in the cpSeparateBufToContigBuf (bsc#1099257).
- CVE-2017-9147: Fixed invalid read in the _TIFFVGetField function in tif_dir.c, that allowed remote attackers to cause a DoS via acrafted TIFF file (bsc#1040322). 
- CVE-2017-9117: Fixed BMP images processing that was verified without biWidth and biHeight values (bsc#1040080).
- CVE-2017-17942: Fixed issue in the function PackBitsEncode that could have led to a heap overflow and caused a DoS (bsc#1074186).
- CVE-2016-9273: Fixed heap-based buffer overflow issue (bsc#1010163).
- CVE-2016-5319: Fixed heap-based buffer overflow in PackBitsEncode (bsc#983440).
- CVE-2016-3621: Fixed out-of-bounds read in the bmp2tiff tool (lzw packing) (bsc#974448).
- CVE-2016-3620: Fixed out-of-bounds read in the bmp2tiff tool (zip packing) (bsc#974447)
- CVE-2016-3619: Fixed out-of-bounds read in the bmp2tiff tool (none packing) (bsc#974446)
- CVE-2015-8870: Fixed integer overflow in tools/bmp2tiff.c that allowed remote attackers to causea DOS (bsc#1014461).

Non-security issues fixed:

- asan_build: build ASAN included
- debug_build: build more suitable for debugging
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040080">SUSE bug 1040080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974446">SUSE bug 974446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974447">SUSE bug 974447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974448">SUSE bug 974448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3619/">CVE-2016-3619</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3620/">CVE-2016-3620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3621/">CVE-2016-3621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5319/">CVE-2016-5319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9117/">CVE-2017-9117</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9147/">CVE-2017-9147</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586349" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586350" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586351" comment="libtiff3-x86-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586352" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586349" comment="libtiff3-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586350" comment="libtiff3-32bit-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586351" comment="libtiff3-x86-3.8.2-141.169.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586352" comment="tiff-3.8.2-141.169.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41989" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1017693" ref_url="https://bugzilla.suse.com/1017693" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004962.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:                                             
                                                                                     
Security issues fixed:                                                                         
                                                                                                                               
- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).                   
- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).      
- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).          
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586353" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586354" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586355" comment="libtiff3-x86-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586356" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586353" comment="libtiff3-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586354" comment="libtiff3-32bit-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586355" comment="libtiff3-x86-3.8.2-141.169.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586356" comment="tiff-3.8.2-141.169.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41990" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1121626" ref_url="https://bugzilla.suse.com/1121626" source="BUGZILLA"/>
		<reference ref_id="983268" ref_url="https://bugzilla.suse.com/983268" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5102" ref_url="https://www.suse.com/security/cve/CVE-2016-5102/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issue:

Security vulnerabilities fixed:

- CVE-2016-5102: Fixed a buffer overflow in readgifimage() (bsc#983268)
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in tif_unix.c (bsc#1121626)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5102/">CVE-2016-5102</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586357" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586358" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586359" comment="libtiff3-x86-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586360" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586357" comment="libtiff3-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586358" comment="libtiff3-32bit-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586359" comment="libtiff3-x86-3.8.2-141.169.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586360" comment="tiff-3.8.2-141.169.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41991" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1156749" ref_url="https://bugzilla.suse.com/1156749" source="BUGZILLA"/>
		<reference ref_id="1156754" ref_url="https://bugzilla.suse.com/1156754" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2015-8683: Fixed out-of-bounds when reading CIE Lab image format files (bsc#1156754).
- CVE-2015-8665: Fixed out-of-bounds read in tif_getimage.c (bsc#1156749).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666467" comment="libtiff3-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666468" comment="libtiff3-32bit-3.8.2-141.169.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666469" comment="tiff-3.8.2-141.169.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41992" version="1" class="patch">
	<metadata>
		<title>Security update for tightvnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1155442" ref_url="https://bugzilla.suse.com/1155442" source="BUGZILLA"/>
		<reference ref_id="1155452" ref_url="https://bugzilla.suse.com/1155452" source="BUGZILLA"/>
		<reference ref_id="1155472" ref_url="https://bugzilla.suse.com/1155472" source="BUGZILLA"/>
		<reference ref_id="1155476" ref_url="https://bugzilla.suse.com/1155476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15678" ref_url="https://www.suse.com/security/cve/CVE-2019-15678/" source="CVE"/>
		<reference ref_id="CVE-2019-15679" ref_url="https://www.suse.com/security/cve/CVE-2019-15679/" source="CVE"/>
		<reference ref_id="CVE-2019-15680" ref_url="https://www.suse.com/security/cve/CVE-2019-15680/" source="CVE"/>
		<reference ref_id="CVE-2019-8287" ref_url="https://www.suse.com/security/cve/CVE-2019-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006203.html" source="SUSE-SU"/>
		<description>
This update for tightvnc fixes the following issues:

- CVE-2019-15679: Fixed a heap buffer overflow in InitialiseRFBConnection 
  which might lead to code execution (bsc#1155476). 
- CVE-2019-8287: Fixed a global buffer overflow in HandleCoRREBBPmay which 
  might lead to code execution (bsc#1155472).
- CVE-2019-15680: Fixed a null pointer dereference in HandleZlibBPP which 
  could have led to denial of service (bsc#1155452).
- CVE-2019-15678: Fixed a heap buffer overflow in rfbServerCutText handler 
  (bsc#1155442).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-29"/>
	<updated date="2019-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155452">SUSE bug 1155452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155476">SUSE bug 1155476</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15678/">CVE-2019-15678</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15679/">CVE-2019-15679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15680/">CVE-2019-15680</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8287/">CVE-2019-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586361" comment="tightvnc-1.3.9-81.15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41993" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002253.html" source="SUSE-SU"/>
		<description>

This update for tomcat6 fixes the following issue:

- CVE-2016-5388 Setting HTTP_PROXY environment variable via Proxy header (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575263" comment="tomcat6-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575264" comment="tomcat6-admin-webapps-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575265" comment="tomcat6-docs-webapp-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575266" comment="tomcat6-javadoc-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575267" comment="tomcat6-jsp-2_1-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575268" comment="tomcat6-lib-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575269" comment="tomcat6-servlet-2_5-api-6.0.45-0.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575270" comment="tomcat6-webapps-6.0.45-0.53.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41994" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="906152" ref_url="https://bugzilla.suse.com/906152" source="BUGZILLA"/>
		<reference ref_id="917127" ref_url="https://bugzilla.suse.com/917127" source="BUGZILLA"/>
		<reference ref_id="926762" ref_url="https://bugzilla.suse.com/926762" source="BUGZILLA"/>
		<reference ref_id="931442" ref_url="https://bugzilla.suse.com/931442" source="BUGZILLA"/>
		<reference ref_id="932698" ref_url="https://bugzilla.suse.com/932698" source="BUGZILLA"/>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0227" ref_url="https://www.suse.com/security/cve/CVE-2014-0227/" source="CVE"/>
		<reference ref_id="CVE-2014-0230" ref_url="https://www.suse.com/security/cve/CVE-2014-0230/" source="CVE"/>
		<reference ref_id="CVE-2014-7810" ref_url="https://www.suse.com/security/cve/CVE-2014-7810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001594.html" source="SUSE-SU"/>
		<description>
This update for Tomcat fixes the following security issues:

- CVE-2014-7810: Security manager bypass via EL expressions. (bsc#931442)
It was found that the expression language resolver evaluated expressions within a
privileged code section. A malicious web application could have used this flaw to
bypass security manager protections.

- CVE-2014-0227: Limited DoS in chunked transfer encoding input filter. (bsc#917127)
It was discovered that the ChunkedInputFilter implementation did not fail subsequent
attempts to read input early enough. A remote attacker could have used this flaw to
perform a denial of service attack, by streaming an unlimited quantity of data,
leading to consumption of server resources.

- CVE-2014-0230: Non-persistent DoS attack by feeding data by aborting an upload
It was possible for a remote attacker to trigger a non-persistent DoS attack by
feeding data by aborting an upload. (bsc#926762)

Additionally, the following non-security issues have been fixed:

- Fix rights of all files within /usr/share/tomcat6/bin. (bsc#906152)
- Don't overwrite /var/run/tomcat6.pid when Tomcat is already running. (bsc#934219)
- Miscellaneous fixes and improvements to Tomcat's init script. (bsc#932698)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-11"/>
	<updated date="2015-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906152">SUSE bug 906152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917127">SUSE bug 917127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931442">SUSE bug 931442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932698">SUSE bug 932698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0227/">CVE-2014-0227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0230/">CVE-2014-0230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7810/">CVE-2014-7810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586362" comment="tomcat6-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586363" comment="tomcat6-admin-webapps-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586364" comment="tomcat6-docs-webapp-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586365" comment="tomcat6-javadoc-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586366" comment="tomcat6-jsp-2_1-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586367" comment="tomcat6-lib-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586368" comment="tomcat6-servlet-2_5-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586369" comment="tomcat6-webapps-6.0.41-0.47.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586362" comment="tomcat6-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586363" comment="tomcat6-admin-webapps-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586364" comment="tomcat6-docs-webapp-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586365" comment="tomcat6-javadoc-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586366" comment="tomcat6-jsp-2_1-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586367" comment="tomcat6-lib-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586368" comment="tomcat6-servlet-2_5-api-6.0.41-0.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586369" comment="tomcat6-webapps-6.0.41-0.47.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41995" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="934219" ref_url="https://bugzilla.suse.com/934219" source="BUGZILLA"/>
		<reference ref_id="967815" ref_url="https://bugzilla.suse.com/967815" source="BUGZILLA"/>
		<reference ref_id="967964" ref_url="https://bugzilla.suse.com/967964" source="BUGZILLA"/>
		<reference ref_id="967965" ref_url="https://bugzilla.suse.com/967965" source="BUGZILLA"/>
		<reference ref_id="967967" ref_url="https://bugzilla.suse.com/967967" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html" source="SUSE-SU"/>
		<description>

This update for tomcat6 fixes the following issues:

The version was updated from 6.0.41 to 6.0.45.

Security issues fixed:

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/934219">SUSE bug 934219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575279" comment="tomcat6-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575280" comment="tomcat6-admin-webapps-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575281" comment="tomcat6-docs-webapp-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575282" comment="tomcat6-javadoc-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575283" comment="tomcat6-jsp-2_1-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575284" comment="tomcat6-lib-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575285" comment="tomcat6-servlet-2_5-api-6.0.45-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575286" comment="tomcat6-webapps-6.0.45-0.50.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41996" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="1036642" ref_url="https://bugzilla.suse.com/1036642" source="BUGZILLA"/>
		<reference ref_id="988489" ref_url="https://bugzilla.suse.com/988489" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

Tomcat was updated to version 6.0.53:

The full changelog is:
  http://tomcat.apache.org/tomcat-6.0-doc/changelog.html

Security issues fixed:

- CVE-2017-5647: A bug in the handling of pipelined requests could lead to information disclosure (bsc#1036642)
- CVE-2016-8745: Regression in the error handling methods could lead to information disclosure (bsc#1015119) 
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-6796: Manager Bypass (bsc#1007858)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5388: an arbitrary HTTP_PROXY environment variable might allow remote attackers to redirect  outbound HTTP traffic (bsc#988489)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036642">SUSE bug 1036642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569238" comment="tomcat6-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569239" comment="tomcat6-admin-webapps-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569240" comment="tomcat6-docs-webapp-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569241" comment="tomcat6-javadoc-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569242" comment="tomcat6-jsp-2_1-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569243" comment="tomcat6-lib-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569244" comment="tomcat6-servlet-2_5-api-6.0.53-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569245" comment="tomcat6-webapps-6.0.53-0.56.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41997" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004231.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following security issues:

- : The error page mechanism of the Java Servlet Specification
  requires that, when an error occurs and an error page is configured for the
  error that occurred, the original request and response are forwarded to the
  error page. This means that the request is presented to the error page with the
  original HTTP method. If the error page is a static file, expected behaviour is
  to serve content of the file as if processing a GET request, regardless of the
  actual HTTP method. The Default Servlet in Tomcat did not do this. Depending on
  the original request this could lead to unexpected and undesirable results for
  static error pages including, if the DefaultServlet is configured to permit
  writes, the replacement or removal of the custom error page (bsc#1042910).
- : The URL pattern of '' was not correctly handled when used as
  part of a security constraint definition. This caused the constraint to be
  ignored. It was possible for unauthorised users to gain access to web
  application resources that should have been protected. Only security
  constraints with a URL pattern of the empty string were affected (bsc#1082480).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575287" comment="tomcat6-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575288" comment="tomcat6-admin-webapps-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575289" comment="tomcat6-docs-webapp-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575290" comment="tomcat6-javadoc-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575291" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575292" comment="tomcat6-lib-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575293" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575294" comment="tomcat6-webapps-6.0.53-0.57.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41998" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1110850" ref_url="https://bugzilla.suse.com/1110850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004904.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issue:

Security issue fixed:

- CVE-2018-11784: Fixed problem with specially crafted URLs that could be used to cause a redirect to any URI of an attackers choise (bsc#1110850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575295" comment="tomcat6-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575296" comment="tomcat6-admin-webapps-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575297" comment="tomcat6-docs-webapp-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575298" comment="tomcat6-javadoc-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575299" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575300" comment="tomcat6-lib-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575301" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009575302" comment="tomcat6-webapps-6.0.53-0.57.10.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41999" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006646.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-27"/>
	<updated date="2020-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569246" comment="tomcat6-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569247" comment="tomcat6-admin-webapps-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569248" comment="tomcat6-docs-webapp-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569249" comment="tomcat6-javadoc-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569250" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569251" comment="tomcat6-lib-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569252" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569253" comment="tomcat6-webapps-6.0.53-0.57.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42000" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-22"/>
	<updated date="2020-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569254" comment="tomcat6-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569255" comment="tomcat6-admin-webapps-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569256" comment="tomcat6-docs-webapp-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569257" comment="tomcat6-javadoc-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569258" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569259" comment="tomcat6-lib-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569260" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569261" comment="tomcat6-webapps-6.0.53-0.57.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42001" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat6 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<description>
This update for tomcat6 fixes the following issues:

- CVE-2021-25329: Fixed completely CVE-2020-9484 (bsc#1182909).
- CVE-2021-24122: Fixed an information disclosure (bsc#1180947).
- CVE-2017-12617: Fixed a file inclusion vulnerability through a crafted request (bsc#1059554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009569262" comment="tomcat6-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569263" comment="tomcat6-admin-webapps-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569264" comment="tomcat6-docs-webapp-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569265" comment="tomcat6-javadoc-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569266" comment="tomcat6-jsp-2_1-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569267" comment="tomcat6-lib-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569268" comment="tomcat6-servlet-2_5-api-6.0.53-0.57.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009569269" comment="tomcat6-webapps-6.0.53-0.57.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42002" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003636.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586370" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586370" comment="transfig-3.2.5-160.3.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42003" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

- Do hardening via compile and linker flags 
- Fixed last added upstream commit (boo#1136882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651177" comment="transfig-3.2.8a-1.160.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42004" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653707" comment="transfig-3.2.8b-160.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42005" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00000.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-03"/>
	<updated date="2017-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586371" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586371" comment="unrar-3.80.2-4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42006" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="513804" ref_url="https://bugzilla.suse.com/513804" source="BUGZILLA"/>
		<reference ref_id="693890" ref_url="https://bugzilla.suse.com/693890" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions 
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Added libunrar* and libunrar*-devel subpackages (bsc#513804)
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513804">SUSE bug 513804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693890">SUSE bug 693890</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586372" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586372" comment="unrar-5.6.1-5.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42007" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1013992" ref_url="https://bugzilla.suse.com/1013992" source="BUGZILLA"/>
		<reference ref_id="1013993" ref_url="https://bugzilla.suse.com/1013993" source="BUGZILLA"/>
		<reference ref_id="950110" ref_url="https://bugzilla.suse.com/950110" source="BUGZILLA"/>
		<reference ref_id="950111" ref_url="https://bugzilla.suse.com/950111" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993)
- CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110)
- CVE-2015-7697: Specially crafted zip files could trigger an endless loop and lead to denial of service (bsc#950111)
- CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586373" comment="unzip-6.00-11.17.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586373" comment="unzip-6.00-11.17.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42008" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1080074" ref_url="https://bugzilla.suse.com/1080074" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003738.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-1000035: Fixed a heap-based buffer overflow in password protected ZIP archives (bsc#1080074)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586374" comment="unzip-6.00-11.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586374" comment="unzip-6.00-11.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42009" version="1" class="patch">
	<metadata>
		<title>Security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1110194" ref_url="https://bugzilla.suse.com/1110194" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005218.html" source="SUSE-SU"/>
		<description>
This update for unzip fixes the following issues:

- CVE-2018-18384: Fixed a buffer overflow when listing archives (bsc#1110194)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586375" comment="unzip-6.00-11.18.8.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586375" comment="unzip-6.00-11.18.8.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42010" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00045.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248, an arbitrary command execution vulnerability
  (bsc#1010685)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586376" comment="gvim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586377" comment="vim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586378" comment="vim-base-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586379" comment="vim-data-7.2-8.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586376" comment="gvim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586377" comment="vim-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586378" comment="vim-base-7.2-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586379" comment="vim-data-7.2-8.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42011" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003007.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following issues:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586380" comment="gvim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586381" comment="vim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586382" comment="vim-base-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586383" comment="vim-data-7.2-8.20.8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586380" comment="gvim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586381" comment="vim-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586382" comment="vim-base-7.2-8.20.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586383" comment="vim-data-7.2-8.20.8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42012" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586384" comment="gvim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586385" comment="vim-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586386" comment="vim-base-7.2-8.21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586387" comment="vim-data-7.2-8.21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42013" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006887.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586388" comment="gvim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586389" comment="vim-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586390" comment="vim-base-7.2-8.21.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586391" comment="vim-data-7.2-8.21.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42014" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1011269" ref_url="https://bugzilla.suse.com/1011269" source="BUGZILLA"/>
		<reference ref_id="1011270" ref_url="https://bugzilla.suse.com/1011270" source="BUGZILLA"/>
		<reference ref_id="1011271" ref_url="https://bugzilla.suse.com/1011271" source="BUGZILLA"/>
		<reference ref_id="1011272" ref_url="https://bugzilla.suse.com/1011272" source="BUGZILLA"/>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012020" ref_url="https://bugzilla.suse.com/1012020" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2016-9422" ref_url="https://www.suse.com/security/cve/CVE-2016-9422/" source="CVE"/>
		<reference ref_id="CVE-2016-9423" ref_url="https://www.suse.com/security/cve/CVE-2016-9423/" source="CVE"/>
		<reference ref_id="CVE-2016-9424" ref_url="https://www.suse.com/security/cve/CVE-2016-9424/" source="CVE"/>
		<reference ref_id="CVE-2016-9425" ref_url="https://www.suse.com/security/cve/CVE-2016-9425/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020)
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011269">SUSE bug 1011269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011270">SUSE bug 1011270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011271">SUSE bug 1011271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011272">SUSE bug 1011272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9422/">CVE-2016-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9423/">CVE-2016-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9424/">CVE-2016-9424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9425/">CVE-2016-9425</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586392" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586392" comment="w3m-0.5.3.git20161120-4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42015" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586393" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586393" comment="libwavpack1-4.50.1-1.27.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42016" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1120930" ref_url="https://bugzilla.suse.com/1120930" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005251.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

Security issues fixed:

- CVE-2018-19840: Fixed a denial-of-service in the WavpackPackInit function from pack_utils.c (bsc#1120930)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-27"/>
	<updated date="2019-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120930">SUSE bug 1120930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586394" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586394" comment="libwavpack1-4.50.1-1.30.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42017" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008521.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-19"/>
	<updated date="2021-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586395" comment="libwavpack1-4.50.1-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42018" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="958342" ref_url="https://bugzilla.suse.com/958342" source="BUGZILLA"/>
		<reference ref_id="984060" ref_url="https://bugzilla.suse.com/984060" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

- CVE-2016-4971: A HTTP to FTP redirection file name confusion vulnerability was fixed.
  (bsc#984060).

- CVE-2016-7098: A potential race condition was fixed by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Bug fixed:
- Wget failed with basicauth: Failed writing HTTP request: Bad file descriptor
  (bsc#958342)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958342">SUSE bug 958342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586396" comment="wget-1.11.4-1.32.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586396" comment="wget-1.11.4-1.32.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42019" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002739.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586397" comment="wget-1.11.4-1.40.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586397" comment="wget-1.11.4-1.40.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42020" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1092061" ref_url="https://bugzilla.suse.com/1092061" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for
  and joining continuation lines. (bsc#1092061)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586398" comment="wget-1.11.4-1.41.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586398" comment="wget-1.11.4-1.41.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42021" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581534" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42022" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581535" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42023" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="968565" ref_url="https://bugzilla.suse.com/968565" source="BUGZILLA"/>
		<reference ref_id="976944" ref_url="https://bugzilla.suse.com/976944" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<description>
This update to Wireshark 1 12.11 fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file.

- The PKTC dissector could crash (wnpa-sec-2016-22)
- The PKTC dissector could crash (wnpa-sec-2016-23)
- The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24)
- Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) 
- The GSM CBCH dissector could crash (wnpa-sec-2016-26)
- The NCP dissector could crash (wnpa-sec-2016-28)
- CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
- CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
- CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
- GSM A-bis OML dissector crash (wnpa-sec-2016-14)
- ASN.1 BER dissector crash (wnpa-sec-2016-15)
- ASN.1 BER dissector crash (wnpa-sec-2016-18) 

Also containsfurther bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html 
https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-05-18"/>
	<updated date="2016-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976944">SUSE bug 976944</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586399" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586399" comment="wireshark-1.12.11-0.18.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42024" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="983671" ref_url="https://bugzilla.suse.com/983671" source="BUGZILLA"/>
		<reference ref_id="991012" ref_url="https://bugzilla.suse.com/991012" source="BUGZILLA"/>
		<reference ref_id="991013" ref_url="https://bugzilla.suse.com/991013" source="BUGZILLA"/>
		<reference ref_id="991015" ref_url="https://bugzilla.suse.com/991015" source="BUGZILLA"/>
		<reference ref_id="991016" ref_url="https://bugzilla.suse.com/991016" source="BUGZILLA"/>
		<reference ref_id="991017" ref_url="https://bugzilla.suse.com/991017" source="BUGZILLA"/>
		<reference ref_id="991018" ref_url="https://bugzilla.suse.com/991018" source="BUGZILLA"/>
		<reference ref_id="991019" ref_url="https://bugzilla.suse.com/991019" source="BUGZILLA"/>
		<reference ref_id="991020" ref_url="https://bugzilla.suse.com/991020" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<description>

This update to wireshark 1.12.13 fixes the following issues:

 - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)
 - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)
 - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)
 - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)
 - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)
 - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)
 - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)
 - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)
 - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)
 - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)
 - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)
 - CVE-2016-5353: UMTS FP crash (bsc#983671)
 - CVE-2016-5354: USB dissector crash (bsc#983671)
 - CVE-2016-5355: Toshiba file parser crash (bsc#983671)
 - CVE-2016-5356: CoSine file parser crash (bsc#983671)
 - CVE-2016-5357: NetScreen file parser crash (bsc#983671)
 - CVE-2016-5358: Ethernet dissector crash (bsc#983671)
 - CVE-2016-5359: WBXML infinite loop (bsc#983671)

For more details please see:
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html
  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html

		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-02"/>
	<updated date="2016-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586400" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586400" comment="wireshark-1.12.13-0.23.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42025" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<description>

Wireshark was updated to version 2.0.12, which brings several new features, enhancements
and bug fixes.

These security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936).
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937).
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938).
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939).
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940).
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941).
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942).
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943).
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944).
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945).
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963).
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735).
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740).
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752).
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754).
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761).
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762).
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763).
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800).
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964).
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913).
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739).
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-04"/>
	<updated date="2017-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586401" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586402" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586401" comment="wireshark-2.0.12-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586402" comment="wireshark-gtk-2.0.12-36.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42026" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<description>
The network analysis tool wireshark was updated to version 2.0.13 to fix the following issues:

* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586403" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586404" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586403" comment="wireshark-2.0.13-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586404" comment="wireshark-gtk-2.0.13-39.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42027" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586405" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586406" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586405" comment="wireshark-2.0.14-40.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586406" comment="wireshark-gtk-2.0.14-40.7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42028" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<description>

  
This update for wireshark to version 2.2.11 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed
  in epan/dissectors/packet-btatt.c by considering a case where not all
  of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system
  memory. This was addressed in epan/dissectors/packet-mbim.c by changing
  the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in
  epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in
  epan/dissectors/packet-netbios.c by ensuring that write operations are
  bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed
  in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU
  length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was
  addressed in epan/dissectors/packet-cipsafety.c by validating the packet
  length. (bsc#1070727)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565487" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586407" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586408" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586409" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586410" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565492" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586411" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586412" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565487" comment="libsmi-0.4.5-2.7.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586407" comment="libwireshark8-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586408" comment="libwiretap6-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586409" comment="libwscodecs1-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586410" comment="libwsutil7-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565492" comment="portaudio-19-234.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586411" comment="wireshark-2.2.11-40.14.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586412" comment="wireshark-gtk-2.2.11-40.14.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42029" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586413" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586414" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586415" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586416" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586417" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586418" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586413" comment="libwireshark8-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586414" comment="libwiretap6-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586415" comment="libwscodecs1-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586416" comment="libwsutil7-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586417" comment="wireshark-2.2.12-40.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586418" comment="wireshark-gtk-2.2.12-40.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42030" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag) 
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element) 
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters) 
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu) 
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv) 
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6) 
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer) 
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main) 
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount) 
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set) 
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans) 
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586419" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586420" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586421" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586422" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586423" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586424" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586419" comment="libwireshark8-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586420" comment="libwiretap6-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586421" comment="libwscodecs1-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586422" comment="libwsutil7-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586423" comment="wireshark-2.2.13-40.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586424" comment="wireshark-gtk-2.2.13-40.22.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42031" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1088200" ref_url="https://bugzilla.suse.com/1088200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9259" ref_url="https://www.suse.com/security/cve/CVE-2018-9259/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003899.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 2.2.14, fix such issues:
  * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities
    fixed in 2.2.14, 2.4.6
  * CVE-2018-9256: LWAPP dissector crash
  * CVE-2018-9260: IEEE 802.15.4 dissector crash
  * CVE-2018-9261: NBAP dissector crash
  * CVE-2018-9262: VLAN dissector crash
  * CVE-2018-9263: Kerberos dissector crash
  * CVE-2018-9264: ADB dissector crash
  * CVE-2018-9265: tn3270 dissector has a memory leak
  * CVE-2018-9266: ISUP dissector memory leak
  * CVE-2018-9267: LAPD dissector memory leak
  * CVE-2018-9268: SMB2 dissector memory leak
  * CVE-2018-9269: GIOP dissector memory leak
  * CVE-2018-9270: OIDS dissector memory leak
  * CVE-2018-9271: multipart dissector memory leak
  * CVE-2018-9272: h223 dissector memory leak
  * CVE-2018-9273: pcp dissector memory leak
  * CVE-2018-9274: failure message memory leak
  * CVE-2018-9259: MP4 dissector crash
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-19"/>
	<updated date="2018-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1088200">SUSE bug 1088200</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9259/">CVE-2018-9259</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586425" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586426" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586427" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586428" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586429" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586430" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586425" comment="libwireshark8-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586426" comment="libwiretap6-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586427" comment="libwscodecs1-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586428" comment="libwsutil7-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586429" comment="wireshark-2.2.14-40.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586430" comment="wireshark-gtk-2.2.14-40.25.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42032" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issues fixed:

- bsc#1094301: Wireshark security update to 2.6.1, 2.4.7, 2.2.15
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586431" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586432" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586433" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586434" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586435" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586436" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586431" comment="libwireshark8-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586432" comment="libwiretap6-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586433" comment="libwscodecs1-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586434" comment="libwsutil7-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586435" comment="wireshark-2.2.16-40.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586436" comment="wireshark-gtk-2.2.16-40.28.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42033" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to version 2.2.17 (bsc#1106514):

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-26"/>
	<updated date="2018-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586437" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586438" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586439" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586440" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586441" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586442" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586437" comment="libwireshark8-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586438" comment="libwiretap6-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586439" comment="libwscodecs1-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586440" comment="libwsutil7-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586441" comment="wireshark-2.2.17-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586442" comment="wireshark-gtk-2.2.17-40.31.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42034" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581537" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42035" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586443" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586443" comment="wpa_supplicant-0.7.1-6.18.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42036" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="915323" ref_url="https://bugzilla.suse.com/915323" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004183.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

Security issue fixed:

- CVE-2015-0210: Fix broken certificate subject check (bsc#915323.)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586444" comment="wpa_supplicant-0.7.1-6.18.6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586444" comment="wpa_supplicant-0.7.1-6.18.6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42037" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="925466" ref_url="https://bugzilla.suse.com/925466" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<description>
xen was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

This non-security issue was fixed:
- Kdump did not work in a XEN environment (bsc#925466).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925466">SUSE bug 925466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42038" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945167" ref_url="https://bugzilla.suse.com/945167" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="949138" ref_url="https://bugzilla.suse.com/949138" source="BUGZILLA"/>
		<reference ref_id="949549" ref_url="https://bugzilla.suse.com/949549" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<description>
xen was updated to version 4.4.3 to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
- bsc#949549: xm create hangs when maxmen value is enclosed in quotes
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945167">SUSE bug 945167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949138">SUSE bug 949138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949549">SUSE bug 949549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42039" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 47 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42040" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="958848" ref_url="https://bugzilla.suse.com/958848" source="BUGZILLA"/>
		<reference ref_id="961600" ref_url="https://bugzilla.suse.com/961600" source="BUGZILLA"/>
		<reference ref_id="963161" ref_url="https://bugzilla.suse.com/963161" source="BUGZILLA"/>
		<reference ref_id="964427" ref_url="https://bugzilla.suse.com/964427" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="973188" ref_url="https://bugzilla.suse.com/973188" source="BUGZILLA"/>
		<reference ref_id="974038" ref_url="https://bugzilla.suse.com/974038" source="BUGZILLA"/>
		<reference ref_id="974912" ref_url="https://bugzilla.suse.com/974912" source="BUGZILLA"/>
		<reference ref_id="975130" ref_url="https://bugzilla.suse.com/975130" source="BUGZILLA"/>
		<reference ref_id="975138" ref_url="https://bugzilla.suse.com/975138" source="BUGZILLA"/>
		<reference ref_id="975907" ref_url="https://bugzilla.suse.com/975907" source="BUGZILLA"/>
		<reference ref_id="976058" ref_url="https://bugzilla.suse.com/976058" source="BUGZILLA"/>
		<reference ref_id="976111" ref_url="https://bugzilla.suse.com/976111" source="BUGZILLA"/>
		<reference ref_id="978164" ref_url="https://bugzilla.suse.com/978164" source="BUGZILLA"/>
		<reference ref_id="978295" ref_url="https://bugzilla.suse.com/978295" source="BUGZILLA"/>
		<reference ref_id="978413" ref_url="https://bugzilla.suse.com/978413" source="BUGZILLA"/>
		<reference ref_id="979035" ref_url="https://bugzilla.suse.com/979035" source="BUGZILLA"/>
		<reference ref_id="979620" ref_url="https://bugzilla.suse.com/979620" source="BUGZILLA"/>
		<reference ref_id="979670" ref_url="https://bugzilla.suse.com/979670" source="BUGZILLA"/>
		<reference ref_id="980716" ref_url="https://bugzilla.suse.com/980716" source="BUGZILLA"/>
		<reference ref_id="980724" ref_url="https://bugzilla.suse.com/980724" source="BUGZILLA"/>
		<reference ref_id="981264" ref_url="https://bugzilla.suse.com/981264" source="BUGZILLA"/>
		<reference ref_id="981276" ref_url="https://bugzilla.suse.com/981276" source="BUGZILLA"/>
		<reference ref_id="982024" ref_url="https://bugzilla.suse.com/982024" source="BUGZILLA"/>
		<reference ref_id="982025" ref_url="https://bugzilla.suse.com/982025" source="BUGZILLA"/>
		<reference ref_id="982026" ref_url="https://bugzilla.suse.com/982026" source="BUGZILLA"/>
		<reference ref_id="982224" ref_url="https://bugzilla.suse.com/982224" source="BUGZILLA"/>
		<reference ref_id="982225" ref_url="https://bugzilla.suse.com/982225" source="BUGZILLA"/>
		<reference ref_id="982286" ref_url="https://bugzilla.suse.com/982286" source="BUGZILLA"/>
		<reference ref_id="982695" ref_url="https://bugzilla.suse.com/982695" source="BUGZILLA"/>
		<reference ref_id="982960" ref_url="https://bugzilla.suse.com/982960" source="BUGZILLA"/>
		<reference ref_id="983973" ref_url="https://bugzilla.suse.com/983973" source="BUGZILLA"/>
		<reference ref_id="983984" ref_url="https://bugzilla.suse.com/983984" source="BUGZILLA"/>
		<reference ref_id="985503" ref_url="https://bugzilla.suse.com/985503" source="BUGZILLA"/>
		<reference ref_id="986586" ref_url="https://bugzilla.suse.com/986586" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="989235" ref_url="https://bugzilla.suse.com/989235" source="BUGZILLA"/>
		<reference ref_id="990843" ref_url="https://bugzilla.suse.com/990843" source="BUGZILLA"/>
		<reference ref_id="990923" ref_url="https://bugzilla.suse.com/990923" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3158" ref_url="https://www.suse.com/security/cve/CVE-2016-3158/" source="CVE"/>
		<reference ref_id="CVE-2016-3159" ref_url="https://www.suse.com/security/cve/CVE-2016-3159/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3960" ref_url="https://www.suse.com/security/cve/CVE-2016-3960/" source="CVE"/>
		<reference ref_id="CVE-2016-4001" ref_url="https://www.suse.com/security/cve/CVE-2016-4001/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4037" ref_url="https://www.suse.com/security/cve/CVE-2016-4037/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4962" ref_url="https://www.suse.com/security/cve/CVE-2016-4962/" source="CVE"/>
		<reference ref_id="CVE-2016-4963" ref_url="https://www.suse.com/security/cve/CVE-2016-4963/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the several issues.

These security issues were fixed:
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264).
- CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188).
- CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the 'Dark Portal' issue (bsc#978164).
- CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038).
- CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130).
- CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138).
- CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907).
- CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111).
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716).
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724).
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225).
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224).
- CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276).
- CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620).
- CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670).
- CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024).
- CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025).
- CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026).
- CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286).
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960).
- CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973).
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984).
- CVE-2016-6258: Potential privilege escalation in PV guests (XSA-182) (bsc#988675).
- bsc#978295: x86 software guest page walk PS bit handling flaw (XSA-176)
- CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923)
- CVE-2016-6351: scsi: esp: OOB write access in esp_do_dma (bsc#990843)

These non-security issues were fixed:
- bsc#954872: Script block-dmmd not working as expected - libxl: error: libxl_dm.c
- bsc#957986: Indirect descriptors are not compatible with Amazon block backend
- bsc#958848: HVM guest crash at /usr/src/packages/BUILD/xen-4.4.2-testing/obj/default/balloon/balloon.c:407
- bsc#961600: Poor performance when Xen HVM domU configured with max memory greater than current memory
- bsc#963161: Windows VM getting stuck during load while a VF is assigned to it after upgrading to latest maintenance updates
- bsc#964427: Discarding device blocks: failed - Input/output error
- bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu)
- bsc#982695: qemu fails to boot HVM guest from xvda
- bsc#986586: Out of memory (oom) during boot on 'modprobe xenblk' (non xen kernel)
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend. Additional memory adjustment made.
- bsc#974912: Persistent performance drop after live-migration using xend tool stack
- bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399
- bsc#989235: xen dom0 xm create command only searched /etc/xen instead of /etc/xen/vm
- Live Migration SLES 11 SP3 to SP4 on AMD: 'xc: error: Couldn't set extended vcpu0 info'
- bsc#985503: Fixed vif-route
- bsc#978413: PV guest upgrade from SLES11 SP4 to SLES 12 SP2 alpha3 failed
		</description>
<advisory from="security@suse.de">
	<issued date="2016-08-18"/>
	<updated date="2016-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958848">SUSE bug 958848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961600">SUSE bug 961600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963161">SUSE bug 963161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964427">SUSE bug 964427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973188">SUSE bug 973188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974038">SUSE bug 974038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974912">SUSE bug 974912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975130">SUSE bug 975130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976058">SUSE bug 976058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978413">SUSE bug 978413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979035">SUSE bug 979035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979620">SUSE bug 979620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979670">SUSE bug 979670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982695">SUSE bug 982695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985503">SUSE bug 985503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986586">SUSE bug 986586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989235">SUSE bug 989235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3158/">CVE-2016-3158</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3159/">CVE-2016-3159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3960/">CVE-2016-3960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4001/">CVE-2016-4001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4037/">CVE-2016-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4962/">CVE-2016-4962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4963/">CVE-2016-4963</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586445" comment="xen-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586446" comment="xen-doc-html-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586447" comment="xen-kmp-default-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586448" comment="xen-kmp-pae-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586449" comment="xen-libs-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586450" comment="xen-libs-32bit-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586451" comment="xen-tools-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586452" comment="xen-tools-domU-4.4.4_07-37.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586445" comment="xen-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586446" comment="xen-doc-html-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586447" comment="xen-kmp-default-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586448" comment="xen-kmp-pae-4.4.4_07_3.0.101_77-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586449" comment="xen-libs-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586450" comment="xen-libs-32bit-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586451" comment="xen-tools-4.4.4_07-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586452" comment="xen-tools-domU-4.4.4_07-37.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42041" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="966467" ref_url="https://bugzilla.suse.com/966467" source="BUGZILLA"/>
		<reference ref_id="970135" ref_url="https://bugzilla.suse.com/970135" source="BUGZILLA"/>
		<reference ref_id="971949" ref_url="https://bugzilla.suse.com/971949" source="BUGZILLA"/>
		<reference ref_id="988675" ref_url="https://bugzilla.suse.com/988675" source="BUGZILLA"/>
		<reference ref_id="990970" ref_url="https://bugzilla.suse.com/990970" source="BUGZILLA"/>
		<reference ref_id="991934" ref_url="https://bugzilla.suse.com/991934" source="BUGZILLA"/>
		<reference ref_id="992224" ref_url="https://bugzilla.suse.com/992224" source="BUGZILLA"/>
		<reference ref_id="993507" ref_url="https://bugzilla.suse.com/993507" source="BUGZILLA"/>
		<reference ref_id="994136" ref_url="https://bugzilla.suse.com/994136" source="BUGZILLA"/>
		<reference ref_id="994421" ref_url="https://bugzilla.suse.com/994421" source="BUGZILLA"/>
		<reference ref_id="994625" ref_url="https://bugzilla.suse.com/994625" source="BUGZILLA"/>
		<reference ref_id="994761" ref_url="https://bugzilla.suse.com/994761" source="BUGZILLA"/>
		<reference ref_id="994772" ref_url="https://bugzilla.suse.com/994772" source="BUGZILLA"/>
		<reference ref_id="994775" ref_url="https://bugzilla.suse.com/994775" source="BUGZILLA"/>
		<reference ref_id="995785" ref_url="https://bugzilla.suse.com/995785" source="BUGZILLA"/>
		<reference ref_id="995789" ref_url="https://bugzilla.suse.com/995789" source="BUGZILLA"/>
		<reference ref_id="995792" ref_url="https://bugzilla.suse.com/995792" source="BUGZILLA"/>
		<reference ref_id="997731" ref_url="https://bugzilla.suse.com/997731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6834" ref_url="https://www.suse.com/security/cve/CVE-2016-6834/" source="CVE"/>
		<reference ref_id="CVE-2016-6835" ref_url="https://www.suse.com/security/cve/CVE-2016-6835/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7154" ref_url="https://www.suse.com/security/cve/CVE-2016-7154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789)
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792)
- CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731)
- CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761)
- CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772)
- CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775)
- CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625)
- CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675)

These non-security issues were fixed:
- bsc#993507: virsh detach-disk failing to detach disk
- bsc#991934: Xen hypervisor crash in csched_acct
- bsc#992224: During boot of Xen Hypervisor, Failed to get contiguous memory for DMA
- bsc#970135: New virtualization project clock test randomly fails on Xen 
- bsc#994136: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol
- bsc#994136: xen_platform: unplug also SCSI disks in qemu-xen
- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live
- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)
- bsc#966467: Live Migration SLES 11 SP3 to SP4 on AMD
		</description>
<advisory from="security@suse.de">
	<issued date="2016-10-12"/>
	<updated date="2016-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/966467">SUSE bug 966467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970135">SUSE bug 970135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971949">SUSE bug 971949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990970">SUSE bug 990970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991934">SUSE bug 991934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992224">SUSE bug 992224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993507">SUSE bug 993507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994136">SUSE bug 994136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994421">SUSE bug 994421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994625">SUSE bug 994625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997731">SUSE bug 997731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6834/">CVE-2016-6834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6835/">CVE-2016-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7154/">CVE-2016-7154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586453" comment="xen-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586454" comment="xen-doc-html-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586455" comment="xen-kmp-default-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586456" comment="xen-kmp-pae-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586457" comment="xen-libs-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586458" comment="xen-libs-32bit-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586459" comment="xen-tools-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586460" comment="xen-tools-domU-4.4.4_08-40.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586453" comment="xen-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586454" comment="xen-doc-html-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586455" comment="xen-kmp-default-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586456" comment="xen-kmp-pae-4.4.4_08_3.0.101_80-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586457" comment="xen-libs-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586458" comment="xen-libs-32bit-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586459" comment="xen-tools-4.4.4_08-40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586460" comment="xen-tools-domU-4.4.4_08-40.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42042" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1000893" ref_url="https://bugzilla.suse.com/1000893" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1004016" ref_url="https://bugzilla.suse.com/1004016" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007160" ref_url="https://bugzilla.suse.com/1007160" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009104" ref_url="https://bugzilla.suse.com/1009104" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652)
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157)
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1007160)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005)
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1004016)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032)

This non-security issue wasfixed:
- bsc#1000893: virsh setmem didn't allow to set current guest memory to max limit

This update also delivers man-pages-supplement since some of the man-pages in there
are now contained in the xen package itself.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000893">SUSE bug 1000893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586461" comment="xen-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586462" comment="xen-doc-html-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586463" comment="xen-kmp-default-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586464" comment="xen-kmp-pae-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586465" comment="xen-libs-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586466" comment="xen-libs-32bit-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586467" comment="xen-tools-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586468" comment="xen-tools-domU-4.4.4_10-43.5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586461" comment="xen-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586462" comment="xen-doc-html-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586463" comment="xen-kmp-default-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586464" comment="xen-kmp-pae-4.4.4_10_3.0.101_88-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586465" comment="xen-libs-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586466" comment="xen-libs-32bit-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586467" comment="xen-tools-4.4.4_10-43.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586468" comment="xen-tools-domU-4.4.4_10-43.5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42043" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
  - CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
  - PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586469" comment="xen-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586470" comment="xen-doc-html-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586471" comment="xen-kmp-default-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586472" comment="xen-kmp-pae-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586473" comment="xen-libs-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586474" comment="xen-libs-32bit-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586475" comment="xen-tools-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586476" comment="xen-tools-domU-4.4.4_12-46.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586469" comment="xen-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586470" comment="xen-doc-html-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586471" comment="xen-kmp-default-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586472" comment="xen-kmp-pae-4.4.4_12_3.0.101_91-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586473" comment="xen-libs-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586474" comment="xen-libs-32bit-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586475" comment="xen-tools-4.4.4_12-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586476" comment="xen-tools-domU-4.4.4_12-46.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42044" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1000195" ref_url="https://bugzilla.suse.com/1000195" source="BUGZILLA"/>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1013657" ref_url="https://bugzilla.suse.com/1013657" source="BUGZILLA"/>
		<reference ref_id="1013668" ref_url="https://bugzilla.suse.com/1013668" source="BUGZILLA"/>
		<reference ref_id="1014490" ref_url="https://bugzilla.suse.com/1014490" source="BUGZILLA"/>
		<reference ref_id="1014507" ref_url="https://bugzilla.suse.com/1014507" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022627" ref_url="https://bugzilla.suse.com/1022627" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024183" ref_url="https://bugzilla.suse.com/1024183" source="BUGZILLA"/>
		<reference ref_id="1024186" ref_url="https://bugzilla.suse.com/1024186" source="BUGZILLA"/>
		<reference ref_id="1024307" ref_url="https://bugzilla.suse.com/1024307" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="1025188" ref_url="https://bugzilla.suse.com/1025188" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="987002" ref_url="https://bugzilla.suse.com/987002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188)
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183)
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186)
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627)
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490)
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169)
- CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657)
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)

These non-security issues were fixed:

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#987002: Prevent crash of domU' after they were migrated from SP3 HV to SP4
 		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000195">SUSE bug 1000195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987002">SUSE bug 987002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586477" comment="xen-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586478" comment="xen-doc-html-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586479" comment="xen-kmp-default-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586480" comment="xen-kmp-pae-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586481" comment="xen-libs-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586482" comment="xen-libs-32bit-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586483" comment="xen-tools-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586484" comment="xen-tools-domU-4.4.4_14-51.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586477" comment="xen-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586478" comment="xen-doc-html-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586479" comment="xen-kmp-default-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586480" comment="xen-kmp-pae-4.4.4_14_3.0.101_94-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586481" comment="xen-libs-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586482" comment="xen-libs-32bit-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586483" comment="xen-tools-4.4.4_14-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586484" comment="xen-tools-domU-4.4.4_14-51.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42045" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1026636" ref_url="https://bugzilla.suse.com/1026636" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1027570" ref_url="https://bugzilla.suse.com/1027570" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

These security issues were fixed:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
- CVE-2016-9603: A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
- CVE-2017-2633: The VNC display driver support was vulnerable to an out-of-bounds memory access issue. A user/process inside guest could use this flaw to cause DoS (bsc#1026636).

These non-security issues were fixed:

- bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827: Forward port xenstored
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-20"/>
	<updated date="2017-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586485" comment="xen-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586486" comment="xen-doc-html-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586487" comment="xen-kmp-default-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586488" comment="xen-kmp-pae-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586489" comment="xen-libs-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586490" comment="xen-libs-32bit-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586491" comment="xen-tools-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586492" comment="xen-tools-domU-4.4.4_16-54.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586485" comment="xen-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586486" comment="xen-doc-html-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586487" comment="xen-kmp-default-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586488" comment="xen-kmp-pae-4.4.4_16_3.0.101_97-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586489" comment="xen-libs-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586490" comment="xen-libs-32bit-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586491" comment="xen-tools-4.4.4_16-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586492" comment="xen-tools-domU-4.4.4_16-54.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42046" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1035483" ref_url="https://bugzilla.suse.com/1035483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

These non-security issues were fixed:

- bsc#1029827: Additional xenstore patch
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586493" comment="xen-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586494" comment="xen-doc-html-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586495" comment="xen-kmp-default-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586496" comment="xen-kmp-pae-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586497" comment="xen-libs-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586498" comment="xen-libs-32bit-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586499" comment="xen-tools-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586500" comment="xen-tools-domU-4.4.4_18-57.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586493" comment="xen-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586494" comment="xen-doc-html-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586495" comment="xen-kmp-default-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586496" comment="xen-kmp-pae-4.4.4_18_3.0.101_97-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586497" comment="xen-libs-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586498" comment="xen-libs-32bit-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586499" comment="xen-tools-4.4.4_18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586500" comment="xen-tools-domU-4.4.4_18-57.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42047" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031460" ref_url="https://bugzilla.suse.com/1031460" source="BUGZILLA"/>
		<reference ref_id="1032148" ref_url="https://bugzilla.suse.com/1032148" source="BUGZILLA"/>
		<reference ref_id="1034845" ref_url="https://bugzilla.suse.com/1034845" source="BUGZILLA"/>
		<reference ref_id="1036470" ref_url="https://bugzilla.suse.com/1036470" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042924" ref_url="https://bugzilla.suse.com/1042924" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="1043074" ref_url="https://bugzilla.suse.com/1043074" source="BUGZILLA"/>
		<reference ref_id="1043297" ref_url="https://bugzilla.suse.com/1043297" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's-&gt;ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
	
These non-security issues were fixed:

- bsc#1032148: Ensure that time doesn't goes backwards during live migration of HVM domU
- bsc#1031460: Fixed DomU Live Migration 
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031460">SUSE bug 1031460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032148">SUSE bug 1032148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036470">SUSE bug 1036470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042924">SUSE bug 1042924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043074">SUSE bug 1043074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586501" comment="xen-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586502" comment="xen-doc-html-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586503" comment="xen-kmp-default-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586504" comment="xen-kmp-pae-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586505" comment="xen-libs-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586506" comment="xen-libs-32bit-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586507" comment="xen-tools-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586508" comment="xen-tools-domU-4.4.4_20-60.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586501" comment="xen-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586502" comment="xen-doc-html-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586503" comment="xen-kmp-default-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586504" comment="xen-kmp-pae-4.4.4_20_3.0.101_104-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586505" comment="xen-libs-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586506" comment="xen-libs-32bit-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586507" comment="xen-tools-4.4.4_20-60.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586508" comment="xen-tools-domU-4.4.4_20-60.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42048" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1032598" ref_url="https://bugzilla.suse.com/1032598" source="BUGZILLA"/>
		<reference ref_id="1037413" ref_url="https://bugzilla.suse.com/1037413" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1047675" ref_url="https://bugzilla.suse.com/1047675" source="BUGZILLA"/>
		<reference ref_id="1048920" ref_url="https://bugzilla.suse.com/1048920" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10806: Stack-based buffer overflow in hw/usb/redirect.c allowed
  local guest OS users to cause a denial of service via vectors related to
  logging debug messages (bsc#1047675).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

This non-security issue was fixed:

- bsc#1032598: Prevent removal of NVME devices
- bsc#1037413: Support for newer intel cpu's, mwait-idle driver and skylake
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-13"/>
	<updated date="2017-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032598">SUSE bug 1032598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037413">SUSE bug 1037413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586509" comment="xen-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586510" comment="xen-doc-html-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586511" comment="xen-kmp-default-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586512" comment="xen-kmp-pae-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586513" comment="xen-libs-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586514" comment="xen-libs-32bit-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586515" comment="xen-tools-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586516" comment="xen-tools-domU-4.4.4_22-61.9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586509" comment="xen-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586510" comment="xen-doc-html-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586511" comment="xen-kmp-default-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586512" comment="xen-kmp-pae-4.4.4_22_3.0.101_108.7-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586513" comment="xen-libs-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586514" comment="xen-libs-32bit-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586515" comment="xen-tools-4.4.4_22-61.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586516" comment="xen-tools-domU-4.4.4_22-61.9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42049" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-20"/>
	<updated date="2017-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586517" comment="xen-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586518" comment="xen-doc-html-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586519" comment="xen-kmp-default-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586520" comment="xen-kmp-pae-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586521" comment="xen-libs-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586522" comment="xen-libs-32bit-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586523" comment="xen-tools-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586524" comment="xen-tools-domU-4.4.4_24-61.12.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586517" comment="xen-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586518" comment="xen-doc-html-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586519" comment="xen-kmp-default-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586520" comment="xen-kmp-pae-4.4.4_24_3.0.101_108.10-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586521" comment="xen-libs-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586522" comment="xen-libs-32bit-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586523" comment="xen-tools-4.4.4_24-61.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586524" comment="xen-tools-domU-4.4.4_24-61.12.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42050" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1056336" ref_url="https://bugzilla.suse.com/1056336" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081).
- CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS (hypervisor
  crash) or possibly gain privileges because self-linear shadow mappings were
  mishandled for translated guests (bsc#1061086).
- CVE-2017-13672: The VGA display emulator support allowed local guest OS
  privileged users to cause a denial of service (out-of-bounds read and QEMU
  process crash) via vectors involving display update (bsc#1056336)

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-08"/>
	<updated date="2017-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586525" comment="xen-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586526" comment="xen-doc-html-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586527" comment="xen-kmp-default-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586528" comment="xen-kmp-pae-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586529" comment="xen-libs-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586530" comment="xen-libs-32bit-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586531" comment="xen-tools-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586532" comment="xen-tools-domU-4.4.4_26-61.17.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586525" comment="xen-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586526" comment="xen-doc-html-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586527" comment="xen-kmp-default-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586528" comment="xen-kmp-pae-4.4.4_26_3.0.101_108.13-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586529" comment="xen-libs-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586530" comment="xen-libs-32bit-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586531" comment="xen-tools-4.4.4_26-61.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586532" comment="xen-tools-domU-4.4.4_26-61.17.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42051" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

This new feature was included:

- add script and sysv service to watch for vcpu online/offline events in a HVM domU

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- Added missing intermediate preemption checks for guest requesting removal of
  memory. This allowed malicious guest administrator to cause denial of service
  due to the high cost of this operation (bsc#1080635).
- Because of XEN not returning the proper error messages when transitioning
  grant tables from v2 to v1 a malicious guest was able to cause DoS or
  potentially allowed for privilege escalation as well as information leaks
  (bsc#1080662).

These non-security issues were fixed:

- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up
- bsc#1031382: Prevent VMs from crashing when migrating between dom0 hosts in
  case read() returns zero on the receiver side.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586533" comment="xen-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586534" comment="xen-doc-html-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586535" comment="xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586536" comment="xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586537" comment="xen-libs-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586538" comment="xen-libs-32bit-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586539" comment="xen-tools-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586540" comment="xen-tools-domU-4.4.4_28-61.23.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586533" comment="xen-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586534" comment="xen-doc-html-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586535" comment="xen-kmp-default-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586536" comment="xen-kmp-pae-4.4.4_28_3.0.101_108.35-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586537" comment="xen-libs-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586538" comment="xen-libs-32bit-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586539" comment="xen-tools-4.4.4_28-61.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586540" comment="xen-tools-domU-4.4.4_28-61.23.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42052" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1057493" ref_url="https://bugzilla.suse.com/1057493" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1083292" ref_url="https://bugzilla.suse.com/1083292" source="BUGZILLA"/>
		<reference ref_id="1086107" ref_url="https://bugzilla.suse.com/1086107" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).
- CVE-2018-7550: The load_multiboot function allowed local guest OS users to
  execute arbitrary code on the host via a mh_load_end_addr value greater than
  mh_bss_end_addr, which triggers an out-of-bounds read or write memory access
  (bsc#1083292).

These non-security issues were fixed:

- bsc#1072834: Prevent unchecked MSR access error
- bsc#1035442: Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds, allowing for more domUs to be shutdown in parallel
- bsc#1057493: Prevent DomU crash

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057493">SUSE bug 1057493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086107">SUSE bug 1086107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586541" comment="xen-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586542" comment="xen-doc-html-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586543" comment="xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586544" comment="xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586545" comment="xen-libs-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586546" comment="xen-libs-32bit-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586547" comment="xen-tools-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586548" comment="xen-tools-domU-4.4.4_30-61.26.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586541" comment="xen-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586542" comment="xen-doc-html-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586543" comment="xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586544" comment="xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586545" comment="xen-libs-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586546" comment="xen-libs-32bit-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586547" comment="xen-tools-4.4.4_30-61.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586548" comment="xen-tools-domU-4.4.4_30-61.26.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42053" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

bsc#1027519
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586549" comment="xen-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586550" comment="xen-doc-html-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586551" comment="xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586552" comment="xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586553" comment="xen-libs-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586554" comment="xen-libs-32bit-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586555" comment="xen-tools-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586556" comment="xen-tools-domU-4.4.4_32-61.29.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586549" comment="xen-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586550" comment="xen-doc-html-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586551" comment="xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586552" comment="xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586553" comment="xen-libs-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586554" comment="xen-libs-32bit-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586555" comment="xen-tools-4.4.4_32-61.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586556" comment="xen-tools-domU-4.4.4_32-61.29.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42054" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1079730" ref_url="https://bugzilla.suse.com/1079730" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1098744" ref_url="https://bugzilla.suse.com/1098744" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12617: Fix integer overflow that causes segmentation fault in qmp_guest_file_read() with g_malloc() (bsc#1098744).
- CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
- CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).

Bug fixes:

- bsc#1079730: Fix failed 'write' lock.
- bsc#1027519: Add upstream patches from January.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-23"/>
	<updated date="2018-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079730">SUSE bug 1079730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586557" comment="xen-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586558" comment="xen-doc-html-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586559" comment="xen-kmp-default-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586560" comment="xen-kmp-pae-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586561" comment="xen-libs-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586562" comment="xen-libs-32bit-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586563" comment="xen-tools-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586564" comment="xen-tools-domU-4.4.4_34-61.32.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586557" comment="xen-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586558" comment="xen-doc-html-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586559" comment="xen-kmp-default-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586560" comment="xen-kmp-pae-4.4.4_34_3.0.101_108.57-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586561" comment="xen-libs-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586562" comment="xen-libs-32bit-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586563" comment="xen-tools-4.4.4_34-61.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586564" comment="xen-tools-domU-4.4.4_34-61.32.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42055" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="1101684" ref_url="https://bugzilla.suse.com/1101684" source="BUGZILLA"/>
		<reference ref_id="1102116" ref_url="https://bugzilla.suse.com/1102116" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

This security issue was fixed:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).

These non-security issues were fixed:

- bsc#1102116: SSBD is not virtualized for guests
- bsc#1092631: Preserve the xl dmesg output after boot for determining what speculative mitigations have been detected by the hypervisor.
- bsc#1101684: Make xen able to disable the visibility of the new CPU flags.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-22"/>
	<updated date="2018-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101684">SUSE bug 1101684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102116">SUSE bug 1102116</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586565" comment="xen-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586566" comment="xen-doc-html-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586567" comment="xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586568" comment="xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586569" comment="xen-libs-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586570" comment="xen-libs-32bit-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586571" comment="xen-tools-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586572" comment="xen-tools-domU-4.4.4_36-61.37.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586565" comment="xen-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586566" comment="xen-doc-html-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586567" comment="xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586568" comment="xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586569" comment="xen-libs-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586570" comment="xen-libs-32bit-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586571" comment="xen-tools-4.4.4_36-61.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586572" comment="xen-tools-domU-4.4.4_36-61.37.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42056" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1056336" ref_url="https://bugzilla.suse.com/1056336" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1110924" ref_url="https://bugzilla.suse.com/1110924" source="BUGZILLA"/>
		<reference ref_id="1111007" ref_url="https://bugzilla.suse.com/1111007" source="BUGZILLA"/>
		<reference ref_id="1111011" ref_url="https://bugzilla.suse.com/1111011" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="1112188" ref_url="https://bugzilla.suse.com/1112188" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047)
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)
- Fixed an integer overflow in ccid_card_vscard_read(), which allowed for
  memory corruption. (bsc#1112188)
- CVE-2017-13672: Fixed an out of bounds read access during display update
  (bsc#1056336)
- CVE-2018-17958: Fixed an integer overflow leading to a buffer overflow in the
  rtl8139 component (bsc#1111007)
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
  pcnet component (bsc#1111011)
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
  leading to a denial of service (DoS). (bsc#1111014)
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
  the ne2000 component (bsc#1110924)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Upstream bug fixes (bsc#1027519)
- Fixed crashing VMs when migrating between dom0 hosts (bsc#1031382)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-02"/>
	<updated date="2019-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586573" comment="xen-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586574" comment="xen-doc-html-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586575" comment="xen-kmp-default-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586576" comment="xen-kmp-pae-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586577" comment="xen-libs-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586578" comment="xen-libs-32bit-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586579" comment="xen-tools-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586580" comment="xen-tools-domU-4.4.4_38-61.40.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586573" comment="xen-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586574" comment="xen-doc-html-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586575" comment="xen-kmp-default-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586576" comment="xen-kmp-pae-4.4.4_38_3.0.101_108.84-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586577" comment="xen-libs-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586578" comment="xen-libs-32bit-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586579" comment="xen-tools-4.4.4_38-61.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586580" comment="xen-tools-domU-4.4.4_38-61.40.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42057" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1031382" ref_url="https://bugzilla.suse.com/1031382" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).

Other issues fixed: 

- Fixed an issue where VMs crashing when migrating between dom0 hosts (bsc#1031382).
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031382">SUSE bug 1031382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586581" comment="xen-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586582" comment="xen-doc-html-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586583" comment="xen-kmp-default-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586584" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586585" comment="xen-libs-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586586" comment="xen-libs-32bit-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586587" comment="xen-tools-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586588" comment="xen-tools-domU-4.4.4_40-61.43.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586581" comment="xen-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586582" comment="xen-doc-html-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586583" comment="xen-kmp-default-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586584" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.87-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586585" comment="xen-libs-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586586" comment="xen-libs-32bit-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586587" comment="xen-tools-4.4.4_40-61.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586588" comment="xen-tools-domU-4.4.4_40-61.43.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42058" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Added upstream bug fix (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586589" comment="xen-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586590" comment="xen-doc-html-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586591" comment="xen-kmp-default-4.4.4_40_3.0.101_108.90-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586592" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.90-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586593" comment="xen-libs-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586594" comment="xen-libs-32bit-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586595" comment="xen-tools-4.4.4_40-61.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586596" comment="xen-tools-domU-4.4.4_40-61.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42059" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1135905" ref_url="https://bugzilla.suse.com/1135905" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1145652" ref_url="https://bugzilla.suse.com/1145652" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
- CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652).
- CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which
  could have led to denial of service (bsc#1135905).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-24"/>
	<updated date="2019-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586597" comment="xen-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586598" comment="xen-doc-html-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586599" comment="xen-kmp-default-4.4.4_40_3.0.101_108.101-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586600" comment="xen-kmp-pae-4.4.4_40_3.0.101_108.101-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586601" comment="xen-libs-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586602" comment="xen-libs-32bit-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586603" comment="xen-tools-4.4.4_40-61.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586604" comment="xen-tools-domU-4.4.4_40-61.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42060" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues
- bsc#1161181 - CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host
- bsc#1157888 - CVE-2019-19579: Device quarantine for alternate pci assignment methods
- bsc#1158004 - CVE-2019-19583: VMX: VMentry failure with debug exceptions and blocked states
- bsc#1158005 - CVE-2019-19578: Linear pagetable use / entry miscounts
- bsc#1158006 - CVE-2019-19580: Further issues with restartable PV type change operations
- bsc#1158007 - CVE-2019-19577: dynamic height for the IOMMU pagetables 
- bsc#1154448 - CVE-2019-18420: VCPUOP_initialise DoS
- bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation
- bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change operations
- bsc#1154461 - CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment
- bsc#1155945 - CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue)
- bsc#1152497 - CVE-2019-11135: TSX Asynchronous Abort (TAA) issue
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586605" comment="xen-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586606" comment="xen-doc-html-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586607" comment="xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586608" comment="xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586609" comment="xen-libs-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586610" comment="xen-libs-32bit-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586611" comment="xen-tools-4.4.4_42-61.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586612" comment="xen-tools-domU-4.4.4_42-61.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42061" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic  modification of live EPT PTE (bsc#1173380,XSA-328)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586613" comment="xen-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586614" comment="xen-doc-html-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586615" comment="xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586616" comment="xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586617" comment="xen-libs-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586618" comment="xen-libs-32bit-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586619" comment="xen-tools-4.4.4_44-61.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586620" comment="xen-tools-domU-4.4.4_44-61.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42062" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1178935 - CVE-2020-25723: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-08"/>
	<updated date="2020-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586621" comment="xen-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586622" comment="xen-doc-html-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586623" comment="xen-kmp-default-4.4.4_46_3.0.101_108.117-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586624" comment="xen-kmp-pae-4.4.4_46_3.0.101_108.117-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586625" comment="xen-libs-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586626" comment="xen-libs-32bit-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586627" comment="xen-tools-4.4.4_46-61.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586628" comment="xen-tools-domU-4.4.4_46-61.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42063" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586629" comment="xen-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586630" comment="xen-doc-html-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586631" comment="xen-kmp-default-4.4.4_48_3.0.101_108.117-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586632" comment="xen-kmp-pae-4.4.4_48_3.0.101_108.117-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586633" comment="xen-libs-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586634" comment="xen-libs-32bit-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586635" comment="xen-tools-4.4.4_48-61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586636" comment="xen-tools-domU-4.4.4_48-61.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42064" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3419: Fixed a stack overflow induced by infinite recursion issue (bsc#1182975).
- CVE-2021-20257: Fixed an infinite loop in the e1000 NIC emulator (bsc#1182846)
- xenstored crashing with segfault (bsc#1182155).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-19"/>
	<updated date="2021-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586637" comment="xen-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586638" comment="xen-doc-html-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586639" comment="xen-kmp-default-4.4.4_48_3.0.101_108.123-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586640" comment="xen-kmp-pae-4.4.4_48_3.0.101_108.123-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586641" comment="xen-libs-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586642" comment="xen-libs-32bit-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586643" comment="xen-tools-4.4.4_48-61.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586644" comment="xen-tools-domU-4.4.4_48-61.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42065" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186013" ref_url="https://bugzilla.suse.com/1186013" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189150" ref_url="https://bugzilla.suse.com/1189150" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="1192526" ref_url="https://bugzilla.suse.com/1192526" source="BUGZILLA"/>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192555" ref_url="https://bugzilla.suse.com/1192555" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="CVE-2021-28703" ref_url="https://www.suse.com/security/cve/CVE-2021-28703/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="CVE-2021-3930" ref_url="https://www.suse.com/security/cve/CVE-2021-3930/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-0089: Fixed Speculative Code Store Bypass (XSA-375) (bsc#1186433).
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654).
- CVE-2021-28690: Fixed x86 TSX Async Abort protections not restored after S3 (XSA-377) (bsc#1186434).
- CVE-2021-28692: Fixed inappropriate x86 IOMMU timeout detection / handling (XSA-373) (bsc#1186429).
- CVE-2021-28697: Fixed grant table v2 status pages may remain accessible after de-allocation (XSA-379) (bsc#1189376).
- CVE-2021-28698: Fixed long running loops in grant table handling. (XSA-380) (bsc#1189378).
- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).
- CVE-2021-28703: Fixed grant table v2 status pages may remain accessible after de-allocation (take two) (XSA-387) (bsc#1192555).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
- CVE-2021-3527: Fixed unbounded stack allocation in usbredir (bsc#1186013).
- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure in slirp (bootp) (bsc#1187369).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure in slirp (udp) (bsc#1187378).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure in slirp (tftp) (bsc#1187376).
- CVE-2021-3682: Fixed free call on invalid pointer in usbredir bufp_alloc (bsc#1189150).
- CVE-2021-3930: Fixed off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (bsc#1192526).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186013">SUSE bug 1186013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189150">SUSE bug 1189150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192526">SUSE bug 1192526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192555">SUSE bug 1192555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28703/">CVE-2021-28703</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3930/">CVE-2021-3930</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658848" comment="xen-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658849" comment="xen-doc-html-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658850" comment="xen-kmp-default-4.4.4_50_3.0.101_108.129-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658851" comment="xen-kmp-pae-4.4.4_50_3.0.101_108.129-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658852" comment="xen-libs-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658853" comment="xen-libs-32bit-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658854" comment="xen-tools-4.4.4_50-61.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658855" comment="xen-tools-domU-4.4.4_50-61.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42066" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666470" comment="xen-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666471" comment="xen-doc-html-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666472" comment="xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666473" comment="xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666474" comment="xen-libs-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666475" comment="xen-libs-32bit-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666476" comment="xen-tools-4.4.4_52-61.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666477" comment="xen-tools-domU-4.4.4_52-61.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42067" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:

- bsc#955399 -  Fix xm migrate --log_progress.
  Due to logic error progress was not logged when requested.

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#955399 -  Fix xm migrate --live.  The options were not passed
  due to a merge error. As a result the migration was not live,
  instead the suspended guest was migrated.

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)


- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42068" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003302.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009575659" comment="xerces-j2-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565556" comment="xerces-j2-xml-apis-2.8.1-238.29.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565557" comment="xerces-j2-xml-resolver-2.8.1-238.29.5.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42069" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010256.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667942" comment="xerces-j2-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667943" comment="xerces-j2-xml-apis-2.8.1-238.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667944" comment="xerces-j2-xml-resolver-2.8.1-238.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42070" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581773" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42071" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003026.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586645" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586646" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586647" comment="xorg-x11-libICE-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586645" comment="xorg-x11-libICE-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586646" comment="xorg-x11-libICE-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586647" comment="xorg-x11-libICE-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42072" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009581778" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581779" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581780" comment="xorg-x11-libX11-x86-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42073" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002455.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

  - plug a memory leak (bsc#1002991, CVE-2016-7942)
  - insufficient validation of data from the X server can cause
    out of boundary memory read (XGetImage()) or write (XListFonts())
    (bsc#1002991, CVE-2016-7942)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586648" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586649" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586650" comment="xorg-x11-libX11-x86-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586648" comment="xorg-x11-libX11-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586649" comment="xorg-x11-libX11-32bit-7.4-5.11.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586650" comment="xorg-x11-libX11-x86-7.4-5.11.65.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42074" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019642" ref_url="https://bugzilla.suse.com/1019642" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002689.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libX11 fixes the following issues:

- a regression introduced by the security fix for CVE-2013-1997
  (bnc#824294). Keyboard mappings for special characters on Non-English
  keyboards might have been broken. (bnc#1019642)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-09"/>
	<updated date="2017-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019642">SUSE bug 1019642</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586651" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586652" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586653" comment="xorg-x11-libX11-x86-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586651" comment="xorg-x11-libX11-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586652" comment="xorg-x11-libX11-32bit-7.4-5.11.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586653" comment="xorg-x11-libX11-x86-7.4-5.11.68.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42075" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1102062" ref_url="https://bugzilla.suse.com/1102062" source="BUGZILLA"/>
		<reference ref_id="1102068" ref_url="https://bugzilla.suse.com/1102068" source="BUGZILLA"/>
		<reference ref_id="1102073" ref_url="https://bugzilla.suse.com/1102073" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
  error caused by malicious server responses, leading to DoS or possibly
  unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as signed
  instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
  leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the first
  string overflows, causing a variable to be set to NULL that will be freed later
  on, leading to DoS (segmentation fault) (bsc#1102073)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586654" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586655" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586656" comment="xorg-x11-libX11-x86-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586654" comment="xorg-x11-libX11-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586655" comment="xorg-x11-libX11-32bit-7.4-5.11.72.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586656" comment="xorg-x11-libX11-x86-7.4-5.11.72.9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42076" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586657" comment="xorg-x11-libX11-7.4-5.11.72.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586658" comment="xorg-x11-libX11-32bit-7.4-5.11.72.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42077" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586659" comment="xorg-x11-libX11-7.4-5.11.72.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586660" comment="xorg-x11-libX11-32bit-7.4-5.11.72.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42078" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586661" comment="xorg-x11-libX11-7.4-5.11.72.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586662" comment="xorg-x11-libX11-32bit-7.4-5.11.72.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42079" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003035.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586663" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586664" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586665" comment="xorg-x11-libXdmcp-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586663" comment="xorg-x11-libXdmcp-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586664" comment="xorg-x11-libXdmcp-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586665" comment="xorg-x11-libXdmcp-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42080" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002491.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXfixes fixes the following issues:

  - insufficient validation of data from the X server can cause an
    integer overflow on 32 bit architectures (bsc#1002995, CVE-2016-7944)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586666" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586667" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586668" comment="xorg-x11-libXfixes-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586666" comment="xorg-x11-libXfixes-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586667" comment="xorg-x11-libXfixes-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586668" comment="xorg-x11-libXfixes-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42081" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002646.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXpm fixes the following security issue:

- A heap overflow in XPM handling could be used by attackers supplying
  XPM files to  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586669" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586670" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586671" comment="xorg-x11-libXpm-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586669" comment="xorg-x11-libXpm-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586670" comment="xorg-x11-libXpm-32bit-7.4-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586671" comment="xorg-x11-libXpm-x86-7.4-3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42082" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXrender fixes the following issues:

  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003002, CVE-2016-7949, CVE-2016-7950)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586672" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586673" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586674" comment="xorg-x11-libXrender-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586672" comment="xorg-x11-libXrender-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586673" comment="xorg-x11-libXrender-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586674" comment="xorg-x11-libXrender-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42083" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002477.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libXv fixes the following issues:

  - insufficient validation of data from the X server can cause
    memory corruption (bsc#1003017, CVE-2016-5407)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586675" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586676" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586677" comment="xorg-x11-libXv-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586675" comment="xorg-x11-libXv-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586676" comment="xorg-x11-libXv-32bit-7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586677" comment="xorg-x11-libXv-x86-7.4-1.20.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42084" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-libs fixes the following issues:

  - insufficient validation of data from the X server can cause a
    one byte buffer read underrun (bsc#1003023, CVE-2016-7953)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service)
    (bsc#1003012, CVE-2016-7951, CVE-2016-7952)
  - insufficient validation of data from the X server can cause out
    of boundary memory writes (bsc#1003000, CVE-2016-7947, CVE-2016-7948)
  - insufficient validation of data from the X server can cause out
    of boundary memory access or endless loops (Denial of Service).
    (bsc#1002998, CVE-2016-7945, CVE-2016-7946)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-16"/>
	<updated date="2016-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586678" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586679" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586680" comment="xorg-x11-libs-x86-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586678" comment="xorg-x11-libs-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586679" comment="xorg-x11-libs-32bit-7.4-8.26.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586680" comment="xorg-x11-libs-x86-7.4-8.26.49.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42085" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libs fixes several issues.

These security issues were fixed:

- CVE-2017-16612: Heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586681" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586682" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586683" comment="xorg-x11-libs-x86-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586681" comment="xorg-x11-libs-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586682" comment="xorg-x11-libs-32bit-7.4-8.26.50.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586683" comment="xorg-x11-libs-x86-7.4-8.26.50.5.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42086" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1103511" ref_url="https://bugzilla.suse.com/1103511" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004579.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-libs fixes the following security issue:

- CVE-2015-9262: _XcursorThemeInherits allowed remote attackers to cause denial
  of service or potentially code execution via a one-byte heap overflow
  (bsc#1103511)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586684" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586685" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586686" comment="xorg-x11-libs-x86-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586684" comment="xorg-x11-libs-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586685" comment="xorg-x11-libs-32bit-7.4-8.26.50.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586686" comment="xorg-x11-libs-x86-7.4-8.26.50.8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42087" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="981044" ref_url="https://bugzilla.suse.com/981044" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security issues:

- CVE-2017-2624: Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)

Non security issues:

- Use arc4random to generate cookies. (bsc#1025084)
- XDrawArc performance improvement (bsc#1019649)
- Fix byte swapping for gradeint stops (bsc#981044).
- Remove unused function with use-after-free issue. (bsc#1025035)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981044">SUSE bug 981044</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586687" comment="xorg-x11-Xvnc-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586688" comment="xorg-x11-server-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586689" comment="xorg-x11-server-extra-7.4-27.118.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586687" comment="xorg-x11-Xvnc-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586688" comment="xorg-x11-server-7.4-27.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586689" comment="xorg-x11-server-extra-7.4-27.118.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42088" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-12"/>
	<updated date="2017-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586690" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586691" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586692" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586690" comment="xorg-x11-Xvnc-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586691" comment="xorg-x11-server-7.4-27.121.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586692" comment="xorg-x11-server-extra-7.4-27.121.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42089" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides several fixes.

These security issues were fixed:

- CVE-2017-13723: Prevent local DoS via unusual characters in XkbAtomText and
  XkbStringText (bsc#1051150).
- Improve the entropy when generating random data used in X.org server authorization
  cookies generation by using getentropy() and getrandom() when available (bsc#1025084)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586693" comment="xorg-x11-Xvnc-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586694" comment="xorg-x11-server-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586695" comment="xorg-x11-server-extra-7.4-27.122.16.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586693" comment="xorg-x11-Xvnc-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586694" comment="xorg-x11-server-7.4-27.122.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586695" comment="xorg-x11-server-extra-7.4-27.122.16.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42090" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1078383" ref_url="https://bugzilla.suse.com/1078383" source="BUGZILLA"/>
		<reference ref_id="1111697" ref_url="https://bugzilla.suse.com/1111697" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fix:

Security issue fixed:

- CVE-2018-14665: Local attackers could overwrite system files in any directory using the -logfile option and gain privileges (bsc#1111697)

Non security issues fixed:

- Do not write past the allocated buffer. (bsc#1078383)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078383">SUSE bug 1078383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586696" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586697" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586698" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586696" comment="xorg-x11-Xvnc-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586697" comment="xorg-x11-server-7.4-27.122.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586698" comment="xorg-x11-server-extra-7.4-27.122.21.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42091" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586699" comment="xorg-x11-Xvnc-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586700" comment="xorg-x11-server-7.4-27.122.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586701" comment="xorg-x11-server-extra-7.4-27.122.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42092" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586702" comment="xorg-x11-Xvnc-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586703" comment="xorg-x11-server-7.4-27.122.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586704" comment="xorg-x11-server-extra-7.4-27.122.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42093" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586705" comment="xorg-x11-Xvnc-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586706" comment="xorg-x11-server-7.4-27.122.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586707" comment="xorg-x11-server-extra-7.4-27.122.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42094" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586708" comment="xorg-x11-Xvnc-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586709" comment="xorg-x11-server-7.4-27.122.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586710" comment="xorg-x11-server-extra-7.4-27.122.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42095" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659915" comment="xorg-x11-Xvnc-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659916" comment="xorg-x11-server-7.4-27.122.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659917" comment="xorg-x11-server-extra-7.4-27.122.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42096" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009924.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660950" comment="xorg-x11-Xvnc-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660951" comment="xorg-x11-server-7.4-27.122.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660952" comment="xorg-x11-server-extra-7.4-27.122.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42097" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009581822" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42098" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:14747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009009.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586711" comment="xterm-238-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42099" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679347" comment="liblzma5-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679348" comment="liblzma5-32bit-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679349" comment="xz-5.0.3-0.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679350" comment="xz-lang-5.0.3-0.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42100" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-storage (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="937942" ref_url="https://bugzilla.suse.com/937942" source="BUGZILLA"/>
		<reference ref_id="984245" ref_url="https://bugzilla.suse.com/984245" source="BUGZILLA"/>
		<reference ref_id="986971" ref_url="https://bugzilla.suse.com/986971" source="BUGZILLA"/>
		<reference ref_id="996208" ref_url="https://bugzilla.suse.com/996208" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5746" ref_url="https://www.suse.com/security/cve/CVE-2016-5746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002284.html" source="SUSE-SU"/>
		<description>

This update for yast2-storage provides the following fixes:

Security issues fixed:
- Use standard IPC, and not temporary files, to pass passwords between processes.
  (bsc#986971, CVE-2016-5746)

Non security bugs fixed:
- Fix usage of complete multipath disk as LVM physical volume. (bsc#984245)
- Load the correct multipath module (dm-multipath). (bsc#937942)
- Improve message for creating volumes with a filesystem but without a mount point.
  (bsc#996208)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-09-23"/>
	<updated date="2016-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/937942">SUSE bug 937942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984245">SUSE bug 984245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986971">SUSE bug 986971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996208">SUSE bug 996208</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5746/">CVE-2016-5746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586712" comment="yast2-storage-2.17.161-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586713" comment="yast2-storage-lib-2.17.161-5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586712" comment="yast2-storage-2.17.161-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586713" comment="yast2-storage-lib-2.17.161-5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42101" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<description>

This update for zlib fixes the following issues:

  * Incompatible declarations for external linkage function deflate (bnc#1003577)
  * CVE-2016-9842: Undefined Left Shift of Negative Number (bnc#1003580) 
  * CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bnc#1003579)
  * CVE-2016-9843: Big-endian out-of-bounds pointer
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586714" comment="zlib-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586715" comment="zlib-32bit-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586716" comment="zlib-x86-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009586714" comment="zlib-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586715" comment="zlib-32bit-1.2.7-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586716" comment="zlib-x86-1.2.7-0.14.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42102" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677181" comment="zlib-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677182" comment="zlib-32bit-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677953" comment="zlib-devel-1.2.7-0.17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677954" comment="zlib-devel-32bit-1.2.7-0.17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42103" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 11 SP4</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003952.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-1100: Fixed a buffer overflow in
  utils.c:checkmailpath() that could lead to local arbitrary code
  execution ( bsc#1089030)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:11:sp4</cpe>
		<cpe>cpe:/o:suse:suse_sles:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586717" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009258811" comment="SUSE Linux Enterprise Server for SAP Applications 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009586717" comment="zsh-4.3.6-67.9.3.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42104" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 11 SP4-LTSS</platform>
		</affected>
		<reference ref_id="1082885" ref_url="https://bugzilla.suse.com/1082885" source="BUGZILLA"/>
		<reference ref_id="1082975" ref_url="https://bugzilla.suse.com/1082975" source="BUGZILLA"/>
		<reference ref_id="1082977" ref_url="https://bugzilla.suse.com/1082977" source="BUGZILLA"/>
		<reference ref_id="1082991" ref_url="https://bugzilla.suse.com/1082991" source="BUGZILLA"/>
		<reference ref_id="1082998" ref_url="https://bugzilla.suse.com/1082998" source="BUGZILLA"/>
		<reference ref_id="1083002" ref_url="https://bugzilla.suse.com/1083002" source="BUGZILLA"/>
		<reference ref_id="1083250" ref_url="https://bugzilla.suse.com/1083250" source="BUGZILLA"/>
		<reference ref_id="1084656" ref_url="https://bugzilla.suse.com/1084656" source="BUGZILLA"/>
		<reference ref_id="1087026" ref_url="https://bugzilla.suse.com/1087026" source="BUGZILLA"/>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070/" source="CVE"/>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2019-20044: Fixed an insecure dropping of privileges when unsetting
  the PRIVILEGED option (bsc#1163882).
- CVE-2018-13259: Fixed an unexpected truncation of long shebang lines (bsc#1107294).
- CVE-2018-7549: Fixed a crash when an empty hash table (bsc#1082991).
- CVE-2018-1083: Fixed a stack-based buffer overflow when using tab completion
  on directories with long names (bsc#1087026).
- CVE-2018-1071: Fixed a stack-based buffer overflow when executing certain
  commands (bsc#1084656).
- CVE-2018-0502: Fixed a mishandling of shebang lines (bsc#1107296).
- CVE-2017-18206: Fixed a buffer overflow related to symlink processing (bsc#1083002).
- CVE-2017-18205: Fixed an application crash when using cd with no
  arguments (bsc#1082998).
- CVE-2016-10714: Fixed a potential application crash when handling maximum
  length paths (bsc#1083250).
- CVE-2014-10072: Fixed a buffer overflow when scanning very long directory
  paths for symbolic links (bsc#1082975).
- CVE-2014-10071: Fixed a buffer overflow when redirecting output to a long
  file descriptor (bsc#1082977).
- CVE-2014-10070: Fixed a privilege escalation vulnerability via environment
  variables (bsc#1082885).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sles_ltss:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117413" comment="SUSE Linux Enterprise Server 11 SP4-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671297" comment="zsh-4.3.6-67.9.8.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143420" version="1" comment="LibVNCServer is &lt;0.9.1-154.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060800" version="1" comment="sles-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059483" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059482" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156399" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156400" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.22.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156401" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.16.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054497" version="1" comment="OpenEXR is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054495" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054496" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156402" version="1" comment="PackageKit is &lt;0.3.14-2.12.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156403" version="1" comment="PackageKit-lang is &lt;0.3.14-2.12.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156404" version="1" comment="hal is &lt;0.5.12-23.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156405" version="1" comment="hal-32bit is &lt;0.5.12-23.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156406" version="1" comment="hal-doc is &lt;0.5.12-23.40.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156407" version="1" comment="hal-x86 is &lt;0.5.12-23.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156408" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.12.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156409" version="1" comment="yast2-core is &lt;2.17.35-0.2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156410" version="1" comment="PolicyKit is &lt;0.9-14.34.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156411" version="1" comment="PolicyKit-32bit is &lt;0.9-14.34.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156412" version="1" comment="PolicyKit-doc is &lt;0.9-14.34.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156413" version="1" comment="PolicyKit-x86 is &lt;0.9-14.34.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156414" version="1" comment="amavisd-new is &lt;2.6.2-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156415" version="1" comment="apache2 is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156416" version="1" comment="apache2-doc is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156417" version="1" comment="apache2-example-pages is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156418" version="1" comment="apache2-prefork is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156419" version="1" comment="apache2-utils is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156420" version="1" comment="apache2-worker is &lt;2.2.10-2.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143445" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058031" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111688" version="1" comment="php5 is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058032" version="1" comment="php5-bcmath is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058033" version="1" comment="php5-bz2 is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058034" version="1" comment="php5-calendar is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058035" version="1" comment="php5-ctype is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058036" version="1" comment="php5-curl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058037" version="1" comment="php5-dba is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058038" version="1" comment="php5-dbase is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058039" version="1" comment="php5-dom is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058040" version="1" comment="php5-exif is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058041" version="1" comment="php5-fastcgi is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058042" version="1" comment="php5-ftp is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058043" version="1" comment="php5-gd is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058044" version="1" comment="php5-gettext is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058045" version="1" comment="php5-gmp is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058046" version="1" comment="php5-hash is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058047" version="1" comment="php5-iconv is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058048" version="1" comment="php5-json is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058049" version="1" comment="php5-ldap is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058050" version="1" comment="php5-mbstring is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058051" version="1" comment="php5-mcrypt is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058052" version="1" comment="php5-mysql is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058053" version="1" comment="php5-odbc is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058054" version="1" comment="php5-openssl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058055" version="1" comment="php5-pcntl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058056" version="1" comment="php5-pdo is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058057" version="1" comment="php5-pear is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058058" version="1" comment="php5-pgsql is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058059" version="1" comment="php5-pspell is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058060" version="1" comment="php5-shmop is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058061" version="1" comment="php5-snmp is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058062" version="1" comment="php5-soap is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058063" version="1" comment="php5-suhosin is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058064" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058065" version="1" comment="php5-sysvsem is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058066" version="1" comment="php5-sysvshm is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058067" version="1" comment="php5-tokenizer is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058068" version="1" comment="php5-wddx is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058069" version="1" comment="php5-xmlreader is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058070" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058071" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058072" version="1" comment="php5-xsl is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058073" version="1" comment="php5-zip is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058074" version="1" comment="php5-zlib is &lt;5.2.6-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144309" version="1" comment="avahi is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144310" version="1" comment="avahi-lang is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144311" version="1" comment="avahi-utils is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144312" version="1" comment="libavahi-client3 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144313" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144314" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144315" version="1" comment="libavahi-common3 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144316" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144317" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144318" version="1" comment="libavahi-core5 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144319" version="1" comment="libdns_sd is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144320" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144321" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057433" version="1" comment="bind is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057427" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057428" version="1" comment="bind-doc is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057431" version="1" comment="bind-libs is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057429" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057430" version="1" comment="bind-libs-x86 is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057432" version="1" comment="bind-utils is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144329" version="1" comment="boost-license is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144330" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144331" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144332" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156421" version="1" comment="bzip2 is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156422" version="1" comment="bzip2-doc is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156423" version="1" comment="libbz2-1 is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156424" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156425" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.246" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156426" version="1" comment="cifs-mount is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156427" version="1" comment="ldapsmb is &lt;1.34b-11.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156428" version="1" comment="libsmbclient0 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156429" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156430" version="1" comment="libsmbclient0-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156431" version="1" comment="libtalloc1 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156432" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156433" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156434" version="1" comment="libtdb1 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156435" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156436" version="1" comment="libtdb1-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156437" version="1" comment="libwbclient0 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156438" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156439" version="1" comment="libwbclient0-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156440" version="1" comment="samba is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156441" version="1" comment="samba-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156442" version="1" comment="samba-client is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156443" version="1" comment="samba-client-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156444" version="1" comment="samba-client-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156445" version="1" comment="samba-krb-printing is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156446" version="1" comment="samba-winbind is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156447" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156448" version="1" comment="samba-winbind-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156449" version="1" comment="samba-x86 is &lt;3.4.3-1.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107268" version="1" comment="clamav is &lt;0.96-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143519" version="1" comment="coolkey is &lt;1.1.0-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156450" version="1" comment="cron is &lt;4.1-194.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058945" version="1" comment="cups is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058941" version="1" comment="cups-client is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058944" version="1" comment="cups-libs is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058942" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058943" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156451" version="1" comment="curl is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156452" version="1" comment="libcurl4 is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156453" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156454" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.24.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055776" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055777" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055778" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156455" version="1" comment="dbus-1 is &lt;1.2.10-3.11.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156456" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.11.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156457" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.11.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156458" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.11.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156459" version="1" comment="dhcp is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156460" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156461" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156462" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.3.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156463" version="1" comment="e2fsprogs is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156464" version="1" comment="libcom_err2 is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156465" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156466" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156467" version="1" comment="libext2fs2 is &lt;1.41.9-2.1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156468" version="1" comment="emacs is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156469" version="1" comment="emacs-el is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156470" version="1" comment="emacs-info is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156471" version="1" comment="emacs-nox is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156472" version="1" comment="emacs-x11 is &lt;22.3-4.32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156473" version="1" comment="enscript is &lt;1.6.4-152.17.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156474" version="1" comment="evince is &lt;2.28.2-0.2.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156475" version="1" comment="evince-doc is &lt;2.28.2-0.2.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156476" version="1" comment="evince-lang is &lt;2.28.2-0.2.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156477" version="1" comment="evolution-data-server is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156478" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156479" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156480" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057200" version="1" comment="expat is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057203" version="1" comment="libexpat1 is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057201" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057202" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053783" version="1" comment="fetchmail is &lt;6.3.8.90-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053784" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156481" version="1" comment="file is &lt;4.24-43.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156482" version="1" comment="file-32bit is &lt;4.24-43.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156483" version="1" comment="file-x86 is &lt;4.24-43.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156484" version="1" comment="findutils is &lt;4.4.0-38.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156485" version="1" comment="findutils-locate is &lt;4.4.0-38.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156486" version="1" comment="freeradius-server is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144357" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144358" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144359" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144360" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156487" version="1" comment="freetype2 is &lt;2.3.7-25.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156488" version="1" comment="freetype2-32bit is &lt;2.3.7-25.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156489" version="1" comment="freetype2-x86 is &lt;2.3.7-25.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144361" version="1" comment="ft2demos is &lt;2.3.7-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060019" version="1" comment="fuse is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060020" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143559" version="1" comment="fvwm2 is &lt;2.5.26-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143560" version="1" comment="g3utils is &lt;1.1.36-26.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143561" version="1" comment="mgetty is &lt;1.1.36-26.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143562" version="1" comment="gd is &lt;2.0.36.RC1-52.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156490" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156491" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156492" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156493" version="1" comment="ghostscript-library is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156494" version="1" comment="ghostscript-omni is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156495" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156496" version="1" comment="libgimpprint is &lt;4.2.7-32.27.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144362" version="1" comment="glib2 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144363" version="1" comment="glib2-doc is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144364" version="1" comment="glib2-lang is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144365" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144366" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144367" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144368" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144369" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144370" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144371" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144372" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144373" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144374" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144375" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144376" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144377" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144378" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144379" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058364" version="1" comment="gmime is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143597" version="1" comment="gmime-2_4 is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058363" version="1" comment="gmime-doc is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058365" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143600" version="1" comment="libgmime-2_4-2 is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156497" version="1" comment="gnome-screensaver is &lt;2.28.3-0.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156498" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054538" version="1" comment="gnutls is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054541" version="1" comment="libgnutls26 is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054539" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054540" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156499" version="1" comment="gpg2 is &lt;2.0.9-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156500" version="1" comment="gpg2-lang is &lt;2.0.9-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156501" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156502" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156503" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156504" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156505" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156506" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156507" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156508" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156509" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156510" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156511" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.25-1.1.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156512" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.17-1.1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156513" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.17-1.1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156514" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.17-1.1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156515" version="1" comment="gtk2 is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156516" version="1" comment="gtk2-32bit is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156517" version="1" comment="gtk2-doc is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156518" version="1" comment="gtk2-lang is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156519" version="1" comment="gtk2-x86 is &lt;2.18.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156520" version="1" comment="gvim is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156521" version="1" comment="vim is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156522" version="1" comment="vim-base is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156523" version="1" comment="vim-data is &lt;7.2-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057426" version="1" comment="gzip is &lt;1.3.12-69.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156524" version="1" comment="hplip is &lt;3.9.8-3.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156525" version="1" comment="hplip-hpijs is &lt;3.9.8-3.4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143631" version="1" comment="ipsec-tools is &lt;0.7.3-1.1.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057171" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057169" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057170" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156526" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156527" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156528" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156529" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156530" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr7.0-1.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156531" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143634" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.8.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156532" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156533" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156534" version="1" comment="kdm is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156535" version="1" comment="kwin is &lt;4.3.5-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143639" version="1" comment="kdebase3-runtime is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143640" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143641" version="1" comment="kdebase3-runtime-x86 is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056569" version="1" comment="kdelibs3 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056564" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056567" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056565" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056566" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056568" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156536" version="1" comment="kdelibs4 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156537" version="1" comment="kdelibs4-core is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156538" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156539" version="1" comment="libkde4 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156540" version="1" comment="libkde4-32bit is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156541" version="1" comment="libkde4-x86 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156542" version="1" comment="libkdecore4 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156543" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156544" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.2.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156545" version="1" comment="kernel-default is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156546" version="1" comment="kernel-default-base is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156547" version="1" comment="kernel-default-devel is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156548" version="1" comment="kernel-default-man is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156549" version="1" comment="kernel-pae is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156550" version="1" comment="kernel-pae-base is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156551" version="1" comment="kernel-pae-devel is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156552" version="1" comment="kernel-ppc64 is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156553" version="1" comment="kernel-ppc64-base is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156554" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156555" version="1" comment="kernel-source is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156556" version="1" comment="kernel-syms is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156557" version="1" comment="kernel-trace is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156558" version="1" comment="kernel-trace-base is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156559" version="1" comment="kernel-trace-devel is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156560" version="1" comment="kernel-xen is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156561" version="1" comment="kernel-xen-base is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156562" version="1" comment="kernel-xen-devel is &lt;2.6.32.12-0.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059529" version="1" comment="krb5 is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059523" version="1" comment="krb5-32bit is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059524" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059525" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059526" version="1" comment="krb5-client is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059527" version="1" comment="krb5-server is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059528" version="1" comment="krb5-x86 is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144432" version="1" comment="krb5-doc is &lt;1.6.3-133.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144433" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144434" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156563" version="1" comment="kvm is &lt;0.12.3-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143670" version="1" comment="lcms is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143671" version="1" comment="liblcms1 is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143672" version="1" comment="liblcms1-32bit is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143673" version="1" comment="liblcms1-x86 is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111684" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111747" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156564" version="1" comment="libQtWebKit4 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156565" version="1" comment="libQtWebKit4-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156566" version="1" comment="libQtWebKit4-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156567" version="1" comment="libqt4 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156568" version="1" comment="libqt4-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156569" version="1" comment="libqt4-qt3support is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156570" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156571" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156572" version="1" comment="libqt4-sql is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156573" version="1" comment="libqt4-sql-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156574" version="1" comment="libqt4-sql-mysql is &lt;4.6.2-1.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156575" version="1" comment="libqt4-sql-sqlite is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156576" version="1" comment="libqt4-sql-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156577" version="1" comment="libqt4-x11 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156578" version="1" comment="libqt4-x11-32bit is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156579" version="1" comment="libqt4-x11-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156580" version="1" comment="libqt4-x86 is &lt;4.6.2-1.6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156581" version="1" comment="qt4-x11-tools is &lt;4.6.2-1.6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143717" version="1" comment="libadns1 is &lt;1.4-73.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055474" version="1" comment="libapr-util1 is &lt;1.3.4-12.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055473" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055476" version="1" comment="libapr1 is &lt;1.3.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055475" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143718" version="1" comment="libarchive2 is &lt;2.5.5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156582" version="1" comment="libdrm is &lt;2.4.17-0.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156583" version="1" comment="libdrm-32bit is &lt;2.4.17-0.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156584" version="1" comment="libdrm-x86 is &lt;2.4.17-0.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144466" version="1" comment="libexif is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144467" version="1" comment="libexif-32bit is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144468" version="1" comment="libexif-x86 is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143723" version="1" comment="libexiv2-4 is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144469" version="1" comment="libgtop is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144470" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144471" version="1" comment="libgtop-doc is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144472" version="1" comment="libgtop-lang is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156585" version="1" comment="libicu is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156586" version="1" comment="libicu-32bit is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156587" version="1" comment="libicu-doc is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144473" version="1" comment="libicu-x86 is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057091" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057089" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057090" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057094" version="1" comment="libtool is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057092" version="1" comment="libtool-32bit is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057093" version="1" comment="libtool-x86 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143739" version="1" comment="libmusicbrainz4 is &lt;2.1.5-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111740" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111752" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111781" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111741" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111742" version="1" comment="mysql is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111743" version="1" comment="mysql-Max is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111744" version="1" comment="mysql-client is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055774" version="1" comment="libneon27 is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055772" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055773" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055775" version="1" comment="neon is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058587" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058585" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058586" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058588" version="1" comment="netpbm is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032233" version="1" comment="libopensc2 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032231" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032232" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032236" version="1" comment="opensc is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032234" version="1" comment="opensc-32bit is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032235" version="1" comment="opensc-x86 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156588" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156589" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156590" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156591" version="1" comment="openssl is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156592" version="1" comment="openssl-doc is &lt;0.9.8h-30.27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053357" version="1" comment="libpng12-0 is &lt;1.2.31-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053355" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053356" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156593" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156594" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156595" version="1" comment="libpoppler5 is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156596" version="1" comment="poppler-tools is &lt;0.12.3-1.2.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156597" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156598" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156599" version="1" comment="libpulse0 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156600" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156601" version="1" comment="libpulse0-x86 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156602" version="1" comment="pulseaudio is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156603" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156604" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156605" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156606" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156607" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156608" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061430" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061429" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156609" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156610" version="1" comment="python-base is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156611" version="1" comment="python-base-32bit is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156612" version="1" comment="python-base-x86 is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156613" version="1" comment="python-xml is &lt;2.6.0-8.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143870" version="1" comment="pyxml is &lt;0.8.4-194.23.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143768" version="1" comment="librpcsecgss is &lt;0.18-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156614" version="1" comment="libtirpc1 is &lt;0.2.1-1.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143770" version="1" comment="libsamplerate is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143771" version="1" comment="libsamplerate-32bit is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143772" version="1" comment="libsamplerate-x86 is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156615" version="1" comment="libsndfile is &lt;1.0.20-2.1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156616" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156617" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156618" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156619" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156620" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156621" version="1" comment="net-snmp is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156622" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156623" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156624" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.1.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156625" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.1.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156626" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.1.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054051" version="1" comment="libtiff3 is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054049" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054050" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054052" version="1" comment="tiff is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156627" version="1" comment="libvirt is &lt;0.7.6-1.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156628" version="1" comment="libvirt-doc is &lt;0.7.6-1.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156629" version="1" comment="libvirt-python is &lt;0.7.6-1.9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156630" version="1" comment="libvorbis is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156631" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156632" version="1" comment="libvorbis-doc is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156633" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156634" version="1" comment="libxml2 is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156635" version="1" comment="libxml2-32bit is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156636" version="1" comment="libxml2-doc is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156637" version="1" comment="libxml2-x86 is &lt;2.7.6-0.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144499" version="1" comment="libxslt is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144500" version="1" comment="libxslt-32bit is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144501" version="1" comment="libxslt-x86 is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143802" version="1" comment="log4net is &lt;1.2.10-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156638" version="1" comment="mailman is &lt;2.1.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143806" version="1" comment="man is &lt;2.5.2-17.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111692" version="1" comment="mono-core is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111693" version="1" comment="mono-data is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111694" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111695" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111696" version="1" comment="mono-locale-extras is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111697" version="1" comment="mono-nunit is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111698" version="1" comment="mono-web is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111699" version="1" comment="mono-winforms is &lt;2.0.1-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059481" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059477" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059478" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059479" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059480" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156639" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156640" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156641" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156642" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156643" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111745" version="1" comment="mutt is &lt;1.5.17-42.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053628" version="1" comment="nagios is &lt;3.0.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053627" version="1" comment="nagios-www is &lt;3.0.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144505" version="1" comment="nagios-plugins is &lt;1.4.13-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144506" version="1" comment="nagios-plugins-extras is &lt;1.4.13-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156644" version="1" comment="ntp is &lt;4.2.4p8-1.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156645" version="1" comment="ntp-doc is &lt;4.2.4p8-1.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156646" version="1" comment="openssh is &lt;5.1p1-41.31.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156647" version="1" comment="openssh-askpass is &lt;5.1p1-41.31.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054997" version="1" comment="openswan is &lt;2.6.16-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054996" version="1" comment="openswan-doc is &lt;2.6.16-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144517" version="1" comment="openvpn is &lt;2.0.9-143.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144518" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156648" version="1" comment="pam is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156649" version="1" comment="pam-32bit is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156650" version="1" comment="pam-doc is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156651" version="1" comment="pam-x86 is &lt;1.0.4-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144519" version="1" comment="pam_krb5 is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144520" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144521" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143844" version="1" comment="pam_ldap is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143845" version="1" comment="pam_ldap-32bit is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143846" version="1" comment="pam_ldap-x86 is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144522" version="1" comment="pam_mount is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144523" version="1" comment="pam_mount-32bit is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144524" version="1" comment="pam_mount-x86 is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156652" version="1" comment="perl is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156653" version="1" comment="perl-32bit is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156654" version="1" comment="perl-base is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156655" version="1" comment="perl-doc is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156656" version="1" comment="perl-x86 is &lt;5.10.0-64.47.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056793" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143857" version="1" comment="perl-Tk is &lt;804.028-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156657" version="1" comment="perl-spamassassin is &lt;3.2.5-26.22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156658" version="1" comment="spamassassin is &lt;3.2.5-26.22.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057282" version="1" comment="postgresql is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057276" version="1" comment="postgresql-contrib is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057277" version="1" comment="postgresql-docs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057280" version="1" comment="postgresql-libs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057278" version="1" comment="postgresql-libs-32bit is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057279" version="1" comment="postgresql-libs-x86 is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057281" version="1" comment="postgresql-server is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156659" version="1" comment="puppet is &lt;0.24.8-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156660" version="1" comment="puppet-server is &lt;0.24.8-1.3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156661" version="1" comment="python is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156662" version="1" comment="python-32bit is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156663" version="1" comment="python-curses is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156664" version="1" comment="python-demo is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156665" version="1" comment="python-gdbm is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156666" version="1" comment="python-idle is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156667" version="1" comment="python-tk is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156668" version="1" comment="python-x86 is &lt;2.6.0-8.9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143871" version="1" comment="qt3 is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143872" version="1" comment="qt3-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143873" version="1" comment="qt3-x86 is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156669" version="1" comment="quagga is &lt;0.99.15-0.1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156670" version="1" comment="rsync is &lt;3.0.4-2.33.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156671" version="1" comment="ruby is &lt;1.8.7.p72-5.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156672" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156673" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059011" version="1" comment="squid is &lt;2.7.STABLE5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156674" version="1" comment="star is &lt;1.5final-28.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058612" version="1" comment="sudo is &lt;1.6.9p17-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156675" version="1" comment="syslog-ng is &lt;2.0.9-27.27.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156676" version="1" comment="sysstat is &lt;8.1.5-7.9.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156677" version="1" comment="sysstat-isag is &lt;8.1.5-7.9.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156678" version="1" comment="systemtap is &lt;1.0-0.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156679" version="1" comment="systemtap-client is &lt;1.0-0.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156680" version="1" comment="systemtap-server is &lt;1.0-0.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060021" version="1" comment="tar is &lt;1.20-23.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143901" version="1" comment="unrar is &lt;3.80.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156681" version="1" comment="unzip is &lt;5.52-142.23.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156682" version="1" comment="w3m is &lt;0.5.2-132.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111746" version="1" comment="wget is &lt;1.11.4-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058844" version="1" comment="wireshark is &lt;1.0.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143905" version="1" comment="xdg-utils is &lt;1.0.2-36.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156683" version="1" comment="xen is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156684" version="1" comment="xen-doc-html is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156685" version="1" comment="xen-doc-pdf is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156686" version="1" comment="xen-kmp-default is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156687" version="1" comment="xen-kmp-pae is &lt;4.0.0_21091_04_2.6.32.12_0.7-0.2.6" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156688" version="1" comment="xen-libs is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156689" version="1" comment="xen-tools is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156690" version="1" comment="xen-tools-domU is &lt;4.0.0_21091_04-0.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156691" version="1" comment="xorg-x11 is &lt;7.4-9.24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156692" version="1" comment="xorg-x11-xauth is &lt;7.4-9.24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156693" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156694" version="1" comment="xorg-x11-server is &lt;7.4-27.19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156695" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.19.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054103" version="1" comment="xpdf-tools is &lt;3.02-138.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143924" version="1" comment="xterm is &lt;238-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562777" version="1" comment="zoo is &lt;2.10-911.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073673" version="1" comment="sles-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072845" version="1" comment="MozillaFirefox is &lt;10.0-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072844" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144250" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144251" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143428" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144252" version="1" comment="PackageKit is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144253" version="1" comment="PackageKit-lang is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144254" version="1" comment="hal is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144255" version="1" comment="hal-32bit is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144256" version="1" comment="hal-doc is &lt;0.5.12-23.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144257" version="1" comment="hal-x86 is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144258" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144259" version="1" comment="PolicyKit is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144260" version="1" comment="PolicyKit-32bit is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143438" version="1" comment="PolicyKit-doc is &lt;0.9-14.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144261" version="1" comment="PolicyKit-x86 is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144262" version="1" comment="aaa_base is &lt;11-6.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144263" version="1" comment="acpid is &lt;1.0.6-91.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143442" version="1" comment="amavisd-new is &lt;2.7.0-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072163" version="1" comment="apache2 is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072158" version="1" comment="apache2-doc is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072159" version="1" comment="apache2-example-pages is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072160" version="1" comment="apache2-prefork is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072161" version="1" comment="apache2-utils is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072162" version="1" comment="apache2-worker is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076368" version="1" comment="apache2-mod_jk is &lt;1.2.26-1.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068818" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111789" version="1" comment="php5 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068819" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068820" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068821" version="1" comment="php5-calendar is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068822" version="1" comment="php5-ctype is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068823" version="1" comment="php5-curl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068824" version="1" comment="php5-dba is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068825" version="1" comment="php5-dbase is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068826" version="1" comment="php5-dom is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068827" version="1" comment="php5-exif is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068828" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068829" version="1" comment="php5-ftp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068830" version="1" comment="php5-gd is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068831" version="1" comment="php5-gettext is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068832" version="1" comment="php5-gmp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068833" version="1" comment="php5-hash is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068834" version="1" comment="php5-iconv is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068835" version="1" comment="php5-json is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068836" version="1" comment="php5-ldap is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068837" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068838" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068839" version="1" comment="php5-mysql is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068840" version="1" comment="php5-odbc is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068841" version="1" comment="php5-openssl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068842" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068843" version="1" comment="php5-pdo is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068844" version="1" comment="php5-pear is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068845" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068846" version="1" comment="php5-pspell is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068847" version="1" comment="php5-shmop is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068848" version="1" comment="php5-snmp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068849" version="1" comment="php5-soap is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068850" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068851" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068852" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068853" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068854" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068855" version="1" comment="php5-wddx is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068856" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068857" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068858" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068859" version="1" comment="php5-xsl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068860" version="1" comment="php5-zip is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068861" version="1" comment="php5-zlib is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144264" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144265" version="1" comment="php53 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144266" version="1" comment="php53-bcmath is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144267" version="1" comment="php53-bz2 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144268" version="1" comment="php53-calendar is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144269" version="1" comment="php53-ctype is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144270" version="1" comment="php53-curl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144271" version="1" comment="php53-dba is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144272" version="1" comment="php53-dom is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144273" version="1" comment="php53-exif is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144274" version="1" comment="php53-fastcgi is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144275" version="1" comment="php53-fileinfo is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144276" version="1" comment="php53-ftp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144277" version="1" comment="php53-gd is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144278" version="1" comment="php53-gettext is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144279" version="1" comment="php53-gmp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144280" version="1" comment="php53-iconv is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144281" version="1" comment="php53-intl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144282" version="1" comment="php53-json is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144283" version="1" comment="php53-ldap is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144284" version="1" comment="php53-mbstring is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144285" version="1" comment="php53-mcrypt is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144286" version="1" comment="php53-mysql is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144287" version="1" comment="php53-odbc is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144288" version="1" comment="php53-openssl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144289" version="1" comment="php53-pcntl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144290" version="1" comment="php53-pdo is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144291" version="1" comment="php53-pear is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144292" version="1" comment="php53-pgsql is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144293" version="1" comment="php53-pspell is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144294" version="1" comment="php53-shmop is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144295" version="1" comment="php53-snmp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144296" version="1" comment="php53-soap is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144297" version="1" comment="php53-suhosin is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144298" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144299" version="1" comment="php53-sysvsem is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144300" version="1" comment="php53-sysvshm is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144301" version="1" comment="php53-tokenizer is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144302" version="1" comment="php53-wddx is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144303" version="1" comment="php53-xmlreader is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144304" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144305" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144306" version="1" comment="php53-xsl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144307" version="1" comment="php53-zip is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144308" version="1" comment="php53-zlib is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144322" version="1" comment="bind is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144323" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144324" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144325" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144326" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144327" version="1" comment="bind-libs-x86 is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144328" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111700" version="1" comment="bzip2 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111701" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111702" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111748" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111773" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144333" version="1" comment="cifs-utils is &lt;5.1-0.4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071561" version="1" comment="clamav is &lt;0.97.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144334" version="1" comment="cron is &lt;4.1-194.199.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070960" version="1" comment="cups is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070956" version="1" comment="cups-client is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070959" version="1" comment="cups-libs is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070957" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070958" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072828" version="1" comment="curl is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072831" version="1" comment="libcurl4 is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072829" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072830" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071558" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071559" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071560" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144335" version="1" comment="dbus-1 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144336" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144337" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144338" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143534" version="1" comment="dbus-1-glib is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143535" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143536" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144339" version="1" comment="dhcp is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144340" version="1" comment="dhcp-client is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144341" version="1" comment="dhcp-relay is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144342" version="1" comment="dhcp-server is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144343" version="1" comment="dhcpcd is &lt;3.2.3-44.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067078" version="1" comment="dhcpv6 is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144344" version="1" comment="e2fsprogs is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144345" version="1" comment="libcom_err2 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144346" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144347" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144348" version="1" comment="libext2fs2 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069763" version="1" comment="ecryptfs-utils is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069761" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069762" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065506" version="1" comment="ed is &lt;0.2-1001.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143546" version="1" comment="emacs is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143547" version="1" comment="emacs-el is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143548" version="1" comment="emacs-info is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143549" version="1" comment="emacs-nox is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143550" version="1" comment="emacs-x11 is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143551" version="1" comment="enscript is &lt;1.6.4-152.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111794" version="1" comment="evince is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111795" version="1" comment="evince-doc is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111796" version="1" comment="evince-lang is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144349" version="1" comment="evolution-data-server is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144350" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144351" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144352" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070961" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070962" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144353" version="1" comment="file is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144354" version="1" comment="file-32bit is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144355" version="1" comment="file-x86 is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143555" version="1" comment="findutils is &lt;4.4.0-38.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143556" version="1" comment="findutils-locate is &lt;4.4.0-38.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069764" version="1" comment="foomatic-filters is &lt;3.0.2-269.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144356" version="1" comment="freeradius-server is &lt;2.1.1-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072124" version="1" comment="freetype2 is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072122" version="1" comment="freetype2-32bit is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072123" version="1" comment="freetype2-x86 is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066589" version="1" comment="fuse is &lt;2.7.2-61.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066591" version="1" comment="libfuse2 is &lt;2.7.2-61.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061853" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061854" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061855" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061856" version="1" comment="ghostscript-library is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061857" version="1" comment="ghostscript-omni is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061858" version="1" comment="ghostscript-x11 is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061859" version="1" comment="libgimpprint is &lt;4.2.7-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144380" version="1" comment="glibc is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144381" version="1" comment="glibc-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144382" version="1" comment="glibc-devel is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144383" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144384" version="1" comment="glibc-html is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144385" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144386" version="1" comment="glibc-info is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144387" version="1" comment="glibc-locale is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144388" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144389" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144390" version="1" comment="glibc-profile is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144391" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144392" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144393" version="1" comment="glibc-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144394" version="1" comment="nscd is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143596" version="1" comment="gmime is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143598" version="1" comment="gmime-doc is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143599" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144395" version="1" comment="gnome-screensaver is &lt;2.28.3-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144396" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072750" version="1" comment="gnutls is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072753" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072751" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072752" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144397" version="1" comment="gpg2 is &lt;2.0.9-25.33.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144398" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143605" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143606" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143607" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143608" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143609" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143610" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143611" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143612" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143613" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143614" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143615" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143616" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143617" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143618" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144399" version="1" comment="gtk2 is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144400" version="1" comment="gtk2-32bit is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144401" version="1" comment="gtk2-doc is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144402" version="1" comment="gtk2-lang is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144403" version="1" comment="gtk2-x86 is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143623" version="1" comment="gvim is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143624" version="1" comment="vim is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143625" version="1" comment="vim-base is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143626" version="1" comment="vim-data is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071605" version="1" comment="hplip is &lt;3.11.10-0.6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071604" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070093" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070091" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070092" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144404" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144405" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144406" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144407" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144408" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143632" version="1" comment="kbd is &lt;1.14.1-16.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144409" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144410" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144411" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144412" version="1" comment="kdm is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144413" version="1" comment="kwin is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068608" version="1" comment="kdelibs4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068606" version="1" comment="kdelibs4-core is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068607" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068611" version="1" comment="libkde4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068609" version="1" comment="libkde4-32bit is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068610" version="1" comment="libkde4-x86 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068614" version="1" comment="libkdecore4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068612" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068613" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065196" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065197" version="1" comment="kget is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065198" version="1" comment="kopete is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065199" version="1" comment="krdc is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065200" version="1" comment="krfb is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144414" version="1" comment="kernel-default is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144415" version="1" comment="kernel-default-base is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144416" version="1" comment="kernel-default-devel is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144417" version="1" comment="kernel-default-man is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144418" version="1" comment="kernel-pae is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144419" version="1" comment="kernel-pae-base is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144420" version="1" comment="kernel-pae-devel is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144421" version="1" comment="kernel-ppc64 is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144422" version="1" comment="kernel-ppc64-base is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144423" version="1" comment="kernel-ppc64-devel is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144424" version="1" comment="kernel-source is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144425" version="1" comment="kernel-syms is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144426" version="1" comment="kernel-trace is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144427" version="1" comment="kernel-trace-base is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144428" version="1" comment="kernel-trace-devel is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144429" version="1" comment="kernel-xen is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144430" version="1" comment="kernel-xen-base is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144431" version="1" comment="kernel-xen-devel is &lt;3.0.13-0.27.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072351" version="1" comment="krb5 is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072345" version="1" comment="krb5-32bit is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072346" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072347" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072348" version="1" comment="krb5-client is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072349" version="1" comment="krb5-server is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072350" version="1" comment="krb5-x86 is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144435" version="1" comment="kvm is &lt;0.15.1-0.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144436" version="1" comment="ldapsmb is &lt;1.34b-12.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144437" version="1" comment="libldb1 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144438" version="1" comment="libsmbclient0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144439" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144440" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144441" version="1" comment="libtalloc2 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144442" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144443" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144444" version="1" comment="libtdb1 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144445" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144446" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144447" version="1" comment="libtevent0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144448" version="1" comment="libwbclient0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144449" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144450" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144451" version="1" comment="samba is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144452" version="1" comment="samba-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144453" version="1" comment="samba-client is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144454" version="1" comment="samba-client-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144455" version="1" comment="samba-client-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144456" version="1" comment="samba-krb-printing is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144457" version="1" comment="samba-winbind is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144458" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144459" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144460" version="1" comment="samba-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144461" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144462" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072598" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072596" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072597" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072611" version="1" comment="libqt4 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072599" version="1" comment="libqt4-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072602" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072600" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072601" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072606" version="1" comment="libqt4-sql is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072603" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072604" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072605" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072609" version="1" comment="libqt4-x11 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072607" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072608" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072610" version="1" comment="libqt4-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069401" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069399" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069403" version="1" comment="libapr1 is &lt;1.3.3-11.18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069402" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111803" version="1" comment="libcap-progs is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111804" version="1" comment="libcap2 is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111826" version="1" comment="libcap2-32bit is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111818" version="1" comment="libcap2-x86 is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067003" version="1" comment="libcgroup1 is &lt;0.34-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144463" version="1" comment="libdrm is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144464" version="1" comment="libdrm-32bit is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144465" version="1" comment="libdrm-x86 is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072304" version="1" comment="libfreebl3 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072303" version="1" comment="libfreebl3-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107302" version="1" comment="libfreebl3-x86 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072314" version="1" comment="mozilla-nss is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072307" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072313" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107303" version="1" comment="mozilla-nss-x86 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143734" version="1" comment="libgdiplus0 is &lt;2.6.7-0.5.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069283" version="1" comment="libgnomesu is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069281" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069282" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072647" version="1" comment="libicu is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072645" version="1" comment="libicu-32bit is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072646" version="1" comment="libicu-doc is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144474" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144475" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144476" version="1" comment="libmysqlclient15-x86 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144477" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144478" version="1" comment="mysql is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144479" version="1" comment="mysql-Max is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144480" version="1" comment="mysql-client is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144481" version="1" comment="mysql-tools is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143743" version="1" comment="libneon27 is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143744" version="1" comment="libneon27-32bit is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143745" version="1" comment="libneon27-x86 is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144482" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144483" version="1" comment="newt is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144484" version="1" comment="python-newt is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065553" version="1" comment="libopensc2 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065551" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065552" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065556" version="1" comment="opensc is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065554" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065555" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072492" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072490" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072491" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072494" version="1" comment="openssl is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072493" version="1" comment="openssl-doc is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069807" version="1" comment="libpng12-0 is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069805" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069806" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064463" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064464" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064465" version="1" comment="libpoppler5 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064466" version="1" comment="poppler-tools is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143749" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143750" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143751" version="1" comment="libpulse0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143752" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143753" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143754" version="1" comment="pulseaudio is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143755" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143756" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143757" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143758" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143759" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143760" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068531" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068529" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068530" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068535" version="1" comment="python-base is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068533" version="1" comment="python-base-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068534" version="1" comment="python-base-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068542" version="1" comment="python-xml is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070883" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070892" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143769" version="1" comment="libtirpc1 is &lt;0.2.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070704" version="1" comment="librsvg is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070702" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070703" version="1" comment="librsvg-x86 is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070705" version="1" comment="rsvg-view is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069633" version="1" comment="libsndfile is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069631" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069632" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144485" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144486" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144487" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144488" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144489" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144490" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144491" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144492" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144493" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067884" version="1" comment="libtiff3 is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067882" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067883" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067885" version="1" comment="tiff is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144494" version="1" comment="libvirt is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144495" version="1" comment="libvirt-client is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144496" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144497" version="1" comment="libvirt-doc is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144498" version="1" comment="libvirt-python is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061093" version="1" comment="libvorbis is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061090" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061091" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061092" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070132" version="1" comment="libxcrypt is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070130" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070131" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143797" version="1" comment="pam-modules is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143798" version="1" comment="pam-modules-32bit is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143799" version="1" comment="pam-modules-x86 is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143800" version="1" comment="pwdutils is &lt;3.2.15-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143801" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072708" version="1" comment="libxml2 is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072705" version="1" comment="libxml2-32bit is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072706" version="1" comment="libxml2-doc is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072707" version="1" comment="libxml2-x86 is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068337" version="1" comment="libzip1 is &lt;0.9-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068574" version="1" comment="logrotate is &lt;3.7.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143803" version="1" comment="logwatch is &lt;7.3.6-65.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144502" version="1" comment="lvm2 is &lt;2.02.84-3.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067854" version="1" comment="mailman is &lt;2.1.14-9.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143807" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143808" version="1" comment="mono-core is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143809" version="1" comment="mono-data is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143810" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143811" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143812" version="1" comment="mono-locale-extras is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143813" version="1" comment="mono-nunit is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143814" version="1" comment="mono-web is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143815" version="1" comment="mono-winforms is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107301" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107304" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107299" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107300" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107305" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144503" version="1" comment="nagios is &lt;3.0.6-1.25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144504" version="1" comment="nagios-www is &lt;3.0.6-1.25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144507" version="1" comment="ntp is &lt;4.2.4p8-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144508" version="1" comment="ntp-doc is &lt;4.2.4p8-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144509" version="1" comment="ofed is &lt;1.5.2-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144510" version="1" comment="ofed-doc is &lt;1.5.2-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144511" version="1" comment="ofed-kmp-default is &lt;1.5.2_3.0.13_0.27-0.22.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144512" version="1" comment="ofed-kmp-pae is &lt;1.5.2_3.0.13_0.27-0.22.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144513" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_3.0.13_0.27-0.22.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144514" version="1" comment="ofed-kmp-trace is &lt;1.5.2_3.0.13_0.27-0.22.23" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143829" version="1" comment="openslp is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143830" version="1" comment="openslp-32bit is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143831" version="1" comment="openslp-server is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143832" version="1" comment="openslp-x86 is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144515" version="1" comment="openssh is &lt;5.1p1-41.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144516" version="1" comment="openssh-askpass is &lt;5.1p1-41.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072165" version="1" comment="openswan is &lt;2.6.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072164" version="1" comment="openswan-doc is &lt;2.6.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069566" version="1" comment="opie is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069564" version="1" comment="opie-32bit is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069565" version="1" comment="opie-x86 is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143837" version="1" comment="pam is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143838" version="1" comment="pam-32bit is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143839" version="1" comment="pam-doc is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143840" version="1" comment="pam-x86 is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066424" version="1" comment="pango is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066421" version="1" comment="pango-32bit is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066422" version="1" comment="pango-doc is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066423" version="1" comment="pango-x86 is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065684" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065687" version="1" comment="pcsc-lite is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065685" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065686" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068387" version="1" comment="perl is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068383" version="1" comment="perl-32bit is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068384" version="1" comment="perl-base is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068385" version="1" comment="perl-doc is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068386" version="1" comment="perl-x86 is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143858" version="1" comment="perl-libwww-perl is &lt;5.816-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143859" version="1" comment="perl-spamassassin is &lt;3.3.1-10.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143860" version="1" comment="spamassassin is &lt;3.3.1-10.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066604" version="1" comment="postgresql is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066598" version="1" comment="postgresql-contrib is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066599" version="1" comment="postgresql-docs is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066602" version="1" comment="postgresql-libs is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066600" version="1" comment="postgresql-libs-32bit is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066601" version="1" comment="postgresql-libs-x86 is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066603" version="1" comment="postgresql-server is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144525" version="1" comment="puppet is &lt;2.6.12-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144526" version="1" comment="puppet-server is &lt;2.6.12-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144527" version="1" comment="pure-ftpd is &lt;1.0.22-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068543" version="1" comment="python is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068532" version="1" comment="python-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068536" version="1" comment="python-curses is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068537" version="1" comment="python-demo is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068538" version="1" comment="python-gdbm is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068539" version="1" comment="python-idle is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068540" version="1" comment="python-tk is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068541" version="1" comment="python-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144528" version="1" comment="python-sssd-config is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144529" version="1" comment="sssd is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144530" version="1" comment="sssd-32bit is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144531" version="1" comment="sssd-tools is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070706" version="1" comment="quagga is &lt;0.99.15-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071831" version="1" comment="radvd is &lt;1.1-1.24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144532" version="1" comment="rsync is &lt;3.0.4-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144533" version="1" comment="rsyslog is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144534" version="1" comment="rsyslog-diag-tools is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144535" version="1" comment="rsyslog-doc is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144536" version="1" comment="rsyslog-module-gssapi is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144537" version="1" comment="rsyslog-module-gtls is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144538" version="1" comment="rsyslog-module-mysql is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144539" version="1" comment="rsyslog-module-pgsql is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144540" version="1" comment="rsyslog-module-relp is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144541" version="1" comment="rsyslog-module-snmp is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144542" version="1" comment="rsyslog-module-udpspoof is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072842" version="1" comment="ruby is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072840" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072841" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072757" version="1" comment="squid is &lt;2.7.STABLE5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072759" version="1" comment="squid3 is &lt;3.1.12-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143886" version="1" comment="squidGuard is &lt;1.4-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143887" version="1" comment="squidGuard-doc is &lt;1.4-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144543" version="1" comment="star is &lt;1.5final-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144544" version="1" comment="sudo is &lt;1.7.6p2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144545" version="1" comment="sysconfig is &lt;0.71.47-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144546" version="1" comment="syslog-ng is &lt;2.0.9-27.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144547" version="1" comment="sysstat is &lt;8.1.5-7.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144548" version="1" comment="sysstat-isag is &lt;8.1.5-7.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072481" version="1" comment="system-config-printer is &lt;1.0.8-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072480" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144549" version="1" comment="systemtap is &lt;1.5-0.7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144550" version="1" comment="systemtap-server is &lt;1.5-0.7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065858" version="1" comment="t1lib is &lt;5.1.1-100.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143897" version="1" comment="tar is &lt;1.26-1.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069328" version="1" comment="tftp is &lt;0.48-101.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144551" version="1" comment="tgt is &lt;0.9.10-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072827" version="1" comment="tomcat6 is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072820" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072821" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072822" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072823" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072824" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072825" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072826" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143902" version="1" comment="unzip is &lt;6.00-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061711" version="1" comment="vte is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061709" version="1" comment="vte-doc is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061710" version="1" comment="vte-lang is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061666" version="1" comment="w3m is &lt;0.5.2-132.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071923" version="1" comment="wireshark is &lt;1.4.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144552" version="1" comment="xen is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144553" version="1" comment="xen-doc-html is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144554" version="1" comment="xen-doc-pdf is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144555" version="1" comment="xen-kmp-default is &lt;4.1.2_14_3.0.13_0.27-0.5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144556" version="1" comment="xen-kmp-pae is &lt;4.1.2_14_3.0.13_0.27-0.5.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144557" version="1" comment="xen-libs is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144558" version="1" comment="xen-libs-32bit is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144559" version="1" comment="xen-tools is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144560" version="1" comment="xen-tools-domU is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144561" version="1" comment="xorg-x11 is &lt;7.4-9.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144562" version="1" comment="xorg-x11-xauth is &lt;7.4-9.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144563" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144564" version="1" comment="xorg-x11-server is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144565" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071551" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071549" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071550" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144566" version="1" comment="yast2 is &lt;2.17.119-0.5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144567" version="1" comment="yast2-core is &lt;2.17.44-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077550" version="1" comment="sles-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143421" version="1" comment="Mesa is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143422" version="1" comment="Mesa-32bit is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143423" version="1" comment="Mesa-x86 is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143424" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.10.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143425" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.10.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143426" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143427" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143429" version="1" comment="PackageKit is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143430" version="1" comment="PackageKit-lang is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143431" version="1" comment="hal is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143432" version="1" comment="hal-32bit is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143433" version="1" comment="hal-doc is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143434" version="1" comment="hal-x86 is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143435" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143436" version="1" comment="PolicyKit is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143437" version="1" comment="PolicyKit-32bit is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143439" version="1" comment="PolicyKit-x86 is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143440" version="1" comment="aaa_base is &lt;11-6.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143441" version="1" comment="acpid is &lt;1.0.6-91.25.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143443" version="1" comment="ant is &lt;1.7.1-20.9.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143444" version="1" comment="ant-trax is &lt;1.7.1-16.9.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077061" version="1" comment="apache2 is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077056" version="1" comment="apache2-doc is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077057" version="1" comment="apache2-example-pages is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077058" version="1" comment="apache2-prefork is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077059" version="1" comment="apache2-utils is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077060" version="1" comment="apache2-worker is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143446" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143447" version="1" comment="php53 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143448" version="1" comment="php53-bcmath is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143449" version="1" comment="php53-bz2 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143450" version="1" comment="php53-calendar is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143451" version="1" comment="php53-ctype is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143452" version="1" comment="php53-curl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143453" version="1" comment="php53-dba is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143454" version="1" comment="php53-dom is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143455" version="1" comment="php53-exif is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143456" version="1" comment="php53-fastcgi is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143457" version="1" comment="php53-fileinfo is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143458" version="1" comment="php53-ftp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143459" version="1" comment="php53-gd is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143460" version="1" comment="php53-gettext is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143461" version="1" comment="php53-gmp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143462" version="1" comment="php53-iconv is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143463" version="1" comment="php53-intl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143464" version="1" comment="php53-json is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143465" version="1" comment="php53-ldap is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143466" version="1" comment="php53-mbstring is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143467" version="1" comment="php53-mcrypt is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143468" version="1" comment="php53-mysql is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143469" version="1" comment="php53-odbc is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143470" version="1" comment="php53-openssl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143471" version="1" comment="php53-pcntl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143472" version="1" comment="php53-pdo is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143473" version="1" comment="php53-pear is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143474" version="1" comment="php53-pgsql is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143475" version="1" comment="php53-pspell is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143476" version="1" comment="php53-shmop is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143477" version="1" comment="php53-snmp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143478" version="1" comment="php53-soap is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143479" version="1" comment="php53-suhosin is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143480" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143481" version="1" comment="php53-sysvsem is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143482" version="1" comment="php53-sysvshm is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143483" version="1" comment="php53-tokenizer is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143484" version="1" comment="php53-wddx is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143485" version="1" comment="php53-xmlreader is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143486" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143487" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143488" version="1" comment="php53-xsl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143489" version="1" comment="php53-zip is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143490" version="1" comment="php53-zlib is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077067" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073173" version="1" comment="ark is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073174" version="1" comment="kcalc is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073175" version="1" comment="kcharselect is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073176" version="1" comment="kdessh is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073177" version="1" comment="kdf is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073178" version="1" comment="kfloppy is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073179" version="1" comment="kgpg is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073180" version="1" comment="ktimer is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073181" version="1" comment="kwalletmanager is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073182" version="1" comment="kwikdisk is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073183" version="1" comment="okteta is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143491" version="1" comment="avahi is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143492" version="1" comment="avahi-lang is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143493" version="1" comment="avahi-utils is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143494" version="1" comment="libavahi-client3 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143495" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143496" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143497" version="1" comment="libavahi-common3 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143498" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143499" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143500" version="1" comment="libavahi-core5 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143501" version="1" comment="libdns_sd is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143502" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143503" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143504" version="1" comment="bind is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143505" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143506" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143507" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143508" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143509" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143510" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074909" version="1" comment="boost-license is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074910" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074917" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074911" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074912" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143511" version="1" comment="cifs-utils is &lt;5.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112218" version="1" comment="clamav is &lt;0.97.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143512" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143513" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143514" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143515" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143516" version="1" comment="openldap2 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143517" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143518" version="1" comment="openldap2-client is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143520" version="1" comment="cron is &lt;4.1-194.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143521" version="1" comment="cups is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143522" version="1" comment="cups-client is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143523" version="1" comment="cups-libs is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143524" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143525" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143526" version="1" comment="curl is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143527" version="1" comment="libcurl4 is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143528" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143529" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073075" version="1" comment="cvs is &lt;1.12.12-144.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073074" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143530" version="1" comment="dbus-1 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143531" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143532" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143533" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143537" version="1" comment="dhcp is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143538" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143539" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143540" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074692" version="1" comment="dhcpcd is &lt;3.2.3-44.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143541" version="1" comment="e2fsprogs is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143542" version="1" comment="libcom_err2 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143543" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143544" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143545" version="1" comment="libext2fs2 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074331" version="1" comment="ecryptfs-utils is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074329" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074330" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075137" version="1" comment="evolution-data-server is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075135" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075136" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075143" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074688" version="1" comment="expat is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074691" version="1" comment="libexpat1 is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074689" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074690" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143552" version="1" comment="file is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143553" version="1" comment="file-32bit is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143554" version="1" comment="file-x86 is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112262" version="1" comment="freeradius-server is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112263" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112264" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112265" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112266" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076460" version="1" comment="freetype2 is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076458" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076471" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076461" version="1" comment="ft2demos is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143557" version="1" comment="fuse is &lt;2.8.7-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143558" version="1" comment="libfuse2 is &lt;2.8.7-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075764" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075765" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075766" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075767" version="1" comment="ghostscript-library is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075768" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075769" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075770" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143563" version="1" comment="glib2 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143564" version="1" comment="glib2-doc is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143565" version="1" comment="glib2-lang is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143566" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143567" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143568" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143569" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143570" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143571" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143572" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143573" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143574" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143575" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143576" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143577" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143578" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143579" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143580" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143581" version="1" comment="glibc is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143582" version="1" comment="glibc-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143583" version="1" comment="glibc-devel is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143584" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143585" version="1" comment="glibc-html is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143586" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143587" version="1" comment="glibc-info is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143588" version="1" comment="glibc-locale is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143589" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143590" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143591" version="1" comment="glibc-profile is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143592" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143593" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143594" version="1" comment="glibc-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143595" version="1" comment="nscd is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143601" version="1" comment="gnome-screensaver is &lt;2.28.3-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143602" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077121" version="1" comment="gnutls is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077132" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077123" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077122" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077133" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143603" version="1" comment="gpg2 is &lt;2.0.9-25.33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143604" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074875" version="1" comment="gtk2 is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074872" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074886" version="1" comment="gtk2-doc is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074874" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074887" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143619" version="1" comment="guestfs-data is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143620" version="1" comment="guestfs-tools is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143621" version="1" comment="guestfsd is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143622" version="1" comment="libguestfs0 is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143627" version="1" comment="gzip is &lt;1.3.12-69.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143628" version="1" comment="hyper-v is &lt;5-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143629" version="1" comment="ibutils is &lt;1.5.7-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143630" version="1" comment="ibutils-32bit is &lt;1.5.7-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076985" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077099" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077095" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077096" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077097" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077098" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112815" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112826" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112816" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112827" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075206" version="1" comment="jpeg is &lt;6b-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075208" version="1" comment="libjpeg is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075207" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075212" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143633" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143635" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143636" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143637" version="1" comment="kdm is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143638" version="1" comment="kwin is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143642" version="1" comment="kdelibs4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143643" version="1" comment="kdelibs4-core is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143644" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143645" version="1" comment="libkde4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143646" version="1" comment="libkde4-32bit is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143647" version="1" comment="libkde4-x86 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143648" version="1" comment="libkdecore4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143649" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143650" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143651" version="1" comment="kernel-default is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143652" version="1" comment="kernel-default-base is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143653" version="1" comment="kernel-default-devel is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143654" version="1" comment="kernel-default-man is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143655" version="1" comment="kernel-pae is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143656" version="1" comment="kernel-pae-base is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143657" version="1" comment="kernel-pae-devel is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143658" version="1" comment="kernel-ppc64 is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143659" version="1" comment="kernel-ppc64-base is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143660" version="1" comment="kernel-ppc64-devel is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143661" version="1" comment="kernel-source is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143662" version="1" comment="kernel-syms is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143663" version="1" comment="kernel-trace is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143664" version="1" comment="kernel-trace-base is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143665" version="1" comment="kernel-trace-devel is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143666" version="1" comment="kernel-xen is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143667" version="1" comment="kernel-xen-base is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143668" version="1" comment="kernel-xen-devel is &lt;3.0.76-0.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112587" version="1" comment="krb5 is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112588" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112589" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112590" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112591" version="1" comment="krb5-client is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112595" version="1" comment="krb5-server is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112812" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112592" version="1" comment="krb5-doc is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112593" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112594" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143669" version="1" comment="kvm is &lt;1.4.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143674" version="1" comment="ldapsmb is &lt;1.34b-12.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143675" version="1" comment="libldb1 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143676" version="1" comment="libsmbclient0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143677" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143678" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143679" version="1" comment="libtalloc2 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143680" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143681" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143682" version="1" comment="libtdb1 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143683" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143684" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143685" version="1" comment="libtevent0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143686" version="1" comment="libwbclient0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143687" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143688" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143689" version="1" comment="samba is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143690" version="1" comment="samba-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143691" version="1" comment="samba-client is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143692" version="1" comment="samba-client-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143693" version="1" comment="samba-client-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143694" version="1" comment="samba-krb-printing is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143695" version="1" comment="samba-winbind is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143696" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143697" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143698" version="1" comment="samba-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077182" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077181" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143699" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143700" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143701" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143702" version="1" comment="libqt4 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143703" version="1" comment="libqt4-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143704" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143705" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143706" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143707" version="1" comment="libqt4-sql is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143708" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143709" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143710" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143711" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143712" version="1" comment="libqt4-x11 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143713" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143714" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143715" version="1" comment="libqt4-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143716" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072983" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072982" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143719" version="1" comment="libcgroup1 is &lt;0.37.1-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143720" version="1" comment="libdrm is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143721" version="1" comment="libdrm-32bit is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143722" version="1" comment="libdrm-x86 is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076988" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076990" version="1" comment="libpq5 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076989" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076991" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076993" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076994" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076995" version="1" comment="postgresql91-server is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075040" version="1" comment="libexif is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075039" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075063" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143724" version="1" comment="libfreebl3 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143725" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143726" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143727" version="1" comment="libsoftokn3 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143728" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143729" version="1" comment="libsoftokn3-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143730" version="1" comment="mozilla-nss is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143731" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143732" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143733" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143735" version="1" comment="libgtop is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143736" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143737" version="1" comment="libgtop-doc is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143738" version="1" comment="libgtop-lang is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076347" version="1" comment="libicu is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076348" version="1" comment="libicu-32bit is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076349" version="1" comment="libicu-doc is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076350" version="1" comment="libicu-x86 is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076518" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076517" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076523" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076520" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143740" version="1" comment="mysql is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143741" version="1" comment="mysql-client is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143742" version="1" comment="mysql-tools is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143746" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143747" version="1" comment="newt is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143748" version="1" comment="python-newt is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076924" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076923" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076935" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076933" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076936" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076925" version="1" comment="openssl is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076937" version="1" comment="openssl-doc is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076091" version="1" comment="libotr2 is &lt;3.2.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075195" version="1" comment="libpng12-0 is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075194" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075199" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076958" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076959" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076960" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076961" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076276" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076270" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076272" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076273" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076275" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076277" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143761" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143762" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143763" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143764" version="1" comment="python-base is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143765" version="1" comment="python-base-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143766" version="1" comment="python-base-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143767" version="1" comment="python-xml is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143773" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143774" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143775" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143776" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143777" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143778" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143779" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143780" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143781" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143782" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143783" version="1" comment="python-sssd-config is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143784" version="1" comment="sssd is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143785" version="1" comment="sssd-32bit is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143786" version="1" comment="sssd-tools is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077218" version="1" comment="libtiff3 is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077217" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077223" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077224" version="1" comment="tiff is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143787" version="1" comment="libtspi1 is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143788" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143789" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143790" version="1" comment="trousers is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075498" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075500" version="1" comment="nut is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075499" version="1" comment="nut-classic is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111805" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143791" version="1" comment="libvirt is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143792" version="1" comment="libvirt-client is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143793" version="1" comment="libvirt-client-32bit is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143794" version="1" comment="libvirt-doc is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143795" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143796" version="1" comment="libvirt-python is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073153" version="1" comment="libvorbis is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073150" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073151" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073152" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077146" version="1" comment="libxml2 is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077144" version="1" comment="libxml2-32bit is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077151" version="1" comment="libxml2-doc is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077152" version="1" comment="libxml2-x86 is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077120" version="1" comment="libxslt is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077119" version="1" comment="libxslt-32bit is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077131" version="1" comment="libxslt-x86 is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073168" version="1" comment="logrotate is &lt;3.7.7-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143804" version="1" comment="lvm2 is &lt;2.02.98-0.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143805" version="1" comment="mailman is &lt;2.1.14-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075117" version="1" comment="mono-core is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075123" version="1" comment="mono-data is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075120" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075121" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075127" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075128" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075130" version="1" comment="mono-web is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075131" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073033" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073029" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073030" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073031" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073032" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076709" version="1" comment="nagios is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076708" version="1" comment="nagios-www is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143816" version="1" comment="nagios-plugins is &lt;1.4.16-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143817" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077277" version="1" comment="nfs-client is &lt;1.2.3-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143818" version="1" comment="ntp is &lt;4.2.4p8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143819" version="1" comment="ntp-doc is &lt;4.2.4p8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143820" version="1" comment="ofed is &lt;1.5.4.1-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143821" version="1" comment="ofed-doc is &lt;1.5.4.1-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143822" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143823" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143824" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143825" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143826" version="1" comment="openCryptoki is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143827" version="1" comment="openCryptoki-32bit is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143828" version="1" comment="openCryptoki-64bit is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143833" version="1" comment="openssh is &lt;6.2p2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143834" version="1" comment="openssh-askpass is &lt;6.2p2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143835" version="1" comment="openvpn is &lt;2.0.9-143.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143836" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143841" version="1" comment="pam_krb5 is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143842" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143843" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143847" version="1" comment="pam_mount is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143848" version="1" comment="pam_mount-32bit is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143849" version="1" comment="pam_mount-x86 is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143850" version="1" comment="perl is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143851" version="1" comment="perl-32bit is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143852" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143853" version="1" comment="perl-Test-Simple is &lt;0.72-0.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143854" version="1" comment="perl-base is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143855" version="1" comment="perl-doc is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143856" version="1" comment="perl-x86 is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076900" version="1" comment="postgresql is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076905" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076906" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076907" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076978" version="1" comment="puppet is &lt;2.6.18-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076986" version="1" comment="puppet-server is &lt;2.6.18-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143861" version="1" comment="pure-ftpd is &lt;1.0.22-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143862" version="1" comment="python is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143863" version="1" comment="python-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143864" version="1" comment="python-curses is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143865" version="1" comment="python-demo is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143866" version="1" comment="python-gdbm is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143867" version="1" comment="python-idle is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143868" version="1" comment="python-tk is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143869" version="1" comment="python-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074309" version="1" comment="python-pam is &lt;0.5.0-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143874" version="1" comment="quagga is &lt;0.99.15-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143875" version="1" comment="rsync is &lt;3.0.4-2.47.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143876" version="1" comment="rsyslog is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143877" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143878" version="1" comment="rsyslog-doc is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143879" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143880" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143881" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143882" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143883" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143884" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143885" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076775" version="1" comment="ruby is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076786" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076787" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075799" version="1" comment="sblim-sfcb is &lt;1.3.11-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074796" version="1" comment="socat is &lt;1.7.0.0-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076602" version="1" comment="squid is &lt;2.7.STABLE5-2.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076661" version="1" comment="squid3 is &lt;3.1.12-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143888" version="1" comment="star is &lt;1.5final-28.23.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143889" version="1" comment="stunnel is &lt;4.54-0.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143890" version="1" comment="sudo is &lt;1.7.6p2-0.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143891" version="1" comment="sysconfig is &lt;0.71.61-0.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143892" version="1" comment="syslog-ng is &lt;2.0.9-27.34.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143893" version="1" comment="sysstat is &lt;8.1.5-7.45.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143894" version="1" comment="sysstat-isag is &lt;8.1.5-7.45.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143895" version="1" comment="system-config-printer is &lt;1.0.8-9.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143896" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077055" version="1" comment="systemtap is &lt;1.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077054" version="1" comment="systemtap-server is &lt;1.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074582" version="1" comment="t1lib is &lt;5.1.1-100.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074585" version="1" comment="taglib is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074583" version="1" comment="taglib-32bit is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074584" version="1" comment="taglib-x86 is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143898" version="1" comment="tftp is &lt;0.48-101.31.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143899" version="1" comment="tgt is &lt;0.9.10-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076487" version="1" comment="tomcat6 is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076480" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076481" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076482" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076483" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076484" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076485" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076486" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143900" version="1" comment="unixODBC_23 is &lt;2.3.1-0.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143903" version="1" comment="virt-utils is &lt;1.2.1-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077108" version="1" comment="wireshark is &lt;1.8.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143904" version="1" comment="x3270 is &lt;3.3.12-517.12.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143906" version="1" comment="xen is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143907" version="1" comment="xen-doc-html is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143908" version="1" comment="xen-doc-pdf is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143909" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.76_0.11-0.7.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143910" version="1" comment="xen-kmp-pae is &lt;4.2.2_04_3.0.76_0.11-0.7.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143911" version="1" comment="xen-libs is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143912" version="1" comment="xen-libs-32bit is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143913" version="1" comment="xen-tools is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143914" version="1" comment="xen-tools-domU is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143915" version="1" comment="xorg-x11 is &lt;7.4-9.62.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143916" version="1" comment="xorg-x11-xauth is &lt;7.4-9.62.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143917" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143918" version="1" comment="xorg-x11-server is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143919" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143920" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143921" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143922" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074291" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143923" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143925" version="1" comment="yast2 is &lt;2.17.129-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143926" version="1" comment="yast2-core is &lt;2.17.45-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117413" version="1" comment="sles-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143928" version="1" comment="Mesa is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143929" version="1" comment="Mesa-32bit is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143930" version="1" comment="Mesa-x86 is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110027" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110026" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143931" version="1" comment="PackageKit is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143932" version="1" comment="PackageKit-lang is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143933" version="1" comment="hal is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143934" version="1" comment="hal-32bit is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143935" version="1" comment="hal-doc is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143936" version="1" comment="hal-x86 is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143937" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143938" version="1" comment="PolicyKit is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143939" version="1" comment="PolicyKit-32bit is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143940" version="1" comment="PolicyKit-doc is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143941" version="1" comment="PolicyKit-x86 is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098629" version="1" comment="a2ps is &lt;4.13-1326.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143942" version="1" comment="aaa_base is &lt;11-6.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143943" version="1" comment="ant is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143944" version="1" comment="ant-trax is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108649" version="1" comment="apache2 is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108644" version="1" comment="apache2-doc is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108645" version="1" comment="apache2-example-pages is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108646" version="1" comment="apache2-prefork is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108647" version="1" comment="apache2-utils is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108648" version="1" comment="apache2-worker is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143945" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143946" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143947" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110219" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112868" version="1" comment="php53 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110220" version="1" comment="php53-bcmath is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110221" version="1" comment="php53-bz2 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110222" version="1" comment="php53-calendar is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110223" version="1" comment="php53-ctype is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110224" version="1" comment="php53-curl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110225" version="1" comment="php53-dba is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110226" version="1" comment="php53-dom is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110227" version="1" comment="php53-exif is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110228" version="1" comment="php53-fastcgi is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110229" version="1" comment="php53-fileinfo is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110230" version="1" comment="php53-ftp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110231" version="1" comment="php53-gd is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110232" version="1" comment="php53-gettext is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110233" version="1" comment="php53-gmp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110234" version="1" comment="php53-iconv is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110235" version="1" comment="php53-intl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110236" version="1" comment="php53-json is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110237" version="1" comment="php53-ldap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110238" version="1" comment="php53-mbstring is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110239" version="1" comment="php53-mcrypt is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110240" version="1" comment="php53-mysql is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110241" version="1" comment="php53-odbc is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110242" version="1" comment="php53-openssl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110243" version="1" comment="php53-pcntl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110244" version="1" comment="php53-pdo is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110245" version="1" comment="php53-pear is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110246" version="1" comment="php53-pgsql is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110247" version="1" comment="php53-pspell is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110248" version="1" comment="php53-shmop is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110249" version="1" comment="php53-snmp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110250" version="1" comment="php53-soap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110251" version="1" comment="php53-suhosin is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110252" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110253" version="1" comment="php53-sysvsem is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110254" version="1" comment="php53-sysvshm is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110255" version="1" comment="php53-tokenizer is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110256" version="1" comment="php53-wddx is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110257" version="1" comment="php53-xmlreader is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110258" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110259" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110260" version="1" comment="php53-xsl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110261" version="1" comment="php53-zip is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110262" version="1" comment="php53-zlib is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099258" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099535" version="1" comment="augeas is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099534" version="1" comment="augeas-lenses is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099536" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089841" version="1" comment="automake is &lt;1.10.1-4.131.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143948" version="1" comment="avahi is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143949" version="1" comment="avahi-lang is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143950" version="1" comment="avahi-utils is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143951" version="1" comment="libavahi-client3 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143952" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143953" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143954" version="1" comment="libavahi-common3 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143955" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143956" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143957" version="1" comment="libavahi-core5 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143958" version="1" comment="libdns_sd is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143959" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143960" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143961" version="1" comment="bash is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143962" version="1" comment="bash-doc is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143963" version="1" comment="bash-x86 is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143964" version="1" comment="libreadline5 is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143965" version="1" comment="libreadline5-32bit is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143966" version="1" comment="libreadline5-x86 is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143967" version="1" comment="readline-doc is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106119" version="1" comment="bind is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106113" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106115" version="1" comment="bind-doc is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106117" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106116" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103747" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106118" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143968" version="1" comment="binutils is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143969" version="1" comment="boost-license is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143970" version="1" comment="boost-license1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143971" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143972" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143973" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143974" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143975" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143976" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143977" version="1" comment="cifs-utils is &lt;5.1-0.14.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109607" version="1" comment="clamav is &lt;0.98.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109626" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109624" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109623" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109627" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109622" version="1" comment="openldap2 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109628" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109625" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109145" version="1" comment="coreutils is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109144" version="1" comment="coreutils-lang is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109146" version="1" comment="coreutils-x86 is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102978" version="1" comment="cpio is &lt;2.9-75.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102977" version="1" comment="cpio-lang is &lt;2.9-75.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143978" version="1" comment="cron is &lt;4.1-194.211.213.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110279" version="1" comment="cups is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110276" version="1" comment="cups-client is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110278" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110277" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110280" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109965" version="1" comment="curl is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109967" version="1" comment="libcurl4 is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109966" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109968" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143979" version="1" comment="davfs2 is &lt;1.5.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100695" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100692" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100693" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100694" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143980" version="1" comment="dhcp is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143981" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143982" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143983" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143984" version="1" comment="dnsmasq is &lt;2.71-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143985" version="1" comment="e2fsprogs is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143986" version="1" comment="libcom_err2 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143987" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143988" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143989" version="1" comment="libext2fs2 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107083" version="1" comment="elfutils is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107084" version="1" comment="libasm1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107090" version="1" comment="libasm1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107086" version="1" comment="libdw1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107085" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107091" version="1" comment="libdw1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107088" version="1" comment="libebl1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107087" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107092" version="1" comment="libebl1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107089" version="1" comment="libelf1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107082" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107093" version="1" comment="libelf1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109215" version="1" comment="emacs is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109216" version="1" comment="emacs-el is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109213" version="1" comment="emacs-info is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109212" version="1" comment="emacs-nox is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109214" version="1" comment="emacs-x11 is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102331" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102329" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102330" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102332" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091213" version="1" comment="fastjar is &lt;0.95-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102013" version="1" comment="file is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102012" version="1" comment="file-32bit is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102016" version="1" comment="file-x86 is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098692" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098688" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098689" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098690" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098691" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110209" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110208" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110211" version="1" comment="freetype2-x86 is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110210" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110282" version="1" comment="fuse is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110283" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109218" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143990" version="1" comment="glib2 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143991" version="1" comment="glib2-doc is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143992" version="1" comment="glib2-lang is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143993" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143994" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143995" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143996" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143997" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143998" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143999" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144000" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144001" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144002" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144003" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144004" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144005" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144006" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144007" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144008" version="1" comment="glibc is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144009" version="1" comment="glibc-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144010" version="1" comment="glibc-devel is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144011" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144012" version="1" comment="glibc-html is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144013" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144014" version="1" comment="glibc-info is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144015" version="1" comment="glibc-locale is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144016" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144017" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144018" version="1" comment="glibc-profile is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144019" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144020" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144021" version="1" comment="glibc-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144022" version="1" comment="nscd is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144023" version="1" comment="gnome-screensaver is &lt;2.28.3-0.39.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144024" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.39.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108436" version="1" comment="gnutls is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108435" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108438" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108437" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108439" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098771" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098770" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099921" version="1" comment="gpgme is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099922" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144025" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144026" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144027" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144028" version="1" comment="guestfs-data is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144029" version="1" comment="guestfs-tools is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144030" version="1" comment="guestfsd is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144031" version="1" comment="libguestfs0 is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093256" version="1" comment="hplip is &lt;3.11.10-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093255" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144032" version="1" comment="hyper-v is &lt;6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144033" version="1" comment="ibutils is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144034" version="1" comment="ibutils-32bit is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144035" version="1" comment="ipsec-tools is &lt;0.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098503" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098502" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144036" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144037" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144038" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144039" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144040" version="1" comment="kbd is &lt;1.14.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098370" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098371" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098373" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098372" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098374" version="1" comment="kdm is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098375" version="1" comment="kwin is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107756" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112896" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112897" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112898" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112899" version="1" comment="libkde4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112900" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112933" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112901" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112902" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112934" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098705" version="1" comment="kdirstat is &lt;2.4.4-255.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144041" version="1" comment="kernel-default is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144042" version="1" comment="kernel-default-base is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144043" version="1" comment="kernel-default-devel is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144044" version="1" comment="kernel-default-man is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144045" version="1" comment="kernel-pae is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144046" version="1" comment="kernel-pae-base is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144047" version="1" comment="kernel-pae-devel is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144048" version="1" comment="kernel-ppc64 is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144049" version="1" comment="kernel-ppc64-base is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144050" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144051" version="1" comment="kernel-source is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144052" version="1" comment="kernel-syms is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144053" version="1" comment="kernel-trace is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144054" version="1" comment="kernel-trace-base is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144055" version="1" comment="kernel-trace-devel is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144056" version="1" comment="kernel-xen is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144057" version="1" comment="kernel-xen-base is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144058" version="1" comment="kernel-xen-devel is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107541" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107539" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107542" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107543" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107540" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107538" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107547" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107544" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107545" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107546" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144059" version="1" comment="kvm is &lt;1.4.2-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091580" version="1" comment="lcms is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091583" version="1" comment="liblcms1 is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091581" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091582" version="1" comment="liblcms1-x86 is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144060" version="1" comment="ldapsmb is &lt;1.34b-12.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144061" version="1" comment="libldb1 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144062" version="1" comment="libsmbclient0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144063" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144064" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144065" version="1" comment="libtalloc2 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144066" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144067" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144068" version="1" comment="libtdb1 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144069" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144070" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144071" version="1" comment="libtevent0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144072" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144073" version="1" comment="libwbclient0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144074" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144075" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144076" version="1" comment="samba is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144077" version="1" comment="samba-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144078" version="1" comment="samba-client is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144079" version="1" comment="samba-client-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144080" version="1" comment="samba-client-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144081" version="1" comment="samba-krb-printing is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144082" version="1" comment="samba-winbind is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144083" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144084" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144085" version="1" comment="samba-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102504" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102506" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102505" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102507" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102727" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102726" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110009" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109994" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109995" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110019" version="1" comment="libqt4 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110010" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110012" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110011" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110020" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110016" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110013" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110014" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110015" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110021" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110018" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110017" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110022" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110023" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110024" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144086" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144087" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144088" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144089" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144090" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144091" version="1" comment="libblkid1 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144092" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144093" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144094" version="1" comment="libuuid1 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144095" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144096" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144097" version="1" comment="util-linux is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144098" version="1" comment="util-linux-lang is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144099" version="1" comment="uuid-runtime is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144100" version="1" comment="libcgroup1 is &lt;0.41.rc1-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144101" version="1" comment="libdrm is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144102" version="1" comment="libdrm-32bit is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144103" version="1" comment="libdrm-x86 is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144104" version="1" comment="libecpg6 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144105" version="1" comment="libpq5 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144106" version="1" comment="libpq5-32bit is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144107" version="1" comment="postgresql94 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144108" version="1" comment="postgresql94-contrib is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144109" version="1" comment="postgresql94-docs is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144110" version="1" comment="postgresql94-server is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112617" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107502" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107501" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107508" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107504" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107503" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107509" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107507" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107505" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107506" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107510" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144111" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144112" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144113" version="1" comment="libgcc_s1-x86 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144114" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144115" version="1" comment="libgomp1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144116" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144117" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144118" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144119" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144120" version="1" comment="libstdc++6-x86 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099938" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099936" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099937" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144121" version="1" comment="libgtop is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144122" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144123" version="1" comment="libgtop-doc is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144124" version="1" comment="libgtop-lang is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106033" version="1" comment="libjasper is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106032" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106034" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102976" version="1" comment="libksba is &lt;1.0.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098769" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098767" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098768" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144125" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144126" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112935" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107714" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109861" version="1" comment="libmysql55client18 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109860" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109865" version="1" comment="libmysql55client18-x86 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109862" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109858" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109859" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109864" version="1" comment="mysql is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109863" version="1" comment="mysql-client is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109866" version="1" comment="mysql-tools is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108147" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108146" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108152" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108148" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107900" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107897" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107899" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107898" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107971" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107902" version="1" comment="openssl is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107901" version="1" comment="openssl-doc is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092675" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092673" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092674" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098501" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098499" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098500" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098332" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098333" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098334" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098335" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144127" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144128" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144129" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144130" version="1" comment="libpulse-mainloop-glib0-x86 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144131" version="1" comment="libpulse0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144132" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144133" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144134" version="1" comment="pulseaudio is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144135" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144136" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144137" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144138" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144139" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144140" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144141" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144142" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144143" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144144" version="1" comment="python-base is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144145" version="1" comment="python-base-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144146" version="1" comment="python-base-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144147" version="1" comment="python-xml is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144148" version="1" comment="libtirpc1 is &lt;0.2.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105659" version="1" comment="libsndfile is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105658" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105660" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100007" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100005" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100006" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100008" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100009" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100010" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108442" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144149" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144150" version="1" comment="python-sssd-config is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144151" version="1" comment="sssd is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144152" version="1" comment="sssd-32bit is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144153" version="1" comment="sssd-tools is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109685" version="1" comment="libtasn1 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109684" version="1" comment="libtasn1-3 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109683" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109686" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144154" version="1" comment="libtevent0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091279" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091277" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091278" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091280" version="1" comment="tiff is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144155" version="1" comment="libtspi1 is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144156" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144157" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144158" version="1" comment="trousers is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144159" version="1" comment="libvirt is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144160" version="1" comment="libvirt-client is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144161" version="1" comment="libvirt-client-32bit is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144162" version="1" comment="libvirt-doc is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144163" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101875" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101876" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101877" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144164" version="1" comment="suseRegister is &lt;1.4-1.38.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144165" version="1" comment="pam-modules is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144166" version="1" comment="pam-modules-32bit is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144167" version="1" comment="pam-modules-x86 is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144168" version="1" comment="pwdutils is &lt;3.2.15-0.17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144169" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101725" version="1" comment="libxml2 is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101723" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101726" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101727" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091329" version="1" comment="libxslt is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091327" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091328" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144170" version="1" comment="logrotate is &lt;3.7.7-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144171" version="1" comment="logwatch is &lt;7.3.6-65.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144172" version="1" comment="lvm2 is &lt;2.02.98-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144173" version="1" comment="lxc is &lt;0.8.0-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144174" version="1" comment="mailx is &lt;12.5-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109245" version="1" comment="mono-core is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109251" version="1" comment="mono-data is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109248" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109249" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109255" version="1" comment="mono-locale-extras is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109256" version="1" comment="mono-nunit is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109258" version="1" comment="mono-web is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109259" version="1" comment="mono-winforms is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101265" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101264" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101271" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109091" version="1" comment="mutt is &lt;1.5.17-42.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098667" version="1" comment="nagios is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098666" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098716" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098715" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098717" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101145" version="1" comment="nagios-plugins is &lt;1.4.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101144" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144175" version="1" comment="nfs-client is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144176" version="1" comment="nfs-doc is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144177" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.38.43.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144178" version="1" comment="ntp is &lt;4.2.8p2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144179" version="1" comment="ntp-doc is &lt;4.2.8p2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144180" version="1" comment="ofed is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144181" version="1" comment="ofed-doc is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144182" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_63-20.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144183" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_63-20.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144184" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_63-20.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144185" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_63-20.26" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144186" version="1" comment="openCryptoki is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144187" version="1" comment="openCryptoki-32bit is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144188" version="1" comment="openCryptoki-64bit is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109700" version="1" comment="openslp is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109699" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109698" version="1" comment="openslp-server is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109701" version="1" comment="openslp-x86 is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144189" version="1" comment="openssh is &lt;6.6p1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144190" version="1" comment="openssh-fips is &lt;6.6p1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102621" version="1" comment="openvpn is &lt;2.0.9-143.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102622" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144191" version="1" comment="pam is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144192" version="1" comment="pam-32bit is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144193" version="1" comment="pam-doc is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144194" version="1" comment="pam-x86 is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144195" version="1" comment="perl is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144196" version="1" comment="perl-32bit is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144197" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144198" version="1" comment="perl-Test-Simple is &lt;0.72-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144199" version="1" comment="perl-base is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144200" version="1" comment="perl-doc is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144201" version="1" comment="perl-x86 is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144202" version="1" comment="popt is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144203" version="1" comment="popt-32bit is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144204" version="1" comment="popt-x86 is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144205" version="1" comment="rpm is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144206" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144207" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144208" version="1" comment="powerpc-utils is &lt;1.2.22-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144209" version="1" comment="ppc64-diag is &lt;2.6.7-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099941" version="1" comment="ppp is &lt;2.4.5.git-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100586" version="1" comment="procmail is &lt;3.22-240.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144210" version="1" comment="puppet is &lt;2.7.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144211" version="1" comment="puppet-server is &lt;2.7.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102493" version="1" comment="pure-ftpd is &lt;1.0.22-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144212" version="1" comment="python is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144213" version="1" comment="python-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144214" version="1" comment="python-curses is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144215" version="1" comment="python-demo is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144216" version="1" comment="python-gdbm is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144217" version="1" comment="python-idle is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144218" version="1" comment="python-tk is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144219" version="1" comment="python-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098685" version="1" comment="python-imaging is &lt;1.1.6-168.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100957" version="1" comment="python-lxml is &lt;2.3.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144220" version="1" comment="python-pywbem is &lt;0.7-6.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103900" version="1" comment="quagga is &lt;0.99.15-0.14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144221" version="1" comment="radvd is &lt;1.1-1.24.8.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100967" version="1" comment="rsyslog is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100958" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100959" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100960" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100961" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100962" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100963" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100964" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100965" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100966" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105486" version="1" comment="ruby is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105481" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105485" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144222" version="1" comment="sblim-sfcb is &lt;1.3.11-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098750" version="1" comment="sendmail is &lt;8.14.3-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102690" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090553" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100639" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144223" version="1" comment="star is &lt;1.5final-28.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098714" version="1" comment="strongswan is &lt;4.4.0-6.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098713" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110042" version="1" comment="sudo is &lt;1.7.6p2-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144224" version="1" comment="sysconfig is &lt;0.71.61-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144225" version="1" comment="sysstat is &lt;8.1.5-7.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144226" version="1" comment="sysstat-isag is &lt;8.1.5-7.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144227" version="1" comment="tar is &lt;1.26-1.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108650" version="1" comment="tcpdump is &lt;3.9.8-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099545" version="1" comment="tomcat6 is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099538" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099539" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099540" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099541" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099542" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099543" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099544" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106835" version="1" comment="unzip is &lt;6.00-11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091215" version="1" comment="vino is &lt;2.28.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091214" version="1" comment="vino-lang is &lt;2.28.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144228" version="1" comment="virt-utils is &lt;1.2.1-10.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144229" version="1" comment="vsftpd is &lt;2.0.7-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101160" version="1" comment="wget is &lt;1.11.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112696" version="1" comment="wireshark is &lt;1.10.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101152" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098512" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144230" version="1" comment="xen is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144231" version="1" comment="xen-doc-html is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144232" version="1" comment="xen-kmp-default is &lt;4.4.2_08_3.0.101_63-1.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144233" version="1" comment="xen-kmp-pae is &lt;4.4.2_08_3.0.101_63-1.7" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144234" version="1" comment="xen-libs is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144235" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144236" version="1" comment="xen-tools is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144237" version="1" comment="xen-tools-domU is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098336" version="1" comment="xinetd is &lt;2.3.14-130.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144238" version="1" comment="xorg-x11 is &lt;7.4-9.65.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144239" version="1" comment="xorg-x11-xauth is &lt;7.4-9.65.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110272" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110274" version="1" comment="xorg-x11-server is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110273" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103948" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103947" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077515" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077723" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077722" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077740" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103952" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103951" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077741" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103964" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103963" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077523" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103956" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103955" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077743" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103962" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103961" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077745" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103958" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103957" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077744" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108447" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108446" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108448" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144240" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144241" version="1" comment="yast2 is &lt;2.17.140-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144242" version="1" comment="yast2-core is &lt;2.17.46-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562778" version="1" comment="curl-openssl1 is &lt;7.19.7-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562779" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562780" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117400" version="1" comment="sles-release is &gt;=11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100664" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100662" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100667" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100665" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100647" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100650" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100648" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100652" version="1" comment="openssl1 is &lt;1.0.1g-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100651" version="1" comment="openssl1-doc is &lt;1.0.1g-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562781" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562782" version="1" comment="libsnmp15-openssl1 is &lt;5.4.2.1-8.12.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562783" version="1" comment="libsnmp15-openssl1-32bit is &lt;5.4.2.1-8.12.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562784" version="1" comment="mailx-openssl1 is &lt;12.5-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121359" version="1" comment="openssh-openssl1 is &lt;6.6p1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121360" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167443" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167444" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154342" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562785" version="1" comment="stunnel-openssl1 is &lt;4.54-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562786" version="1" comment="vsftpd-openssl1 is &lt;2.0.7-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562787" version="1" comment="wget-openssl1 is &lt;1.11.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077243" version="1" comment="GraphicsMagick is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077244" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077245" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117401" version="1" comment="sled-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258811" version="1" comment="SLES_SAP-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117399" version="1" comment="sle-sdk-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102720" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102719" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102721" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102722" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102724" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102723" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102725" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145394" version="1" comment="LibVNCServer-devel is &lt;0.9.1-154.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145395" version="1" comment="Mesa-devel is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145396" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110025" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145397" version="1" comment="NetworkManager-devel is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054516" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145398" version="1" comment="PackageKit-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145399" version="1" comment="hal-devel is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145400" version="1" comment="libpackagekit-glib10-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145401" version="1" comment="libpackagekit-qt10 is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145402" version="1" comment="libpackagekit-qt10-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145403" version="1" comment="PolicyKit-devel is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054067" version="1" comment="Xerces-c is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054068" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054069" version="1" comment="libXerces-c28 is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098881" version="1" comment="a2ps-devel is &lt;4.13-1326.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145404" version="1" comment="ant-antlr is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145405" version="1" comment="ant-apache-bcel is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145406" version="1" comment="ant-apache-bsf is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145407" version="1" comment="ant-apache-log4j is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145408" version="1" comment="ant-apache-oro is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145409" version="1" comment="ant-apache-regexp is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145410" version="1" comment="ant-apache-resolver is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145411" version="1" comment="ant-commons-logging is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145412" version="1" comment="ant-javadoc is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145413" version="1" comment="ant-javamail is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145414" version="1" comment="ant-jdepend is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145415" version="1" comment="ant-jmf is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145416" version="1" comment="ant-junit is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145417" version="1" comment="ant-manual is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145418" version="1" comment="ant-nodeps is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145419" version="1" comment="ant-scripts is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145420" version="1" comment="ant-swing is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108643" version="1" comment="apache2-devel is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091357" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145421" version="1" comment="apache2-mod_perl-devel is &lt;2.0.4-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099546" version="1" comment="augeas-devel is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145422" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145423" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145424" version="1" comment="libavahi-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145425" version="1" comment="libhowl0 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145426" version="1" comment="python-avahi is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106114" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103740" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145427" version="1" comment="binutils-devel is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145428" version="1" comment="binutils-devel-32bit is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145429" version="1" comment="binutils-gold is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145430" version="1" comment="cross-ppc-binutils is &lt;2.24-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145431" version="1" comment="cross-spu-binutils is &lt;2.24-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145432" version="1" comment="boinc-client is &lt;6.2.18-4.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145433" version="1" comment="boinc-client-devel is &lt;6.2.18-4.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145434" version="1" comment="boost-devel is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145435" version="1" comment="boost-devel-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145436" version="1" comment="boost-doc is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145437" version="1" comment="libboost_date_time1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145438" version="1" comment="libboost_date_time1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145439" version="1" comment="libboost_filesystem1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145440" version="1" comment="libboost_filesystem1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145441" version="1" comment="libboost_graph1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145442" version="1" comment="libboost_graph1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145443" version="1" comment="libboost_iostreams1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145444" version="1" comment="libboost_iostreams1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145445" version="1" comment="libboost_math1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145446" version="1" comment="libboost_math1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145447" version="1" comment="libboost_mpi1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145448" version="1" comment="libboost_program_options1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145449" version="1" comment="libboost_python1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145450" version="1" comment="libboost_python1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145451" version="1" comment="libboost_regex1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145452" version="1" comment="libboost_serialization1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145453" version="1" comment="libboost_serialization1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145454" version="1" comment="libboost_signals1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145455" version="1" comment="libboost_system1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145456" version="1" comment="libboost_system1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145457" version="1" comment="libboost_test1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145458" version="1" comment="libboost_test1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145459" version="1" comment="libboost_thread1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145460" version="1" comment="libboost_wave1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145461" version="1" comment="libboost_wave1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145462" version="1" comment="build is &lt;2011.10.10-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109244" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109246" version="1" comment="mono-data-firebird is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109247" version="1" comment="mono-data-oracle is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109250" version="1" comment="mono-data-sybase is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109252" version="1" comment="mono-devel is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109253" version="1" comment="mono-extras is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109254" version="1" comment="mono-jscript is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109257" version="1" comment="mono-wcf is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109260" version="1" comment="mono-winfxcore is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109261" version="1" comment="monodoc-core is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145463" version="1" comment="coolkey-devel is &lt;1.1.0-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145464" version="1" comment="cpp48 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145465" version="1" comment="gcc48 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145466" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145467" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145468" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145469" version="1" comment="gcc48-fortran-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145470" version="1" comment="gcc48-info is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145471" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145472" version="1" comment="libasan0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145473" version="1" comment="libatomic1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145474" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145475" version="1" comment="libitm1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145476" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145477" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145478" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145479" version="1" comment="libtsan0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145480" version="1" comment="cscope is &lt;15.6-95.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098799" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110275" version="1" comment="cups-devel is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071590" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100697" version="1" comment="dbus-1-devel is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100696" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145481" version="1" comment="dbus-1-glib-devel is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145482" version="1" comment="derby is &lt;10.3.1.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145483" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145484" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145485" version="1" comment="libcom_err-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145486" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145487" version="1" comment="libext2fs-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145488" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145489" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145490" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145491" version="1" comment="empathy is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145492" version="1" comment="empathy-devel is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145493" version="1" comment="empathy-lang is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145494" version="1" comment="evince-devel is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145495" version="1" comment="evolution is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145496" version="1" comment="evolution-devel is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145497" version="1" comment="evolution-lang is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102328" version="1" comment="evolution-data-server-devel is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102014" version="1" comment="file-devel is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145498" version="1" comment="fileshareset is &lt;2.0-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145499" version="1" comment="kdebase3 is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145500" version="1" comment="kdebase3-32bit is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145501" version="1" comment="kdebase3-devel is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145502" version="1" comment="misc-console-font is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102692" version="1" comment="finch is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102691" version="1" comment="finch-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102695" version="1" comment="libpurple is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102693" version="1" comment="libpurple-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102694" version="1" comment="libpurple-lang is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102697" version="1" comment="pidgin is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102696" version="1" comment="pidgin-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102501" version="1" comment="flac-devel is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102502" version="1" comment="libFLAC++6-32bit is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102503" version="1" comment="libFLAC++6-x86 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098917" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110207" version="1" comment="freetype2-devel is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110206" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110281" version="1" comment="fuse-devel is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109217" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074871" version="1" comment="gdk-pixbuf is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074870" version="1" comment="gdk-pixbuf-32bit is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074890" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075774" version="1" comment="ghostscript-devel is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075775" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075776" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093459" version="1" comment="gimp is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093456" version="1" comment="gimp-devel is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093457" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093458" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105496" version="1" comment="git is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105488" version="1" comment="git-arch is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105489" version="1" comment="git-core is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105490" version="1" comment="git-cvs is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105491" version="1" comment="git-daemon is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105492" version="1" comment="git-email is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105493" version="1" comment="git-gui is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105494" version="1" comment="git-svn is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105495" version="1" comment="git-web is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105497" version="1" comment="gitk is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145503" version="1" comment="glib2-devel is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145504" version="1" comment="glib2-devel-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145505" version="1" comment="libgio-fam is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145506" version="1" comment="gmime-2_4-devel is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145507" version="1" comment="gmime-devel is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145508" version="1" comment="gmime-sharp is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145509" version="1" comment="gnucash is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145510" version="1" comment="gnucash-devel is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145511" version="1" comment="gnucash-lang is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145512" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074873" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074891" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145513" version="1" comment="ibutils-devel is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145514" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076346" version="1" comment="icu is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076352" version="1" comment="libicu-devel is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076351" version="1" comment="libicu-devel-32bit is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145515" version="1" comment="imlib is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145516" version="1" comment="imlib-32bit is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145517" version="1" comment="imlib-config is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145518" version="1" comment="imlib-devel is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145519" version="1" comment="imlib-x86 is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145520" version="1" comment="imlib2 is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145521" version="1" comment="imlib2-devel is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145522" version="1" comment="imlib2-filters is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145523" version="1" comment="imlib2-loaders is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145524" version="1" comment="inkscape is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145525" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145526" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145527" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145528" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145529" version="1" comment="inkscape-lang is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145530" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098798" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056620" version="1" comment="kdelibs3-arts is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056618" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056619" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056621" version="1" comment="kdelibs3-devel is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056622" version="1" comment="kdelibs3-doc is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116235" version="1" comment="libkde4-devel is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116236" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145531" version="1" comment="kernel-docs is &lt;3.0.101-63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065203" version="1" comment="kopete-devel is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107537" version="1" comment="krb5-devel is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107536" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109993" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109998" version="1" comment="libqt4-devel is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109997" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109996" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109999" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110000" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110003" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110001" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110002" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110004" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110005" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110008" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110006" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110007" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145532" version="1" comment="libadns-devel is &lt;1.4-73.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145533" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145534" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145535" version="1" comment="libapr1-devel is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145536" version="1" comment="libapr1-devel-32bit is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145537" version="1" comment="libarchive-devel is &lt;2.5.5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107078" version="1" comment="libasm-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107079" version="1" comment="libdw-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107080" version="1" comment="libebl-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107081" version="1" comment="libelf-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145538" version="1" comment="libblkid-devel is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145539" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145540" version="1" comment="libuuid-devel is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145541" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145542" version="1" comment="libbz2-devel is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145543" version="1" comment="libcap-devel is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145544" version="1" comment="libcgroup-devel is &lt;0.41.rc1-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109964" version="1" comment="libcurl-devel is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067210" version="1" comment="libdhcp6client-1_0-2 is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067211" version="1" comment="libdhcp6client-devel is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145545" version="1" comment="libdrm-devel is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145546" version="1" comment="libdrm-devel-32bit is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116240" version="1" comment="libevent-devel is &lt;1.4.5-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075065" version="1" comment="libexif-devel is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145547" version="1" comment="libexiv2-4-32bit is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145548" version="1" comment="libexiv2-4-x86 is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145549" version="1" comment="libexiv2-devel is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074697" version="1" comment="libexpat-devel is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098828" version="1" comment="libgadu is &lt;1.8.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098827" version="1" comment="libgadu-devel is &lt;1.8.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099940" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099939" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069324" version="1" comment="libgnomesu-devel is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108433" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108434" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099933" version="1" comment="libgpgme-devel is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099934" version="1" comment="libgpgme11-32bit is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099935" version="1" comment="libgpgme11-x86 is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145550" version="1" comment="libgtop-2_0-7-32bit is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145551" version="1" comment="libgtop-2_0-7-x86 is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145552" version="1" comment="libgtop-devel is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145553" version="1" comment="libguestfs-devel is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145554" version="1" comment="libid3tag is &lt;0.15.1b-130.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145555" version="1" comment="libid3tag-devel is &lt;0.15.1b-130.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106031" version="1" comment="libjasper-devel is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075214" version="1" comment="libjpeg-devel is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075213" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102975" version="1" comment="libksba-devel is &lt;1.0.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091592" version="1" comment="liblcms-devel is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091591" version="1" comment="liblcms-devel-32bit is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091593" version="1" comment="python-lcms is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145556" version="1" comment="libldb-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145557" version="1" comment="libnetapi-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145558" version="1" comment="libnetapi0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145559" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145560" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145561" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145562" version="1" comment="libtalloc-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145563" version="1" comment="libtdb-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145564" version="1" comment="libtevent-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145565" version="1" comment="libwbclient-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145566" version="1" comment="samba-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145567" version="1" comment="samba-test is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060145" version="1" comment="libmikmod is &lt;3.1.11a-116.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060144" version="1" comment="libmikmod-devel is &lt;3.1.11a-116.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116243" version="1" comment="mpfr-devel is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116244" version="1" comment="mpfr-devel-32bit is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107713" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145568" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076526" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108141" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108142" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145569" version="1" comment="libneon-devel is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058601" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058600" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145570" version="1" comment="newt-devel is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145571" version="1" comment="newt-static is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107896" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076093" version="1" comment="libotr-devel is &lt;3.2.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076437" version="1" comment="libpcp3 is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076443" version="1" comment="pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076438" version="1" comment="pcp-devel is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076439" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076440" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076441" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076442" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076444" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076445" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076446" version="1" comment="perl-PCP-MMV is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076447" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092701" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098836" version="1" comment="libpng-devel is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098835" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098773" version="1" comment="libpoppler-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098774" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098775" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098776" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098777" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076278" version="1" comment="libproxy-devel is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145572" version="1" comment="libpulse-devel is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145573" version="1" comment="readline-devel is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145574" version="1" comment="readline-devel-32bit is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102439" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102366" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102364" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102365" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102369" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102368" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102371" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102370" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102372" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102373" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102397" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102396" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102399" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102398" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102421" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102431" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102432" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102433" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102434" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102435" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102436" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102438" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102437" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102367" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102395" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102400" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102401" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102402" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102403" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102404" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102405" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102406" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102407" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102408" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102409" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102410" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102411" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102412" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102413" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102414" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102415" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102416" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102417" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102418" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102419" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102420" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102423" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102422" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102424" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102425" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102426" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102427" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102428" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102429" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102430" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102374" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102375" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102376" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102377" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102378" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102379" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102380" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102381" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102382" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102383" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102384" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102385" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102386" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102387" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102388" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102390" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102389" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102391" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102392" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102393" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102394" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073546" version="1" comment="libreoffice-testtool is &lt;3.4.5.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070840" version="1" comment="librsvg-devel is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145575" version="1" comment="libsamplerate-devel is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065586" version="1" comment="libsmi is &lt;0.4.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105657" version="1" comment="libsndfile-devel is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100015" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100014" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145576" version="1" comment="libsoup-devel is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145577" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098837" version="1" comment="libssh2 is &lt;0.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108440" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108441" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108443" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145578" version="1" comment="libsss_idmap-devel is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145579" version="1" comment="libsss_sudo-devel is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109682" version="1" comment="libtasn1-devel is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145580" version="1" comment="libthai is &lt;0.1.9-9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145581" version="1" comment="libthai-devel is &lt;0.1.9-9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091282" version="1" comment="libtiff-devel is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091281" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145582" version="1" comment="libtirpc-devel is &lt;0.2.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145583" version="1" comment="libtunepimp is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145584" version="1" comment="libtunepimp-devel is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145585" version="1" comment="libtunepimp5 is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075501" version="1" comment="nut-cgi is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075502" version="1" comment="nut-devel is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145586" version="1" comment="libvirt-devel is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145587" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073167" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145588" version="1" comment="libwebkit-1_0-1 is &lt;1.0.1-0.1.141" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145589" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145590" version="1" comment="libwebkit-devel is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145591" version="1" comment="libwebkit-lang is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052853" version="1" comment="libwmf is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052847" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052848" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052851" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052849" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052850" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052852" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145592" version="1" comment="libwpd-0_8-8 is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145593" version="1" comment="libwpd-devel is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145594" version="1" comment="libwpd-devel-doc is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101878" version="1" comment="libwsman-devel is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101879" version="1" comment="openwsman-python is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070142" version="1" comment="libxcrypt-devel is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145595" version="1" comment="libxine-devel is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145596" version="1" comment="libxine1 is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145597" version="1" comment="libxine1-32bit is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145598" version="1" comment="libxine1-gnome-vfs is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145599" version="1" comment="libxine1-pulse is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145600" version="1" comment="libxml is &lt;1.8.17-481.19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054822" version="1" comment="libxml-32bit is &lt;1.8.17-481.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145601" version="1" comment="libxml-devel is &lt;1.8.17-481.19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101773" version="1" comment="libxml2-devel is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101772" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091336" version="1" comment="libxslt-devel is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091335" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105487" version="1" comment="libyaml-devel is &lt;0.1.3-0.10.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098929" version="1" comment="lighttpd is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098923" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098924" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098925" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098926" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098927" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098928" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145602" version="1" comment="lxc-devel is &lt;0.8.0-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145603" version="1" comment="lynx is &lt;2.8.6-143.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098943" version="1" comment="lzo-devel is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098942" version="1" comment="lzo-devel-32bit is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060499" version="1" comment="memcached is &lt;1.2.6-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109208" version="1" comment="mercurial is &lt;2.3.2-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101255" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107498" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073046" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073047" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073053" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098907" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145604" version="1" comment="netatalk is &lt;2.0.3-249.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145605" version="1" comment="netatalk-devel is &lt;2.0.3-249.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052958" version="1" comment="novell-ipsec-tools is &lt;0.7.1-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052957" version="1" comment="novell-ipsec-tools-devel is &lt;0.7.1-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145606" version="1" comment="obex-data-server is &lt;0.4.6-2.7.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145607" version="1" comment="ofed-devel is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145608" version="1" comment="openCryptoki-devel is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109619" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109621" version="1" comment="openldap2-devel is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109620" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065557" version="1" comment="opensc-devel is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109697" version="1" comment="openslp-devel is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145609" version="1" comment="osc is &lt;0.139.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145610" version="1" comment="pam-devel is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145611" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066427" version="1" comment="pango-devel is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066426" version="1" comment="pango-devel-32bit is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065698" version="1" comment="pcsc-lite-devel is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074786" version="1" comment="perl-DBD-Pg is &lt;2.10.3-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145612" version="1" comment="perl-Tk-devel is &lt;804.028-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145613" version="1" comment="perl-base-32bit is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110212" version="1" comment="php53-devel is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110213" version="1" comment="php53-imap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110214" version="1" comment="php53-posix is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110215" version="1" comment="php53-readline is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110216" version="1" comment="php53-sockets is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110217" version="1" comment="php53-sqlite is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110218" version="1" comment="php53-tidy is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145614" version="1" comment="popt-devel is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145615" version="1" comment="popt-devel-32bit is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145616" version="1" comment="rpm-devel is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145617" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145618" version="1" comment="postgresql-devel is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145619" version="1" comment="postgresql94-devel is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099942" version="1" comment="ppp-devel is &lt;2.4.5.git-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093472" version="1" comment="pwlib is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093471" version="1" comment="pwlib-devel is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107377" version="1" comment="python-crypto is &lt;2.0.1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145620" version="1" comment="python-devel is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098909" version="1" comment="python-imaging-sane is &lt;1.1.6-168.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093641" version="1" comment="python-logilab-common is &lt;0.56.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100969" version="1" comment="python-lxml-doc is &lt;2.3.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145621" version="1" comment="python-setuptools is &lt;0.6c11-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075758" version="1" comment="qemu is &lt;0.10.1-0.5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145622" version="1" comment="qt3-devel is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145623" version="1" comment="qt3-devel-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145624" version="1" comment="qt3-devel-doc is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145625" version="1" comment="qt3-devel-tools is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145626" version="1" comment="qt3-devel-tools-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090611" version="1" comment="quagga-devel is &lt;0.99.15-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105480" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105482" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105483" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105484" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145627" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145628" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145629" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145630" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145631" version="1" comment="rubygem-rails-3_2 is &lt;3.2.12-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145632" version="1" comment="rubygem-railties-3_2 is &lt;3.2.12-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145633" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116288" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109143" version="1" comment="rubygem-bundler is &lt;1.7.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094589" version="1" comment="rubygem-i18n-0_6 is &lt;0.6.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077065" version="1" comment="rubygem-json_pure is &lt;1.2.0-0.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077210" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098930" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-0.12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076717" version="1" comment="rubygem-rdoc is &lt;3.9.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145634" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.1-0.7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098933" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098941" version="1" comment="sendmail-devel is &lt;8.14.3-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054843" version="1" comment="silc-toolkit is &lt;1.1.7-7.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054842" version="1" comment="silc-toolkit-devel is &lt;1.1.7-7.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109634" version="1" comment="struts is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109632" version="1" comment="struts-javadoc is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109633" version="1" comment="struts-manual is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108673" version="1" comment="subversion is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108668" version="1" comment="subversion-devel is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108669" version="1" comment="subversion-perl is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108670" version="1" comment="subversion-python is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108671" version="1" comment="subversion-server is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108672" version="1" comment="subversion-tools is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074607" version="1" comment="t1lib-devel is &lt;5.1.1-100.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074619" version="1" comment="taglib-devel is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077038" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145635" version="1" comment="texlive is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145636" version="1" comment="texlive-arab is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145637" version="1" comment="texlive-bin is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145638" version="1" comment="texlive-bin-cjk is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145639" version="1" comment="texlive-bin-devel is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145640" version="1" comment="texlive-bin-dvilj is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145641" version="1" comment="texlive-bin-jadetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145642" version="1" comment="texlive-bin-latex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145643" version="1" comment="texlive-bin-metapost is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145644" version="1" comment="texlive-bin-musictex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145645" version="1" comment="texlive-bin-omega is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145646" version="1" comment="texlive-bin-tex4ht is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145647" version="1" comment="texlive-bin-tools is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145648" version="1" comment="texlive-bin-xetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145649" version="1" comment="texlive-bin-xmltex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145650" version="1" comment="texlive-cjk is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145651" version="1" comment="texlive-context is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145652" version="1" comment="texlive-devel is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145653" version="1" comment="texlive-doc is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145654" version="1" comment="texlive-dvilj is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145655" version="1" comment="texlive-jadetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145656" version="1" comment="texlive-latex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145657" version="1" comment="texlive-latex-doc is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145658" version="1" comment="texlive-metapost is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145659" version="1" comment="texlive-musictex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145660" version="1" comment="texlive-omega is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145661" version="1" comment="texlive-ppower4 is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145662" version="1" comment="texlive-tex4ht is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145663" version="1" comment="texlive-tools is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145664" version="1" comment="texlive-xetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145665" version="1" comment="texlive-xmltex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145666" version="1" comment="trousers-devel is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145667" version="1" comment="unixODBC_23-devel is &lt;2.3.1-0.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145668" version="1" comment="valgrind is &lt;3.8.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145669" version="1" comment="valgrind-devel is &lt;3.8.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061712" version="1" comment="vte-devel is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117365" version="1" comment="wireshark-devel is &lt;1.10.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098849" version="1" comment="xalan-j2-demo is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098850" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098851" version="1" comment="xalan-j2-manual is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145670" version="1" comment="xen-devel is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108445" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108444" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077487" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077525" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077747" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077746" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077749" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077748" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077510" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077534" version="1" comment="xorg-x11-libXp-devel-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077753" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077752" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077757" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077756" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077755" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077754" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145671" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145672" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110271" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145673" version="1" comment="yast2-core-devel is &lt;2.17.46-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145674" version="1" comment="yast2-devel-doc is &lt;2.17.140-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562788" version="1" comment="python-Jinja2 is &lt;2.6-2.19.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562789" version="1" comment="python-azure-agent is &lt;2.2.45-28.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562790" version="1" comment="GraphicsMagick is &lt;1.2.5-4.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562791" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562792" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073771" version="1" comment="sled-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258809" version="1" comment="SLES_SAP-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073773" version="1" comment="sle-sdk-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562793" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562794" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562795" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562796" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562797" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562798" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562799" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562800" version="1" comment="Mesa-devel is &lt;7.11.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562801" version="1" comment="Mesa-devel-32bit is &lt;7.11.2-0.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562802" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562803" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562804" version="1" comment="php5 is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562805" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562806" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562807" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562808" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562809" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562810" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562811" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562812" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562813" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562814" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562815" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562816" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562817" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562818" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562819" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562820" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562821" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562822" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562823" version="1" comment="php5-json is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562824" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562825" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562826" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562827" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562828" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562829" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562830" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562831" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562832" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562833" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562834" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562835" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562836" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562837" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562838" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562839" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562840" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562841" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562842" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562843" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562844" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562845" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562846" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562847" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562848" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562849" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562850" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562851" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562852" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562853" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562854" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562855" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562856" version="1" comment="php53-devel is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562857" version="1" comment="php53-imap is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562858" version="1" comment="php53-posix is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562859" version="1" comment="php53-readline is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562860" version="1" comment="php53-sockets is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562861" version="1" comment="php53-sqlite is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562862" version="1" comment="php53-tidy is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562863" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562864" version="1" comment="automake is &lt;1.10.1-4.131.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562865" version="1" comment="bind-devel is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562866" version="1" comment="bind-devel-32bit is &lt;9.9.4P2-0.6.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562867" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562868" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562869" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562870" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562871" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562872" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562873" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562874" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562875" version="1" comment="mono-devel is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562876" version="1" comment="mono-extras is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562877" version="1" comment="mono-jscript is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562878" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562879" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562880" version="1" comment="mono-wcf is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562881" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562882" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562883" version="1" comment="mono-winfxcore is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562884" version="1" comment="monodoc-core is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562885" version="1" comment="libldb-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562886" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562887" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562888" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562889" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562890" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562891" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562892" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562893" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562894" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562895" version="1" comment="samba-devel is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562896" version="1" comment="cups-devel is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562897" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562898" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562899" version="1" comment="fastjar is &lt;0.95-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562900" version="1" comment="finch is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562901" version="1" comment="finch-devel is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562902" version="1" comment="libpurple is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562903" version="1" comment="libpurple-devel is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562904" version="1" comment="libpurple-lang is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562905" version="1" comment="pidgin is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562906" version="1" comment="pidgin-devel is &lt;2.6.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562907" version="1" comment="mozilla-nspr-devel is &lt;4.9.2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562908" version="1" comment="mozilla-nss-devel is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562909" version="1" comment="mozilla-nspr-devel is &lt;4.9.3-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562910" version="1" comment="mozilla-nss-devel is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562911" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562912" version="1" comment="mozilla-nss-devel is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562913" version="1" comment="beagle is &lt;0.3.8-56.51.1 for i586,ia64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562914" version="1" comment="beagle-devel is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562915" version="1" comment="beagle-lang is &lt;0.3.8-56.44.45.129 for i586,ia64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562916" version="1" comment="mozilla-nspr-devel is &lt;4.9.5-0.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562917" version="1" comment="mozilla-nss-devel is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562918" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562919" version="1" comment="mozilla-nss-devel is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562920" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562921" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562922" version="1" comment="freetype2-devel is &lt;2.3.7-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562923" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562924" version="1" comment="ghostscript-devel is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562925" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562926" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562927" version="1" comment="glibc-html is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562928" version="1" comment="glibc-info is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562929" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562930" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562931" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562932" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562933" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.23.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562934" version="1" comment="icu is &lt;4.0-7.26.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562935" version="1" comment="libicu-32bit is &lt;4.0-7.26.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562936" version="1" comment="libicu-devel is &lt;4.0-7.26.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562937" version="1" comment="libicu-devel-32bit is &lt;4.0-7.26.15 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562938" version="1" comment="inkscape is &lt;0.46-62.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562939" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562940" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562941" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562942" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562943" version="1" comment="inkscape-lang is &lt;0.46-62.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562944" version="1" comment="inn is &lt;2.4.2-170.21.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562945" version="1" comment="inn-devel is &lt;2.4.2-170.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562946" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562947" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.18-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562948" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562949" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562950" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562951" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.0-0.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562952" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562953" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562954" version="1" comment="libkde4-devel is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562955" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562956" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562957" version="1" comment="krb5-devel is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562958" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.58.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562959" version="1" comment="krb5-server is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562960" version="1" comment="liblcms-devel is &lt;1.17-77.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562961" version="1" comment="liblcms-devel-32bit is &lt;1.17-77.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562962" version="1" comment="python-lcms is &lt;1.17-77.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562963" version="1" comment="libldb-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562964" version="1" comment="libnetapi-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562965" version="1" comment="libnetapi0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562966" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562967" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562968" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562969" version="1" comment="libtalloc-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562970" version="1" comment="libtdb-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562971" version="1" comment="libtevent-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562972" version="1" comment="libwbclient-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562973" version="1" comment="samba-devel is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562974" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562975" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562976" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562977" version="1" comment="libqt4-devel is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562978" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562979" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.20.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562980" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562981" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562982" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562983" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562984" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562985" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562986" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562987" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562988" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562989" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562990" version="1" comment="postgresql91-devel is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562991" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562992" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.15.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562993" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562994" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562995" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562996" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562997" version="1" comment="libotr-devel is &lt;3.2.0-10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562998" version="1" comment="libpcp3 is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562999" version="1" comment="pcp is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563000" version="1" comment="pcp-devel is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563001" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563002" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563003" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563004" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563005" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563006" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563007" version="1" comment="perl-PCP-MMV is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563008" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563009" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563010" version="1" comment="libpoppler-devel is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563011" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563012" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563013" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563014" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563015" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563016" version="1" comment="libproxy-devel is &lt;0.3.1-2.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563017" version="1" comment="libreoffice is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563018" version="1" comment="libreoffice-base is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563019" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563020" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563021" version="1" comment="libreoffice-branding-upstream is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563022" version="1" comment="libreoffice-calc is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563023" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563024" version="1" comment="libreoffice-draw is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563025" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563026" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563027" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563028" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563029" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563030" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563031" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563032" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563033" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563034" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563035" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563036" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563037" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563038" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563039" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563040" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563041" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563042" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563043" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563044" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563045" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563046" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563047" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563048" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563049" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563050" version="1" comment="libreoffice-impress is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563051" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563052" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563053" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563054" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563055" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563056" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563057" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563058" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563059" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563060" version="1" comment="libreoffice-l10n-el is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563061" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563062" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563063" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563064" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563065" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563066" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563067" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563068" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563069" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563070" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563071" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563072" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563073" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563074" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563075" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563076" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563077" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563078" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563079" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563080" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563081" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563082" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563083" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563084" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563085" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563086" version="1" comment="libreoffice-math is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563087" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563088" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563089" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563090" version="1" comment="libreoffice-sdk is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563091" version="1" comment="libreoffice-writer is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563092" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563093" version="1" comment="libssh2 is &lt;0.2-5.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563094" version="1" comment="libtiff-devel is &lt;3.8.2-141.154.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563095" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.154.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563096" version="1" comment="libvirt-devel is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563097" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563098" version="1" comment="libvirt-devel is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563099" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563100" version="1" comment="libxml2-devel is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563101" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563102" version="1" comment="libxslt-devel is &lt;1.1.24-19.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563103" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563104" version="1" comment="libxslt-python is &lt;1.1.24-19.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563105" version="1" comment="lighttpd is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563106" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563107" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563108" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563109" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563110" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563111" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563112" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563113" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563114" version="1" comment="nagios is &lt;3.0.6-1.25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563115" version="1" comment="nagios-devel is &lt;3.0.6-1.25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563116" version="1" comment="nagios-www is &lt;3.0.6-1.25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563117" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563118" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563119" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563120" version="1" comment="perl-base-32bit is &lt;5.10.0-64.61.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563121" version="1" comment="perl-base-x86 is &lt;5.10.0-64.61.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563122" version="1" comment="python-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563123" version="1" comment="python-demo is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563124" version="1" comment="python-devel is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563125" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563126" version="1" comment="python-idle is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563127" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563128" version="1" comment="python-httplib2 is &lt;0.7.4-0.7.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563129" version="1" comment="qemu is &lt;0.10.1-0.5.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563130" version="1" comment="quagga is &lt;0.99.15-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563131" version="1" comment="quagga-devel is &lt;0.99.15-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563132" version="1" comment="rubygem-rack-1_3 is &lt;1.3.10-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563133" version="1" comment="rubygem-rack is &lt;1.1.6-0.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563134" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563135" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563136" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563137" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563138" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563139" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563140" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.17-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563141" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563142" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563143" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.17-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563144" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563145" version="1" comment="rubygem-rails is &lt;2.3.17-0.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563146" version="1" comment="rubygem-rails-2_3 is &lt;2.3.17-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563147" version="1" comment="rubygem-actionpack-2_1 is &lt;2.1.2-1.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563148" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563149" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.14-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563150" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.14-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563151" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563152" version="1" comment="rubygem-json_pure is &lt;1.2.0-0.4.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563153" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563154" version="1" comment="rubygem-rack-cache-1_1 is &lt;1.1-0.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563155" version="1" comment="rubygem-rdoc is &lt;3.9.1-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563156" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563157" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563158" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563159" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.5.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563160" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.5.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563161" version="1" comment="subversion is &lt;1.6.17-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563162" version="1" comment="subversion-devel is &lt;1.6.17-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563163" version="1" comment="subversion-perl is &lt;1.6.17-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563164" version="1" comment="subversion-python is &lt;1.6.17-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563165" version="1" comment="subversion-server is &lt;1.6.17-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563166" version="1" comment="subversion-tools is &lt;1.6.17-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563167" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563168" version="1" comment="wireshark is &lt;1.8.12-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563169" version="1" comment="wireshark-devel is &lt;1.8.12-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563170" version="1" comment="xen-devel is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563171" version="1" comment="libvirt-devel is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563172" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563173" version="1" comment="xen-devel is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563174" version="1" comment="xen-devel is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563175" version="1" comment="xen-devel is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563176" version="1" comment="xen-devel is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563177" version="1" comment="xen-devel is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563178" version="1" comment="xen-devel is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563179" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563180" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563181" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563182" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563183" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563184" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563185" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563186" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563187" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563188" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563189" version="1" comment="xorg-x11-libXp-devel-32bit is &lt;7.4-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563190" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563191" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563192" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563193" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563194" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563195" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563196" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563197" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.22.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563198" version="1" comment="MozillaFirefox-devel is &lt;24.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563199" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563200" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077540" version="1" comment="sled-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258810" version="1" comment="SLES_SAP-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077554" version="1" comment="sle-sdk-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563201" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563202" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563203" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563204" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563205" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563206" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563207" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563208" version="1" comment="MozillaFirefox-devel is &lt;17.0.9esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563209" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563210" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563211" version="1" comment="MozillaFirefox-devel is &lt;24.5.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563212" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563213" version="1" comment="mozilla-nss-devel is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563214" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563215" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563216" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563217" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563218" version="1" comment="a2ps-devel is &lt;4.13-1326.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563219" version="1" comment="apache2 is &lt;2.2.12-59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563220" version="1" comment="apache2-devel is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563221" version="1" comment="apache2-doc is &lt;2.2.12-59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563222" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563223" version="1" comment="apache2-prefork is &lt;2.2.12-59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563224" version="1" comment="apache2-utils is &lt;2.2.12-59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563225" version="1" comment="apache2-worker is &lt;2.2.12-59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563226" version="1" comment="php53-devel is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563227" version="1" comment="php53-imap is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563228" version="1" comment="php53-posix is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563229" version="1" comment="php53-readline is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563230" version="1" comment="php53-sockets is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563231" version="1" comment="php53-sqlite is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563232" version="1" comment="php53-tidy is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563233" version="1" comment="augeas-devel is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563234" version="1" comment="augeas-devel is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563235" version="1" comment="libreadline5 is &lt;5.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563236" version="1" comment="readline-devel is &lt;5.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563237" version="1" comment="readline-devel-32bit is &lt;5.2-147.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563238" version="1" comment="bind-devel is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563239" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.12.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563240" version="1" comment="bind-devel is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563241" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.15.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563242" version="1" comment="bind-devel is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563243" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.19.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563244" version="1" comment="bind-devel is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563245" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.22.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563246" version="1" comment="binutils-devel is &lt;2.23.1-0.23.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563247" version="1" comment="binutils-devel-32bit is &lt;2.23.1-0.23.15 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563248" version="1" comment="binutils-gold is &lt;2.23.1-0.23.15 for i586,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563249" version="1" comment="cross-ppc-binutils is &lt;2.23.1-0.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563250" version="1" comment="cross-spu-binutils is &lt;2.23.1-0.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563251" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563252" version="1" comment="cups-devel is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563253" version="1" comment="libcurl-devel is &lt;7.19.7-1.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563254" version="1" comment="libcurl-devel is &lt;7.19.7-1.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563255" version="1" comment="libcurl-devel is &lt;7.19.7-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563256" version="1" comment="dbus-1-devel is &lt;1.2.10-3.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563257" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563258" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563259" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563260" version="1" comment="libblkid-devel is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563261" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.62.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563262" version="1" comment="libcom_err-devel is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563263" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563264" version="1" comment="libext2fs-devel is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563265" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563266" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563267" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.10.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563268" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563269" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.62.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563270" version="1" comment="libasm-devel is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563271" version="1" comment="libdw-devel is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563272" version="1" comment="libebl-devel is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563273" version="1" comment="libelf-devel is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563274" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563275" version="1" comment="emacs-nox is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563276" version="1" comment="evolution-data-server-devel is &lt;2.28.2-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563277" version="1" comment="file-devel is &lt;4.24-43.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563278" version="1" comment="python-magic is &lt;4.24-43.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563279" version="1" comment="finch is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563280" version="1" comment="finch-devel is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563281" version="1" comment="libpurple is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563282" version="1" comment="libpurple-devel is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563283" version="1" comment="libpurple-lang is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563284" version="1" comment="pidgin is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563285" version="1" comment="pidgin-devel is &lt;2.6.6-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563286" version="1" comment="MozillaFirefox-devel is &lt;17.0.7esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563287" version="1" comment="MozillaFirefox-devel is &lt;17.0.10esr-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563288" version="1" comment="MozillaFirefox-devel is &lt;24.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563289" version="1" comment="mozilla-nss-devel is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563290" version="1" comment="MozillaFirefox-devel is &lt;24.4.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563291" version="1" comment="MozillaFirefox-devel is &lt;24.7.0esr-0.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563292" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563293" version="1" comment="MozillaFirefox-devel is &lt;24.8.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563294" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563295" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563296" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563297" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-0.8.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563298" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563299" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563300" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563301" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563302" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563303" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-25.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563304" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563305" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563306" version="1" comment="MozillaFirefox-devel is &lt;24.2.0esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563307" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563308" version="1" comment="MozillaFirefox-devel is &lt;31.2.0esr-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563309" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563310" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563311" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563312" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563313" version="1" comment="flac-devel is &lt;1.2.1-68.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563314" version="1" comment="libFLAC++6-32bit is &lt;1.2.1-68.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563315" version="1" comment="libFLAC++6-x86 is &lt;1.2.1-68.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563316" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563317" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563318" version="1" comment="freetype2-devel is &lt;2.3.7-25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563319" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563320" version="1" comment="fuse-devel is &lt;2.8.7-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563321" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563322" version="1" comment="giflib-devel is &lt;4.1.6-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563323" version="1" comment="giflib-devel-32bit is &lt;4.1.6-13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563324" version="1" comment="gimp is &lt;2.6.2-3.34.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563325" version="1" comment="gimp-devel is &lt;2.6.2-3.34.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563326" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563327" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563328" version="1" comment="git is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563329" version="1" comment="git-arch is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563330" version="1" comment="git-core is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563331" version="1" comment="git-cvs is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563332" version="1" comment="git-daemon is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563333" version="1" comment="git-email is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563334" version="1" comment="git-gui is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563335" version="1" comment="git-svn is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563336" version="1" comment="git-web is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563337" version="1" comment="gitk is &lt;1.7.12.4-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563338" version="1" comment="git is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563339" version="1" comment="git-arch is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563340" version="1" comment="git-core is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563341" version="1" comment="git-cvs is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563342" version="1" comment="git-daemon is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563343" version="1" comment="git-email is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563344" version="1" comment="git-gui is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563345" version="1" comment="git-svn is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563346" version="1" comment="git-web is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563347" version="1" comment="gitk is &lt;1.7.12.4-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563348" version="1" comment="glibc-html is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563349" version="1" comment="glibc-info is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563350" version="1" comment="glibc-html is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563351" version="1" comment="glibc-info is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563352" version="1" comment="glibc-html is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563353" version="1" comment="glibc-info is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563354" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563355" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563356" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563357" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563358" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563359" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563360" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563361" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563362" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563363" version="1" comment="libgpgme-devel is &lt;1.1.6-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563364" version="1" comment="libgpgme11-32bit is &lt;1.1.6-25.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563365" version="1" comment="libgpgme11-x86 is &lt;1.1.6-25.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563366" version="1" comment="gtk2-devel is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563367" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.35.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563368" version="1" comment="gtk2-devel is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563369" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.39.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563370" version="1" comment="libguestfs-devel is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563371" version="1" comment="icu is &lt;4.0-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563372" version="1" comment="libicu-32bit is &lt;4.0-7.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563373" version="1" comment="libicu-devel is &lt;4.0-7.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563374" version="1" comment="libicu-devel-32bit is &lt;4.0-7.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563375" version="1" comment="libjasper-devel is &lt;1.900.1-134.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563376" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563377" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563378" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563379" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563380" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563381" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563382" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563383" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563384" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563385" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563386" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.10-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563387" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.20-42.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563388" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563389" version="1" comment="kde4-l10n-de-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563390" version="1" comment="kde4-l10n-de-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563391" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563392" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563393" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563394" version="1" comment="libkde4-devel is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563395" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563396" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563397" version="1" comment="kernel-docs is &lt;3.0.101-0.47.71.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563398" version="1" comment="krb5-devel is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563399" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.62.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563400" version="1" comment="krb5-server is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563401" version="1" comment="krb5-devel is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563402" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563403" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563404" version="1" comment="krb5-devel is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563405" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.103.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563406" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563407" version="1" comment="krb5-devel is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563408" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563409" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563410" version="1" comment="krb5-devel is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563411" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563412" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563413" version="1" comment="krb5-devel is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563414" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.68.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563415" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563416" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563417" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563418" version="1" comment="liblcms2-devel is &lt;2.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563419" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563420" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563421" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563422" version="1" comment="libqt4-devel is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563423" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563424" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563425" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563426" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563427" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563428" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563429" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563430" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563431" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563432" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563433" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563434" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563435" version="1" comment="postgresql91-devel is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563436" version="1" comment="libevent-devel is &lt;1.4.5-24.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563437" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563438" version="1" comment="libgadu is &lt;1.8.2-1.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563439" version="1" comment="libgadu-devel is &lt;1.8.2-1.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563440" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563441" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563442" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563443" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563444" version="1" comment="libksba-devel is &lt;1.0.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563445" version="1" comment="libksba-devel is &lt;1.0.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563446" version="1" comment="lzo-devel is &lt;2.03-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563447" version="1" comment="lzo-devel-32bit is &lt;2.03-12.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563448" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563449" version="1" comment="mpfr-devel is &lt;2.3.2-3.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563450" version="1" comment="mpfr-devel-32bit is &lt;2.3.2-3.118.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563451" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563452" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563453" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563454" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.39-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563455" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.13 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563456" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.13 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563457" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563458" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563459" version="1" comment="libpng-devel is &lt;1.2.31-5.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563460" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563461" version="1" comment="libpng-devel is &lt;1.2.31-5.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563462" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563463" version="1" comment="libpng-devel is &lt;1.2.31-5.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563464" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563465" version="1" comment="libpoppler-devel is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563466" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563467" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563468" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563469" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563470" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563471" version="1" comment="libpulse-devel is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563472" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563473" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563474" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563475" version="1" comment="libqt4-devel is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563476" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563477" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563478" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563479" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563480" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563481" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563482" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563483" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563484" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563485" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563486" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563487" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563488" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563489" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563490" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563491" version="1" comment="libqt4-devel is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563492" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563493" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563494" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563495" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563496" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563497" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563498" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563499" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563500" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563501" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563502" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563503" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563504" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563505" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563506" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563507" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563508" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563509" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563510" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563511" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563512" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563513" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563514" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563515" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563516" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563517" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563518" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563519" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563520" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563521" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563522" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563523" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563524" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563525" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563526" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563527" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563528" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563529" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563530" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563531" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563532" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563533" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563534" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563535" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563536" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563537" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563538" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563539" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563540" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563541" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563542" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563543" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563544" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563545" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563546" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563547" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563548" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563549" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563550" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563551" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563552" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563553" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563554" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563555" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563556" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563557" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563558" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563559" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563560" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563561" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563562" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563563" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563564" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563565" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563566" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563567" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563568" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563569" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563570" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563571" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563572" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563573" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563574" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563575" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563576" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563577" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563578" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563579" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563580" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563581" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563582" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563583" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563584" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563585" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563586" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563587" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563588" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563589" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563590" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563591" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563592" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563593" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563594" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563595" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563596" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563597" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563598" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563599" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563600" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563601" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563602" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563603" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563604" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563605" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563606" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563607" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563608" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563609" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563610" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563611" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563612" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563613" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563614" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563615" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563616" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563617" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563618" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563619" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563620" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563621" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563622" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563623" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563624" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563625" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563626" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563627" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563628" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563629" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563630" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563631" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563632" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563633" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563634" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563635" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563636" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563637" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563638" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563639" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563640" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563641" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563642" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563643" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563644" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563645" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563646" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563647" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563648" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563649" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563650" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563651" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563652" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563653" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563654" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563655" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563656" version="1" comment="librsvg-devel is &lt;2.26.0-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563657" version="1" comment="libsndfile-devel is &lt;1.0.20-2.6.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563658" version="1" comment="libsndfile-devel is &lt;1.0.20-2.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563659" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563660" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563661" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.22.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563662" version="1" comment="libssh2 is &lt;0.2-5.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563663" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563664" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563665" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563666" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563667" version="1" comment="libtasn1-devel is &lt;1.5-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563668" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563669" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563670" version="1" comment="LibVNCServer-devel is &lt;0.9.1-156.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563671" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563672" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.29.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563673" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.29.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563674" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.29.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563675" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.29.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563676" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.29.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563677" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.29.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563678" version="1" comment="libwsman-devel is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563679" version="1" comment="openwsman-python is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563680" version="1" comment="libxml2-devel is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563681" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563682" version="1" comment="libxml2-devel is &lt;2.7.6-0.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563683" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563684" version="1" comment="libxml2-devel is &lt;2.7.6-0.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563685" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563686" version="1" comment="libyaml-devel is &lt;0.1.3-0.10.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563687" version="1" comment="lighttpd is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563688" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563689" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563690" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563691" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563692" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563693" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563694" version="1" comment="lxc is &lt;0.8.0-0.21.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563695" version="1" comment="lxc-devel is &lt;0.8.0-0.21.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563696" version="1" comment="lxc is &lt;0.8.0-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563697" version="1" comment="lxc-devel is &lt;0.8.0-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563698" version="1" comment="mercurial is &lt;2.3.2-0.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563699" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563700" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563701" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563702" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563703" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563704" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563705" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563706" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563707" version="1" comment="mono-devel is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563708" version="1" comment="mono-extras is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563709" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563710" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563711" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563712" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563713" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563714" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563715" version="1" comment="mono-winfxcore is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563716" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563717" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-31.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563718" version="1" comment="mozilla-nss-devel is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563719" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563720" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563721" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563722" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563723" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.45-0.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563724" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563725" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.46-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563726" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563727" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.47-0.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563728" version="1" comment="nagios is &lt;3.0.6-1.25.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563729" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563730" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563731" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563732" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563733" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.24.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563734" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563735" version="1" comment="openldap2 is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563736" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563737" version="1" comment="openldap2-devel is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563738" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563739" version="1" comment="openldap2 is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563740" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563741" version="1" comment="openldap2-devel is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563742" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563743" version="1" comment="openldap2 is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563744" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563745" version="1" comment="openldap2-devel is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563746" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.62.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563747" version="1" comment="openslp-devel is &lt;1.2.0-172.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563748" version="1" comment="openslp-server is &lt;1.2.0-172.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563749" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563750" version="1" comment="osc is &lt;0.152.0-6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563751" version="1" comment="pam-devel is &lt;1.1.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563752" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563753" version="1" comment="perl-base-32bit is &lt;5.10.0-64.70.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563754" version="1" comment="php53-devel is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563755" version="1" comment="php53-imap is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563756" version="1" comment="php53-posix is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563757" version="1" comment="php53-readline is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563758" version="1" comment="php53-sockets is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563759" version="1" comment="php53-sqlite is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563760" version="1" comment="php53-tidy is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563761" version="1" comment="php53-devel is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563762" version="1" comment="php53-imap is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563763" version="1" comment="php53-posix is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563764" version="1" comment="php53-readline is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563765" version="1" comment="php53-sockets is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563766" version="1" comment="php53-sqlite is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563767" version="1" comment="php53-tidy is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563768" version="1" comment="popt-devel is &lt;1.7-37.60.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563769" version="1" comment="popt-devel-32bit is &lt;1.7-37.60.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563770" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563771" version="1" comment="rpm-devel is &lt;4.4.2.3-37.60.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563772" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.60.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563773" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.60.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563774" version="1" comment="postgresql94-devel is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563775" version="1" comment="postgresql91-devel is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563776" version="1" comment="postgresql91-devel is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563777" version="1" comment="postgresql91-devel is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563778" version="1" comment="ppp-devel is &lt;2.4.5.git-2.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563779" version="1" comment="pwlib is &lt;1.10.10-120.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563780" version="1" comment="pwlib-devel is &lt;1.10.10-120.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563781" version="1" comment="python-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563782" version="1" comment="python-demo is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563783" version="1" comment="python-devel is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563784" version="1" comment="python-doc is &lt;2.6-8.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563785" version="1" comment="python-doc-pdf is &lt;2.6-8.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563786" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563787" version="1" comment="python-idle is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563788" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563789" version="1" comment="python-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563790" version="1" comment="python-demo is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563791" version="1" comment="python-devel is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563792" version="1" comment="python-doc is &lt;2.6-8.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563793" version="1" comment="python-doc-pdf is &lt;2.6-8.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563794" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563795" version="1" comment="python-idle is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563796" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563797" version="1" comment="python-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563798" version="1" comment="python-demo is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563799" version="1" comment="python-devel is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563800" version="1" comment="python-doc is &lt;2.6-8.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563801" version="1" comment="python-doc-pdf is &lt;2.6-8.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563802" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563803" version="1" comment="python-idle is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563804" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563805" version="1" comment="python-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563806" version="1" comment="python-demo is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563807" version="1" comment="python-devel is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563808" version="1" comment="python-doc is &lt;2.6-8.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563809" version="1" comment="python-doc-pdf is &lt;2.6-8.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563810" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563811" version="1" comment="python-idle is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563812" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563813" version="1" comment="python-imaging is &lt;1.1.6-168.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563814" version="1" comment="python-imaging-sane is &lt;1.1.6-168.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563815" version="1" comment="python-logilab-common is &lt;0.56.2-1.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563816" version="1" comment="python-lxml is &lt;2.3.6-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563817" version="1" comment="python-lxml-doc is &lt;2.3.6-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563818" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563819" version="1" comment="python-setuptools is &lt;0.6c11-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563820" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563821" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563822" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563823" version="1" comment="sendmail is &lt;8.14.3-50.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563824" version="1" comment="sendmail-devel is &lt;8.14.3-50.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563825" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563826" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563827" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563828" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563829" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563830" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563831" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563832" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563833" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563834" version="1" comment="rubygem-bundler is &lt;1.7.0-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563835" version="1" comment="rubygem-i18n-0_6 is &lt;0.6.0-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563836" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563837" version="1" comment="rubygem-rack is &lt;1.1.6-0.11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563838" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.7.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563839" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-0.12.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563840" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563841" version="1" comment="libldb-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563842" version="1" comment="libnetapi-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563843" version="1" comment="libnetapi0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563844" version="1" comment="libsmbclient-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563845" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563846" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563847" version="1" comment="libtalloc-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563848" version="1" comment="libtdb-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563849" version="1" comment="libtevent-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563850" version="1" comment="libwbclient-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563851" version="1" comment="samba-devel is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563852" version="1" comment="samba-test is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563853" version="1" comment="libldb-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563854" version="1" comment="libnetapi-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563855" version="1" comment="libnetapi0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563856" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563857" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563858" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563859" version="1" comment="libtalloc-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563860" version="1" comment="libtdb-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563861" version="1" comment="libtevent-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563862" version="1" comment="libwbclient-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563863" version="1" comment="samba-devel is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563864" version="1" comment="libldb-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563865" version="1" comment="libnetapi-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563866" version="1" comment="libnetapi0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563867" version="1" comment="libsmbclient-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563868" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563869" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563870" version="1" comment="libtalloc-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563871" version="1" comment="libtdb-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563872" version="1" comment="libtevent-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563873" version="1" comment="libwbclient-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563874" version="1" comment="samba-devel is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563875" version="1" comment="samba-test is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563876" version="1" comment="gnu-efi is &lt;3.0u-0.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563877" version="1" comment="struts is &lt;1.2.9-162.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563878" version="1" comment="struts-javadoc is &lt;1.2.9-162.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563879" version="1" comment="struts-manual is &lt;1.2.9-162.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563880" version="1" comment="subversion is &lt;1.6.17-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563881" version="1" comment="subversion-devel is &lt;1.6.17-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563882" version="1" comment="subversion-perl is &lt;1.6.17-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563883" version="1" comment="subversion-python is &lt;1.6.17-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563884" version="1" comment="subversion-server is &lt;1.6.17-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563885" version="1" comment="subversion-tools is &lt;1.6.17-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563886" version="1" comment="libtidy is &lt;1.0-37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563887" version="1" comment="libtidy-devel is &lt;1.0-37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563888" version="1" comment="tidy is &lt;1.0-37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563889" version="1" comment="libtiff-devel is &lt;3.8.2-141.160.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563890" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.160.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563891" version="1" comment="wireshark is &lt;1.10.11-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563892" version="1" comment="wireshark-devel is &lt;1.10.11-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563893" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563894" version="1" comment="wireshark-devel is &lt;1.12.7-0.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563895" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563896" version="1" comment="wireshark-devel is &lt;1.12.9-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563897" version="1" comment="xalan-j2-demo is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563898" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563899" version="1" comment="xalan-j2-manual is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563900" version="1" comment="xen-devel is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563901" version="1" comment="xen-devel is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563902" version="1" comment="xen-devel is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563903" version="1" comment="xen-devel is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563904" version="1" comment="xen-devel is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563905" version="1" comment="xen-devel is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563906" version="1" comment="xen-devel is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563907" version="1" comment="xen-devel is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563908" version="1" comment="xen-devel is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563909" version="1" comment="xen-devel is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563910" version="1" comment="xen-devel is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563911" version="1" comment="xen-devel is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563912" version="1" comment="xfsprogs-devel is &lt;3.1.8-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563913" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563914" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.42.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563915" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563916" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563917" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563918" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563919" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563920" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563921" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563922" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563923" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563924" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563925" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563926" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563927" version="1" comment="libbotan-devel is &lt;1.6.5-4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563928" version="1" comment="libbotan-1_6_5 is &lt;1.6.5-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563929" version="1" comment="libbotan-devel is &lt;1.6.5-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563930" version="1" comment="GraphicsMagick is &lt;1.2.5-4.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563931" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563932" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563933" version="1" comment="GraphicsMagick is &lt;1.2.5-4.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563934" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563935" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563936" version="1" comment="GraphicsMagick is &lt;1.2.5-4.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563937" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563938" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563939" version="1" comment="GraphicsMagick is &lt;1.2.5-4.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563940" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563941" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563942" version="1" comment="GraphicsMagick is &lt;1.2.5-4.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563943" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563944" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563945" version="1" comment="GraphicsMagick is &lt;1.2.5-4.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563946" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563947" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563948" version="1" comment="GraphicsMagick is &lt;1.2.5-4.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563949" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563950" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563951" version="1" comment="GraphicsMagick is &lt;1.2.5-4.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563952" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563953" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563954" version="1" comment="GraphicsMagick is &lt;1.2.5-4.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563955" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563956" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563957" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563958" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563959" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563960" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563961" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563962" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563963" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563964" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563965" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563966" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563967" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563968" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563969" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563970" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563971" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563972" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563973" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563974" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563975" version="1" comment="GraphicsMagick is &lt;1.2.5-4.78.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563976" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.78.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563977" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.78.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563978" version="1" comment="GraphicsMagick is &lt;1.2.5-78.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563979" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563980" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563981" version="1" comment="GraphicsMagick is &lt;1.2.5-78.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563982" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563983" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563984" version="1" comment="GraphicsMagick is &lt;1.2.5-78.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563985" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563986" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563987" version="1" comment="GraphicsMagick is &lt;1.2.5-78.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563988" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563989" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563990" version="1" comment="GraphicsMagick is &lt;1.2.5-78.66.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563991" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.66.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563992" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.66.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563993" version="1" comment="GraphicsMagick is &lt;1.2.5-78.72.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563994" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.72.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563995" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.72.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563996" version="1" comment="GraphicsMagick is &lt;1.2.5-78.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563997" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563998" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563999" version="1" comment="GraphicsMagick is &lt;1.2.5-78.85.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564000" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-78.85.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564001" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-78.85.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564002" version="1" comment="ImageMagick is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564003" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564004" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564005" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564006" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564007" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564008" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564009" version="1" comment="ImageMagick is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564010" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564011" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564012" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564013" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564014" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564015" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564016" version="1" comment="ImageMagick is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564017" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564018" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564019" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564020" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564021" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564022" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564023" version="1" comment="ImageMagick is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564024" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564025" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564026" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564027" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564028" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.45.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564029" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564030" version="1" comment="ImageMagick is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564031" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564032" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564033" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564034" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564035" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564036" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564037" version="1" comment="ImageMagick is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564038" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564039" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564040" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564041" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564042" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.54.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564043" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564044" version="1" comment="ImageMagick is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564045" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564046" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564047" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564048" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564049" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564050" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564051" version="1" comment="ImageMagick is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564052" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564053" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564054" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564055" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564056" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564057" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564058" version="1" comment="ImageMagick is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564059" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564060" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564061" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564062" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564063" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.77.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564064" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564065" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564066" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564067" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564068" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564069" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564070" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.5.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564071" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564072" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564073" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564074" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564075" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564076" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564077" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564078" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564079" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564080" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564081" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564082" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564083" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564084" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564085" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564086" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564087" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564088" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564089" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564090" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564091" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564092" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564093" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564094" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564095" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564096" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564097" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564098" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564099" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564100" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564101" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564102" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564103" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564104" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564105" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564106" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564107" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564108" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564109" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564110" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564111" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564112" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564113" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564114" version="1" comment="ImageMagick is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564115" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564116" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564117" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564118" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564119" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.78.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564120" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564121" version="1" comment="ImageMagick is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564122" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564123" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564124" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564125" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564126" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564127" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564128" version="1" comment="ImageMagick is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564129" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564130" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564131" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564132" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564133" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.45.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564134" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564135" version="1" comment="ImageMagick is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564136" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564137" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564138" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564139" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564140" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564141" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564142" version="1" comment="ImageMagick is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564143" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564144" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564145" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564146" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564147" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.59.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564148" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564149" version="1" comment="ImageMagick is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564150" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564151" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564152" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564153" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564154" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564155" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564156" version="1" comment="ImageMagick is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564157" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564158" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564159" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564160" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564161" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.79.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564162" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564163" version="1" comment="ImageMagick is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564164" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564165" version="1" comment="libMagick++-devel is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564166" version="1" comment="libMagick++1 is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564167" version="1" comment="libMagickWand1 is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564168" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-78.92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564169" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564170" version="1" comment="LibVNCServer-devel is &lt;0.9.1-159.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564171" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564172" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564173" version="1" comment="LibVNCServer-devel is &lt;0.9.1-160.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564174" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564175" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564176" version="1" comment="mozilla-nspr-devel is &lt;4.12-26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564177" version="1" comment="mozilla-nss-devel is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564178" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-45.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564179" version="1" comment="firefox-fontconfig-devel is &lt;2.11.0-2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564180" version="1" comment="mozilla-nspr-devel is &lt;4.12-29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564181" version="1" comment="mozilla-nss-devel is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564182" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564183" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564184" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564185" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-65.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564186" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564187" version="1" comment="MozillaFirefox-devel is &lt;45.9.0esr-71.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564188" version="1" comment="mozilla-nspr-devel is &lt;4.13.1-32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564189" version="1" comment="mozilla-nss-devel is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564190" version="1" comment="MozillaFirefox-devel is &lt;52.2.0esr-72.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564191" version="1" comment="mozilla-nss-devel is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564192" version="1" comment="MozillaFirefox-devel is &lt;52.3.0esr-72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564193" version="1" comment="MozillaFirefox-devel is &lt;52.5.0esr-72.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564194" version="1" comment="MozillaFirefox-devel is &lt;52.6.0esr-72.20.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564195" version="1" comment="MozillaFirefox-devel is &lt;52.7.3esr-72.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564196" version="1" comment="MozillaFirefox-devel is &lt;52.8.0esr-72.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564197" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-72.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564198" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-72.38.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564199" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-37.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564200" version="1" comment="mozilla-nspr-devel is &lt;4.12-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564201" version="1" comment="mozilla-nss-devel is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564202" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564203" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564204" version="1" comment="SDL-32bit is &lt;1.2.13-106.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564205" version="1" comment="SDL-devel is &lt;1.2.13-106.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564206" version="1" comment="SDL-devel-32bit is &lt;1.2.13-106.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564207" version="1" comment="SDL_image is &lt;1.2.6-84.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564208" version="1" comment="SDL_image-devel is &lt;1.2.6-84.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564209" version="1" comment="SDL_image is &lt;1.2.6-84.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564210" version="1" comment="SDL_image-devel is &lt;1.2.6-84.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564211" version="1" comment="xen-devel is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564212" version="1" comment="Xerces-c is &lt;2.8.0-29.17.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564213" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.17.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564214" version="1" comment="libXerces-c28 is &lt;2.8.0-29.17.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564215" version="1" comment="ant is &lt;1.7.1-20.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564216" version="1" comment="ant-antlr is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564217" version="1" comment="ant-apache-bcel is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564218" version="1" comment="ant-apache-bsf is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564219" version="1" comment="ant-apache-log4j is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564220" version="1" comment="ant-apache-oro is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564221" version="1" comment="ant-apache-regexp is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564222" version="1" comment="ant-apache-resolver is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564223" version="1" comment="ant-commons-logging is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564224" version="1" comment="ant-javamail is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564225" version="1" comment="ant-jdepend is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564226" version="1" comment="ant-jmf is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564227" version="1" comment="ant-junit is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564228" version="1" comment="ant-manual is &lt;1.7.1-20.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564229" version="1" comment="ant-nodeps is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564230" version="1" comment="ant-scripts is &lt;1.7.1-20.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564231" version="1" comment="ant-swing is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564232" version="1" comment="ant-trax is &lt;1.7.1-16.11.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564233" version="1" comment="apache2 is &lt;2.2.12-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564234" version="1" comment="apache2-devel is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564235" version="1" comment="apache2-doc is &lt;2.2.12-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564236" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564237" version="1" comment="apache2-prefork is &lt;2.2.12-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564238" version="1" comment="apache2-utils is &lt;2.2.12-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564239" version="1" comment="apache2-worker is &lt;2.2.12-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564240" version="1" comment="apache2 is &lt;2.2.12-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564241" version="1" comment="apache2-devel is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564242" version="1" comment="apache2-doc is &lt;2.2.12-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564243" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564244" version="1" comment="apache2-prefork is &lt;2.2.12-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564245" version="1" comment="apache2-utils is &lt;2.2.12-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564246" version="1" comment="apache2-worker is &lt;2.2.12-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564247" version="1" comment="apache2 is &lt;2.2.34-70.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564248" version="1" comment="apache2-devel is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564249" version="1" comment="apache2-doc is &lt;2.2.34-70.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564250" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564251" version="1" comment="apache2-prefork is &lt;2.2.34-70.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564252" version="1" comment="apache2-utils is &lt;2.2.34-70.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564253" version="1" comment="apache2-worker is &lt;2.2.34-70.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564254" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564255" version="1" comment="apache2-devel is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564256" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564257" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564258" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564259" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564260" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564261" version="1" comment="apache2 is &lt;2.2.34-70.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564262" version="1" comment="apache2-devel is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564263" version="1" comment="apache2-doc is &lt;2.2.34-70.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564264" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564265" version="1" comment="apache2-prefork is &lt;2.2.34-70.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564266" version="1" comment="apache2-utils is &lt;2.2.34-70.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564267" version="1" comment="apache2-worker is &lt;2.2.34-70.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564268" version="1" comment="apache2 is &lt;2.2.34-70.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564269" version="1" comment="apache2-devel is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564270" version="1" comment="apache2-doc is &lt;2.2.34-70.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564271" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564272" version="1" comment="apache2-prefork is &lt;2.2.34-70.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564273" version="1" comment="apache2-utils is &lt;2.2.34-70.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564274" version="1" comment="apache2-worker is &lt;2.2.34-70.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564275" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564276" version="1" comment="audiofile-devel is &lt;0.2.6-142.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564277" version="1" comment="augeas-devel is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564278" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564279" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564280" version="1" comment="avahi-mono is &lt;0.6.23-35.6.1 for i586,ia64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564281" version="1" comment="libavahi-devel is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564282" version="1" comment="libavahi-glib-devel is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564283" version="1" comment="libavahi-gobject-devel is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564284" version="1" comment="libavahi-gobject0 is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564285" version="1" comment="libavahi-ui0 is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564286" version="1" comment="libhowl0 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564287" version="1" comment="python-avahi is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564288" version="1" comment="python-avahi-gtk is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564289" version="1" comment="libreadline5 is &lt;5.2-147.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564290" version="1" comment="readline-devel is &lt;5.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564291" version="1" comment="readline-devel-32bit is &lt;5.2-147.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564292" version="1" comment="libreadline5 is &lt;5.2-147.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564293" version="1" comment="readline-devel is &lt;5.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564294" version="1" comment="readline-devel-32bit is &lt;5.2-147.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564295" version="1" comment="bind-devel is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564296" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.25.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564297" version="1" comment="bind-devel is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564298" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.30.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564299" version="1" comment="bind-devel is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564300" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.33.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564301" version="1" comment="bind-devel is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564302" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.36.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564303" version="1" comment="bind-devel is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564304" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.39.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564305" version="1" comment="bind-devel is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564306" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.44.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564307" version="1" comment="bind-devel is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564308" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.47.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564309" version="1" comment="bind-devel is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564310" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.50.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564311" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564312" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.51.7.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564313" version="1" comment="libarchive-devel is &lt;2.5.5-9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564314" version="1" comment="bsh2 is &lt;2.0-318.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564315" version="1" comment="bsh2-classgen is &lt;2.0-318.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564316" version="1" comment="bsh2-javadoc is &lt;2.0-318.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564317" version="1" comment="build is &lt;20171128-8.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564318" version="1" comment="osc is &lt;0.162.1-7.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564319" version="1" comment="bzr is &lt;1.8-3.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564320" version="1" comment="cairo-devel is &lt;1.8.8-2.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564321" version="1" comment="cairo-devel-32bit is &lt;1.8.8-2.3.7.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564322" version="1" comment="cairo-doc is &lt;1.8.8-2.3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564323" version="1" comment="cracklib-devel is &lt;2.8.12-56.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564324" version="1" comment="crash is &lt;7.0.9-30.3.28 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564325" version="1" comment="crash-devel is &lt;7.0.9-30.3.28 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564326" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564327" version="1" comment="cups-devel is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564328" version="1" comment="libcurl-devel is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564329" version="1" comment="libcurl-devel is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564330" version="1" comment="libcurl-devel is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564331" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564332" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564333" version="1" comment="libcurl-devel is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564334" version="1" comment="libcurl-devel is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564335" version="1" comment="libcurl-devel is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564336" version="1" comment="libcurl-devel is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564337" version="1" comment="libcurl-devel is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564338" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564339" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564340" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564341" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564342" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564343" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564344" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564345" version="1" comment="dom4j is &lt;1.6.1-8.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564346" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564347" version="1" comment="evince-devel is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564348" version="1" comment="libexempi-devel is &lt;2.0.2-4.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564349" version="1" comment="libexpat-devel is &lt;2.0.1-88.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564350" version="1" comment="libexpat-devel is &lt;2.0.1-88.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564351" version="1" comment="libexpat-devel is &lt;2.0.1-88.42.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564352" version="1" comment="MozillaFirefox-devel is &lt;52.4.0esr-72.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564353" version="1" comment="mozilla-nss-devel is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564354" version="1" comment="fontconfig-devel is &lt;2.6.0-10.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564355" version="1" comment="fontconfig-devel-32bit is &lt;2.6.0-10.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564356" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564357" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564358" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564359" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564360" version="1" comment="freetype2-devel is &lt;2.3.7-25.41.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564361" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.41.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564362" version="1" comment="freetype2-devel is &lt;2.3.7-25.45.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564363" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.45.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564364" version="1" comment="freetype2-devel is &lt;2.3.7-25.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564365" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.45.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564366" version="1" comment="fuse-devel is &lt;2.8.7-0.11.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564367" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564368" version="1" comment="gcc43-ada is &lt;4.3.4_20091019-37.3.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564369" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564370" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564371" version="1" comment="gcc43-obj-c++ is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564372" version="1" comment="gcc43-objc is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564373" version="1" comment="gcc43-objc-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564374" version="1" comment="libada43 is &lt;4.3.4_20091019-37.3.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564375" version="1" comment="libobjc43 is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564376" version="1" comment="libobjc43-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564377" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564378" version="1" comment="gcc43-ada is &lt;4.3.4_20091019-37.9.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564379" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564380" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564381" version="1" comment="gcc43-obj-c++ is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564382" version="1" comment="gcc43-objc is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564383" version="1" comment="gcc43-objc-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564384" version="1" comment="libada43 is &lt;4.3.4_20091019-37.9.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564385" version="1" comment="libobjc43 is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564386" version="1" comment="libobjc43-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564387" version="1" comment="cpp48 is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564388" version="1" comment="gcc48 is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564389" version="1" comment="gcc48-32bit is &lt;4.8.5-4.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564390" version="1" comment="gcc48-c++ is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564391" version="1" comment="gcc48-fortran is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564392" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-4.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564393" version="1" comment="gcc48-info is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564394" version="1" comment="gcc48-locale is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564395" version="1" comment="libasan0 is &lt;4.8.5-4.2 for i586,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564396" version="1" comment="libasan0-32bit is &lt;4.8.5-4.2 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564397" version="1" comment="libstdc++48-devel is &lt;4.8.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564398" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-4.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564399" version="1" comment="cpp48 is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564400" version="1" comment="gcc48 is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564401" version="1" comment="gcc48-32bit is &lt;4.8.5-5.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564402" version="1" comment="gcc48-c++ is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564403" version="1" comment="gcc48-fortran is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564404" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564405" version="1" comment="gcc48-info is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564406" version="1" comment="gcc48-locale is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564407" version="1" comment="libasan0 is &lt;4.8.5-5.3.1 for i586,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564408" version="1" comment="libasan0-32bit is &lt;4.8.5-5.3.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564409" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564410" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564411" version="1" comment="cpp5 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564412" version="1" comment="gcc5 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564413" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564414" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564415" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564416" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564417" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564418" version="1" comment="gcc5-info is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564419" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564420" version="1" comment="libasan2 is &lt;5.3.1+r233831-10.1 for i586,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564421" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-10.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564422" version="1" comment="libatomic1 is &lt;5.3.1+r233831-10.1 for i586,ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564423" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564424" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564425" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564426" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564427" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1 for i586,ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564428" version="1" comment="libitm1 is &lt;5.3.1+r233831-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564429" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564430" version="1" comment="liblsan0 is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564431" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1 for i586,ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564432" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564433" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564434" version="1" comment="libtsan0 is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564435" version="1" comment="libubsan0 is &lt;5.3.1+r233831-10.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564436" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-10.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564437" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564438" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564439" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564440" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564441" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.33.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564442" version="1" comment="ghostscript-devel is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564443" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564444" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564445" version="1" comment="ghostscript-devel is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564446" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564447" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564448" version="1" comment="ghostscript-devel is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564449" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564450" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564451" version="1" comment="ghostscript-devel is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564452" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564453" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564454" version="1" comment="ghostscript-devel is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564455" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564456" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564457" version="1" comment="ghostscript-devel is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564458" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564459" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564460" version="1" comment="ghostscript-devel is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564461" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564462" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564463" version="1" comment="giflib-devel is &lt;4.1.6-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564464" version="1" comment="giflib-devel-32bit is &lt;4.1.6-21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564465" version="1" comment="gimp is &lt;2.6.2-3.34.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564466" version="1" comment="gimp-devel is &lt;2.6.2-3.34.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564467" version="1" comment="gimp-lang is &lt;2.6.2-3.34.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564468" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564469" version="1" comment="git is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564470" version="1" comment="git-arch is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564471" version="1" comment="git-core is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564472" version="1" comment="git-cvs is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564473" version="1" comment="git-daemon is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564474" version="1" comment="git-email is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564475" version="1" comment="git-gui is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564476" version="1" comment="git-svn is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564477" version="1" comment="git-web is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564478" version="1" comment="gitk is &lt;1.7.12.4-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564479" version="1" comment="git is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564480" version="1" comment="git-arch is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564481" version="1" comment="git-core is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564482" version="1" comment="git-cvs is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564483" version="1" comment="git-daemon is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564484" version="1" comment="git-email is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564485" version="1" comment="git-gui is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564486" version="1" comment="git-svn is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564487" version="1" comment="git-web is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564488" version="1" comment="gitk is &lt;1.7.12.4-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564489" version="1" comment="git is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564490" version="1" comment="git-arch is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564491" version="1" comment="git-core is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564492" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564493" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564494" version="1" comment="git-email is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564495" version="1" comment="git-gui is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564496" version="1" comment="git-svn is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564497" version="1" comment="git-web is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564498" version="1" comment="gitk is &lt;1.7.12.4-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564499" version="1" comment="git is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564500" version="1" comment="git-arch is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564501" version="1" comment="git-core is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564502" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564503" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564504" version="1" comment="git-email is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564505" version="1" comment="git-gui is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564506" version="1" comment="git-svn is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564507" version="1" comment="git-web is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564508" version="1" comment="gitk is &lt;1.7.12.4-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564509" version="1" comment="git is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564510" version="1" comment="git-arch is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564511" version="1" comment="git-core is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564512" version="1" comment="git-cvs is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564513" version="1" comment="git-daemon is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564514" version="1" comment="git-email is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564515" version="1" comment="git-gui is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564516" version="1" comment="git-svn is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564517" version="1" comment="git-web is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564518" version="1" comment="gitk is &lt;1.7.12.4-0.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564519" version="1" comment="glib2-devel is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564520" version="1" comment="glib2-devel-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564521" version="1" comment="glib2-doc is &lt;2.22.5-0.8.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564522" version="1" comment="libgio-fam is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564523" version="1" comment="glibc-html is &lt;2.11.3-17.102.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564524" version="1" comment="glibc-info is &lt;2.11.3-17.102.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564525" version="1" comment="glibc-html is &lt;2.11.3-17.109.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564526" version="1" comment="glibc-info is &lt;2.11.3-17.109.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564527" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564528" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564529" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564530" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564531" version="1" comment="glibc-html is &lt;2.11.3-17.110.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564532" version="1" comment="glibc-info is &lt;2.11.3-17.110.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564533" version="1" comment="glibc-html is &lt;2.11.3-17.110.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564534" version="1" comment="glibc-info is &lt;2.11.3-17.110.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564535" version="1" comment="glibc-html is &lt;2.11.3-17.110.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564536" version="1" comment="glibc-info is &lt;2.11.3-17.110.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564537" version="1" comment="glibc-html is &lt;2.11.3-17.110.24.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564538" version="1" comment="glibc-info is &lt;2.11.3-17.110.24.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564539" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564540" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564541" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564542" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564543" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564544" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564545" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564546" version="1" comment="gtk2-devel is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564547" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.44.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564548" version="1" comment="gtk2-devel is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564549" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.45.3.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564550" version="1" comment="gtk2-devel is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564551" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.45.8.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564552" version="1" comment="guile-devel is &lt;1.8.5-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564553" version="1" comment="icu is &lt;4.0-7.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564554" version="1" comment="libicu-32bit is &lt;4.0-7.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564555" version="1" comment="libicu-devel is &lt;4.0-7.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564556" version="1" comment="libicu-devel-32bit is &lt;4.0-7.30.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564557" version="1" comment="icu is &lt;4.0-38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564558" version="1" comment="libicu-32bit is &lt;4.0-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564559" version="1" comment="libicu-devel is &lt;4.0-38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564560" version="1" comment="libicu-devel-32bit is &lt;4.0-38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564561" version="1" comment="icu is &lt;4.0-43.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564562" version="1" comment="libicu-32bit is &lt;4.0-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564563" version="1" comment="libicu-devel is &lt;4.0-43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564564" version="1" comment="libicu-devel-32bit is &lt;4.0-43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564565" version="1" comment="icu is &lt;4.0-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564566" version="1" comment="libicu-32bit is &lt;4.0-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564567" version="1" comment="libicu-devel is &lt;4.0-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564568" version="1" comment="libicu-devel-32bit is &lt;4.0-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564569" version="1" comment="icu is &lt;4.0-47.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564570" version="1" comment="libicu-32bit is &lt;4.0-47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564571" version="1" comment="libicu-devel is &lt;4.0-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564572" version="1" comment="libicu-devel-32bit is &lt;4.0-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564573" version="1" comment="imlib2 is &lt;1.4.2-2.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564574" version="1" comment="imlib2-devel is &lt;1.4.2-2.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564575" version="1" comment="imlib2-filters is &lt;1.4.2-2.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564576" version="1" comment="imlib2-loaders is &lt;1.4.2-2.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564577" version="1" comment="libjasper-devel is &lt;1.900.14-134.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564578" version="1" comment="libjasper-devel is &lt;1.900.14-134.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564579" version="1" comment="libjasper-devel is &lt;1.900.14-134.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564580" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564581" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564582" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564583" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564584" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564585" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564586" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.5-25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564587" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.10-26.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564588" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.15-26.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564589" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.20-26.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564590" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-26.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564591" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-26.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564592" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-26.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564593" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564594" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564595" version="1" comment="libjpeg-devel is &lt;6.2.0-879.12.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564596" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-879.12.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564597" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564598" version="1" comment="kdelibs3-arts is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564599" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-23.30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564600" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.10-23.30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564601" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564602" version="1" comment="kdelibs3-devel is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564603" version="1" comment="kdelibs3-doc is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564604" version="1" comment="kernel-docs is &lt;3.0.101-80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564605" version="1" comment="kernel-docs is &lt;3.0.101-88.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564606" version="1" comment="kernel-docs is &lt;3.0.101-94.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564607" version="1" comment="kernel-docs is &lt;3.0.101-97.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564608" version="1" comment="kernel-docs is &lt;3.0.101-104.7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564609" version="1" comment="kernel-docs is &lt;3.0.101-108.7.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564610" version="1" comment="kernel-docs is &lt;3.0.101-108.13.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564611" version="1" comment="kernel-docs is &lt;3.0.101-108.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564612" version="1" comment="kernel-docs is &lt;3.0.101-65.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564613" version="1" comment="kernel-docs is &lt;3.0.101-71.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564614" version="1" comment="kernel-docs is &lt;3.0.101-108.18.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564615" version="1" comment="kernel-docs is &lt;3.0.101-108.21.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564616" version="1" comment="kernel-docs is &lt;3.0.101-108.24.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564617" version="1" comment="kernel-docs is &lt;3.0.101-108.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564618" version="1" comment="kernel-docs is &lt;3.0.101-108.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564619" version="1" comment="kernel-docs is &lt;3.0.101-108.52.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564620" version="1" comment="kernel-docs is &lt;3.0.101-108.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564621" version="1" comment="kernel-docs is &lt;3.0.101-108.77.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564622" version="1" comment="kernel-docs is &lt;3.0.101-108.87.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564623" version="1" comment="kernel-docs is &lt;3.0.101-68.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564624" version="1" comment="kernel-docs is &lt;3.0.101-77.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564625" version="1" comment="kernel-docs is &lt;3.0.101-84.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564626" version="1" comment="kernel-docs is &lt;3.0.101-107.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564627" version="1" comment="kernel-docs is &lt;3.0.101-108.10.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564628" version="1" comment="kernel-docs is &lt;3.0.101-108.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564629" version="1" comment="kernel-docs is &lt;3.0.101-108.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564630" version="1" comment="kernel-docs is &lt;3.0.101-108.81.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564631" version="1" comment="kernel-docs is &lt;3.0.101-108.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564632" version="1" comment="kernel-docs is &lt;3.0.101-108.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564633" version="1" comment="ofed-devel is &lt;1.5.4.1-22.3.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564634" version="1" comment="ofed-devel is &lt;1.5.4.1-22.6.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564635" version="1" comment="krb5-devel is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564636" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.106.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564637" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564638" version="1" comment="krb5-devel is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564639" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564640" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564641" version="1" comment="krb5-devel is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564642" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.113.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564643" version="1" comment="krb5-server is &lt;1.6.3-133.49.113.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564644" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564645" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564646" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23.3.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564647" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.13.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564648" version="1" comment="libapr1-devel is &lt;1.3.3-11.18.19.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564649" version="1" comment="libapr1-devel-32bit is &lt;1.3.3-11.18.19.13.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564650" version="1" comment="libcap-ng-devel is &lt;0.6.3-1.9.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564651" version="1" comment="python-capng is &lt;0.6.3-1.9.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564652" version="1" comment="libcares-devel is &lt;1.7.4-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564653" version="1" comment="libcgroup-devel is &lt;0.41.rc1-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564654" version="1" comment="libcgroup1 is &lt;0.41.rc1-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564655" version="1" comment="libdb-4_5-devel is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564656" version="1" comment="libdb_java-4_5 is &lt;4.5.20-97.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564657" version="1" comment="libevent-devel is &lt;1.4.5-24.24.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564658" version="1" comment="libexif-devel is &lt;0.6.17-2.14.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564659" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564660" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564661" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564662" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564663" version="1" comment="libical-devel is &lt;0.43-1.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564664" version="1" comment="libical0-32bit is &lt;0.43-1.10.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564665" version="1" comment="libid3tag is &lt;0.15.1b-132.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564666" version="1" comment="libid3tag-devel is &lt;0.15.1b-132.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564667" version="1" comment="libidn-devel is &lt;1.10-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564668" version="1" comment="libidn-devel is &lt;1.10-7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564669" version="1" comment="libksba-devel is &lt;1.0.4-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564670" version="1" comment="libmikmod is &lt;3.1.11a-116.2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564671" version="1" comment="libmikmod-devel is &lt;3.1.11a-116.2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564672" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.11.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564673" version="1" comment="libofx is &lt;0.9.0-3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564674" version="1" comment="libofx-devel is &lt;0.9.0-3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564675" version="1" comment="libofx4 is &lt;0.9.0-3.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564676" version="1" comment="libosip2 is &lt;3.1.0-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564677" version="1" comment="libosip2-devel is &lt;3.1.0-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564678" version="1" comment="libotr-devel is &lt;3.2.0-10.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564679" version="1" comment="libpng-devel is &lt;1.2.31-5.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564680" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564681" version="1" comment="libquicktime is &lt;1.0.3-5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564682" version="1" comment="libquicktime-devel is &lt;1.0.3-5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564683" version="1" comment="libquicktime is &lt;1.0.3-6.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564684" version="1" comment="libquicktime-devel is &lt;1.0.3-6.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564685" version="1" comment="google-carlito-fonts is &lt;1.1.03.beta1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564686" version="1" comment="hyphen-devel is &lt;2.8.8-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564687" version="1" comment="libhyphen0 is &lt;2.8.8-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564688" version="1" comment="libmythes-1_2-0 is &lt;1.2.4-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564689" version="1" comment="libreoffice is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564690" version="1" comment="libreoffice-base is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564691" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564692" version="1" comment="libreoffice-branding-upstream is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564693" version="1" comment="libreoffice-calc is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564694" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564695" version="1" comment="libreoffice-draw is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564696" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564697" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564698" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564699" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564700" version="1" comment="libreoffice-impress is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564701" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564702" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564703" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564704" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564705" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564706" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564707" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564708" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564709" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564710" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564711" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564712" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564713" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564714" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564715" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564716" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564717" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564718" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564719" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564720" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564721" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564722" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564723" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564724" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564725" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564726" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564727" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564728" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564729" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564730" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564731" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564732" version="1" comment="libreoffice-math is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564733" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564734" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564735" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515206" version="1" comment="libreoffice-share-linker is &lt;1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564736" version="1" comment="libreoffice-voikko is &lt;4.1-2.26 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564737" version="1" comment="libreoffice-writer is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564738" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564739" version="1" comment="libvoikko-devel is &lt;3.7.1-5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564740" version="1" comment="libvoikko1 is &lt;3.7.1-5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564741" version="1" comment="myspell-af_NA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564742" version="1" comment="myspell-af_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564743" version="1" comment="myspell-ar is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564744" version="1" comment="myspell-ar_AE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564745" version="1" comment="myspell-ar_BH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564746" version="1" comment="myspell-ar_DZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564747" version="1" comment="myspell-ar_EG is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564748" version="1" comment="myspell-ar_IQ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564749" version="1" comment="myspell-ar_JO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564750" version="1" comment="myspell-ar_KW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564751" version="1" comment="myspell-ar_LB is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564752" version="1" comment="myspell-ar_LY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564753" version="1" comment="myspell-ar_MA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564754" version="1" comment="myspell-ar_OM is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564755" version="1" comment="myspell-ar_QA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564756" version="1" comment="myspell-ar_SA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564757" version="1" comment="myspell-ar_SD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564758" version="1" comment="myspell-ar_SY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564759" version="1" comment="myspell-ar_TN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564760" version="1" comment="myspell-ar_YE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564761" version="1" comment="myspell-be_BY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564762" version="1" comment="myspell-bg_BG is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564763" version="1" comment="myspell-bn_BD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564764" version="1" comment="myspell-bn_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564765" version="1" comment="myspell-bs is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564766" version="1" comment="myspell-bs_BA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564767" version="1" comment="myspell-ca is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564768" version="1" comment="myspell-ca_AD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564769" version="1" comment="myspell-ca_ES is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564770" version="1" comment="myspell-ca_ES_valencia is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564771" version="1" comment="myspell-ca_FR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564772" version="1" comment="myspell-ca_IT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564773" version="1" comment="myspell-cs_CZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564774" version="1" comment="myspell-da_DK is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564775" version="1" comment="myspell-de is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564776" version="1" comment="myspell-de_AT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564777" version="1" comment="myspell-de_CH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564778" version="1" comment="myspell-de_DE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564779" version="1" comment="myspell-dictionaries is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564780" version="1" comment="myspell-el_GR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564781" version="1" comment="myspell-en is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564782" version="1" comment="myspell-en_AU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564783" version="1" comment="myspell-en_BS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564784" version="1" comment="myspell-en_BZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564785" version="1" comment="myspell-en_CA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564786" version="1" comment="myspell-en_GB is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564787" version="1" comment="myspell-en_GH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564788" version="1" comment="myspell-en_IE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564789" version="1" comment="myspell-en_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564790" version="1" comment="myspell-en_JM is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564791" version="1" comment="myspell-en_MW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564792" version="1" comment="myspell-en_NA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564793" version="1" comment="myspell-en_NZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564794" version="1" comment="myspell-en_PH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564795" version="1" comment="myspell-en_TT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564796" version="1" comment="myspell-en_US is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564797" version="1" comment="myspell-en_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564798" version="1" comment="myspell-en_ZW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564799" version="1" comment="myspell-es is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564800" version="1" comment="myspell-es_AR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564801" version="1" comment="myspell-es_BO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564802" version="1" comment="myspell-es_CL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564803" version="1" comment="myspell-es_CO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564804" version="1" comment="myspell-es_CR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564805" version="1" comment="myspell-es_CU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564806" version="1" comment="myspell-es_DO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564807" version="1" comment="myspell-es_EC is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564808" version="1" comment="myspell-es_ES is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564809" version="1" comment="myspell-es_GT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564810" version="1" comment="myspell-es_HN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564811" version="1" comment="myspell-es_MX is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564812" version="1" comment="myspell-es_NI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564813" version="1" comment="myspell-es_PA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564814" version="1" comment="myspell-es_PE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564815" version="1" comment="myspell-es_PR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564816" version="1" comment="myspell-es_PY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564817" version="1" comment="myspell-es_SV is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564818" version="1" comment="myspell-es_UY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564819" version="1" comment="myspell-es_VE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564820" version="1" comment="myspell-et_EE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564821" version="1" comment="myspell-fr_BE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564822" version="1" comment="myspell-fr_CA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564823" version="1" comment="myspell-fr_CH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564824" version="1" comment="myspell-fr_FR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564825" version="1" comment="myspell-fr_LU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564826" version="1" comment="myspell-fr_MC is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564827" version="1" comment="myspell-gu_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564828" version="1" comment="myspell-he_IL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564829" version="1" comment="myspell-hi_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564830" version="1" comment="myspell-hr_HR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564831" version="1" comment="myspell-hu_HU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564832" version="1" comment="myspell-it_IT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564833" version="1" comment="myspell-lightproof-en is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564834" version="1" comment="myspell-lightproof-hu_HU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564835" version="1" comment="myspell-lightproof-pt_BR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564836" version="1" comment="myspell-lightproof-ru_RU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564837" version="1" comment="myspell-lo_LA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564838" version="1" comment="myspell-lt_LT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564839" version="1" comment="myspell-lv_LV is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564840" version="1" comment="myspell-nb_NO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564841" version="1" comment="myspell-nl_BE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564842" version="1" comment="myspell-nl_NL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564843" version="1" comment="myspell-nn_NO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564844" version="1" comment="myspell-no is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564845" version="1" comment="myspell-pl_PL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564846" version="1" comment="myspell-pt_AO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564847" version="1" comment="myspell-pt_BR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564848" version="1" comment="myspell-pt_PT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564849" version="1" comment="myspell-ro is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564850" version="1" comment="myspell-ro_RO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564851" version="1" comment="myspell-ru_RU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564852" version="1" comment="myspell-sk_SK is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564853" version="1" comment="myspell-sl_SI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564854" version="1" comment="myspell-sr is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564855" version="1" comment="myspell-sr_CS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564856" version="1" comment="myspell-sr_Latn_CS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564857" version="1" comment="myspell-sr_Latn_RS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564858" version="1" comment="myspell-sr_RS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564859" version="1" comment="myspell-sv_FI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564860" version="1" comment="myspell-sv_SE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564861" version="1" comment="myspell-te is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564862" version="1" comment="myspell-te_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564863" version="1" comment="myspell-th_TH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564864" version="1" comment="myspell-vi is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564865" version="1" comment="myspell-vi_VN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564866" version="1" comment="myspell-zu_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564867" version="1" comment="mythes-devel is &lt;1.2.4-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564868" version="1" comment="python-importlib is &lt;1.0.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564869" version="1" comment="libsamplerate-devel is &lt;0.1.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564870" version="1" comment="libsndfile-devel is &lt;1.0.20-2.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564871" version="1" comment="libsndfile-devel is &lt;1.0.20-2.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564872" version="1" comment="libsndfile-devel is &lt;1.0.20-2.19.7.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564873" version="1" comment="libsndfile-devel is &lt;1.0.20-2.19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564874" version="1" comment="libssh-devel is &lt;0.2-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564875" version="1" comment="libssh-devel-doc is &lt;0.2-5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564876" version="1" comment="libssh2 is &lt;0.2-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564877" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564878" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564879" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564880" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564881" version="1" comment="libssh2-1 is &lt;1.4.3-17.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564882" version="1" comment="libssh2-1-32bit is &lt;1.4.3-17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564883" version="1" comment="libssh2-1-x86 is &lt;1.4.3-17.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564884" version="1" comment="libssh2-devel is &lt;1.4.3-17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564885" version="1" comment="libtirpc-devel is &lt;0.2.1-1.12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564886" version="1" comment="libtirpc-devel is &lt;0.2.1-1.13.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564887" version="1" comment="libtirpc-devel is &lt;0.2.1-1.13.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564888" version="1" comment="libvirt-devel is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564889" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564890" version="1" comment="libvirt-devel is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564891" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564892" version="1" comment="libvirt-devel is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564893" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564894" version="1" comment="libvirt-devel is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564895" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564896" version="1" comment="libvirt-devel is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564897" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-23.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564898" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564899" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564900" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564901" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564902" version="1" comment="libxml2-devel is &lt;2.7.6-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564903" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564904" version="1" comment="libxml2-devel is &lt;2.7.6-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564905" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564906" version="1" comment="libxml2-devel is &lt;2.7.6-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564907" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564908" version="1" comment="libxml2-devel is &lt;2.7.6-0.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564909" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564910" version="1" comment="libxml2-devel is &lt;2.7.6-0.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564911" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564912" version="1" comment="libxml2-devel is &lt;2.7.6-0.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564913" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564914" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564915" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564916" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564917" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564918" version="1" comment="libxml2-devel is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564919" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.77.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564920" version="1" comment="libxslt-devel is &lt;1.1.24-19.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564921" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564922" version="1" comment="libxslt-python is &lt;1.1.24-19.33.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564923" version="1" comment="lighttpd is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564924" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564925" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564926" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564927" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564928" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564929" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564930" version="1" comment="kernel-docs is &lt;3.0.101-91.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564931" version="1" comment="kernel-docs is &lt;3.0.101-100.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564932" version="1" comment="lynx is &lt;2.8.6-145.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564933" version="1" comment="lynx is &lt;2.8.6-146.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564934" version="1" comment="memcached is &lt;1.2.6-5.17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564935" version="1" comment="memcached is &lt;1.2.6-5.17.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564936" version="1" comment="mercurial is &lt;2.3.2-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564937" version="1" comment="mercurial is &lt;2.3.2-0.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564938" version="1" comment="mercurial is &lt;2.3.2-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564939" version="1" comment="mercurial is &lt;2.3.2-0.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564940" version="1" comment="mercurial is &lt;2.3.2-0.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564941" version="1" comment="mercurial is &lt;2.3.2-0.18.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564942" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564943" version="1" comment="mozilla-nss-devel is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564944" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564945" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564946" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564947" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564948" version="1" comment="mono-devel is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564949" version="1" comment="mono-extras is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564950" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564951" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564952" version="1" comment="mono-winfxcore is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564953" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564954" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564955" version="1" comment="mono-core is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564956" version="1" comment="mono-data is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564957" version="1" comment="mono-data-firebird is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564958" version="1" comment="mono-data-oracle is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564959" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564960" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564961" version="1" comment="mono-data-sybase is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564962" version="1" comment="mono-devel is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564963" version="1" comment="mono-extras is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564964" version="1" comment="mono-jscript is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564965" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564966" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564967" version="1" comment="mono-wcf is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564968" version="1" comment="mono-web is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564969" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564970" version="1" comment="mono-winfxcore is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564971" version="1" comment="monodoc-core is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564972" version="1" comment="libmxml1 is &lt;2.5-24.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564973" version="1" comment="mxml is &lt;2.5-24.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564974" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.49-0.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564975" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.49-0.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564976" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.8.10.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564977" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.10.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564978" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.8.10.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564979" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.52-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564980" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.52-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564981" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.53-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564982" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.53-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564983" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.54-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564984" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.54-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564985" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.55-0.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564986" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.55-0.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564987" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.57-0.39.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564988" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.57-0.39.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564989" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.58-0.39.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564990" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.58-0.39.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564991" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.59-0.39.9.8 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564992" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.59-0.39.9.8 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564993" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.60-0.39.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564994" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.60-0.39.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564995" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.61-0.39.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564996" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.61-0.39.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564997" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.62-0.39.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564998" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.62-0.39.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564999" version="1" comment="nagios is &lt;3.0.6-1.25.36.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565000" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565001" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565002" version="1" comment="nasm is &lt;2.03.90-2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565003" version="1" comment="nautilus-devel is &lt;2.28.4-1.16.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565004" version="1" comment="ncurses-devel is &lt;5.6-92.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565005" version="1" comment="ncurses-devel-32bit is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565006" version="1" comment="tack is &lt;5.6-92.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565007" version="1" comment="ncurses-devel is &lt;5.6-93.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565008" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565009" version="1" comment="tack is &lt;5.6-93.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565010" version="1" comment="ncurses-devel is &lt;5.6-93.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565011" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565012" version="1" comment="tack is &lt;5.6-93.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565013" version="1" comment="ncurses-devel is &lt;5.6-93.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565014" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565015" version="1" comment="tack is &lt;5.6-93.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565016" version="1" comment="netatalk is &lt;2.0.3-249.23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565017" version="1" comment="netatalk-devel is &lt;2.0.3-249.23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565018" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565019" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565020" version="1" comment="ntfs-3g is &lt;2011.4.12-0.9.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565021" version="1" comment="ntfs-3g-devel is &lt;2011.4.12-0.9.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565022" version="1" comment="ntfsprogs is &lt;2011.4.12-0.9.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565023" version="1" comment="libtasn1-devel is &lt;1.5-1.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565024" version="1" comment="ocaml is &lt;4.02.1-3.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565025" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-3.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565026" version="1" comment="ocaml-runtime is &lt;4.02.1-3.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565027" version="1" comment="ocaml is &lt;4.02.1-4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565028" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565029" version="1" comment="ocaml-runtime is &lt;4.02.1-4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565030" version="1" comment="ocaml is &lt;4.02.1-4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565031" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565032" version="1" comment="ocaml-runtime is &lt;4.02.1-4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565033" version="1" comment="opensc-devel is &lt;0.11.6-5.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565034" version="1" comment="openslp-devel is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565035" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565036" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565037" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565038" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565039" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565040" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.102.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565041" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565042" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.105.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565043" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565044" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565045" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565046" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565047" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565048" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565049" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565050" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.106.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565051" version="1" comment="libwsman-devel is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565052" version="1" comment="openwsman-python is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565053" version="1" comment="pam-devel is &lt;1.1.5-0.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565054" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.17.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565055" version="1" comment="perl-base-32bit is &lt;5.10.0-64.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565056" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565057" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565058" version="1" comment="perl-base-32bit is &lt;5.10.0-64.81.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565059" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565060" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565061" version="1" comment="perl-DBD-mysql is &lt;4.008-10.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565062" version="1" comment="perl-SOAP-Lite is &lt;0.710.08-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565063" version="1" comment="php53-devel is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565064" version="1" comment="php53-imap is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565065" version="1" comment="php53-posix is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565066" version="1" comment="php53-readline is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565067" version="1" comment="php53-sockets is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565068" version="1" comment="php53-sqlite is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565069" version="1" comment="php53-tidy is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565070" version="1" comment="php53-devel is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565071" version="1" comment="php53-imap is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565072" version="1" comment="php53-posix is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565073" version="1" comment="php53-readline is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565074" version="1" comment="php53-sockets is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565075" version="1" comment="php53-sqlite is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565076" version="1" comment="php53-tidy is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565077" version="1" comment="php53-devel is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565078" version="1" comment="php53-imap is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565079" version="1" comment="php53-posix is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565080" version="1" comment="php53-readline is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565081" version="1" comment="php53-sockets is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565082" version="1" comment="php53-sqlite is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565083" version="1" comment="php53-tidy is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565084" version="1" comment="php53-devel is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565085" version="1" comment="php53-imap is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565086" version="1" comment="php53-posix is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565087" version="1" comment="php53-readline is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565088" version="1" comment="php53-sockets is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565089" version="1" comment="php53-sqlite is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565090" version="1" comment="php53-tidy is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565091" version="1" comment="php53-devel is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565092" version="1" comment="php53-imap is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565093" version="1" comment="php53-posix is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565094" version="1" comment="php53-readline is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565095" version="1" comment="php53-sockets is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565096" version="1" comment="php53-sqlite is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565097" version="1" comment="php53-tidy is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565098" version="1" comment="php53-devel is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565099" version="1" comment="php53-imap is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565100" version="1" comment="php53-posix is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565101" version="1" comment="php53-readline is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565102" version="1" comment="php53-sockets is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565103" version="1" comment="php53-sqlite is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565104" version="1" comment="php53-tidy is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565105" version="1" comment="php53-devel is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565106" version="1" comment="php53-imap is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565107" version="1" comment="php53-posix is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565108" version="1" comment="php53-readline is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565109" version="1" comment="php53-sockets is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565110" version="1" comment="php53-sqlite is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565111" version="1" comment="php53-tidy is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565112" version="1" comment="php53-devel is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565113" version="1" comment="php53-imap is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565114" version="1" comment="php53-posix is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565115" version="1" comment="php53-readline is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565116" version="1" comment="php53-sockets is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565117" version="1" comment="php53-sqlite is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565118" version="1" comment="php53-tidy is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565119" version="1" comment="php53-devel is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565120" version="1" comment="php53-imap is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565121" version="1" comment="php53-posix is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565122" version="1" comment="php53-readline is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565123" version="1" comment="php53-sockets is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565124" version="1" comment="php53-sqlite is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565125" version="1" comment="php53-tidy is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565126" version="1" comment="php53-devel is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565127" version="1" comment="php53-imap is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565128" version="1" comment="php53-posix is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565129" version="1" comment="php53-readline is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565130" version="1" comment="php53-sockets is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565131" version="1" comment="php53-sqlite is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565132" version="1" comment="php53-tidy is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565133" version="1" comment="php53-devel is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565134" version="1" comment="php53-imap is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565135" version="1" comment="php53-posix is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565136" version="1" comment="php53-readline is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565137" version="1" comment="php53-sockets is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565138" version="1" comment="php53-sqlite is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565139" version="1" comment="php53-tidy is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565140" version="1" comment="php53-devel is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565141" version="1" comment="php53-imap is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565142" version="1" comment="php53-posix is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565143" version="1" comment="php53-readline is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565144" version="1" comment="php53-sockets is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565145" version="1" comment="php53-sqlite is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565146" version="1" comment="php53-tidy is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565147" version="1" comment="php53-devel is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565148" version="1" comment="php53-imap is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565149" version="1" comment="php53-posix is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565150" version="1" comment="php53-readline is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565151" version="1" comment="php53-sockets is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565152" version="1" comment="php53-sqlite is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565153" version="1" comment="php53-tidy is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565154" version="1" comment="php53-devel is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565155" version="1" comment="php53-imap is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565156" version="1" comment="php53-posix is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565157" version="1" comment="php53-readline is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565158" version="1" comment="php53-sockets is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565159" version="1" comment="php53-sqlite is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565160" version="1" comment="php53-tidy is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565161" version="1" comment="php53-devel is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565162" version="1" comment="php53-imap is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565163" version="1" comment="php53-posix is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565164" version="1" comment="php53-readline is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565165" version="1" comment="php53-sockets is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565166" version="1" comment="php53-sqlite is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565167" version="1" comment="php53-tidy is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565168" version="1" comment="php53-devel is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565169" version="1" comment="php53-imap is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565170" version="1" comment="php53-posix is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565171" version="1" comment="php53-readline is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565172" version="1" comment="php53-sockets is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565173" version="1" comment="php53-sqlite is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565174" version="1" comment="php53-tidy is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565175" version="1" comment="php53-devel is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565176" version="1" comment="php53-imap is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565177" version="1" comment="php53-posix is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565178" version="1" comment="php53-readline is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565179" version="1" comment="php53-sockets is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565180" version="1" comment="php53-sqlite is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565181" version="1" comment="php53-tidy is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565182" version="1" comment="php53-devel is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565183" version="1" comment="php53-imap is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565184" version="1" comment="php53-posix is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565185" version="1" comment="php53-readline is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565186" version="1" comment="php53-sockets is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565187" version="1" comment="php53-sqlite is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565188" version="1" comment="php53-tidy is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565189" version="1" comment="php53-devel is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565190" version="1" comment="php53-imap is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565191" version="1" comment="php53-posix is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565192" version="1" comment="php53-readline is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565193" version="1" comment="php53-sockets is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565194" version="1" comment="php53-sqlite is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565195" version="1" comment="php53-tidy is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565196" version="1" comment="php53-devel is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565197" version="1" comment="php53-imap is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565198" version="1" comment="php53-posix is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565199" version="1" comment="php53-readline is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565200" version="1" comment="php53-sockets is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565201" version="1" comment="php53-sqlite is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565202" version="1" comment="php53-tidy is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565203" version="1" comment="php53-devel is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565204" version="1" comment="php53-imap is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565205" version="1" comment="php53-posix is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565206" version="1" comment="php53-readline is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565207" version="1" comment="php53-sockets is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565208" version="1" comment="php53-sqlite is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565209" version="1" comment="php53-tidy is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565210" version="1" comment="finch is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565211" version="1" comment="finch-devel is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565212" version="1" comment="libpurple is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565213" version="1" comment="libpurple-devel is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565214" version="1" comment="libpurple-lang is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565215" version="1" comment="pidgin is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565216" version="1" comment="pidgin-devel is &lt;2.6.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565217" version="1" comment="finch is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565218" version="1" comment="finch-devel is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565219" version="1" comment="libpurple is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565220" version="1" comment="libpurple-devel is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565221" version="1" comment="libpurple-lang is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565222" version="1" comment="pidgin is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565223" version="1" comment="pidgin-devel is &lt;2.6.6-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565224" version="1" comment="libpoppler-devel is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565225" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565226" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565227" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565228" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565229" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565230" version="1" comment="libpoppler-devel is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565231" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565232" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565233" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565234" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565235" version="1" comment="poppler-tools is &lt;0.12.3-1.13.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565236" version="1" comment="postgresql94-devel is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565237" version="1" comment="postgresql94-devel is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565238" version="1" comment="postgresql94-devel is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565239" version="1" comment="postgresql94-devel is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565240" version="1" comment="postgresql94-devel is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565241" version="1" comment="postgresql94-devel is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565242" version="1" comment="postgresql94-devel is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565243" version="1" comment="postgresql94-devel is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565244" version="1" comment="ppp-devel is &lt;2.4.5.git-2.31.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565245" version="1" comment="python-32bit is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565246" version="1" comment="python-demo is &lt;2.6.9-39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565247" version="1" comment="python-devel is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565248" version="1" comment="python-doc is &lt;2.6-8.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565249" version="1" comment="python-doc-pdf is &lt;2.6-8.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565250" version="1" comment="python-gdbm is &lt;2.6.9-39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565251" version="1" comment="python-idle is &lt;2.6.9-39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565252" version="1" comment="python-tk is &lt;2.6.9-39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565253" version="1" comment="python-32bit is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565254" version="1" comment="python-demo is &lt;2.6.9-40.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565255" version="1" comment="python-devel is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565256" version="1" comment="python-doc is &lt;2.6-8.40.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565257" version="1" comment="python-doc-pdf is &lt;2.6-8.40.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565258" version="1" comment="python-gdbm is &lt;2.6.9-40.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565259" version="1" comment="python-idle is &lt;2.6.9-40.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565260" version="1" comment="python-tk is &lt;2.6.9-40.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565261" version="1" comment="python-32bit is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565262" version="1" comment="python-demo is &lt;2.6.9-40.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565263" version="1" comment="python-devel is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565264" version="1" comment="python-doc is &lt;2.6-8.40.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565265" version="1" comment="python-doc-pdf is &lt;2.6-8.40.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565266" version="1" comment="python-gdbm is &lt;2.6.9-40.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565267" version="1" comment="python-idle is &lt;2.6.9-40.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565268" version="1" comment="python-tk is &lt;2.6.9-40.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565269" version="1" comment="python-32bit is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565270" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565271" version="1" comment="python-devel is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565272" version="1" comment="python-doc is &lt;2.6-8.40.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565273" version="1" comment="python-doc-pdf is &lt;2.6-8.40.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565274" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565275" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565276" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565277" version="1" comment="python-32bit is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565278" version="1" comment="python-demo is &lt;2.6.9-40.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565279" version="1" comment="python-devel is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565280" version="1" comment="python-doc is &lt;2.6-8.40.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565281" version="1" comment="python-doc-pdf is &lt;2.6-8.40.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565282" version="1" comment="python-gdbm is &lt;2.6.9-40.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565283" version="1" comment="python-idle is &lt;2.6.9-40.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565284" version="1" comment="python-tk is &lt;2.6.9-40.21.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565285" version="1" comment="python-numpy-devel is &lt;1.8.0-6.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565286" version="1" comment="quagga is &lt;0.99.15-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565287" version="1" comment="quagga-devel is &lt;0.99.15-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565288" version="1" comment="quagga is &lt;0.99.15-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565289" version="1" comment="quagga-devel is &lt;0.99.15-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565290" version="1" comment="quagga is &lt;0.99.15-0.24.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565291" version="1" comment="quagga-devel is &lt;0.99.15-0.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565292" version="1" comment="quagga is &lt;0.99.15-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565293" version="1" comment="quagga-devel is &lt;0.99.15-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565294" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565295" version="1" comment="quagga-devel is &lt;0.99.15-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565296" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565297" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565298" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565299" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565300" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565301" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565302" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565303" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565304" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565305" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565306" version="1" comment="rubygem-mail-2_4 is &lt;2.4.4-0.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565307" version="1" comment="libldb-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565308" version="1" comment="libnetapi-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565309" version="1" comment="libnetapi0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565310" version="1" comment="libsmbclient-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565311" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565312" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565313" version="1" comment="libtalloc-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565314" version="1" comment="libtdb-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565315" version="1" comment="libtevent-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565316" version="1" comment="libwbclient-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565317" version="1" comment="samba-devel is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565318" version="1" comment="samba-test is &lt;3.6.3-67.2 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565319" version="1" comment="libldb-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565320" version="1" comment="libnetapi-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565321" version="1" comment="libnetapi0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565322" version="1" comment="libsmbclient-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565323" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565324" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565325" version="1" comment="libtalloc-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565326" version="1" comment="libtdb-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565327" version="1" comment="libtevent-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565328" version="1" comment="libwbclient-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565329" version="1" comment="samba-devel is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565330" version="1" comment="samba-test is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565331" version="1" comment="libldb-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565332" version="1" comment="libnetapi-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565333" version="1" comment="libnetapi0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565334" version="1" comment="libsmbclient-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565335" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565336" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565337" version="1" comment="libtalloc-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565338" version="1" comment="libtdb-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565339" version="1" comment="libtevent-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565340" version="1" comment="libwbclient-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565341" version="1" comment="samba-devel is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565342" version="1" comment="samba-test is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565343" version="1" comment="libldb-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565344" version="1" comment="libnetapi-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565345" version="1" comment="libnetapi0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565346" version="1" comment="libsmbclient-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565347" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565348" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565349" version="1" comment="libtalloc-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565350" version="1" comment="libtdb-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565351" version="1" comment="libtevent-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565352" version="1" comment="libwbclient-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565353" version="1" comment="samba-devel is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565354" version="1" comment="samba-test is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565355" version="1" comment="libldb-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565356" version="1" comment="libnetapi-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565357" version="1" comment="libnetapi0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565358" version="1" comment="libsmbclient-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565359" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565360" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565361" version="1" comment="libtalloc-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565362" version="1" comment="libtdb-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565363" version="1" comment="libtevent-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565364" version="1" comment="libwbclient-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565365" version="1" comment="samba-devel is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565366" version="1" comment="samba-test is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565367" version="1" comment="libldb-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565368" version="1" comment="libnetapi-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565369" version="1" comment="libnetapi0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565370" version="1" comment="libsmbclient-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565371" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565372" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565373" version="1" comment="libtalloc-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565374" version="1" comment="libtdb-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565375" version="1" comment="libtevent-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565376" version="1" comment="libwbclient-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565377" version="1" comment="samba-devel is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565378" version="1" comment="samba-test is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565379" version="1" comment="libldb-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565380" version="1" comment="libnetapi-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565381" version="1" comment="libnetapi0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565382" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565383" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565384" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565385" version="1" comment="libtalloc-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565386" version="1" comment="libtdb-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565387" version="1" comment="libtevent-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565388" version="1" comment="libwbclient-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565389" version="1" comment="samba-devel is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565390" version="1" comment="samba-test is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565391" version="1" comment="libldb-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565392" version="1" comment="libnetapi-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565393" version="1" comment="libnetapi0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565394" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565395" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565396" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565397" version="1" comment="libtalloc-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565398" version="1" comment="libtdb-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565399" version="1" comment="libtevent-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565400" version="1" comment="libwbclient-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565401" version="1" comment="samba-devel is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565402" version="1" comment="samba-test is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565403" version="1" comment="libldb-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565404" version="1" comment="libnetapi-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565405" version="1" comment="libnetapi0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565406" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565407" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565408" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565409" version="1" comment="libtalloc-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565410" version="1" comment="libtdb-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565411" version="1" comment="libtevent-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565412" version="1" comment="libwbclient-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565413" version="1" comment="samba-devel is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565414" version="1" comment="samba-test is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565415" version="1" comment="libldb-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565416" version="1" comment="libnetapi-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565417" version="1" comment="libnetapi0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565418" version="1" comment="libsmbclient-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565419" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565420" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565421" version="1" comment="libtalloc-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565422" version="1" comment="libtdb-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565423" version="1" comment="libtevent-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565424" version="1" comment="libwbclient-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565425" version="1" comment="samba-devel is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565426" version="1" comment="samba-test is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565427" version="1" comment="samba-test is &lt;3.6.3-64.1 for ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565428" version="1" comment="sane-backends-32bit is &lt;1.0.20-7.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565429" version="1" comment="sane-backends-autoconfig is &lt;1.0.20-7.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565430" version="1" comment="sane-backends-x86 is &lt;1.0.20-7.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565431" version="1" comment="libspice-server-devel is &lt;0.12.4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565432" version="1" comment="libspice-server-devel is &lt;0.12.4-8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565433" version="1" comment="libspice-server-devel is &lt;0.12.4-11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565434" version="1" comment="libspice-server-devel is &lt;0.12.4-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565435" version="1" comment="libspice-server-devel is &lt;0.12.4-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565436" version="1" comment="sqlite3-devel is &lt;3.7.6.3-1.4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565437" version="1" comment="sqlite3-devel is &lt;3.7.6.3-1.4.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565438" version="1" comment="subversion is &lt;1.6.17-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565439" version="1" comment="subversion-devel is &lt;1.6.17-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565440" version="1" comment="subversion-perl is &lt;1.6.17-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565441" version="1" comment="subversion-python is &lt;1.6.17-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565442" version="1" comment="subversion-server is &lt;1.6.17-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565443" version="1" comment="subversion-tools is &lt;1.6.17-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565444" version="1" comment="subversion is &lt;1.6.17-1.36.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565445" version="1" comment="subversion-devel is &lt;1.6.17-1.36.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565446" version="1" comment="subversion-perl is &lt;1.6.17-1.36.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565447" version="1" comment="subversion-python is &lt;1.6.17-1.36.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565448" version="1" comment="subversion-server is &lt;1.6.17-1.36.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565449" version="1" comment="subversion-tools is &lt;1.6.17-1.36.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565450" version="1" comment="libtiff-devel is &lt;3.8.2-141.163.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565451" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.163.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565452" version="1" comment="libtiff-devel is &lt;3.8.2-141.168.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565453" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.168.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565454" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565455" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565456" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565457" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565458" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565459" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565460" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565461" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565462" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565463" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565464" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565465" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565466" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565467" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565468" version="1" comment="libtiff-devel is &lt;3.8.2-141.169.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565469" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.169.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565470" version="1" comment="wavpack is &lt;4.50.1-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565471" version="1" comment="wavpack-devel is &lt;4.50.1-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565472" version="1" comment="wavpack is &lt;4.50.1-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565473" version="1" comment="wavpack-devel is &lt;4.50.1-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565474" version="1" comment="wireshark is &lt;1.12.11-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565475" version="1" comment="wireshark-devel is &lt;1.12.11-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565476" version="1" comment="wireshark is &lt;1.12.13-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565477" version="1" comment="wireshark-devel is &lt;1.12.13-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565478" version="1" comment="wireshark is &lt;2.0.12-36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565479" version="1" comment="wireshark-devel is &lt;2.0.12-36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565480" version="1" comment="wireshark-gtk is &lt;2.0.12-36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565481" version="1" comment="wireshark is &lt;2.0.13-39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565482" version="1" comment="wireshark-devel is &lt;2.0.13-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565483" version="1" comment="wireshark-gtk is &lt;2.0.13-39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565484" version="1" comment="wireshark is &lt;2.0.14-40.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565485" version="1" comment="wireshark-devel is &lt;2.0.14-40.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565486" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565487" version="1" comment="libsmi is &lt;0.4.5-2.7.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565488" version="1" comment="libwireshark8 is &lt;2.2.11-40.14.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565489" version="1" comment="libwiretap6 is &lt;2.2.11-40.14.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565490" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565491" version="1" comment="libwsutil7 is &lt;2.2.11-40.14.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565492" version="1" comment="portaudio is &lt;19-234.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565493" version="1" comment="portaudio-devel is &lt;19-234.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565494" version="1" comment="wireshark is &lt;2.2.11-40.14.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565495" version="1" comment="wireshark-devel is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565496" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565497" version="1" comment="libwireshark8 is &lt;2.2.12-40.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565498" version="1" comment="libwiretap6 is &lt;2.2.12-40.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565499" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565500" version="1" comment="libwsutil7 is &lt;2.2.12-40.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565501" version="1" comment="wireshark is &lt;2.2.12-40.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565502" version="1" comment="wireshark-devel is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565503" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565504" version="1" comment="libwireshark8 is &lt;2.2.13-40.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565505" version="1" comment="libwiretap6 is &lt;2.2.13-40.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565506" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565507" version="1" comment="libwsutil7 is &lt;2.2.13-40.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565508" version="1" comment="wireshark is &lt;2.2.13-40.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565509" version="1" comment="wireshark-devel is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565510" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565511" version="1" comment="libwireshark8 is &lt;2.2.14-40.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565512" version="1" comment="libwiretap6 is &lt;2.2.14-40.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565513" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565514" version="1" comment="libwsutil7 is &lt;2.2.14-40.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565515" version="1" comment="wireshark is &lt;2.2.14-40.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565516" version="1" comment="wireshark-devel is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565517" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565518" version="1" comment="libwireshark8 is &lt;2.2.16-40.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565519" version="1" comment="libwiretap6 is &lt;2.2.16-40.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565520" version="1" comment="libwscodecs1 is &lt;2.2.16-40.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565521" version="1" comment="libwsutil7 is &lt;2.2.16-40.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565522" version="1" comment="wireshark is &lt;2.2.16-40.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565523" version="1" comment="wireshark-devel is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565524" version="1" comment="wireshark-gtk is &lt;2.2.16-40.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565525" version="1" comment="libwireshark8 is &lt;2.2.17-40.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565526" version="1" comment="libwiretap6 is &lt;2.2.17-40.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565527" version="1" comment="libwscodecs1 is &lt;2.2.17-40.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565528" version="1" comment="libwsutil7 is &lt;2.2.17-40.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565529" version="1" comment="wireshark is &lt;2.2.17-40.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565530" version="1" comment="wireshark-devel is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565531" version="1" comment="wireshark-gtk is &lt;2.2.17-40.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565532" version="1" comment="xen-devel is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565533" version="1" comment="xen-devel is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565534" version="1" comment="xen-devel is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565535" version="1" comment="xen-devel is &lt;4.4.4_07-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565536" version="1" comment="xen-devel is &lt;4.4.4_08-40.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565537" version="1" comment="xen-devel is &lt;4.4.4_10-43.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565538" version="1" comment="xen-devel is &lt;4.4.4_12-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565539" version="1" comment="xen-devel is &lt;4.4.4_14-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565540" version="1" comment="xen-devel is &lt;4.4.4_16-54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565541" version="1" comment="xen-devel is &lt;4.4.4_18-57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565542" version="1" comment="xen-devel is &lt;4.4.4_20-60.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565543" version="1" comment="xen-devel is &lt;4.4.4_22-61.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565544" version="1" comment="xen-devel is &lt;4.4.4_24-61.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565545" version="1" comment="xen-devel is &lt;4.4.4_26-61.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565546" version="1" comment="xen-devel is &lt;4.4.4_28-61.23.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565547" version="1" comment="xen-devel is &lt;4.4.4_30-61.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565548" version="1" comment="xen-devel is &lt;4.4.4_32-61.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565549" version="1" comment="xen-devel is &lt;4.4.4_34-61.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565550" version="1" comment="xen-devel is &lt;4.4.4_36-61.37.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565551" version="1" comment="xen-devel is &lt;4.4.4_38-61.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565552" version="1" comment="xen-devel is &lt;4.4.4_40-61.43.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565553" version="1" comment="xen-devel is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565554" version="1" comment="xerces-j2-demo is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565555" version="1" comment="xerces-j2-scripts is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565556" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565557" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565558" version="1" comment="xorg-x11-libICE-devel is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565559" version="1" comment="xorg-x11-libICE-devel-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565560" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565561" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565562" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565563" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.68.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565564" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565565" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.72.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565566" version="1" comment="xorg-x11-libXdmcp-32bit is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565567" version="1" comment="xorg-x11-libXdmcp-devel is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565568" version="1" comment="xorg-x11-libXdmcp-devel-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565569" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565570" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565571" version="1" comment="xorg-x11-libXpm-devel is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565572" version="1" comment="xorg-x11-libXpm-devel-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565573" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565574" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565575" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565576" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565577" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565578" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565579" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.50.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565580" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.50.5.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565581" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.50.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565582" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.50.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565583" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565584" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565585" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565586" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565587" version="1" comment="yast2-storage-devel is &lt;2.17.161-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565588" version="1" comment="zlib-devel is &lt;1.2.7-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565589" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657130" version="1" comment="clamav-openssl1 is &lt;0.103.4-0.20.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664011" version="1" comment="clamav-openssl1 is &lt;0.103.5-0.20.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565590" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565591" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565592" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565593" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565594" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565595" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565596" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565597" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565598" version="1" comment="curl-openssl1 is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565599" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565600" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565601" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.69.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565602" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565603" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565604" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565605" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565606" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565607" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565608" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565609" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.70.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565610" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565611" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565612" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565613" version="1" comment="curl-openssl1 is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565614" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565615" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565616" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565617" version="1" comment="curl-openssl1 is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565618" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565619" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565620" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565621" version="1" comment="curl-openssl1 is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565622" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565623" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565624" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565625" version="1" comment="curl-openssl1 is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565626" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565627" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565628" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565629" version="1" comment="curl-openssl1 is &lt;7.37.0-70.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565630" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565631" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.41.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565632" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.41.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565633" version="1" comment="curl-openssl1 is &lt;7.37.0-70.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565634" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565635" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565636" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565637" version="1" comment="curl-openssl1 is &lt;7.37.0-70.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565638" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565639" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565640" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565641" version="1" comment="curl-openssl1 is &lt;7.37.0-70.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565642" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565643" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.52.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565644" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.52.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565645" version="1" comment="curl-openssl1 is &lt;7.37.0-70.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565646" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565647" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.57.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565648" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.57.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565649" version="1" comment="curl-openssl1 is &lt;7.37.0-70.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565650" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565651" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565652" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.60.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565653" version="1" comment="curl-openssl1 is &lt;7.37.0-70.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565654" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565655" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.63.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565656" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.63.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565657" version="1" comment="curl-openssl1 is &lt;7.37.0-70.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565658" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565659" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565660" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.66.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626165" version="1" comment="curl-openssl1 is &lt;7.37.0-70.71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626166" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626167" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.71.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626168" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.71.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633933" version="1" comment="curl-openssl1 is &lt;7.37.0-70.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633934" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633935" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633936" version="1" comment="libcurl4-openssl1-x86 is &lt;7.37.0-70.74.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565661" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565662" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565663" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-0.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565664" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565665" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565666" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565667" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565668" version="1" comment="cyrus-sasl-openssl1-crammd5-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565669" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565670" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565671" version="1" comment="cyrus-sasl-openssl1-digestmd5-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565672" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565673" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565674" version="1" comment="cyrus-sasl-openssl1-gssapi-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565675" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565676" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565677" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565678" version="1" comment="cyrus-sasl-openssl1-otp-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565679" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565680" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565681" version="1" comment="cyrus-sasl-openssl1-plain-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565682" version="1" comment="cyrus-sasl-openssl1-x86 is &lt;2.1.22-182.26.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669432" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669433" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669434" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669435" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669436" version="1" comment="cyrus-sasl-openssl1-crammd5-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669437" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669438" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669439" version="1" comment="cyrus-sasl-openssl1-digestmd5-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669440" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669441" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669442" version="1" comment="cyrus-sasl-openssl1-gssapi-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669443" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669444" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669445" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669446" version="1" comment="cyrus-sasl-openssl1-otp-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669447" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669448" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669449" version="1" comment="cyrus-sasl-openssl1-plain-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669450" version="1" comment="cyrus-sasl-openssl1-x86 is &lt;2.1.22-182.26.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565683" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565684" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565685" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565686" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565687" version="1" comment="openssl1 is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565688" version="1" comment="openssl1-doc is &lt;1.0.1g-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565689" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565690" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565691" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565692" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565693" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565694" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565695" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565696" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565697" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565698" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565699" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565700" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565701" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565702" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565703" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565704" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565705" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565706" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565707" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565708" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565709" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565710" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565711" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565712" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565713" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565714" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565715" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565716" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565717" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565718" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565719" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.74.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565720" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565721" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565722" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565723" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.30.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565724" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.30.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565725" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.62.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565726" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.62.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565727" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.62.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565728" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565729" version="1" comment="openssh-openssl1 is &lt;6.6p1-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565730" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565731" version="1" comment="openssh-openssl1 is &lt;6.6p1-15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565732" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565733" version="1" comment="openssh-openssl1 is &lt;6.6p1-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565734" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565735" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565736" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565737" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565738" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659156" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659157" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565739" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565740" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565741" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565742" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565743" version="1" comment="openssl1 is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565744" version="1" comment="openssl1-doc is &lt;1.0.1g-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565745" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565746" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565747" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565748" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565749" version="1" comment="openssl1 is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565750" version="1" comment="openssl1-doc is &lt;1.0.1g-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565751" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565752" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565753" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565754" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565755" version="1" comment="openssl1 is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565756" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565757" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565758" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565759" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565760" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.52.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565761" version="1" comment="openssl1 is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565762" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565763" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565764" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565765" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565766" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.57.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565767" version="1" comment="openssl1 is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565768" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565769" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565770" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565771" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565772" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565773" version="1" comment="openssl1 is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565774" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565775" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565776" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565777" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565778" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565779" version="1" comment="openssl1 is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565780" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565781" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565782" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565783" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565784" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565785" version="1" comment="openssl1 is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565786" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565787" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565788" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565789" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565790" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565791" version="1" comment="openssl1 is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565792" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565793" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565794" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565795" version="1" comment="openssl1 is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565796" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565797" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565798" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565799" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565800" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565801" version="1" comment="openssl1 is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565802" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565803" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565804" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565805" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565806" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565807" version="1" comment="openssl1 is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565808" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565809" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565810" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565811" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.27.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565812" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.27.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565813" version="1" comment="openssl1 is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565814" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565815" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565816" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565817" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565818" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565819" version="1" comment="openssl1 is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565820" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565821" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565822" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565823" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565824" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565825" version="1" comment="openssl1 is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565826" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631729" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631730" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631731" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.36.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631732" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.36.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631733" version="1" comment="openssl1 is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631734" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632537" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632538" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632539" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632540" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632541" version="1" comment="openssl1 is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632542" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673386" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673387" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673388" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.42.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673389" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.58.42.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673390" version="1" comment="openssl1 is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673391" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565827" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565828" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565829" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565830" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565831" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565832" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565833" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565834" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676886" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676887" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565835" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565836" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565837" version="1" comment="wget-openssl1 is &lt;1.11.4-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565838" version="1" comment="wget-openssl1 is &lt;1.11.4-1.41.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565839" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565840" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565841" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565842" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565843" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565844" version="1" comment="Mesa is &lt;7.11.2-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565845" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565846" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565847" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565848" version="1" comment="acroread is &lt;9.5.5-0.5.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565849" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565850" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565851" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565852" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565853" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565854" version="1" comment="acroread_ja is &lt;9.4.2-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565855" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565856" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565857" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565858" version="1" comment="bogofilter is &lt;1.1.1-174.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565859" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565860" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565861" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565862" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565863" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565864" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565865" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565866" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565867" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565868" version="1" comment="mono-devel is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565869" version="1" comment="mono-extras is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565870" version="1" comment="mono-jscript is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565871" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565872" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565873" version="1" comment="mono-wcf is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565874" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565875" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565876" version="1" comment="monodoc-core is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565877" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565878" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565879" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565880" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565881" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565882" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565883" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565884" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565885" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565886" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565887" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565888" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565889" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565890" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565891" version="1" comment="samba is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565892" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565893" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565894" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565895" version="1" comment="samba-doc is &lt;3.6.3-0.33.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565896" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565897" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565898" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565899" version="1" comment="clamav is &lt;0.97.8-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565900" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565901" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565902" version="1" comment="coreutils is &lt;8.12-6.25.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565903" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565904" version="1" comment="cups is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565905" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565906" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565907" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565908" version="1" comment="curl is &lt;7.19.7-1.20.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565909" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565910" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565911" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565912" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565913" version="1" comment="finch is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565914" version="1" comment="libpurple is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565915" version="1" comment="libpurple-lang is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565916" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565917" version="1" comment="libpurple-tcl is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565918" version="1" comment="pidgin is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565919" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565920" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565921" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565922" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565923" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565924" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565925" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565926" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565927" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565928" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565929" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565930" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565931" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565932" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565933" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565934" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565935" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565936" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565937" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565938" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565939" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565940" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565941" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565942" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565943" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565944" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565945" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565946" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565947" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565948" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565949" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565950" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565951" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565952" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565953" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565954" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565955" version="1" comment="beagle is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565956" version="1" comment="beagle-evolution is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565957" version="1" comment="beagle-firefox is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565958" version="1" comment="beagle-gui is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565959" version="1" comment="beagle-lang is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565960" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565961" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565962" version="1" comment="mhtml-firefox is &lt;0.5-1.47.51.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565963" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565964" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565965" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565966" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565967" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565968" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565969" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565970" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565971" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565972" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565973" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565974" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565975" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565976" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565977" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565978" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565979" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565980" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565981" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565982" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565983" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565984" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565985" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565986" version="1" comment="flash-player is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565987" version="1" comment="flash-player-gnome is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565988" version="1" comment="flash-player-kde4 is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565989" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565990" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565991" version="1" comment="freetype2-devel is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565992" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565993" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565994" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565995" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565996" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565997" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565998" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565999" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566000" version="1" comment="glibc is &lt;2.11.3-17.45.49.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566001" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566002" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566003" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566004" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566005" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566006" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566007" version="1" comment="nscd is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566008" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566009" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566010" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566011" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566012" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566013" version="1" comment="gtk2 is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566014" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566015" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566016" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566017" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566018" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566019" version="1" comment="icedtea-web is &lt;1.4.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566020" version="1" comment="libicu is &lt;4.0-7.26.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566021" version="1" comment="inkscape is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566022" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566023" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566024" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566025" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566026" version="1" comment="inkscape-lang is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566027" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566028" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566029" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566030" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566031" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566032" version="1" comment="libkde4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566033" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566034" version="1" comment="kernel-default is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566035" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566036" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566037" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566038" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566039" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566040" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566041" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566042" version="1" comment="kernel-source is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566043" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566044" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566045" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566046" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566047" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566048" version="1" comment="kernel-xen is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566049" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566050" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566051" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566052" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566053" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566054" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566055" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566056" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566057" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566058" version="1" comment="kvm is &lt;0.15.1-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566059" version="1" comment="lcms is &lt;1.17-77.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566060" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566061" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566062" version="1" comment="libldb1 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566063" version="1" comment="libldb1-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566064" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566065" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566066" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566067" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566068" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566069" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566070" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566071" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566072" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566073" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566074" version="1" comment="samba is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566075" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566076" version="1" comment="samba-client is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566077" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566078" version="1" comment="samba-doc is &lt;3.6.3-0.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566079" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566080" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566081" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566082" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566083" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566084" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566085" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566086" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566087" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566088" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566089" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566090" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566091" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566092" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566093" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566094" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566095" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566096" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566097" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566098" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566099" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566100" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566101" version="1" comment="libpq5 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566102" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566103" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566104" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566105" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566106" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566107" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566108" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566109" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566110" version="1" comment="mysql is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566111" version="1" comment="mysql-client is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566112" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566113" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566114" version="1" comment="openssl is &lt;0.9.8j-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566115" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566116" version="1" comment="permissions is &lt;2013.1.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566117" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566118" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566119" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566120" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566121" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566122" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566123" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566124" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566125" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566126" version="1" comment="libproxy0-config-gnome-32bit is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566127" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566128" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566129" version="1" comment="libproxy0-networkmanager-32bit is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566130" version="1" comment="libssh2 is &lt;0.2-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566131" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566132" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566133" version="1" comment="libvirt is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566134" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566135" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566136" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566137" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566138" version="1" comment="libvirt is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566139" version="1" comment="libvirt-client is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566140" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566141" version="1" comment="libvirt-doc is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566142" version="1" comment="libvirt-python is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566143" version="1" comment="libxml2 is &lt;2.7.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566144" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566145" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566146" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566147" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566148" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566149" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566150" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566151" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566152" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566153" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566154" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566155" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566156" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566157" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566158" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566159" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566160" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566161" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566162" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566163" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566164" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566165" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566166" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566167" version="1" comment="openssh is &lt;5.1p1-41.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566168" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566169" version="1" comment="openssl-certs is &lt;1.95-0.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566170" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566171" version="1" comment="perl is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566172" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566173" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566174" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566175" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566176" version="1" comment="puppet is &lt;2.6.18-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566177" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566178" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566179" version="1" comment="python is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566180" version="1" comment="python-base is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566181" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566182" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566183" version="1" comment="python-devel is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566184" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566185" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566186" version="1" comment="strongswan is &lt;4.4.0-6.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566187" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566188" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566189" version="1" comment="telepathy-idle is &lt;0.1.5-1.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566190" version="1" comment="usbmuxd is &lt;1.0.7-5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566191" version="1" comment="vino is &lt;2.28.1-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566192" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566193" version="1" comment="xen is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566194" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566195" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566196" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566197" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566198" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566199" version="1" comment="xen-libs is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566200" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566201" version="1" comment="xen-tools is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566202" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566203" version="1" comment="libvirt is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566204" version="1" comment="libvirt-client is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566205" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566206" version="1" comment="libvirt-doc is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566207" version="1" comment="libvirt-python is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566208" version="1" comment="virt-manager is &lt;0.9.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566209" version="1" comment="vm-install is &lt;0.5.10-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566210" version="1" comment="xen is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566211" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566212" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566213" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566214" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566215" version="1" comment="xen-libs is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566216" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566217" version="1" comment="xen-tools is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566218" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566219" version="1" comment="vm-install is &lt;0.5.12-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566220" version="1" comment="xen is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566221" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566222" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566223" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566224" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566225" version="1" comment="xen-libs is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566226" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566227" version="1" comment="xen-tools is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566228" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566229" version="1" comment="xen is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566230" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566231" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566232" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566233" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566234" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566235" version="1" comment="xen-libs is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566236" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566237" version="1" comment="xen-tools is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566238" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566239" version="1" comment="xen is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566240" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566241" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566242" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566243" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566244" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566245" version="1" comment="xen-libs is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566246" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566247" version="1" comment="xen-tools is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566248" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566249" version="1" comment="xen is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566250" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566251" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566252" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566253" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566254" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566255" version="1" comment="xen-libs is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566256" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566257" version="1" comment="xen-tools is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566258" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566259" version="1" comment="xen is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566260" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566261" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566262" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566263" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566264" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566265" version="1" comment="xen-libs is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566266" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566267" version="1" comment="xen-tools is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566268" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566269" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566270" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566271" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566272" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566273" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566274" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566275" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566276" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566277" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566278" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566279" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566280" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566281" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566282" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566283" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566284" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566285" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566286" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566287" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566288" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566289" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566290" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566291" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566292" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566293" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566294" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566295" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566296" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566297" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566298" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566299" version="1" comment="zypper is &lt;1.6.166-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566300" version="1" comment="zypper-log is &lt;1.6.166-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566301" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566302" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566303" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566304" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566305" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566306" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566307" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566308" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566309" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566310" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566311" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566312" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566313" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566314" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566315" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566316" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566317" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566318" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566319" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566320" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566321" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566322" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566323" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566324" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566325" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566326" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566327" version="1" comment="libfreebl3 is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566328" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566329" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566330" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566331" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566332" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566333" version="1" comment="mozilla-nss is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566334" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566335" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566336" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566337" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566338" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566339" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566340" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566341" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566342" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566343" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566344" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566345" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566346" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566347" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566348" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566349" version="1" comment="a2ps is &lt;4.13-1326.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566350" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566351" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566352" version="1" comment="bash is &lt;3.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566353" version="1" comment="bash-doc is &lt;3.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566354" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566355" version="1" comment="readline-doc is &lt;5.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566356" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566357" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566358" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566359" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566360" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566361" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566362" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566363" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566364" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566365" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566366" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566367" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566368" version="1" comment="binutils is &lt;2.23.1-0.23.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566369" version="1" comment="cabextract is &lt;1.2-2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566370" version="1" comment="cabextract is &lt;1.2-2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566371" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566372" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566373" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566374" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566375" version="1" comment="compat-wireless-kmp-default is &lt;3.13_3.0.101_0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566376" version="1" comment="compat-wireless-kmp-pae is &lt;3.13_3.0.101_0.31-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566377" version="1" comment="compat-wireless-kmp-xen is &lt;3.13_3.0.101_0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566378" version="1" comment="cpio is &lt;2.9-75.78.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566379" version="1" comment="cpio-lang is &lt;2.9-75.78.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566380" version="1" comment="cups is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566381" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566382" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566383" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566384" version="1" comment="curl is &lt;7.19.7-1.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566385" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566386" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566387" version="1" comment="curl is &lt;7.19.7-1.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566388" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566389" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566390" version="1" comment="curl is &lt;7.19.7-1.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566391" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566392" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566393" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566394" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566395" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566396" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566397" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566398" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566399" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566400" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009440332" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009101461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566401" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566402" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566403" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566404" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566405" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009440334" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009101461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566406" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566407" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566408" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566409" version="1" comment="elfutils is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566410" version="1" comment="libasm1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566411" version="1" comment="libdw1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566412" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566413" version="1" comment="libebl1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566414" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566415" version="1" comment="libelf1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566416" version="1" comment="emacs is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566417" version="1" comment="emacs-info is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566418" version="1" comment="emacs-x11 is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566419" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566420" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566421" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566422" version="1" comment="file is &lt;4.24-43.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566423" version="1" comment="file-32bit is &lt;4.24-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566424" version="1" comment="finch is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566425" version="1" comment="libpurple is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566426" version="1" comment="libpurple-lang is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566427" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566428" version="1" comment="libpurple-tcl is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566429" version="1" comment="pidgin is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566430" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566431" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566432" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566433" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566434" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566435" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566436" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566437" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566438" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566439" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566440" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566441" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566442" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566443" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566444" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566445" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566446" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566447" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566448" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566449" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566450" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566451" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566452" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566453" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566454" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566455" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566456" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566457" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566458" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566459" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566460" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566461" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566462" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566463" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566464" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566465" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566466" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566467" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566468" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566469" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566470" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566471" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566472" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566473" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566474" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566475" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566476" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566477" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566478" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566479" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566480" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566481" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566482" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566483" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566484" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566485" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566486" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566487" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566488" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566489" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566490" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566491" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566492" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566493" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566494" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566495" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566496" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566497" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566498" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566499" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566500" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566501" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566502" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566503" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566504" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566505" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566506" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566507" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566508" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566509" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566510" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566511" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566512" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566513" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566514" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566515" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566516" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566517" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566518" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566519" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566520" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566521" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566522" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566523" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566524" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566525" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566526" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566527" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566528" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566529" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566530" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566531" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566532" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566533" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566534" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566535" version="1" comment="flash-player is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566536" version="1" comment="flash-player-gnome is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566537" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566538" version="1" comment="flash-player is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566539" version="1" comment="flash-player-gnome is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566540" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566541" version="1" comment="flash-player is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566542" version="1" comment="flash-player-gnome is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566543" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566544" version="1" comment="flash-player is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566545" version="1" comment="flash-player-gnome is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566546" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566547" version="1" comment="flash-player is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566548" version="1" comment="flash-player-gnome is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566549" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566550" version="1" comment="flash-player is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566551" version="1" comment="flash-player-gnome is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566552" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566553" version="1" comment="flash-player is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566554" version="1" comment="flash-player-gnome is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566555" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566556" version="1" comment="flash-player is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566557" version="1" comment="flash-player-gnome is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566558" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566559" version="1" comment="flash-player is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566560" version="1" comment="flash-player-gnome is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566561" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566562" version="1" comment="flash-player is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566563" version="1" comment="flash-player-gnome is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566564" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566565" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566566" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566567" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566568" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566569" version="1" comment="fuse is &lt;2.8.7-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566570" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566571" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566572" version="1" comment="giflib is &lt;4.1.6-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566573" version="1" comment="giflib-32bit is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566574" version="1" comment="gimp is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566575" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566576" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566577" version="1" comment="glibc is &lt;2.11.3-17.72.14 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566578" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566579" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566580" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566581" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566582" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566583" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566584" version="1" comment="nscd is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566585" version="1" comment="glibc is &lt;2.11.3-17.87.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566586" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566587" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566588" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566589" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566590" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566591" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566592" version="1" comment="nscd is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566593" version="1" comment="glibc is &lt;2.11.3-17.95.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566594" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566595" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566596" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566597" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566598" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566599" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566600" version="1" comment="nscd is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566601" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566602" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566603" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566604" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566605" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566606" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566607" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566608" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566609" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566610" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566611" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566612" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566613" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566614" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566615" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566616" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566617" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566618" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566619" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566620" version="1" comment="libgstbasecamerabinsrc-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566621" version="1" comment="libgstbasecamerabinsrc-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566622" version="1" comment="libgstbasevideo-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566623" version="1" comment="libgstbasevideo-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566624" version="1" comment="libgstphotography-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566625" version="1" comment="libgstphotography-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566626" version="1" comment="libgstsignalprocessor-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566627" version="1" comment="libgstsignalprocessor-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566628" version="1" comment="libgstvdp-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566629" version="1" comment="libgstvdp-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566630" version="1" comment="gtk2 is &lt;2.18.9-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566631" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566632" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566633" version="1" comment="gtk2 is &lt;2.18.9-0.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566634" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566635" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566636" version="1" comment="icedtea-web is &lt;1.4.2-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566637" version="1" comment="libicu is &lt;4.0-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566638" version="1" comment="libjasper is &lt;1.900.1-134.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566639" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566640" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566641" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566642" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566643" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566644" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566645" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566646" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566647" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566648" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566649" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566650" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566651" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566652" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566653" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566654" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566655" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566656" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566657" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566658" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566659" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566660" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566661" version="1" comment="kde4-l10n-da-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566662" version="1" comment="kde4-l10n-da-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566663" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566664" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566665" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566666" version="1" comment="kde4-l10n-es-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566667" version="1" comment="kde4-l10n-es-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566668" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566669" version="1" comment="kde4-l10n-fr-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566670" version="1" comment="kde4-l10n-fr-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566671" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566672" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566673" version="1" comment="kde4-l10n-it-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566674" version="1" comment="kde4-l10n-it-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566675" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566676" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566677" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566678" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566679" version="1" comment="kde4-l10n-nl-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566680" version="1" comment="kde4-l10n-nl-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566681" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566682" version="1" comment="kde4-l10n-pl-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566683" version="1" comment="kde4-l10n-pl-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566684" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566685" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566686" version="1" comment="kde4-l10n-pt_BR-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566687" version="1" comment="kde4-l10n-pt_BR-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566688" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566689" version="1" comment="kde4-l10n-ru-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566690" version="1" comment="kde4-l10n-ru-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566691" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566692" version="1" comment="kde4-l10n-sv-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566693" version="1" comment="kde4-l10n-sv-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566694" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566695" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566696" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566697" version="1" comment="kdebase4-runtime-xine is &lt;4.3.5-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566698" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566699" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566700" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566701" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566702" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566703" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566704" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566705" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566706" version="1" comment="libkde4 is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566707" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566708" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566709" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566710" version="1" comment="kernel-default is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566711" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566712" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566713" version="1" comment="kernel-default-extra is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566714" version="1" comment="kernel-pae is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566715" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566716" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566717" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566718" version="1" comment="kernel-source is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566719" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566720" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566721" version="1" comment="kernel-xen is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566722" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566723" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566724" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566725" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566726" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566727" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566728" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566729" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566730" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566731" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566732" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566733" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566734" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566735" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566736" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566737" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566738" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566739" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566740" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566741" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566742" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566743" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566744" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566745" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566746" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566747" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566748" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566749" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566750" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566751" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566752" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566753" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566754" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566755" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566756" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566757" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566758" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566759" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566760" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566761" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566762" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566763" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566764" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566765" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566766" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566767" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566768" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566769" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566770" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566771" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566772" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566773" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566774" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566775" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566776" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566777" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566778" version="1" comment="kvm is &lt;1.4.2-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566779" version="1" comment="kvm is &lt;1.4.2-0.22.34.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566780" version="1" comment="kvm is &lt;1.4.2-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566781" version="1" comment="kvm is &lt;1.4.2-0.21.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566782" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566783" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566784" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566785" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566786" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566787" version="1" comment="lcms2 is &lt;2.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566788" version="1" comment="liblcms2-2 is &lt;2.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566789" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566790" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566791" version="1" comment="libqt4 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566792" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566793" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566794" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566795" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566796" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566797" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566798" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566799" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566800" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566801" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566802" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566803" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566804" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566805" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566806" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566807" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566808" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566809" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566810" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566811" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566812" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566813" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566814" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566815" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566816" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566817" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566818" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566819" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566820" version="1" comment="libgadu is &lt;1.8.2-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566821" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566822" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566823" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566824" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566825" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566826" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566827" version="1" comment="libksba is &lt;1.0.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566828" version="1" comment="libksba is &lt;1.0.4-1.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566829" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566830" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566831" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566832" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566833" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566834" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566835" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566836" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566837" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566838" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566839" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566840" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566841" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566842" version="1" comment="mysql is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566843" version="1" comment="mysql-client is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566844" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566845" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566846" version="1" comment="openssl is &lt;0.9.8j-0.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566847" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566848" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566849" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566850" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566851" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566852" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566853" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566854" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566855" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566856" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566857" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566858" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566859" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566860" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566861" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566862" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566863" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566864" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566865" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566866" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566867" version="1" comment="pulseaudio-module-gconf is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566868" version="1" comment="pulseaudio-module-jack is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566869" version="1" comment="pulseaudio-module-lirc is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566870" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566871" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566872" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566873" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566874" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566875" version="1" comment="libqt4 is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566876" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566877" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566878" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566879" version="1" comment="libqt4-sql is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566880" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566881" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566882" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566883" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566884" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566885" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566886" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566887" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566888" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566889" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566890" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566891" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566892" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566893" version="1" comment="libqt4 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566894" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566895" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566896" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566897" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566898" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566899" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566900" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566901" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566902" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566903" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566904" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566905" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566906" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566907" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566908" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566909" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566910" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566911" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566912" version="1" comment="libsndfile is &lt;1.0.20-2.6.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566913" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566914" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566915" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566916" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566917" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566918" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566919" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566920" version="1" comment="libssh2 is &lt;0.2-5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566921" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566922" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566923" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566924" version="1" comment="libvdpau1 is &lt;0.4.1-16.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566925" version="1" comment="libvdpau1-32bit is &lt;0.4.1-16.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566926" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566927" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566928" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566929" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566930" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566931" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566932" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566933" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566934" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566935" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566936" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566937" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566938" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566939" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566940" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566941" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566942" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566943" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566944" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566945" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566946" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566947" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566948" version="1" comment="libfreebl3 is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566949" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566950" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566951" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566952" version="1" comment="mozilla-nss is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566953" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566954" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566955" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566956" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566957" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566958" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566959" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566960" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566961" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566962" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566963" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566964" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566965" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566966" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566967" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566968" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566969" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566970" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566971" version="1" comment="mutt is &lt;1.5.17-42.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566972" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566973" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566974" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566975" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566976" version="1" comment="mysql is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566977" version="1" comment="mysql-client is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566978" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566979" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566980" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566981" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566982" version="1" comment="mysql is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566983" version="1" comment="mysql-client is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566984" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566985" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566986" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566987" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566988" version="1" comment="mysql is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566989" version="1" comment="mysql-client is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566990" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566991" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566992" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566993" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566994" version="1" comment="novell-qtgui is &lt;3.0.0-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566995" version="1" comment="novell-qtgui-cli is &lt;3.0.0-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566996" version="1" comment="novell-ui-base is &lt;3.0.0-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566997" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566998" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566999" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567000" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567001" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567002" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567003" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567004" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567005" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567006" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567007" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567008" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567009" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567010" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567011" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567012" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567013" version="1" comment="openslp is &lt;1.2.0-172.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567014" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567015" version="1" comment="openssh is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567016" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567017" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567018" version="1" comment="openssh is &lt;6.2p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567019" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567020" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567021" version="1" comment="openssh is &lt;6.2p2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567022" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567023" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567024" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567025" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567026" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567027" version="1" comment="openssl-certs is &lt;1.97-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567028" version="1" comment="openvpn is &lt;2.0.9-143.40.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567029" version="1" comment="orca is &lt;2.28.3-0.5.10 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567030" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567031" version="1" comment="pam is &lt;1.1.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567032" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567033" version="1" comment="pam-doc is &lt;1.1.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567034" version="1" comment="perl is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567035" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567036" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567037" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567038" version="1" comment="perl-base is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567039" version="1" comment="perl-doc is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567040" version="1" comment="popt is &lt;1.7-37.60.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567041" version="1" comment="popt-32bit is &lt;1.7-37.60.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567042" version="1" comment="rpm is &lt;4.4.2.3-37.60.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567043" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567044" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567045" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567046" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567047" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567048" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567049" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567050" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567051" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567052" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567053" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567054" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567055" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567056" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567057" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567058" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567059" version="1" comment="procmail is &lt;3.22-240.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567060" version="1" comment="puppet is &lt;2.6.18-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567061" version="1" comment="pwlib is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567062" version="1" comment="pwlib-plugins-avc is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567063" version="1" comment="pwlib-plugins-dc is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567064" version="1" comment="pwlib-plugins-v4l2 is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567065" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567066" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567067" version="1" comment="python is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567068" version="1" comment="python-base is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567069" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567070" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567071" version="1" comment="python-devel is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567072" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567073" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567074" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567075" version="1" comment="python is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567076" version="1" comment="python-base is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567077" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567078" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567079" version="1" comment="python-devel is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567080" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567081" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567082" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567083" version="1" comment="python is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567084" version="1" comment="python-base is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567085" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567086" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567087" version="1" comment="python-devel is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567088" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567089" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567090" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567091" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567092" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567093" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567094" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567095" version="1" comment="python-devel is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567096" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567097" version="1" comment="python-lxml is &lt;2.3.6-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567098" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567099" version="1" comment="python-setuptools is &lt;0.6c11-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567100" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567101" version="1" comment="rsync is &lt;3.0.4-2.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567102" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567103" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567104" version="1" comment="libldb1 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567105" version="1" comment="libldb1-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567106" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567107" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567108" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567109" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567110" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567111" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567112" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567113" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567114" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567115" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567116" version="1" comment="samba is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567117" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567118" version="1" comment="samba-client is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567119" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567120" version="1" comment="samba-doc is &lt;3.6.3-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567121" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567122" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567123" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567124" version="1" comment="libldb1 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567125" version="1" comment="libldb1-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567126" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567127" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567128" version="1" comment="libtalloc2 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567129" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567130" version="1" comment="libtdb1 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567131" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567132" version="1" comment="libtevent0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567133" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567134" version="1" comment="libwbclient0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567135" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567136" version="1" comment="samba is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567137" version="1" comment="samba-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567138" version="1" comment="samba-client is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567139" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567140" version="1" comment="samba-doc is &lt;3.6.3-64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567141" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567142" version="1" comment="samba-winbind is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567143" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567144" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567145" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567146" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567147" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567148" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567149" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567150" version="1" comment="sudo is &lt;1.7.6p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567151" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567152" version="1" comment="libtidy is &lt;1.0-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567153" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567154" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567155" version="1" comment="unzip is &lt;6.00-11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567156" version="1" comment="vorbis-tools is &lt;1.1.1-174.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567157" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567158" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567159" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567160" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567161" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.17.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567162" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567163" version="1" comment="xen is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567164" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567165" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567166" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567167" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567168" version="1" comment="xen-libs is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567169" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567170" version="1" comment="xen-tools is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567171" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567172" version="1" comment="xen is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567173" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567174" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567175" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567176" version="1" comment="xen-libs is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567177" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567178" version="1" comment="xen-tools is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567179" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567180" version="1" comment="xen is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567181" version="1" comment="xen-doc-html is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567182" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567183" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567184" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567185" version="1" comment="xen-libs is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567186" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567187" version="1" comment="xen-tools is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567188" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567189" version="1" comment="xen is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567190" version="1" comment="xen-doc-html is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567191" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567192" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567193" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567194" version="1" comment="xen-libs is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567195" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567196" version="1" comment="xen-tools is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567197" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567198" version="1" comment="xen is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567199" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567200" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567201" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567202" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567203" version="1" comment="xen-libs is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567204" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567205" version="1" comment="xen-tools is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567206" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567207" version="1" comment="xen is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567208" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567209" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567210" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567211" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567212" version="1" comment="xen-libs is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567213" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567214" version="1" comment="xen-tools is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567215" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567216" version="1" comment="xen is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567217" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567218" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567219" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567220" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567221" version="1" comment="xen-libs is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567222" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567223" version="1" comment="xen-tools is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567224" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567225" version="1" comment="xen is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567226" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567227" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567228" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567229" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567230" version="1" comment="xen-libs is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567231" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567232" version="1" comment="xen-tools is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567233" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567234" version="1" comment="xen is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567235" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567236" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567237" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567238" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567239" version="1" comment="xen-libs is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567240" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567241" version="1" comment="xen-tools is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567242" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567243" version="1" comment="xen is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567244" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567245" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567246" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567247" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567248" version="1" comment="xen-libs is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567249" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567250" version="1" comment="xen-tools is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567251" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567252" version="1" comment="xen is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567253" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567254" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567255" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567256" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567257" version="1" comment="xen-libs is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567258" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567259" version="1" comment="xen-tools is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567260" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567261" version="1" comment="xen is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567262" version="1" comment="xen-doc-html is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567263" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567264" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567265" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567266" version="1" comment="xen-libs is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567267" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567268" version="1" comment="xen-tools is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567269" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567270" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567271" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567272" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567273" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567274" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567275" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567276" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567277" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567278" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567279" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567280" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567281" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567282" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567283" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567284" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567285" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567286" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567287" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567288" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567289" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567290" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567291" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567292" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567293" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567294" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567295" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567296" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567297" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567298" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567299" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567300" version="1" comment="xen is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567301" version="1" comment="xen-doc-html is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567302" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567303" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567304" version="1" comment="xen-libs is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567305" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567306" version="1" comment="xen-tools is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567307" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567308" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567309" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567310" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567311" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567312" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567313" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567314" version="1" comment="flash-player is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567315" version="1" comment="flash-player-gnome is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567316" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567317" version="1" comment="flash-player is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567318" version="1" comment="flash-player-gnome is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567319" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567320" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567321" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567322" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567323" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567324" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567325" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567326" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567327" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567328" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567329" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567330" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567331" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567332" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567333" version="1" comment="icedtea-web is &lt;1.5.3-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567334" version="1" comment="libicu is &lt;4.0-7.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567335" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567336" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567337" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567338" version="1" comment="kernel-default is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567339" version="1" comment="kernel-default-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567340" version="1" comment="kernel-default-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567341" version="1" comment="kernel-default-extra is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567342" version="1" comment="kernel-pae is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567343" version="1" comment="kernel-pae-base is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567344" version="1" comment="kernel-pae-devel is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567345" version="1" comment="kernel-pae-extra is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567346" version="1" comment="kernel-source is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567347" version="1" comment="kernel-syms is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567348" version="1" comment="kernel-trace-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567349" version="1" comment="kernel-xen is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567350" version="1" comment="kernel-xen-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567351" version="1" comment="kernel-xen-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567352" version="1" comment="kernel-xen-extra is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567353" version="1" comment="kernel-default is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567354" version="1" comment="kernel-default-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567355" version="1" comment="kernel-default-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567356" version="1" comment="kernel-default-extra is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567357" version="1" comment="kernel-pae is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567358" version="1" comment="kernel-pae-base is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567359" version="1" comment="kernel-pae-devel is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567360" version="1" comment="kernel-pae-extra is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567361" version="1" comment="kernel-source is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567362" version="1" comment="kernel-syms is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567363" version="1" comment="kernel-trace-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567364" version="1" comment="kernel-xen is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567365" version="1" comment="kernel-xen-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567366" version="1" comment="kernel-xen-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567367" version="1" comment="kernel-xen-extra is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567368" version="1" comment="kernel-default is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567369" version="1" comment="kernel-default-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567370" version="1" comment="kernel-default-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567371" version="1" comment="kernel-default-extra is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567372" version="1" comment="kernel-pae is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567373" version="1" comment="kernel-pae-base is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567374" version="1" comment="kernel-pae-devel is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567375" version="1" comment="kernel-pae-extra is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567376" version="1" comment="kernel-source is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567377" version="1" comment="kernel-syms is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567378" version="1" comment="kernel-trace-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567379" version="1" comment="kernel-xen is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567380" version="1" comment="kernel-xen-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567381" version="1" comment="kernel-xen-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567382" version="1" comment="kernel-xen-extra is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567383" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567384" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567385" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567386" version="1" comment="kvm is &lt;1.4.2-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567387" version="1" comment="kvm is &lt;1.4.2-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567388" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567389" version="1" comment="libssh2 is &lt;0.2-5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567390" version="1" comment="libvirt is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567391" version="1" comment="libvirt-client is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567392" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567393" version="1" comment="libvirt-doc is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567394" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567395" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567396" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567397" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567398" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567399" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567400" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567401" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567402" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567403" version="1" comment="mono-devel is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567404" version="1" comment="mono-extras is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567405" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567406" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567407" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567408" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567409" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567410" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567411" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567412" version="1" comment="ntp is &lt;4.2.8p4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567413" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567414" version="1" comment="openssh is &lt;6.6p1-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567415" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567416" version="1" comment="openssh-helpers is &lt;6.6p1-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567417" version="1" comment="openssh is &lt;6.6p1-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567418" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567419" version="1" comment="openssh-helpers is &lt;6.6p1-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567420" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567421" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567422" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567423" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567424" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567425" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567426" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567427" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567428" version="1" comment="libldb1 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567429" version="1" comment="libldb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567430" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567431" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567432" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567433" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567434" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567435" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567436" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567437" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567438" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567439" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567440" version="1" comment="samba is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567441" version="1" comment="samba-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567442" version="1" comment="samba-client is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567443" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567444" version="1" comment="samba-doc is &lt;3.6.3-67.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567445" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567446" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567447" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567448" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567449" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567450" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567451" version="1" comment="xen is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567452" version="1" comment="xen-doc-html is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567453" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567454" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567455" version="1" comment="xen-libs is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567456" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567457" version="1" comment="xen-tools is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567458" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567459" version="1" comment="xen is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567460" version="1" comment="xen-doc-html is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567461" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567462" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567463" version="1" comment="xen-libs is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567464" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567465" version="1" comment="xen-tools is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567466" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567467" version="1" comment="xen is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567468" version="1" comment="xen-doc-html is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567469" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567470" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567471" version="1" comment="xen-libs is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567472" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567473" version="1" comment="xen-tools is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567474" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567475" version="1" comment="xen is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567476" version="1" comment="xen-doc-html is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567477" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567478" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567479" version="1" comment="xen-libs is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567480" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567481" version="1" comment="xen-tools is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567482" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567483" version="1" comment="conntrack-tools is &lt;1.0.0-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117402" version="1" comment="sle-hae-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567484" version="1" comment="ctdb is &lt;1.0.114.6-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567485" version="1" comment="hawk is &lt;0.6.1-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567486" version="1" comment="hawk-templates is &lt;0.6.1-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567487" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.47.55-2.28.1.21 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567488" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.40-2.27.98 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567489" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.40-2.27.98 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567490" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.40-2.27.98 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567491" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.40-2.27.98 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567492" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.40-2.27.98 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567493" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.47.55-0.17.1.21 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567494" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.40-0.16.104 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567495" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.40-0.16.104 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567496" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.40-0.16.104 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567497" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.40-0.16.104 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567498" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.40-0.16.104 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567499" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.47.55-0.21.1.21 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567500" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.40-0.20.98 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567501" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.40-0.20.98 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567502" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.40-0.20.98 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567503" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.40-0.20.98 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567504" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.40-0.20.98 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567505" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.40-2.27.98 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567506" version="1" comment="drbd-kmp-bigsmp is &lt;8.4.4_3.0.101_0.40-0.22.64 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567507" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.40-0.16.104 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567508" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.40-0.20.98 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117403" version="1" comment="sle-hae-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624155" version="1" comment="csync2 is &lt;1.34-0.13.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567509" version="1" comment="ctdb is &lt;1.0.114.6-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567510" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.76.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567511" version="1" comment="graphviz-python is &lt;2.20.2-8.3.6 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567512" version="1" comment="hawk is &lt;0.7.0+git.1430140184.8e872c5-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567513" version="1" comment="hawk-templates is &lt;0.7.0+git.1430140184.8e872c5-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567514" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.7-2.32.2.14 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567515" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.7-2.32.2.14 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567516" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.7-2.32.2.14 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567517" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.7-2.32.2.14 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567518" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.7-2.32.2.14 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567519" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.7-2.32.2.14 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567520" version="1" comment="drbd is &lt;8.4.4-0.27.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567521" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567522" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567523" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.7-0.27.2.13 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567524" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.7-0.27.2.13 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567525" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.7-0.27.2.13 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567526" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.7-0.27.2.13 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567527" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.7-0.27.2.13 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567528" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.7-0.27.2.13 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567529" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567530" version="1" comment="drbd-udev is &lt;8.4.4-0.27.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567531" version="1" comment="drbd-utils is &lt;8.4.4-0.27.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567532" version="1" comment="drbd-xen is &lt;8.4.4-0.27.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567533" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.7-0.24.2.14 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567534" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.7-0.24.2.14 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567535" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.7-0.24.2.14 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567536" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.7-0.24.2.14 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567537" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.7-0.24.2.14 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567538" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.7-0.24.2.14 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567539" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.7-0.28.3.4 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567540" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.7-0.28.3.4 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567541" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.7-0.28.3.4 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567542" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.7-0.28.3.4 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567543" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.7-0.28.3.4 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567544" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.7-0.28.3.4 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567545" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.35-2.32.4.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567546" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.35-2.32.4.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567547" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.35-2.32.4.6 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567548" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.35-2.32.4.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567549" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.35-2.32.4.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567550" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.35-2.32.4.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567551" version="1" comment="drbd is &lt;8.4.4-0.27.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567552" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567553" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567554" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.35-0.27.4.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567555" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.35-0.27.4.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567556" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.35-0.27.4.6 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567557" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.35-0.27.4.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567558" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.35-0.27.4.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567559" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.35-0.27.4.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567560" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567561" version="1" comment="drbd-udev is &lt;8.4.4-0.27.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567562" version="1" comment="drbd-utils is &lt;8.4.4-0.27.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567563" version="1" comment="drbd-xen is &lt;8.4.4-0.27.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567564" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.35-0.24.4.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567565" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.35-0.24.4.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567566" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.35-0.24.4.6 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567567" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.35-0.24.4.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567568" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.35-0.24.4.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567569" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.35-0.24.4.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567570" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.35-0.28.5.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567571" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.35-0.28.5.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567572" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.35-0.28.5.6 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567573" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.35-0.28.5.6 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567574" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.35-0.28.5.6 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567575" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.35-0.28.5.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567576" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.87-0.28.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567577" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.87-0.28.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567578" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.87-0.28.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567579" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.87-0.28.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567580" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.87-0.28.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567581" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.87-0.28.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567582" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.108-0.28.11.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567583" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.108-0.28.11.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567584" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.108-0.28.11.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567585" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.108-0.28.11.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567586" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.108-0.28.11.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567587" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.108-0.28.11.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567588" version="1" comment="cluster-network-kmp-bigmem is &lt;1.4_3.0.101_108.87-2.32.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567589" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_108.87-2.32.6.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567590" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_108.87-2.32.6.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567591" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_108.87-2.32.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567592" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_108.87-2.32.6.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567593" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_108.87-2.32.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567594" version="1" comment="drbd is &lt;8.4.4-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567595" version="1" comment="drbd-bash-completion is &lt;8.4.4-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567596" version="1" comment="drbd-heartbeat is &lt;8.4.4-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567597" version="1" comment="drbd-kmp-bigmem is &lt;8.4.4_3.0.101_108.87-0.27.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567598" version="1" comment="drbd-kmp-default is &lt;8.4.4_3.0.101_108.87-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567599" version="1" comment="drbd-kmp-pae is &lt;8.4.4_3.0.101_108.87-0.27.6.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567600" version="1" comment="drbd-kmp-ppc64 is &lt;8.4.4_3.0.101_108.87-0.27.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567601" version="1" comment="drbd-kmp-trace is &lt;8.4.4_3.0.101_108.87-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567602" version="1" comment="drbd-kmp-xen is &lt;8.4.4_3.0.101_108.87-0.27.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567603" version="1" comment="drbd-pacemaker is &lt;8.4.4-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567604" version="1" comment="drbd-udev is &lt;8.4.4-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567605" version="1" comment="drbd-utils is &lt;8.4.4-0.27.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567606" version="1" comment="drbd-xen is &lt;8.4.4-0.27.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567607" version="1" comment="gfs2-kmp-bigmem is &lt;2_3.0.101_108.87-0.24.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567608" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_108.87-0.24.6.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567609" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_108.87-0.24.6.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567610" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_108.87-0.24.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567611" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_108.87-0.24.6.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567612" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_108.87-0.24.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567613" version="1" comment="ocfs2-kmp-bigmem is &lt;1.6_3.0.101_108.87-0.28.9.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567614" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_108.87-0.28.9.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567615" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_108.87-0.28.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567616" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_108.87-0.28.9.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567617" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_108.87-0.28.9.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567618" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_108.87-0.28.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567619" version="1" comment="libpacemaker-devel is &lt;1.1.12-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567620" version="1" comment="libpacemaker3 is &lt;1.1.12-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567621" version="1" comment="pacemaker is &lt;1.1.12-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567622" version="1" comment="pacemaker-cli is &lt;1.1.12-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567623" version="1" comment="pacemaker-remote is &lt;1.1.12-18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567624" version="1" comment="ldirectord is &lt;3.9.5-50.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567625" version="1" comment="nagios-plugins-metadata is &lt;3.9.5-50.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567626" version="1" comment="resource-agents is &lt;3.9.5-50.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117404" version="1" comment="sle-pos-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567627" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.92.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117405" version="1" comment="sle-pos-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567628" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.135.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567629" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567630" version="1" comment="LibVNCServer is &lt;0.9.1-160.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567631" version="1" comment="LibVNCServer is &lt;0.9.1-160.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567632" version="1" comment="LibVNCServer is &lt;0.9.1-160.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567633" version="1" comment="LibVNCServer is &lt;0.9.1-160.22.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567634" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567635" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567636" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567637" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567638" version="1" comment="libfreebl3 is &lt;3.21.1-35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567639" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567640" version="1" comment="mozilla-nspr is &lt;4.12-29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567641" version="1" comment="mozilla-nss is &lt;3.21.1-35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567642" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567643" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567644" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567645" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567646" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567647" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567648" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567649" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567650" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567651" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567652" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567653" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567654" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567655" version="1" comment="libfreebl3 is &lt;3.29.5-46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567656" version="1" comment="libsoftokn3 is &lt;3.29.5-46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567657" version="1" comment="mozilla-nspr is &lt;4.13.1-32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567658" version="1" comment="mozilla-nss is &lt;3.29.5-46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567659" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567660" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567661" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3.44 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567662" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567663" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567664" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567665" version="1" comment="libfreebl3 is &lt;3.29.5-47.3.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567666" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567667" version="1" comment="mozilla-nss is &lt;3.29.5-47.3.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567668" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567669" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567670" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567671" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567672" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567673" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567674" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567675" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567676" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567677" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567678" version="1" comment="MozillaFirefox is &lt;52.8.0esr-72.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567679" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-72.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567680" version="1" comment="MozillaFirefox is &lt;52.8.1esr-72.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567681" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-72.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567682" version="1" comment="MozillaFirefox is &lt;52.9.0esr-72.38.6 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567683" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-72.38.6 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567684" version="1" comment="OpenEXR is &lt;1.6.1-83.17.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657131" version="1" comment="OpenEXR is &lt;1.6.1-83.17.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567685" version="1" comment="POS_Image-Minimal3 is &lt;3.4.0-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567686" version="1" comment="POS_Image-Netboot-hooks is &lt;3.4.0-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567687" version="1" comment="POS_Image-Tools is &lt;3.4.0-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567688" version="1" comment="POS_Image3 is &lt;3.5.5-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567689" version="1" comment="POS_Migration is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567690" version="1" comment="POS_Server-Admin3 is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567691" version="1" comment="POS_Server-AdminGUI is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567692" version="1" comment="POS_Server-AdminTools3 is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567693" version="1" comment="POS_Server-BranchTools3 is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567694" version="1" comment="POS_Server-Modules3 is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567695" version="1" comment="POS_Server3 is &lt;3.5.5-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567696" version="1" comment="admind is &lt;1.9-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567697" version="1" comment="admind-client is &lt;1.9-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567698" version="1" comment="posbios is &lt;1.0-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567699" version="1" comment="SDL is &lt;1.2.13-106.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679742" version="1" comment="SDL is &lt;1.2.13-106.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567700" version="1" comment="libadns1 is &lt;1.4-75.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664249" version="1" comment="aide is &lt;0.13.1-40.16.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567701" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567702" version="1" comment="apache2-devel is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567703" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567704" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567705" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567706" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567707" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567708" version="1" comment="apache2 is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567709" version="1" comment="apache2-devel is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567710" version="1" comment="apache2-doc is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567711" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567712" version="1" comment="apache2-prefork is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567713" version="1" comment="apache2-utils is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567714" version="1" comment="apache2-worker is &lt;2.2.34-70.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567715" version="1" comment="apache2 is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567716" version="1" comment="apache2-devel is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567717" version="1" comment="apache2-doc is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567718" version="1" comment="apache2-example-pages is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567719" version="1" comment="apache2-prefork is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567720" version="1" comment="apache2-utils is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567721" version="1" comment="apache2-worker is &lt;2.2.34-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567722" version="1" comment="apache2 is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567723" version="1" comment="apache2-devel is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567724" version="1" comment="apache2-doc is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567725" version="1" comment="apache2-example-pages is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567726" version="1" comment="apache2-prefork is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567727" version="1" comment="apache2-utils is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567728" version="1" comment="apache2-worker is &lt;2.2.34-70.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633937" version="1" comment="apache2 is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633938" version="1" comment="apache2-devel is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633939" version="1" comment="apache2-doc is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633940" version="1" comment="apache2-example-pages is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633941" version="1" comment="apache2-prefork is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633942" version="1" comment="apache2-utils is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633943" version="1" comment="apache2-worker is &lt;2.2.34-70.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673613" version="1" comment="apache2 is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673614" version="1" comment="apache2-devel is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673615" version="1" comment="apache2-doc is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673616" version="1" comment="apache2-example-pages is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673617" version="1" comment="apache2-prefork is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673618" version="1" comment="apache2-utils is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673619" version="1" comment="apache2-worker is &lt;2.2.34-70.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567729" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567730" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.63.3.3 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616450" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627830" version="1" comment="aspell is &lt;0.60.6-26.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627831" version="1" comment="aspell-ispell is &lt;0.60.6-26.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567731" version="1" comment="atftp is &lt;0.7.0-135.23.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567732" version="1" comment="bind is &lt;9.9.6P1-0.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567733" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567734" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567735" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567736" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567737" version="1" comment="bind is &lt;9.9.6P1-0.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567738" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567739" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567740" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567741" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567742" version="1" comment="bind is &lt;9.9.6P1-0.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567743" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567744" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567745" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567746" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567747" version="1" comment="bind is &lt;9.9.6P1-0.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567748" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567749" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567750" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567751" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567752" version="1" comment="bind is &lt;9.9.6P1-0.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567753" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567754" version="1" comment="bind-devel is &lt;9.9.6P1-0.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567755" version="1" comment="bind-doc is &lt;9.9.6P1-0.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567756" version="1" comment="bind-libs is &lt;9.9.6P1-0.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567757" version="1" comment="bind-utils is &lt;9.9.6P1-0.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567758" version="1" comment="bind is &lt;9.9.6P1-0.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567759" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567760" version="1" comment="bind-devel is &lt;9.9.6P1-0.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567761" version="1" comment="bind-doc is &lt;9.9.6P1-0.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567762" version="1" comment="bind-libs is &lt;9.9.6P1-0.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567763" version="1" comment="bind-utils is &lt;9.9.6P1-0.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567764" version="1" comment="bind is &lt;9.9.6P1-0.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567765" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567766" version="1" comment="bind-devel is &lt;9.9.6P1-0.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567767" version="1" comment="bind-doc is &lt;9.9.6P1-0.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567768" version="1" comment="bind-libs is &lt;9.9.6P1-0.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567769" version="1" comment="bind-utils is &lt;9.9.6P1-0.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567770" version="1" comment="bind is &lt;9.9.6P1-0.51.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567771" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567772" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567773" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567774" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567775" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567776" version="1" comment="bind is &lt;9.9.6P1-0.51.15.4 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567777" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.15.4 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567778" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.15.4 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567779" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.15.4 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567780" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.15.4 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567781" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.15.4 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567782" version="1" comment="bind is &lt;9.9.6P1-0.51.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567783" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567784" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567785" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567786" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567787" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567788" version="1" comment="bind is &lt;9.9.6P1-0.51.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567789" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567790" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567791" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567792" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567793" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567794" version="1" comment="bind is &lt;9.9.6P1-0.51.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567795" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567796" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567797" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567798" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567799" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567800" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567801" version="1" comment="bzip2 is &lt;1.0.5-34.256.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567802" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567803" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567804" version="1" comment="bzip2 is &lt;1.0.5-34.256.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567805" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567806" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681247" version="1" comment="cifs-utils is &lt;5.1-0.14.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567807" version="1" comment="clamav is &lt;0.99.2-0.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567808" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567809" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567810" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567811" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567812" version="1" comment="clamav is &lt;0.100.3-0.20.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567813" version="1" comment="clamav is &lt;0.100.3-0.20.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567814" version="1" comment="clamav is &lt;0.100.3-0.20.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567815" version="1" comment="clamav is &lt;0.103.0-0.20.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567816" version="1" comment="clamav is &lt;0.103.2-0.20.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657132" version="1" comment="clamav is &lt;0.103.4-0.20.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664012" version="1" comment="clamav is &lt;0.103.5-0.20.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630644" version="1" comment="cpio is &lt;2.9-75.81.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630645" version="1" comment="cpio-lang is &lt;2.9-75.81.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631546" version="1" comment="cpio is &lt;2.9-75.81.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631547" version="1" comment="cpio-lang is &lt;2.9-75.81.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567817" version="1" comment="cups is &lt;1.3.9-8.46.56.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567818" version="1" comment="cups-client is &lt;1.3.9-8.46.56.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567819" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567820" version="1" comment="cups is &lt;1.3.9-8.46.56.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567821" version="1" comment="cups-client is &lt;1.3.9-8.46.56.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567822" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567823" version="1" comment="cups is &lt;1.3.9-8.46.56.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567824" version="1" comment="cups-client is &lt;1.3.9-8.46.56.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567825" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567826" version="1" comment="curl is &lt;7.19.7-1.61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567827" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567828" version="1" comment="curl is &lt;7.37.0-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567829" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567830" version="1" comment="curl is &lt;7.37.0-70.41.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567831" version="1" comment="libcurl-devel is &lt;7.37.0-70.41.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567832" version="1" comment="libcurl4 is &lt;7.37.0-70.41.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567833" version="1" comment="curl is &lt;7.37.0-70.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567834" version="1" comment="libcurl-devel is &lt;7.37.0-70.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567835" version="1" comment="libcurl4 is &lt;7.37.0-70.44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567836" version="1" comment="curl is &lt;7.37.0-70.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567837" version="1" comment="libcurl-devel is &lt;7.37.0-70.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567838" version="1" comment="libcurl4 is &lt;7.37.0-70.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567839" version="1" comment="curl is &lt;7.37.0-70.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567840" version="1" comment="libcurl-devel is &lt;7.37.0-70.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567841" version="1" comment="libcurl4 is &lt;7.37.0-70.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567842" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567843" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567844" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567845" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567846" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567847" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567848" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567849" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669451" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669452" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669453" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669454" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669455" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669456" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669457" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669458" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567850" version="1" comment="dbus-1 is &lt;1.2.10-3.34.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567851" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567852" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567853" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567854" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567855" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567856" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567857" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567858" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567859" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567860" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567861" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567862" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567863" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567864" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567865" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624087" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627832" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567866" version="1" comment="dnsmasq is &lt;2.78-0.16.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567867" version="1" comment="dnsmasq is &lt;2.78-0.16.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679568" version="1" comment="dnsmasq is &lt;2.78-0.16.17.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567868" version="1" comment="emacs is &lt;22.3-42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567869" version="1" comment="emacs-el is &lt;22.3-42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567870" version="1" comment="emacs-info is &lt;22.3-42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567871" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567872" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567873" version="1" comment="evince is &lt;2.28.2-0.7.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567874" version="1" comment="evince-doc is &lt;2.28.2-0.7.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567875" version="1" comment="evince-lang is &lt;2.28.2-0.7.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664118" version="1" comment="expat is &lt;2.0.1-88.42.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664119" version="1" comment="libexpat1 is &lt;2.0.1-88.42.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666454" version="1" comment="expat is &lt;2.0.1-88.42.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666455" version="1" comment="libexpat1 is &lt;2.0.1-88.42.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669848" version="1" comment="expat is &lt;2.0.1-88.42.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669849" version="1" comment="libexpat1 is &lt;2.0.1-88.42.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671287" version="1" comment="expat is &lt;2.0.1-88.42.22.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671288" version="1" comment="libexpat1 is &lt;2.0.1-88.42.22.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567876" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567877" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567878" version="1" comment="libfreebl3 is &lt;3.29.5-47.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567879" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567880" version="1" comment="mozilla-nss is &lt;3.29.5-47.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567881" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567882" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567883" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567884" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567885" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567886" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567887" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567888" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567889" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567890" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567891" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567892" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567893" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567894" version="1" comment="gdb is &lt;7.5.1-0.9.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567895" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567896" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567897" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567898" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567899" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567900" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567901" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567902" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567903" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567904" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567905" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567906" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567907" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567908" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567909" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567910" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567911" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567912" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567913" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567914" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567915" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567916" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567917" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567918" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567919" version="1" comment="ghostscript-library is &lt;8.62-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567920" version="1" comment="ghostscript-omni is &lt;8.62-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567921" version="1" comment="ghostscript-x11 is &lt;8.62-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567922" version="1" comment="libgimpprint is &lt;4.2.7-47.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567923" version="1" comment="glib2 is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567924" version="1" comment="glib2-doc is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567925" version="1" comment="glib2-lang is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567926" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567927" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567928" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567929" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567930" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567931" version="1" comment="glibc is &lt;2.11.3-17.109.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567932" version="1" comment="glibc-devel is &lt;2.11.3-17.109.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567933" version="1" comment="glibc-html is &lt;2.11.3-17.109.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567934" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567935" version="1" comment="glibc-info is &lt;2.11.3-17.109.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567936" version="1" comment="glibc-locale is &lt;2.11.3-17.109.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567937" version="1" comment="glibc-profile is &lt;2.11.3-17.109.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567938" version="1" comment="nscd is &lt;2.11.3-17.109.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567939" version="1" comment="glibc is &lt;2.11.3-17.110.3.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567940" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567941" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567942" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567943" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567944" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567945" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567946" version="1" comment="nscd is &lt;2.11.3-17.110.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567947" version="1" comment="glibc is &lt;2.11.3-17.110.6.2 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567948" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6.2 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567949" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567950" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567951" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567952" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567953" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567954" version="1" comment="nscd is &lt;2.11.3-17.110.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567955" version="1" comment="glibc is &lt;2.11.3-17.110.14.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567956" version="1" comment="glibc-devel is &lt;2.11.3-17.110.14.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567957" version="1" comment="glibc-html is &lt;2.11.3-17.110.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567958" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567959" version="1" comment="glibc-info is &lt;2.11.3-17.110.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567960" version="1" comment="glibc-locale is &lt;2.11.3-17.110.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567961" version="1" comment="glibc-profile is &lt;2.11.3-17.110.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567962" version="1" comment="nscd is &lt;2.11.3-17.110.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567963" version="1" comment="glibc is &lt;2.11.3-17.110.19.2 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567964" version="1" comment="glibc-devel is &lt;2.11.3-17.110.19.2 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567965" version="1" comment="glibc-html is &lt;2.11.3-17.110.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567966" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567967" version="1" comment="glibc-info is &lt;2.11.3-17.110.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567968" version="1" comment="glibc-locale is &lt;2.11.3-17.110.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567969" version="1" comment="glibc-profile is &lt;2.11.3-17.110.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567970" version="1" comment="nscd is &lt;2.11.3-17.110.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567971" version="1" comment="glibc is &lt;2.11.3-17.110.24.2 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567972" version="1" comment="glibc-devel is &lt;2.11.3-17.110.24.2 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567973" version="1" comment="glibc-html is &lt;2.11.3-17.110.24.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567974" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.24.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567975" version="1" comment="glibc-info is &lt;2.11.3-17.110.24.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567976" version="1" comment="glibc-locale is &lt;2.11.3-17.110.24.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567977" version="1" comment="glibc-profile is &lt;2.11.3-17.110.24.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567978" version="1" comment="nscd is &lt;2.11.3-17.110.24.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567979" version="1" comment="glibc is &lt;2.11.3-17.110.33.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567980" version="1" comment="glibc-devel is &lt;2.11.3-17.110.33.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567981" version="1" comment="glibc-html is &lt;2.11.3-17.110.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567982" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567983" version="1" comment="glibc-info is &lt;2.11.3-17.110.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567984" version="1" comment="glibc-locale is &lt;2.11.3-17.110.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567985" version="1" comment="glibc-profile is &lt;2.11.3-17.110.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567986" version="1" comment="nscd is &lt;2.11.3-17.110.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634722" version="1" comment="glibc is &lt;2.11.3-17.110.37.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634723" version="1" comment="glibc-devel is &lt;2.11.3-17.110.37.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634724" version="1" comment="glibc-html is &lt;2.11.3-17.110.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634725" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634726" version="1" comment="glibc-info is &lt;2.11.3-17.110.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634727" version="1" comment="glibc-locale is &lt;2.11.3-17.110.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634728" version="1" comment="glibc-profile is &lt;2.11.3-17.110.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634729" version="1" comment="nscd is &lt;2.11.3-17.110.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673392" version="1" comment="glibc is &lt;2.11.3-17.110.40.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673393" version="1" comment="glibc-devel is &lt;2.11.3-17.110.40.1 for i586,i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673394" version="1" comment="glibc-html is &lt;2.11.3-17.110.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673395" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673396" version="1" comment="glibc-info is &lt;2.11.3-17.110.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673397" version="1" comment="glibc-locale is &lt;2.11.3-17.110.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673398" version="1" comment="glibc-profile is &lt;2.11.3-17.110.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673399" version="1" comment="nscd is &lt;2.11.3-17.110.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567987" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567988" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567989" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.18.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567990" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.18.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567991" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.18.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567992" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.18.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567993" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.18.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567994" version="1" comment="inn is &lt;2.4.2-170.21.3.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567995" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567996" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567997" version="1" comment="libjasper is &lt;1.900.14-134.33.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567998" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567999" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568000" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568001" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568002" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568003" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568004" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568005" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568006" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568007" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568008" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568009" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568010" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568011" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568012" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568013" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568014" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568015" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568016" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568017" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568018" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568019" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568020" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568021" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568022" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.50-55.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568023" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.50-55.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568024" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.50-55.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568025" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.50-55.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568026" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.50-55.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568027" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.60-58.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568028" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.60-58.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568029" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.60-58.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568030" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.60-58.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568031" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.60-58.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568032" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.1-61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568033" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.1-61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568034" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.1-61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568035" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.1-61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568036" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.1-61.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568037" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.5-64.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568038" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.5-64.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568039" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.5-64.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568040" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.5-64.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568041" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.5-64.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568042" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.15-65.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568043" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.15-65.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568044" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.15-65.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568045" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.15-65.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568046" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.15-65.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568047" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.20-65.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568048" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.20-65.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568049" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.20-65.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568050" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.20-65.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568051" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.20-65.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568052" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.25-65.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568053" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.25-65.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568054" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.25-65.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568055" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.25-65.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568056" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.25-65.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568057" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.30-65.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568058" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.30-65.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568059" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.30-65.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568060" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.30-65.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568061" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.30-65.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568062" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.35-65.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568063" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.35-65.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568064" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.35-65.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568065" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.35-65.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568066" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.35-65.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568067" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.40-65.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568068" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.40-65.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568069" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.40-65.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568070" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.40-65.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568071" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.40-65.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568072" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.50-65.42.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568073" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.50-65.42.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568074" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.50-65.42.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568075" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.50-65.42.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568076" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.50-65.42.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568077" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.55-65.45.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568078" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.55-65.45.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568079" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.55-65.45.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568080" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.55-65.45.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568081" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.55-65.45.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568082" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.60-65.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568083" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.60-65.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568084" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.60-65.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568085" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.60-65.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568086" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.60-65.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568087" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.65-65.51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568088" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.65-65.51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568089" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.65-65.51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568090" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.65-65.51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568091" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.65-65.51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568092" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.70-65.54.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568093" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.70-65.54.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568094" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.70-65.54.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568095" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.70-65.54.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568096" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.70-65.54.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568097" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.75-65.57.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568098" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.75-65.57.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568099" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.75-65.57.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568100" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.75-65.57.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568101" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.75-65.57.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568102" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.80-65.60.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568103" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.80-65.60.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568104" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.80-65.60.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568105" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.80-65.60.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568106" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.80-65.60.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674098" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.5-65.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674099" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.5-65.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674100" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr11.5-65.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674101" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.5-65.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674102" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.5-65.66.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662517" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.0-65.63.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662518" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.0-65.63.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662519" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr11.0-65.63.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662520" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.0-65.63.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662521" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.0-65.63.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568107" version="1" comment="kernel-default is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568108" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568109" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568110" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568111" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568112" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568113" version="1" comment="kernel-pae is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568114" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568115" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568116" version="1" comment="kernel-source is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568117" version="1" comment="kernel-syms is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568118" version="1" comment="kernel-trace is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568119" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568120" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568121" version="1" comment="kernel-xen is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568122" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568123" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.86.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568124" version="1" comment="kernel-default is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568125" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568126" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568127" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568128" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568129" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568130" version="1" comment="kernel-pae is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568131" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568132" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568133" version="1" comment="kernel-source is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568134" version="1" comment="kernel-syms is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568135" version="1" comment="kernel-trace is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568136" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568137" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568138" version="1" comment="kernel-xen is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568139" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568140" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.93.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568141" version="1" comment="kernel-default is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568142" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568143" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568144" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568145" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568146" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568147" version="1" comment="kernel-pae is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568148" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568149" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568150" version="1" comment="kernel-source is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568151" version="1" comment="kernel-syms is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568152" version="1" comment="kernel-trace is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568153" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568154" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568155" version="1" comment="kernel-xen is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568156" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568157" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.99.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568158" version="1" comment="kernel-default is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568159" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568160" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568161" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568162" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568163" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568164" version="1" comment="kernel-pae is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568165" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568166" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568167" version="1" comment="kernel-source is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568168" version="1" comment="kernel-syms is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568169" version="1" comment="kernel-trace is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568170" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568171" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568172" version="1" comment="kernel-xen is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568173" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568174" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.102.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568175" version="1" comment="kernel-default is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568176" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568177" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568178" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568179" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568180" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568181" version="1" comment="kernel-pae is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568182" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568183" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568184" version="1" comment="kernel-source is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568185" version="1" comment="kernel-syms is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568186" version="1" comment="kernel-trace is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568187" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568188" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568189" version="1" comment="kernel-xen is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568190" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568191" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.105.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568192" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568193" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568194" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568195" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568196" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568197" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568198" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568199" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568200" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568201" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568202" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568203" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568204" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568205" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568206" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568207" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568208" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568209" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568210" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568211" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568212" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568213" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568214" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568215" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568216" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568217" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568218" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568219" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568220" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568221" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568222" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568223" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568224" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568225" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568226" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568227" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568228" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568229" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568230" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568231" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568232" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568233" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568234" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568235" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568236" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568237" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568238" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568239" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568240" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568241" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568242" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568243" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568244" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568245" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568246" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568247" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568248" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568249" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568250" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568251" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568252" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568253" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568254" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568255" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568256" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568257" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568258" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568259" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568260" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568261" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568262" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568263" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568264" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568265" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568266" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568267" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568268" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568269" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568270" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568271" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568272" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568273" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568274" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568275" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568276" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568277" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568278" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568279" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568280" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568281" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568282" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568283" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568284" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568285" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568286" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568287" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568288" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568289" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568290" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568291" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568292" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568293" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.43.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568294" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568295" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568296" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568297" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568298" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568299" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568300" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568301" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568302" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568303" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568304" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568305" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568306" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568307" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568308" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568309" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568310" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.59.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568311" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568312" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568313" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568314" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568315" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568316" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568317" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568318" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568319" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568320" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568321" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568322" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568323" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568324" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568325" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568326" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568327" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568328" version="1" comment="kernel-default is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568329" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568330" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568331" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568332" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568333" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568334" version="1" comment="kernel-pae is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568335" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568336" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568337" version="1" comment="kernel-source is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568338" version="1" comment="kernel-syms is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568339" version="1" comment="kernel-trace is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568340" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568341" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568342" version="1" comment="kernel-xen is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568343" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568344" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568345" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568346" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568347" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568348" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568349" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568350" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568351" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568352" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568353" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568354" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568355" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568356" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568357" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568358" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568359" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568360" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568361" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568362" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568363" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568364" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568365" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568366" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568367" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568368" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568369" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568370" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568371" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568372" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568373" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568374" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568375" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568376" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568377" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568378" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.56.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568379" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568380" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568381" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568382" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568383" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568384" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568385" version="1" comment="kernel-pae is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568386" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568387" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568388" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568389" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568390" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568391" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568392" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568393" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568394" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568395" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568396" version="1" comment="kvm is &lt;1.4.2-53.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568397" version="1" comment="kvm is &lt;1.4.2-53.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568398" version="1" comment="kvm is &lt;1.4.2-53.17.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568399" version="1" comment="kvm is &lt;1.4.2-53.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568400" version="1" comment="kvm is &lt;1.4.2-53.23.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568401" version="1" comment="kvm is &lt;1.4.2-53.26.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568402" version="1" comment="kvm is &lt;1.4.2-53.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568403" version="1" comment="kvm is &lt;1.4.2-53.38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626872" version="1" comment="kvm is &lt;1.4.2-53.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670890" version="1" comment="libcaca is &lt;0.99.beta13b-49.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630422" version="1" comment="libcares2 is &lt;1.7.4-7.10.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568404" version="1" comment="libcdio7 is &lt;0.80-8.3.5 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568405" version="1" comment="libcdio_cdda0 is &lt;0.80-8.3.5 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568406" version="1" comment="libcdio_paranoia0 is &lt;0.80-8.3.5 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631917" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629507" version="1" comment="libesmtp is &lt;1.0.4-157.18.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568407" version="1" comment="libexif is &lt;0.6.17-2.14.7.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568408" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626759" version="1" comment="libsndfile is &lt;1.0.20-2.19.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662522" version="1" comment="libsndfile is &lt;1.0.20-2.19.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568409" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568410" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568411" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568412" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568413" version="1" comment="libtcnative-1-0 is &lt;1.3.4-12.5.5.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568414" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568415" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568416" version="1" comment="libvirt is &lt;1.0.5.9-21.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568417" version="1" comment="libvirt-client is &lt;1.0.5.9-21.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568418" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568419" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568420" version="1" comment="libvirt-python is &lt;1.0.5.9-21.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568421" version="1" comment="libvirt is &lt;1.0.5.9-21.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568422" version="1" comment="libvirt-client is &lt;1.0.5.9-21.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568423" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568424" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568425" version="1" comment="libvirt-python is &lt;1.0.5.9-21.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568426" version="1" comment="libvirt is &lt;1.0.5.9-21.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568427" version="1" comment="libvirt-client is &lt;1.0.5.9-21.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568428" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568429" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568430" version="1" comment="libvirt-python is &lt;1.0.5.9-21.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568431" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568432" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568433" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568434" version="1" comment="libxml2 is &lt;2.7.6-0.77.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568435" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568436" version="1" comment="libxml2-python is &lt;2.7.6-0.77.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568437" version="1" comment="libxml2 is &lt;2.7.6-0.77.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568438" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568439" version="1" comment="libxml2-python is &lt;2.7.6-0.77.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568440" version="1" comment="libxml2 is &lt;2.7.6-0.77.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568441" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568442" version="1" comment="libxml2-python is &lt;2.7.6-0.77.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670891" version="1" comment="libxml2 is &lt;2.7.6-0.77.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670892" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670893" version="1" comment="libxml2-python is &lt;2.7.6-0.77.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568443" version="1" comment="kernel-default is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568444" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568445" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568446" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568447" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568448" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568449" version="1" comment="kernel-pae is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568450" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568451" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568452" version="1" comment="kernel-source is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568453" version="1" comment="kernel-syms is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568454" version="1" comment="kernel-trace is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568455" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568456" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568457" version="1" comment="kernel-xen is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568458" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568459" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.96.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568460" version="1" comment="log4j is &lt;1.2.15-26.32.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660155" version="1" comment="log4j is &lt;1.2.15-26.32.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664707" version="1" comment="log4j is &lt;1.2.15-26.32.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568461" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568462" version="1" comment="mailman is &lt;2.1.15-9.6.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568463" version="1" comment="mailman is &lt;2.1.15-9.6.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568464" version="1" comment="mailman is &lt;2.1.15-9.6.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568465" version="1" comment="mailman is &lt;2.1.15-9.6.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568466" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568467" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568468" version="1" comment="libfreebl3 is &lt;3.21.3-39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568469" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568470" version="1" comment="mozilla-nss is &lt;3.21.3-39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568471" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568472" version="1" comment="microcode_ctl is &lt;1.17-102.83.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568473" version="1" comment="microcode_ctl is &lt;1.17-102.83.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568474" version="1" comment="microcode_ctl is &lt;1.17-102.83.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568475" version="1" comment="microcode_ctl is &lt;1.17-102.83.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568476" version="1" comment="microcode_ctl is &lt;1.17-102.83.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568477" version="1" comment="microcode_ctl is &lt;1.17-102.83.41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568478" version="1" comment="microcode_ctl is &lt;1.17-102.83.47.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568479" version="1" comment="microcode_ctl is &lt;1.17-102.83.50.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568480" version="1" comment="microcode_ctl is &lt;1.17-102.83.53.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568481" version="1" comment="microcode_ctl is &lt;1.17-102.83.59.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568482" version="1" comment="microcode_ctl is &lt;1.17-102.83.62.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568483" version="1" comment="microcode_ctl is &lt;1.17-102.83.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659158" version="1" comment="libfreebl3 is &lt;3.68.1-47.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659159" version="1" comment="libsoftokn3 is &lt;3.68.1-47.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659160" version="1" comment="mozilla-nss is &lt;3.68.1-47.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659161" version="1" comment="mozilla-nss-certs is &lt;3.68.1-47.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659162" version="1" comment="mozilla-nss-tools is &lt;3.68.1-47.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678376" version="1" comment="libfreebl3 is &lt;3.68.3-47.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678377" version="1" comment="libsoftokn3 is &lt;3.68.3-47.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678378" version="1" comment="mozilla-nss is &lt;3.68.3-47.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678379" version="1" comment="mozilla-nss-certs is &lt;3.68.3-47.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678380" version="1" comment="mozilla-nss-tools is &lt;3.68.3-47.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568484" version="1" comment="mutt is &lt;1.5.17-42.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568485" version="1" comment="mutt is &lt;1.5.17-42.51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568486" version="1" comment="mutt is &lt;1.5.17-42.56.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568487" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568488" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568489" version="1" comment="mysql is &lt;5.5.52-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568490" version="1" comment="mysql-client is &lt;5.5.52-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568491" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568492" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568493" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568494" version="1" comment="mysql is &lt;5.5.54-0.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568495" version="1" comment="mysql-client is &lt;5.5.54-0.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568496" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568497" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568498" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568499" version="1" comment="mysql is &lt;5.5.58-0.39.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568500" version="1" comment="mysql-client is &lt;5.5.58-0.39.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568501" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568502" version="1" comment="libmysql55client18 is &lt;5.5.62-0.39.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568503" version="1" comment="libmysql55client_r18 is &lt;5.5.62-0.39.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568504" version="1" comment="mysql is &lt;5.5.62-0.39.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568505" version="1" comment="mysql-client is &lt;5.5.62-0.39.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568506" version="1" comment="mysql-tools is &lt;5.5.62-0.39.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568507" version="1" comment="libnetpbm10 is &lt;10.26.44-101.15.5.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568508" version="1" comment="netpbm is &lt;10.26.44-101.15.5.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568509" version="1" comment="ntp is &lt;4.2.8p9-48.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568510" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568511" version="1" comment="ntp is &lt;4.2.8p12-48.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568512" version="1" comment="ntp-doc is &lt;4.2.8p12-48.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568513" version="1" comment="ntp is &lt;4.2.8p13-48.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568514" version="1" comment="ntp-doc is &lt;4.2.8p13-48.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568515" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568516" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568517" version="1" comment="openldap2 is &lt;2.4.26-0.74.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568518" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568519" version="1" comment="openldap2-client is &lt;2.4.26-0.74.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568520" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568521" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568522" version="1" comment="openldap2 is &lt;2.4.26-0.74.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568523" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568524" version="1" comment="openldap2-client is &lt;2.4.26-0.74.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568525" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568526" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568527" version="1" comment="openldap2 is &lt;2.4.26-0.74.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568528" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568529" version="1" comment="openldap2-client is &lt;2.4.26-0.74.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568530" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568531" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568532" version="1" comment="openldap2 is &lt;2.4.26-0.74.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568533" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568534" version="1" comment="openldap2-client is &lt;2.4.26-0.74.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653632" version="1" comment="libopensc2 is &lt;0.11.6-5.27.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653633" version="1" comment="opensc is &lt;0.11.6-5.27.14.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568535" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568536" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568537" version="1" comment="openssh is &lt;6.2p2-0.33.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568538" version="1" comment="openssh-askpass is &lt;6.2p2-0.33.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568539" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.33.5 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568540" version="1" comment="openssh is &lt;6.2p2-0.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568541" version="1" comment="openssh-askpass is &lt;6.2p2-0.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568542" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.40.3 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568543" version="1" comment="openssh is &lt;6.2p2-0.41.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568544" version="1" comment="openssh-askpass is &lt;6.2p2-0.41.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568545" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.41.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568546" version="1" comment="openssh is &lt;6.6p1-41.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568547" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568548" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568549" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568550" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568551" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568552" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568553" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568554" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568555" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568556" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568557" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568558" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568559" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568560" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568561" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568562" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568563" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568564" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568565" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568566" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568567" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568568" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568569" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568570" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568571" version="1" comment="openssl is &lt;0.9.8j-0.106.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568572" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568573" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568574" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568575" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568576" version="1" comment="openssl is &lt;0.9.8j-0.106.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568577" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568578" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568579" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568580" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568581" version="1" comment="openssl is &lt;0.9.8j-0.106.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568582" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.28.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568583" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568584" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568585" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568586" version="1" comment="openssl is &lt;0.9.8j-0.106.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568587" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568588" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568589" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568590" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568591" version="1" comment="openssl is &lt;0.9.8j-0.106.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568592" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568593" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568594" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568595" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568596" version="1" comment="openssl is &lt;0.9.8j-0.106.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568597" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631735" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631736" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631737" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631738" version="1" comment="openssl is &lt;0.9.8j-0.106.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631739" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632456" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632457" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632458" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632459" version="1" comment="openssl is &lt;0.9.8j-0.106.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632460" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673050" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673051" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673052" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673053" version="1" comment="openssl is &lt;0.9.8j-0.106.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673054" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568598" version="1" comment="openvpn is &lt;2.0.9-143.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568599" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568600" version="1" comment="openvpn is &lt;2.0.9-143.47.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568601" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568602" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568603" version="1" comment="perl is &lt;5.10.0-64.81.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568604" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568605" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568606" version="1" comment="perl-base is &lt;5.10.0-64.81.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568607" version="1" comment="perl-doc is &lt;5.10.0-64.81.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568608" version="1" comment="perl-DBI is &lt;1.607-3.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568609" version="1" comment="perl-DBI is &lt;1.607-3.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568610" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568611" version="1" comment="permissions is &lt;2013.1.7-0.6.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568612" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568613" version="1" comment="php53 is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568614" version="1" comment="php53-bcmath is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568615" version="1" comment="php53-bz2 is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568616" version="1" comment="php53-calendar is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568617" version="1" comment="php53-ctype is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568618" version="1" comment="php53-curl is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568619" version="1" comment="php53-dba is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568620" version="1" comment="php53-dom is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568621" version="1" comment="php53-exif is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568622" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568623" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568624" version="1" comment="php53-ftp is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568625" version="1" comment="php53-gd is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568626" version="1" comment="php53-gettext is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568627" version="1" comment="php53-gmp is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568628" version="1" comment="php53-iconv is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568629" version="1" comment="php53-intl is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568630" version="1" comment="php53-json is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568631" version="1" comment="php53-ldap is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568632" version="1" comment="php53-mbstring is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568633" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568634" version="1" comment="php53-mysql is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568635" version="1" comment="php53-odbc is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568636" version="1" comment="php53-openssl is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568637" version="1" comment="php53-pcntl is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568638" version="1" comment="php53-pdo is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568639" version="1" comment="php53-pear is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568640" version="1" comment="php53-pgsql is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568641" version="1" comment="php53-pspell is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568642" version="1" comment="php53-shmop is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568643" version="1" comment="php53-snmp is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568644" version="1" comment="php53-soap is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568645" version="1" comment="php53-suhosin is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568646" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568647" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568648" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568649" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568650" version="1" comment="php53-wddx is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568651" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568652" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568653" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568654" version="1" comment="php53-xsl is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568655" version="1" comment="php53-zip is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568656" version="1" comment="php53-zlib is &lt;5.3.17-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568657" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568658" version="1" comment="php53 is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568659" version="1" comment="php53-bcmath is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568660" version="1" comment="php53-bz2 is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568661" version="1" comment="php53-calendar is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568662" version="1" comment="php53-ctype is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568663" version="1" comment="php53-curl is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568664" version="1" comment="php53-dba is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568665" version="1" comment="php53-dom is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568666" version="1" comment="php53-exif is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568667" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568668" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568669" version="1" comment="php53-ftp is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568670" version="1" comment="php53-gd is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568671" version="1" comment="php53-gettext is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568672" version="1" comment="php53-gmp is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568673" version="1" comment="php53-iconv is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568674" version="1" comment="php53-intl is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568675" version="1" comment="php53-json is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568676" version="1" comment="php53-ldap is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568677" version="1" comment="php53-mbstring is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568678" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568679" version="1" comment="php53-mysql is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568680" version="1" comment="php53-odbc is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568681" version="1" comment="php53-openssl is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568682" version="1" comment="php53-pcntl is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568683" version="1" comment="php53-pdo is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568684" version="1" comment="php53-pear is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568685" version="1" comment="php53-pgsql is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568686" version="1" comment="php53-pspell is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568687" version="1" comment="php53-shmop is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568688" version="1" comment="php53-snmp is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568689" version="1" comment="php53-soap is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568690" version="1" comment="php53-suhosin is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568691" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568692" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568693" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568694" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568695" version="1" comment="php53-wddx is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568696" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568697" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568698" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568699" version="1" comment="php53-xsl is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568700" version="1" comment="php53-zip is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568701" version="1" comment="php53-zlib is &lt;5.3.17-101.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568702" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568703" version="1" comment="php53 is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568704" version="1" comment="php53-bcmath is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568705" version="1" comment="php53-bz2 is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568706" version="1" comment="php53-calendar is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568707" version="1" comment="php53-ctype is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568708" version="1" comment="php53-curl is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568709" version="1" comment="php53-dba is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568710" version="1" comment="php53-dom is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568711" version="1" comment="php53-exif is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568712" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568713" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568714" version="1" comment="php53-ftp is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568715" version="1" comment="php53-gd is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568716" version="1" comment="php53-gettext is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568717" version="1" comment="php53-gmp is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568718" version="1" comment="php53-iconv is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568719" version="1" comment="php53-intl is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568720" version="1" comment="php53-json is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568721" version="1" comment="php53-ldap is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568722" version="1" comment="php53-mbstring is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568723" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568724" version="1" comment="php53-mysql is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568725" version="1" comment="php53-odbc is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568726" version="1" comment="php53-openssl is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568727" version="1" comment="php53-pcntl is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568728" version="1" comment="php53-pdo is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568729" version="1" comment="php53-pear is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568730" version="1" comment="php53-pgsql is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568731" version="1" comment="php53-pspell is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568732" version="1" comment="php53-shmop is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568733" version="1" comment="php53-snmp is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568734" version="1" comment="php53-soap is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568735" version="1" comment="php53-suhosin is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568736" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568737" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568738" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568739" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568740" version="1" comment="php53-wddx is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568741" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568742" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568743" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568744" version="1" comment="php53-xsl is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568745" version="1" comment="php53-zip is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568746" version="1" comment="php53-zlib is &lt;5.3.17-112.20.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568747" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568748" version="1" comment="php53 is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568749" version="1" comment="php53-bcmath is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568750" version="1" comment="php53-bz2 is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568751" version="1" comment="php53-calendar is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568752" version="1" comment="php53-ctype is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568753" version="1" comment="php53-curl is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568754" version="1" comment="php53-dba is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568755" version="1" comment="php53-dom is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568756" version="1" comment="php53-exif is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568757" version="1" comment="php53-fastcgi is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568758" version="1" comment="php53-fileinfo is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568759" version="1" comment="php53-ftp is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568760" version="1" comment="php53-gd is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568761" version="1" comment="php53-gettext is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568762" version="1" comment="php53-gmp is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568763" version="1" comment="php53-iconv is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568764" version="1" comment="php53-intl is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568765" version="1" comment="php53-json is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568766" version="1" comment="php53-ldap is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568767" version="1" comment="php53-mbstring is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568768" version="1" comment="php53-mcrypt is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568769" version="1" comment="php53-mysql is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568770" version="1" comment="php53-odbc is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568771" version="1" comment="php53-openssl is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568772" version="1" comment="php53-pcntl is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568773" version="1" comment="php53-pdo is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568774" version="1" comment="php53-pear is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568775" version="1" comment="php53-pgsql is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568776" version="1" comment="php53-pspell is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568777" version="1" comment="php53-shmop is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568778" version="1" comment="php53-snmp is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568779" version="1" comment="php53-soap is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568780" version="1" comment="php53-suhosin is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568781" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568782" version="1" comment="php53-sysvsem is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568783" version="1" comment="php53-sysvshm is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568784" version="1" comment="php53-tokenizer is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568785" version="1" comment="php53-wddx is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568786" version="1" comment="php53-xmlreader is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568787" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568788" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568789" version="1" comment="php53-xsl is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568790" version="1" comment="php53-zip is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568791" version="1" comment="php53-zlib is &lt;5.3.17-112.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568792" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568793" version="1" comment="php53 is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568794" version="1" comment="php53-bcmath is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568795" version="1" comment="php53-bz2 is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568796" version="1" comment="php53-calendar is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568797" version="1" comment="php53-ctype is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568798" version="1" comment="php53-curl is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568799" version="1" comment="php53-dba is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568800" version="1" comment="php53-dom is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568801" version="1" comment="php53-exif is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568802" version="1" comment="php53-fastcgi is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568803" version="1" comment="php53-fileinfo is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568804" version="1" comment="php53-ftp is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568805" version="1" comment="php53-gd is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568806" version="1" comment="php53-gettext is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568807" version="1" comment="php53-gmp is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568808" version="1" comment="php53-iconv is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568809" version="1" comment="php53-intl is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568810" version="1" comment="php53-json is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568811" version="1" comment="php53-ldap is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568812" version="1" comment="php53-mbstring is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568813" version="1" comment="php53-mcrypt is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568814" version="1" comment="php53-mysql is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568815" version="1" comment="php53-odbc is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568816" version="1" comment="php53-openssl is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568817" version="1" comment="php53-pcntl is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568818" version="1" comment="php53-pdo is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568819" version="1" comment="php53-pear is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568820" version="1" comment="php53-pgsql is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568821" version="1" comment="php53-pspell is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568822" version="1" comment="php53-shmop is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568823" version="1" comment="php53-snmp is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568824" version="1" comment="php53-soap is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568825" version="1" comment="php53-suhosin is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568826" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568827" version="1" comment="php53-sysvsem is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568828" version="1" comment="php53-sysvshm is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568829" version="1" comment="php53-tokenizer is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568830" version="1" comment="php53-wddx is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568831" version="1" comment="php53-xmlreader is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568832" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568833" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568834" version="1" comment="php53-xsl is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568835" version="1" comment="php53-zip is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568836" version="1" comment="php53-zlib is &lt;5.3.17-112.58.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568837" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568838" version="1" comment="php53 is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568839" version="1" comment="php53-bcmath is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568840" version="1" comment="php53-bz2 is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568841" version="1" comment="php53-calendar is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568842" version="1" comment="php53-ctype is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568843" version="1" comment="php53-curl is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568844" version="1" comment="php53-dba is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568845" version="1" comment="php53-dom is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568846" version="1" comment="php53-exif is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568847" version="1" comment="php53-fastcgi is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568848" version="1" comment="php53-fileinfo is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568849" version="1" comment="php53-ftp is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568850" version="1" comment="php53-gd is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568851" version="1" comment="php53-gettext is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568852" version="1" comment="php53-gmp is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568853" version="1" comment="php53-iconv is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568854" version="1" comment="php53-intl is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568855" version="1" comment="php53-json is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568856" version="1" comment="php53-ldap is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568857" version="1" comment="php53-mbstring is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568858" version="1" comment="php53-mcrypt is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568859" version="1" comment="php53-mysql is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568860" version="1" comment="php53-odbc is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568861" version="1" comment="php53-openssl is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568862" version="1" comment="php53-pcntl is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568863" version="1" comment="php53-pdo is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568864" version="1" comment="php53-pear is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568865" version="1" comment="php53-pgsql is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568866" version="1" comment="php53-pspell is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568867" version="1" comment="php53-shmop is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568868" version="1" comment="php53-snmp is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568869" version="1" comment="php53-soap is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568870" version="1" comment="php53-suhosin is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568871" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568872" version="1" comment="php53-sysvsem is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568873" version="1" comment="php53-sysvshm is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568874" version="1" comment="php53-tokenizer is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568875" version="1" comment="php53-wddx is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568876" version="1" comment="php53-xmlreader is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568877" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568878" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568879" version="1" comment="php53-xsl is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568880" version="1" comment="php53-zip is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568881" version="1" comment="php53-zlib is &lt;5.3.17-112.71.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568882" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568883" version="1" comment="php53 is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568884" version="1" comment="php53-bcmath is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568885" version="1" comment="php53-bz2 is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568886" version="1" comment="php53-calendar is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568887" version="1" comment="php53-ctype is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568888" version="1" comment="php53-curl is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568889" version="1" comment="php53-dba is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568890" version="1" comment="php53-dom is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568891" version="1" comment="php53-exif is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568892" version="1" comment="php53-fastcgi is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568893" version="1" comment="php53-fileinfo is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568894" version="1" comment="php53-ftp is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568895" version="1" comment="php53-gd is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568896" version="1" comment="php53-gettext is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568897" version="1" comment="php53-gmp is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568898" version="1" comment="php53-iconv is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568899" version="1" comment="php53-intl is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568900" version="1" comment="php53-json is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568901" version="1" comment="php53-ldap is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568902" version="1" comment="php53-mbstring is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568903" version="1" comment="php53-mcrypt is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568904" version="1" comment="php53-mysql is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568905" version="1" comment="php53-odbc is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568906" version="1" comment="php53-openssl is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568907" version="1" comment="php53-pcntl is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568908" version="1" comment="php53-pdo is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568909" version="1" comment="php53-pear is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568910" version="1" comment="php53-pgsql is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568911" version="1" comment="php53-pspell is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568912" version="1" comment="php53-shmop is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568913" version="1" comment="php53-snmp is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568914" version="1" comment="php53-soap is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568915" version="1" comment="php53-suhosin is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568916" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568917" version="1" comment="php53-sysvsem is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568918" version="1" comment="php53-sysvshm is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568919" version="1" comment="php53-tokenizer is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568920" version="1" comment="php53-wddx is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568921" version="1" comment="php53-xmlreader is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568922" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568923" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568924" version="1" comment="php53-xsl is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568925" version="1" comment="php53-zip is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568926" version="1" comment="php53-zlib is &lt;5.3.17-112.79.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568927" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568928" version="1" comment="php53 is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568929" version="1" comment="php53-bcmath is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568930" version="1" comment="php53-bz2 is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568931" version="1" comment="php53-calendar is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568932" version="1" comment="php53-ctype is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568933" version="1" comment="php53-curl is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568934" version="1" comment="php53-dba is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568935" version="1" comment="php53-dom is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568936" version="1" comment="php53-exif is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568937" version="1" comment="php53-fastcgi is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568938" version="1" comment="php53-fileinfo is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568939" version="1" comment="php53-ftp is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568940" version="1" comment="php53-gd is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568941" version="1" comment="php53-gettext is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568942" version="1" comment="php53-gmp is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568943" version="1" comment="php53-iconv is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568944" version="1" comment="php53-intl is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568945" version="1" comment="php53-json is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568946" version="1" comment="php53-ldap is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568947" version="1" comment="php53-mbstring is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568948" version="1" comment="php53-mcrypt is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568949" version="1" comment="php53-mysql is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568950" version="1" comment="php53-odbc is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568951" version="1" comment="php53-openssl is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568952" version="1" comment="php53-pcntl is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568953" version="1" comment="php53-pdo is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568954" version="1" comment="php53-pear is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568955" version="1" comment="php53-pgsql is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568956" version="1" comment="php53-pspell is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568957" version="1" comment="php53-shmop is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568958" version="1" comment="php53-snmp is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568959" version="1" comment="php53-soap is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568960" version="1" comment="php53-suhosin is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568961" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568962" version="1" comment="php53-sysvsem is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568963" version="1" comment="php53-sysvshm is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568964" version="1" comment="php53-tokenizer is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568965" version="1" comment="php53-wddx is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568966" version="1" comment="php53-xmlreader is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568967" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568968" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568969" version="1" comment="php53-xsl is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568970" version="1" comment="php53-zip is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568971" version="1" comment="php53-zlib is &lt;5.3.17-112.93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568972" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568973" version="1" comment="php53 is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568974" version="1" comment="php53-bcmath is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568975" version="1" comment="php53-bz2 is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568976" version="1" comment="php53-calendar is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568977" version="1" comment="php53-ctype is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568978" version="1" comment="php53-curl is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568979" version="1" comment="php53-dba is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568980" version="1" comment="php53-dom is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568981" version="1" comment="php53-exif is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568982" version="1" comment="php53-fastcgi is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568983" version="1" comment="php53-fileinfo is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568984" version="1" comment="php53-ftp is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568985" version="1" comment="php53-gd is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568986" version="1" comment="php53-gettext is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568987" version="1" comment="php53-gmp is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568988" version="1" comment="php53-iconv is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568989" version="1" comment="php53-intl is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568990" version="1" comment="php53-json is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568991" version="1" comment="php53-ldap is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568992" version="1" comment="php53-mbstring is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568993" version="1" comment="php53-mcrypt is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568994" version="1" comment="php53-mysql is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568995" version="1" comment="php53-odbc is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568996" version="1" comment="php53-openssl is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568997" version="1" comment="php53-pcntl is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568998" version="1" comment="php53-pdo is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009568999" version="1" comment="php53-pear is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569000" version="1" comment="php53-pgsql is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569001" version="1" comment="php53-pspell is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569002" version="1" comment="php53-shmop is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569003" version="1" comment="php53-snmp is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569004" version="1" comment="php53-soap is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569005" version="1" comment="php53-suhosin is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569006" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569007" version="1" comment="php53-sysvsem is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569008" version="1" comment="php53-sysvshm is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569009" version="1" comment="php53-tokenizer is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569010" version="1" comment="php53-wddx is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569011" version="1" comment="php53-xmlreader is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569012" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569013" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569014" version="1" comment="php53-xsl is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569015" version="1" comment="php53-zip is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569016" version="1" comment="php53-zlib is &lt;5.3.17-112.99.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569017" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569018" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569019" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569020" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569021" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569022" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569023" version="1" comment="ppp is &lt;2.4.5.git-2.32.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569024" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569025" version="1" comment="python is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569026" version="1" comment="python-base is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569027" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569028" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569029" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569030" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569031" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569032" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569033" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569034" version="1" comment="python is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569035" version="1" comment="python-base is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569036" version="1" comment="python-curses is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569037" version="1" comment="python-demo is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569038" version="1" comment="python-doc is &lt;2.6-8.40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569039" version="1" comment="python-doc-pdf is &lt;2.6-8.40.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569040" version="1" comment="python-gdbm is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569041" version="1" comment="python-idle is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569042" version="1" comment="python-tk is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569043" version="1" comment="python-xml is &lt;2.6.9-40.24.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569044" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569045" version="1" comment="python is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569046" version="1" comment="python-base is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569047" version="1" comment="python-curses is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569048" version="1" comment="python-demo is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569049" version="1" comment="python-doc is &lt;2.6-8.40.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569050" version="1" comment="python-doc-pdf is &lt;2.6-8.40.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569051" version="1" comment="python-gdbm is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569052" version="1" comment="python-idle is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569053" version="1" comment="python-tk is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569054" version="1" comment="python-xml is &lt;2.6.9-40.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569055" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569056" version="1" comment="python is &lt;2.6.9-40.32.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569057" version="1" comment="python-base is &lt;2.6.9-40.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569058" version="1" comment="python-curses is &lt;2.6.9-40.32.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569059" version="1" comment="python-demo is &lt;2.6.9-40.32.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569060" version="1" comment="python-doc is &lt;2.6-8.40.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569061" version="1" comment="python-doc-pdf is &lt;2.6-8.40.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569062" version="1" comment="python-gdbm is &lt;2.6.9-40.32.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569063" version="1" comment="python-idle is &lt;2.6.9-40.32.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569064" version="1" comment="python-tk is &lt;2.6.9-40.32.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569065" version="1" comment="python-xml is &lt;2.6.9-40.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569066" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569067" version="1" comment="python is &lt;2.6.9-40.35.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569068" version="1" comment="python-base is &lt;2.6.9-40.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569069" version="1" comment="python-curses is &lt;2.6.9-40.35.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569070" version="1" comment="python-demo is &lt;2.6.9-40.35.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569071" version="1" comment="python-doc is &lt;2.6-8.40.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569072" version="1" comment="python-doc-pdf is &lt;2.6-8.40.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569073" version="1" comment="python-gdbm is &lt;2.6.9-40.35.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569074" version="1" comment="python-idle is &lt;2.6.9-40.35.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569075" version="1" comment="python-tk is &lt;2.6.9-40.35.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569076" version="1" comment="python-xml is &lt;2.6.9-40.35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569077" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569078" version="1" comment="python is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569079" version="1" comment="python-base is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569080" version="1" comment="python-curses is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569081" version="1" comment="python-demo is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569082" version="1" comment="python-doc is &lt;2.6-8.40.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569083" version="1" comment="python-doc-pdf is &lt;2.6-8.40.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569084" version="1" comment="python-gdbm is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569085" version="1" comment="python-idle is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569086" version="1" comment="python-tk is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569087" version="1" comment="python-xml is &lt;2.6.9-40.48.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569088" version="1" comment="python-numpy is &lt;1.3.0-1.3.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569089" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569090" version="1" comment="ldapsmb is &lt;1.34b-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569091" version="1" comment="libldb1 is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569092" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569093" version="1" comment="libtalloc2 is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569094" version="1" comment="libtdb1 is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569095" version="1" comment="libtevent0 is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569096" version="1" comment="libwbclient0 is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569097" version="1" comment="samba is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569098" version="1" comment="samba-client is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569099" version="1" comment="samba-doc is &lt;3.6.3-84.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569100" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569101" version="1" comment="samba-winbind is &lt;3.6.3-84.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569102" version="1" comment="ldapsmb is &lt;1.34b-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569103" version="1" comment="libldb1 is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569104" version="1" comment="libsmbclient0 is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569105" version="1" comment="libtalloc2 is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569106" version="1" comment="libtdb1 is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569107" version="1" comment="libtevent0 is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569108" version="1" comment="libwbclient0 is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569109" version="1" comment="samba is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569110" version="1" comment="samba-client is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569111" version="1" comment="samba-doc is &lt;3.6.3-90.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569112" version="1" comment="samba-krb-printing is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569113" version="1" comment="samba-winbind is &lt;3.6.3-90.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569114" version="1" comment="ldapsmb is &lt;1.34b-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569115" version="1" comment="libldb1 is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569116" version="1" comment="libsmbclient0 is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569117" version="1" comment="libtalloc2 is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569118" version="1" comment="libtdb1 is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569119" version="1" comment="libtevent0 is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569120" version="1" comment="libwbclient0 is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569121" version="1" comment="samba is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569122" version="1" comment="samba-client is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569123" version="1" comment="samba-doc is &lt;3.6.3-93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569124" version="1" comment="samba-krb-printing is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569125" version="1" comment="samba-winbind is &lt;3.6.3-93.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569126" version="1" comment="ldapsmb is &lt;1.34b-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569127" version="1" comment="libldb1 is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569128" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569129" version="1" comment="libtalloc2 is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569130" version="1" comment="libtdb1 is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569131" version="1" comment="libtevent0 is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569132" version="1" comment="libwbclient0 is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569133" version="1" comment="samba is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569134" version="1" comment="samba-client is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569135" version="1" comment="samba-doc is &lt;3.6.3-94.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569136" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569137" version="1" comment="samba-winbind is &lt;3.6.3-94.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569138" version="1" comment="ldapsmb is &lt;1.34b-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569139" version="1" comment="libldb1 is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569140" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569141" version="1" comment="libtalloc2 is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569142" version="1" comment="libtdb1 is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569143" version="1" comment="libtevent0 is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569144" version="1" comment="libwbclient0 is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569145" version="1" comment="samba is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569146" version="1" comment="samba-client is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569147" version="1" comment="samba-doc is &lt;3.6.3-94.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569148" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569149" version="1" comment="samba-winbind is &lt;3.6.3-94.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569150" version="1" comment="ldapsmb is &lt;1.34b-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569151" version="1" comment="libldb1 is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569152" version="1" comment="libsmbclient0 is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569153" version="1" comment="libtalloc2 is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569154" version="1" comment="libtdb1 is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569155" version="1" comment="libtevent0 is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569156" version="1" comment="libwbclient0 is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569157" version="1" comment="samba is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569158" version="1" comment="samba-client is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569159" version="1" comment="samba-doc is &lt;3.6.3-94.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569160" version="1" comment="samba-krb-printing is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569161" version="1" comment="samba-winbind is &lt;3.6.3-94.14.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569162" version="1" comment="ldapsmb is &lt;1.34b-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569163" version="1" comment="libldb1 is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569164" version="1" comment="libsmbclient0 is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569165" version="1" comment="libtalloc2 is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569166" version="1" comment="libtdb1 is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569167" version="1" comment="libtevent0 is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569168" version="1" comment="libwbclient0 is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569169" version="1" comment="samba is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569170" version="1" comment="samba-client is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569171" version="1" comment="samba-doc is &lt;3.6.3-94.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569172" version="1" comment="samba-krb-printing is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569173" version="1" comment="samba-winbind is &lt;3.6.3-94.19.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569174" version="1" comment="ldapsmb is &lt;1.34b-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569175" version="1" comment="libldb1 is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569176" version="1" comment="libsmbclient0 is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569177" version="1" comment="libtalloc2 is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569178" version="1" comment="libtdb1 is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569179" version="1" comment="libtevent0 is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569180" version="1" comment="libwbclient0 is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569181" version="1" comment="samba is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569182" version="1" comment="samba-client is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569183" version="1" comment="samba-doc is &lt;3.6.3-94.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569184" version="1" comment="samba-krb-printing is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569185" version="1" comment="samba-winbind is &lt;3.6.3-94.23.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569186" version="1" comment="ldapsmb is &lt;1.34b-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569187" version="1" comment="libldb1 is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569188" version="1" comment="libsmbclient0 is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569189" version="1" comment="libtalloc2 is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569190" version="1" comment="libtdb1 is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569191" version="1" comment="libtevent0 is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569192" version="1" comment="libwbclient0 is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569193" version="1" comment="samba is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569194" version="1" comment="samba-client is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569195" version="1" comment="samba-doc is &lt;3.6.3-94.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569196" version="1" comment="samba-krb-printing is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569197" version="1" comment="samba-winbind is &lt;3.6.3-94.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569198" version="1" comment="ldapsmb is &lt;1.34b-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569199" version="1" comment="libldb1 is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569200" version="1" comment="libsmbclient0 is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569201" version="1" comment="libtalloc2 is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569202" version="1" comment="libtdb1 is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569203" version="1" comment="libtevent0 is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569204" version="1" comment="libwbclient0 is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569205" version="1" comment="samba is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569206" version="1" comment="samba-client is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569207" version="1" comment="samba-doc is &lt;3.6.3-94.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569208" version="1" comment="samba-krb-printing is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569209" version="1" comment="samba-winbind is &lt;3.6.3-94.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569210" version="1" comment="ldapsmb is &lt;1.34b-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569211" version="1" comment="libldb1 is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569212" version="1" comment="libsmbclient0 is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569213" version="1" comment="libtalloc2 is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569214" version="1" comment="libtdb1 is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569215" version="1" comment="libtevent0 is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569216" version="1" comment="libwbclient0 is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569217" version="1" comment="samba is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569218" version="1" comment="samba-client is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569219" version="1" comment="samba-doc is &lt;3.6.3-94.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569220" version="1" comment="samba-krb-printing is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569221" version="1" comment="samba-winbind is &lt;3.6.3-94.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569222" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569223" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569224" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569225" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569226" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569227" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626549" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626550" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670260" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569228" version="1" comment="squid3 is &lt;3.1.23-8.16.37.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569229" version="1" comment="squid3 is &lt;3.1.23-8.16.37.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671848" version="1" comment="squid3 is &lt;3.1.23-8.16.37.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652838" version="1" comment="strongswan is &lt;4.4.0-6.36.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652839" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664945" version="1" comment="strongswan is &lt;4.4.0-6.36.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664946" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.12.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569230" version="1" comment="sudo is &lt;1.7.6p2-0.30.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569231" version="1" comment="supportutils is &lt;1.20-122.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569232" version="1" comment="syslog-ng is &lt;2.0.9-27.34.40.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569233" version="1" comment="tar is &lt;1.27.1-14.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569234" version="1" comment="tcpdump is &lt;3.9.8-1.30.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668228" version="1" comment="tcpdump is &lt;3.9.8-1.30.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569235" version="1" comment="libtiff3 is &lt;3.8.2-141.169.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569236" version="1" comment="tiff is &lt;3.8.2-141.169.31.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666456" version="1" comment="libtiff3 is &lt;3.8.2-141.169.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666457" version="1" comment="tiff is &lt;3.8.2-141.169.34.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569237" version="1" comment="tightvnc is &lt;1.3.9-81.15.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569238" version="1" comment="tomcat6 is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569239" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569240" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569241" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569242" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569243" version="1" comment="tomcat6-lib is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569244" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569245" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569246" version="1" comment="tomcat6 is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569247" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569248" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569249" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569250" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569251" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569252" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569253" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569254" version="1" comment="tomcat6 is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569255" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569256" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569257" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569258" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569259" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569260" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569261" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569262" version="1" comment="tomcat6 is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569263" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569264" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569265" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569266" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569267" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569268" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569269" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651175" version="1" comment="transfig is &lt;3.2.8a-1.160.13.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653705" version="1" comment="transfig is &lt;3.2.8b-160.16.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569270" version="1" comment="unrar is &lt;3.80.2-4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569271" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569272" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569273" version="1" comment="util-linux is &lt;2.19.1-6.62.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569274" version="1" comment="util-linux-lang is &lt;2.19.1-6.62.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569275" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569276" version="1" comment="gvim is &lt;7.2-8.21.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569277" version="1" comment="vim is &lt;7.2-8.21.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569278" version="1" comment="vim-base is &lt;7.2-8.21.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569279" version="1" comment="vim-data is &lt;7.2-8.21.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569280" version="1" comment="gvim is &lt;7.2-8.21.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569281" version="1" comment="vim is &lt;7.2-8.21.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569282" version="1" comment="vim-base is &lt;7.2-8.21.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569283" version="1" comment="vim-data is &lt;7.2-8.21.6.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569284" version="1" comment="libwavpack1 is &lt;4.50.1-1.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569285" version="1" comment="wget is &lt;1.11.4-1.32.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569286" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569287" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.86-27.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569288" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.86-27.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569289" version="1" comment="xen-libs is &lt;4.2.5_21-27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569290" version="1" comment="xen-tools-domU is &lt;4.2.5_21-27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569291" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.90-30.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569292" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.90-30.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569293" version="1" comment="xen-libs is &lt;4.2.5_21-30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569294" version="1" comment="xen-tools-domU is &lt;4.2.5_21-30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569295" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.96-35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569296" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.96-35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569297" version="1" comment="xen-libs is &lt;4.2.5_21-35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569298" version="1" comment="xen-tools-domU is &lt;4.2.5_21-35.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569299" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569300" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569301" version="1" comment="xen-libs is &lt;4.2.5_21-38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569302" version="1" comment="xen-tools-domU is &lt;4.2.5_21-38.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569303" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569304" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.99-41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569305" version="1" comment="xen-libs is &lt;4.2.5_21-41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569306" version="1" comment="xen-tools-domU is &lt;4.2.5_21-41.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569307" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.102-44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569308" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.102-44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569309" version="1" comment="xen-libs is &lt;4.2.5_21-44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569310" version="1" comment="xen-tools-domU is &lt;4.2.5_21-44.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569311" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569312" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569313" version="1" comment="xen-libs is &lt;4.2.5_21-45.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569314" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569315" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569316" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569317" version="1" comment="xen-libs is &lt;4.2.5_21-45.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569318" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569319" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569320" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569321" version="1" comment="xen-libs is &lt;4.2.5_21-45.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569322" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.11.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569323" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569324" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569325" version="1" comment="xen-libs is &lt;4.2.5_21-45.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569326" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.16.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569327" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569328" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569329" version="1" comment="xen-libs is &lt;4.2.5_21-45.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569330" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.19.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569331" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569332" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569333" version="1" comment="xen-libs is &lt;4.2.5_21-45.22.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569334" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.22.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569335" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569336" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569337" version="1" comment="xen-libs is &lt;4.2.5_21-45.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569338" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.25.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569339" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.59-45.30.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569340" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.59-45.30.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569341" version="1" comment="xen-libs is &lt;4.2.5_21-45.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569342" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.30.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569343" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.59-45.33.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569344" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.106.59-45.33.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569345" version="1" comment="xen-libs is &lt;4.2.5_21-45.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569346" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.33.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569347" version="1" comment="xen-kmp-default is &lt;4.2.5_22_3.0.101_0.47.106.59-45.36.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569348" version="1" comment="xen-kmp-pae is &lt;4.2.5_22_3.0.101_0.47.106.59-45.36.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569349" version="1" comment="xen-libs is &lt;4.2.5_22-45.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569350" version="1" comment="xen-tools-domU is &lt;4.2.5_22-45.36.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667942" version="1" comment="xerces-j2 is &lt;2.8.1-238.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667943" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667944" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569351" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569352" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.15.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569353" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.18.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569354" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.27.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569355" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569356" version="1" comment="xorg-x11-server is &lt;7.4-27.121.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569357" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121.2 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569358" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569359" version="1" comment="xorg-x11-server is &lt;7.4-27.122.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569360" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.21.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569361" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569362" version="1" comment="xorg-x11-server is &lt;7.4-27.122.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569363" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.26.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569364" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569365" version="1" comment="xorg-x11-server is &lt;7.4-27.122.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569366" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.29.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569367" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569368" version="1" comment="xorg-x11-server is &lt;7.4-27.122.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569369" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.37.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569370" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569371" version="1" comment="xorg-x11-server is &lt;7.4-27.122.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569372" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.40.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659906" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659907" version="1" comment="xorg-x11-server is &lt;7.4-27.122.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659908" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.43.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660944" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660945" version="1" comment="xorg-x11-server is &lt;7.4-27.122.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660946" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569373" version="1" comment="xterm is &lt;238-3.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679340" version="1" comment="liblzma5 is &lt;5.0.3-0.12.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679341" version="1" comment="xz is &lt;5.0.3-0.12.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679342" version="1" comment="xz-lang is &lt;5.0.3-0.12.7.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677178" version="1" comment="zlib is &lt;1.2.7-0.17.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671289" version="1" comment="zsh is &lt;4.3.6-67.9.8.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569374" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.5-0.2.52 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569375" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.5-2.5.62 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569376" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.5-2.5.62 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569377" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3.62 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569378" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3.62 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569379" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.5-0.9.11.38 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569380" version="1" comment="kernel-rt is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569381" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569382" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569383" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569384" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569385" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569386" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569387" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569388" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2.62 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569389" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2.62 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569390" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.5-0.9.13.49 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664708" version="1" comment="SLE_RT-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569391" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.18_rt31_0.3-0.9.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569392" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.7.9-2.18.79 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569393" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.7.9-2.18.79 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569394" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6.70 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569395" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6.70 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569396" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25.18 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569397" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25.18 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569398" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569399" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569400" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569401" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569402" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569403" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569404" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569405" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.7.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569406" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569407" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569408" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.7.9-0.11.78 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569409" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.7.9-0.11.78 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569410" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28.50 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569411" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28.50 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664709" version="1" comment="SLE_RT-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569412" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.28-2.27.99 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569413" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.28-2.27.99 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569414" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.28-0.22.65 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569415" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.28-0.22.65 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569416" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.28-0.38.84 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569417" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.28-0.38.84 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569418" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569419" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569420" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569421" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569422" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569423" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569424" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569425" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569426" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.28-0.11.75 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569427" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.28-0.11.75 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569428" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.28-0.20.99 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569429" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.28-0.20.99 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569430" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13.90 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569431" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13.90 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664710" version="1" comment="SLE_RT-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569432" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569433" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569434" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569435" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569436" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569437" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569438" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569439" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569440" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569441" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569442" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569443" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569444" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569445" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569446" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.44.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569447" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569448" version="1" comment="kernel-rt is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569449" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569450" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569451" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569452" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569453" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569454" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569455" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664711" version="1" comment="SLE_RT-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569456" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_68-2.32.2.14 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569457" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_68-2.32.2.14 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569458" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_68-0.27.2.13 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569459" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_68-0.27.2.13 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569460" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_68-0.24.2.14 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569461" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_68-0.24.2.14 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569462" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_68-0.28.3.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569463" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_68-0.28.3.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569464" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569465" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569466" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569467" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569468" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569469" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569470" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569471" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569472" version="1" comment="kernel-rt is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569473" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569474" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569475" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569476" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569477" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569478" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569479" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569480" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_69.14-2.32.4.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569481" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_69.14-2.32.4.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569482" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_69.14-0.27.4.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569483" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_69.14-0.27.4.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569484" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_69.14-0.24.4.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569485" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_69.14-0.24.4.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569486" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.14-0.28.5.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569487" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.14-0.28.5.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569488" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.42-0.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569489" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.42-0.28.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569490" version="1" comment="kernel-rt is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569491" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569492" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569493" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569494" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569495" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569496" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569497" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569498" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569499" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569500" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569501" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569502" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569503" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569504" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569505" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569506" version="1" comment="kernel-rt is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569507" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569508" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569509" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569510" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569511" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569512" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569513" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-45.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569514" version="1" comment="kernel-rt is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569515" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569516" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569517" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569518" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569519" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569520" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569521" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569522" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569523" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569524" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569525" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569526" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569527" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569528" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569529" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569530" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569531" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569532" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569533" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569534" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569535" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569536" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569537" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569538" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569539" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569540" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569541" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569542" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569543" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569544" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569545" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569546" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569547" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569548" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569549" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569550" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569551" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569552" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569553" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569554" version="1" comment="kernel-rt is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569555" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569556" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569557" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569558" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569559" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569560" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569561" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569562" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569563" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569564" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569565" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569566" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569567" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569568" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569569" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569570" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569571" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569572" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569573" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569574" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569575" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569576" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569577" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569578" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569579" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569580" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569581" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569582" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569583" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569584" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569585" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569586" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_69.24-0.43.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569587" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_69.24-0.43.2.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569588" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_69.24-22.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569589" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_69.24-22.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569590" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_69.42-2.32.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569591" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_69.42-2.32.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569592" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_69.42-0.27.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569593" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_69.42-0.27.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569594" version="1" comment="gfs2-kmp-rt is &lt;2_3.0.101_rt130_69.42-0.24.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569595" version="1" comment="gfs2-kmp-rt_trace is &lt;2_3.0.101_rt130_69.42-0.24.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569596" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_69.42-0.43.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569597" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_69.42-0.43.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569598" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_69.42-0.28.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569599" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_69.42-0.28.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569600" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_69.42-22.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569601" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_69.42-22.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569602" version="1" comment="kernel-rt is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569603" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569604" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569605" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569606" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569607" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569608" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569609" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569610" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569611" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569612" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569613" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569614" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569615" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569616" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569617" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569618" version="1" comment="kernel-rt is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569619" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569620" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569621" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569622" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569623" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569624" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569625" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-69.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258808" version="1" comment="SLES_SAP-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569626" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.13-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569627" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.13-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569628" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569629" version="1" comment="sap_suse_cluster_connector is &lt;1.0.0-0.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569630" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569631" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569632" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569633" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569634" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569635" version="1" comment="clamsap is &lt;0.98.9-0.7.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569636" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569637" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569638" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569639" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569640" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569641" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569642" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569643" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569644" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.50.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569645" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.50.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569646" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.51.5.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569647" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.51.5.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569648" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.51.8.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569649" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.51.8.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569650" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569651" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569652" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569653" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569654" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569655" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.58.1 for ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569656" version="1" comment="rhn-virtualization-common is &lt;5.4.15-0.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569657" version="1" comment="rhn-virtualization-host is &lt;5.4.15-0.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569658" version="1" comment="rhncfg is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569659" version="1" comment="rhncfg-actions is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569660" version="1" comment="rhncfg-client is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569661" version="1" comment="rhncfg-management is &lt;5.9.33-0.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569662" version="1" comment="koan is &lt;2.0.10-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569663" version="1" comment="rhnmd is &lt;5.3.7-0.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569664" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569665" version="1" comment="spacewalk-certs-tools is &lt;1.2.2-0.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569666" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569667" version="1" comment="rhnlib is &lt;2.5.84.4-8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569668" version="1" comment="spacecmd is &lt;2.5.5.5-14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569669" version="1" comment="spacewalk-backend-libs is &lt;2.5.24.9-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569670" version="1" comment="spacewalk-check is &lt;2.5.13.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569671" version="1" comment="spacewalk-client-setup is &lt;2.5.13.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569672" version="1" comment="spacewalk-client-tools is &lt;2.5.13.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569673" version="1" comment="mgr-cfg is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569674" version="1" comment="mgr-cfg-actions is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569675" version="1" comment="mgr-cfg-client is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569676" version="1" comment="mgr-cfg-management is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569677" version="1" comment="mgr-daemon is &lt;4.0.7-5.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569678" version="1" comment="mgr-osad is &lt;4.0.9-5.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569679" version="1" comment="mgr-virtualization-host is &lt;4.0.8-5.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569680" version="1" comment="python2-mgr-cfg is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569681" version="1" comment="python2-mgr-cfg-actions is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569682" version="1" comment="python2-mgr-cfg-client is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569683" version="1" comment="python2-mgr-cfg-management is &lt;4.0.9-5.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569684" version="1" comment="python2-mgr-osa-common is &lt;4.0.9-5.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569685" version="1" comment="python2-mgr-osad is &lt;4.0.9-5.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569686" version="1" comment="python2-mgr-virtualization-common is &lt;4.0.8-5.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569687" version="1" comment="python2-mgr-virtualization-host is &lt;4.0.8-5.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569688" version="1" comment="python2-rhnlib is &lt;4.0.11-12.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569689" version="1" comment="spacecmd is &lt;4.0.14-18.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569690" version="1" comment="spacewalk-backend-libs is &lt;4.0.25-28.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569691" version="1" comment="spacewalk-remote-utils is &lt;4.0.5-6.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569692" version="1" comment="koan is &lt;2.2.2-0.68.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569693" version="1" comment="mgr-daemon is &lt;4.1.3-5.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569694" version="1" comment="python2-spacewalk-check is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569695" version="1" comment="python2-spacewalk-client-setup is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569696" version="1" comment="python2-spacewalk-client-tools is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569697" version="1" comment="salt is &lt;2016.11.10-43.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569698" version="1" comment="salt-doc is &lt;2016.11.10-43.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569699" version="1" comment="salt-minion is &lt;2016.11.10-43.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569700" version="1" comment="spacecmd is &lt;4.1.8-18.72.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569701" version="1" comment="spacewalk-check is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569702" version="1" comment="spacewalk-client-setup is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569703" version="1" comment="spacewalk-client-tools is &lt;4.1.7-27.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569704" version="1" comment="golang-github-wrouesnel-postgres_exporter is &lt;0.4.7-5.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569705" version="1" comment="mgr-cfg is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569706" version="1" comment="mgr-cfg-actions is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569707" version="1" comment="mgr-cfg-client is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569708" version="1" comment="mgr-cfg-management is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569709" version="1" comment="mgr-custom-info is &lt;4.2.1-5.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569710" version="1" comment="mgr-daemon is &lt;4.2.7-5.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569711" version="1" comment="mgr-osad is &lt;4.2.5-5.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569712" version="1" comment="mgr-push is &lt;4.2.2-5.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569713" version="1" comment="mgr-virtualization-host is &lt;4.2.1-5.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569714" version="1" comment="python2-mgr-cfg is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569715" version="1" comment="python2-mgr-cfg-actions is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569716" version="1" comment="python2-mgr-cfg-client is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569717" version="1" comment="python2-mgr-cfg-management is &lt;4.2.2-5.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569718" version="1" comment="python2-mgr-osa-common is &lt;4.2.5-5.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569719" version="1" comment="python2-mgr-osad is &lt;4.2.5-5.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569720" version="1" comment="python2-mgr-push is &lt;4.2.2-5.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569721" version="1" comment="python2-mgr-virtualization-common is &lt;4.2.1-5.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569722" version="1" comment="python2-mgr-virtualization-host is &lt;4.2.1-5.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569723" version="1" comment="python2-rhnlib is &lt;4.2.3-12.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569724" version="1" comment="python2-spacewalk-check is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569725" version="1" comment="python2-spacewalk-client-setup is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569726" version="1" comment="python2-spacewalk-client-tools is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569727" version="1" comment="python2-spacewalk-koan is &lt;4.2.3-9.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569728" version="1" comment="python2-spacewalk-oscap is &lt;4.2.1-6.15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569729" version="1" comment="python2-suseRegisterInfo is &lt;4.2.3-6.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569730" version="1" comment="python2-uyuni-common-libs is &lt;4.2.3-5.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569731" version="1" comment="salt is &lt;2016.11.10-43.75.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569732" version="1" comment="salt-doc is &lt;2016.11.10-43.75.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569733" version="1" comment="salt-minion is &lt;2016.11.10-43.75.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569734" version="1" comment="spacecmd is &lt;4.2.8-18.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569735" version="1" comment="spacewalk-check is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569736" version="1" comment="spacewalk-client-setup is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569737" version="1" comment="spacewalk-client-tools is &lt;4.2.10-27.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569738" version="1" comment="spacewalk-koan is &lt;4.2.3-9.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569739" version="1" comment="spacewalk-oscap is &lt;4.2.1-6.15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569740" version="1" comment="spacewalk-remote-utils is &lt;4.2.1-6.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569741" version="1" comment="supportutils-plugin-susemanager-client is &lt;4.2.2-9.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569742" version="1" comment="suseRegisterInfo is &lt;4.2.3-6.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651453" version="1" comment="python2-spacewalk-check is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651454" version="1" comment="python2-spacewalk-client-setup is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651455" version="1" comment="python2-spacewalk-client-tools is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651456" version="1" comment="salt is &lt;2016.11.10-43.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651457" version="1" comment="salt-doc is &lt;2016.11.10-43.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651458" version="1" comment="salt-minion is &lt;2016.11.10-43.84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651459" version="1" comment="spacecmd is &lt;4.2.13-18.93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651460" version="1" comment="spacewalk-check is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651461" version="1" comment="spacewalk-client-setup is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651462" version="1" comment="spacewalk-client-tools is &lt;4.2.14-27.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569743" version="1" comment="koan is &lt;2.2.2-0.68.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569744" version="1" comment="koan is &lt;2.2.2-0.68.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668399" version="1" comment="koan is &lt;2.2.2-0.68.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569745" version="1" comment="python-pycrypto is &lt;2.6.1-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569746" version="1" comment="salt is &lt;2016.11.4-43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569747" version="1" comment="salt-doc is &lt;2016.11.4-43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569748" version="1" comment="salt-minion is &lt;2016.11.4-43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569749" version="1" comment="salt is &lt;2016.11.4-43.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569750" version="1" comment="salt-doc is &lt;2016.11.4-43.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569751" version="1" comment="salt-minion is &lt;2016.11.4-43.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569752" version="1" comment="salt is &lt;2016.11.10-43.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569753" version="1" comment="salt-doc is &lt;2016.11.10-43.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569754" version="1" comment="salt-minion is &lt;2016.11.10-43.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569755" version="1" comment="salt is &lt;2016.11.10-43.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569756" version="1" comment="salt-doc is &lt;2016.11.10-43.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569757" version="1" comment="salt-minion is &lt;2016.11.10-43.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569758" version="1" comment="salt is &lt;2016.11.4-42.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569759" version="1" comment="salt-doc is &lt;2016.11.4-42.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569760" version="1" comment="salt-minion is &lt;2016.11.4-42.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569761" version="1" comment="libzmq3 is &lt;4.0.4-3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569762" version="1" comment="hawk is &lt;0.5.2-0.38.16 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569763" version="1" comment="hawk-templates is &lt;0.5.2-0.38.16 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117412" version="1" comment="sle-hae-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569764" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.17-2.18.81 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569765" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.7.17-2.18.81 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569766" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.7.17-2.18.81 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569767" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.17-2.18.81 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569768" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.7.17-2.18.81 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569769" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.17-0.7.109 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569770" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.7.17-0.7.109 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569771" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.7.17-0.7.109 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569772" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.17-0.7.109 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569773" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.7.17-0.7.109 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569774" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.17-0.11.80 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569775" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.7.17-0.11.80 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569776" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.7.17-0.11.80 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569777" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.17-0.11.80 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569778" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.7.17-0.11.80 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569779" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569780" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032105" version="1" comment="sles-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009258684" version="1" comment="SUSE_SLES_SAP-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569781" version="1" comment="MozillaFirefox is &lt;3.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569782" version="1" comment="MozillaFirefox-branding-SLED is &lt;3.5-1.1.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569783" version="1" comment="MozillaFirefox-translations is &lt;3.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569784" version="1" comment="gconf2 is &lt;2.24.0-7.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569785" version="1" comment="gconf2-32bit is &lt;2.24.0-7.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569786" version="1" comment="gconf2-x86 is &lt;2.24.0-7.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569787" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569788" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569789" version="1" comment="libfreebl3-x86 is &lt;3.12.3.1-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569790" version="1" comment="libidl is &lt;0.8.11-2.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569791" version="1" comment="libidl-32bit is &lt;0.8.11-2.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569792" version="1" comment="libidl-x86 is &lt;0.8.11-2.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569793" version="1" comment="mozilla-nspr is &lt;4.8-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569794" version="1" comment="mozilla-nspr-32bit is &lt;4.8-1.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569795" version="1" comment="mozilla-nspr-x86 is &lt;4.8-1.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569796" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569797" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569798" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569799" version="1" comment="mozilla-nss-x86 is &lt;3.12.3.1-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569800" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569801" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.10-1.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569802" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569803" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.10-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569804" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.10-1.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569805" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569806" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569807" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569808" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569809" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.11-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569810" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569811" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569812" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569813" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569814" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.12-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569815" version="1" comment="orbit2 is &lt;2.14.16-2.16 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569816" version="1" comment="orbit2-32bit is &lt;2.14.16-2.16 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569817" version="1" comment="orbit2-x86 is &lt;2.14.16-2.16 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569818" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569819" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569820" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569821" version="1" comment="OpenEXR is &lt;1.6.1-83.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569822" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569823" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569824" version="1" comment="procps is &lt;3.2.7-151.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569825" version="1" comment="acl is &lt;2.2.47-30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569826" version="1" comment="libacl is &lt;2.2.47-30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569827" version="1" comment="libacl-32bit is &lt;2.2.47-30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569828" version="1" comment="libacl-x86 is &lt;2.2.47-30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569829" version="1" comment="apache2 is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569830" version="1" comment="apache2-doc is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569831" version="1" comment="apache2-example-pages is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569832" version="1" comment="apache2-prefork is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569833" version="1" comment="apache2-utils is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569834" version="1" comment="apache2-worker is &lt;2.2.10-2.23.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569835" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569836" version="1" comment="php5 is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569837" version="1" comment="php5-bcmath is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569838" version="1" comment="php5-bz2 is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569839" version="1" comment="php5-calendar is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569840" version="1" comment="php5-ctype is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569841" version="1" comment="php5-curl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569842" version="1" comment="php5-dba is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569843" version="1" comment="php5-dbase is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569844" version="1" comment="php5-dom is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569845" version="1" comment="php5-exif is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569846" version="1" comment="php5-fastcgi is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569847" version="1" comment="php5-ftp is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569848" version="1" comment="php5-gd is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569849" version="1" comment="php5-gettext is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569850" version="1" comment="php5-gmp is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569851" version="1" comment="php5-hash is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569852" version="1" comment="php5-iconv is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569853" version="1" comment="php5-json is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569854" version="1" comment="php5-ldap is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569855" version="1" comment="php5-mbstring is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569856" version="1" comment="php5-mcrypt is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569857" version="1" comment="php5-mysql is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569858" version="1" comment="php5-odbc is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569859" version="1" comment="php5-openssl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569860" version="1" comment="php5-pcntl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569861" version="1" comment="php5-pdo is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569862" version="1" comment="php5-pear is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569863" version="1" comment="php5-pgsql is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569864" version="1" comment="php5-pspell is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569865" version="1" comment="php5-shmop is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569866" version="1" comment="php5-snmp is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569867" version="1" comment="php5-soap is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569868" version="1" comment="php5-suhosin is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569869" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569870" version="1" comment="php5-sysvsem is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569871" version="1" comment="php5-sysvshm is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569872" version="1" comment="php5-tokenizer is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569873" version="1" comment="php5-wddx is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569874" version="1" comment="php5-xmlreader is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569875" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569876" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569877" version="1" comment="php5-xsl is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569878" version="1" comment="php5-zip is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569879" version="1" comment="php5-zlib is &lt;5.2.6-50.18.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569880" version="1" comment="avahi is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569881" version="1" comment="avahi-lang is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569882" version="1" comment="libavahi-client3 is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569883" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569884" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569885" version="1" comment="libavahi-common3 is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569886" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569887" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569888" version="1" comment="libavahi-core5 is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569889" version="1" comment="libdns_sd is &lt;0.6.23-11.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569890" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569891" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569892" version="1" comment="bzip2 is &lt;1.0.5-34.253.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569893" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569894" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569895" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569896" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569897" version="1" comment="cifs-mount is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569898" version="1" comment="ldapsmb is &lt;1.34b-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569899" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569900" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569901" version="1" comment="libsmbclient0-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569902" version="1" comment="libtalloc1 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569903" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569904" version="1" comment="libtalloc1-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569905" version="1" comment="libtdb1 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569906" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569907" version="1" comment="libtdb1-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569908" version="1" comment="libwbclient0 is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569909" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569910" version="1" comment="libwbclient0-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569911" version="1" comment="samba is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569912" version="1" comment="samba-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569913" version="1" comment="samba-client is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569914" version="1" comment="samba-client-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569915" version="1" comment="samba-client-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569916" version="1" comment="samba-krb-printing is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569917" version="1" comment="samba-winbind is &lt;3.2.7-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569918" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569919" version="1" comment="samba-winbind-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569920" version="1" comment="samba-x86 is &lt;3.2.7-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569921" version="1" comment="clamav is &lt;0.95.1-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569922" version="1" comment="libgcc43 is &lt;4.3.3_20081022-11.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569923" version="1" comment="libgcc43-32bit is &lt;4.3.3_20081022-11.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569924" version="1" comment="libgcc43-x86 is &lt;4.3.3_20081022-11.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569925" version="1" comment="libstdc++43 is &lt;4.3.3_20081022-11.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569926" version="1" comment="libstdc++43-32bit is &lt;4.3.3_20081022-11.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569927" version="1" comment="libstdc++43-x86 is &lt;4.3.3_20081022-11.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569928" version="1" comment="cpio is &lt;2.9-75.27.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569929" version="1" comment="cpio-lang is &lt;2.9-75.27.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569930" version="1" comment="cron is &lt;4.1-194.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569931" version="1" comment="cups is &lt;1.3.9-8.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569932" version="1" comment="cups-client is &lt;1.3.9-8.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569933" version="1" comment="cups-libs is &lt;1.3.9-8.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569934" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569935" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569936" version="1" comment="curl is &lt;7.19.0-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569937" version="1" comment="keyutils-libs is &lt;1.2-107.22 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569938" version="1" comment="keyutils-libs-32bit is &lt;1.2-107.22 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569939" version="1" comment="keyutils-libs-x86 is &lt;1.2-107.22 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569940" version="1" comment="libcurl4 is &lt;7.19.0-11.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569941" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569942" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569943" version="1" comment="libidn is &lt;1.10-3.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569944" version="1" comment="libidn-32bit is &lt;1.10-3.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569945" version="1" comment="libidn-x86 is &lt;1.10-3.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569946" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569947" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569948" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569949" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569950" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569951" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569952" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569953" version="1" comment="cyrus-sasl-crammd5-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569954" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569955" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569956" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569957" version="1" comment="cyrus-sasl-gssapi-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569958" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569959" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569960" version="1" comment="cyrus-sasl-otp-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569961" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569962" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569963" version="1" comment="cyrus-sasl-plain-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569964" version="1" comment="cyrus-sasl-x86 is &lt;2.1.22-182.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569965" version="1" comment="dbus-1 is &lt;1.2.10-3.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569966" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569967" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569968" version="1" comment="dbus-1-glib is &lt;0.76-34.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569969" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569970" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569971" version="1" comment="dhcp-client is &lt;3.1.1-7.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569972" version="1" comment="dnsmasq is &lt;2.45-12.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569973" version="1" comment="wireshark is &lt;1.0.5-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569974" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569975" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569976" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569977" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569978" version="1" comment="gtkhtml2 is &lt;3.24.1.1-3.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569979" version="1" comment="gtkhtml2-lang is &lt;3.24.1.1-3.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569980" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569981" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569982" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569983" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569984" version="1" comment="expat is &lt;2.0.1-88.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569985" version="1" comment="libexpat1 is &lt;2.0.1-88.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569986" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569987" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569988" version="1" comment="fetchmail is &lt;6.3.8.90-13.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569989" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569990" version="1" comment="cdparanoia is &lt;IIIalpha9.8-691.22 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569991" version="1" comment="cdparanoia-32bit is &lt;IIIalpha9.8-691.22 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569992" version="1" comment="cdparanoia-x86 is &lt;IIIalpha9.8-691.22 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569993" version="1" comment="desktop-file-utils is &lt;0.15-1.29 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569994" version="1" comment="fam is &lt;2.7.0-130.21 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569995" version="1" comment="fam-32bit is &lt;2.7.0-130.21 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569996" version="1" comment="fam-x86 is &lt;2.7.0-130.21 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569997" version="1" comment="gnome-vfs2 is &lt;2.24.0-7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569998" version="1" comment="gnome-vfs2-32bit is &lt;2.24.0-7.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009569999" version="1" comment="gnome-vfs2-x86 is &lt;2.24.0-7.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570000" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.20 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570001" version="1" comment="libogg0 is &lt;1.1.3-87.12 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570002" version="1" comment="libogg0-32bit is &lt;1.1.3-87.12 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570003" version="1" comment="libogg0-x86 is &lt;1.1.3-87.12 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570004" version="1" comment="liboil is &lt;0.3.15-3.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570005" version="1" comment="liboil-32bit is &lt;0.3.15-3.10 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570006" version="1" comment="liboil-x86 is &lt;0.3.15-3.10 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570007" version="1" comment="freetype2 is &lt;2.3.7-25.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570008" version="1" comment="freetype2-32bit is &lt;2.3.7-25.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570009" version="1" comment="freetype2-x86 is &lt;2.3.7-25.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570010" version="1" comment="fuse is &lt;2.7.2-61.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570011" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570012" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570013" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570014" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570015" version="1" comment="ghostscript-library is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570016" version="1" comment="ghostscript-omni is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570017" version="1" comment="ghostscript-x11 is &lt;8.62-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570018" version="1" comment="libgimpprint is &lt;4.2.7-32.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570019" version="1" comment="glib2 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570020" version="1" comment="glib2-doc is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570021" version="1" comment="glib2-lang is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570022" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570023" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570024" version="1" comment="libgio-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570025" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570026" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570027" version="1" comment="libglib-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570028" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570029" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570030" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570031" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570032" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570033" version="1" comment="libgobject-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570034" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570035" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570036" version="1" comment="libgthread-2_0-0-x86 is &lt;2.18.2-7.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570037" version="1" comment="glibc is &lt;2.9-13.11.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570038" version="1" comment="glibc-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570039" version="1" comment="glibc-devel is &lt;2.9-13.11.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570040" version="1" comment="glibc-devel-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570041" version="1" comment="glibc-html is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570042" version="1" comment="glibc-i18ndata is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570043" version="1" comment="glibc-info is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570044" version="1" comment="glibc-locale is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570045" version="1" comment="glibc-locale-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570046" version="1" comment="glibc-locale-x86 is &lt;2.9-13.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570047" version="1" comment="glibc-profile is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570048" version="1" comment="glibc-profile-32bit is &lt;2.9-13.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570049" version="1" comment="glibc-profile-x86 is &lt;2.9-13.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570050" version="1" comment="glibc-x86 is &lt;2.9-13.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570051" version="1" comment="nscd is &lt;2.9-13.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570052" version="1" comment="gmime is &lt;2.2.23-1.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570053" version="1" comment="gmime-doc is &lt;2.2.23-1.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570054" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570055" version="1" comment="gnome-screensaver is &lt;2.24.0-14.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570056" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-14.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570057" version="1" comment="gnutls is &lt;2.4.1-24.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570058" version="1" comment="libgnutls26 is &lt;2.4.1-24.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570059" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570060" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570061" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570062" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.21-2.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570063" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570064" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570065" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.21-2.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570066" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.21-2.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570067" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.21-2.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570068" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.21-2.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570069" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570070" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570071" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-4.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570072" version="1" comment="gzip is &lt;1.3.12-69.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570073" version="1" comment="libicu is &lt;4.0-7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570074" version="1" comment="libicu-32bit is &lt;4.0-7.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570075" version="1" comment="libicu-doc is &lt;4.0-7.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570076" version="1" comment="ipsec-tools is &lt;0.7.1-10.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570077" version="1" comment="iscsitarget is &lt;0.4.15-94.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570078" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570079" version="1" comment="iscsitarget-kmp-pae is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570080" version="1" comment="iscsitarget-kmp-ppc64 is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570081" version="1" comment="iscsitarget-kmp-vmi is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570082" version="1" comment="iscsitarget-kmp-xen is &lt;0.4.15_2.6.27.48_0.6-94.14.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570083" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570084" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.1.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570085" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.1.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570086" version="1" comment="java-1_5_0-bea is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570087" version="1" comment="java-1_5_0-bea-console is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570088" version="1" comment="java-1_5_0-bea-fonts is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570089" version="1" comment="java-1_5_0-bea-jdbc is &lt;1.5.0.13.1.2-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570090" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570091" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0-124.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570092" version="1" comment="java-1_6_0-ibm-alsa-x86 is &lt;1.6.0-124.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570093" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570094" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570095" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0-124.6.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570096" version="1" comment="java-1_6_0-ibm-x86 is &lt;1.6.0-124.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570097" version="1" comment="kde4-akonadi is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570098" version="1" comment="kde4-akregator is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570099" version="1" comment="kde4-kaddressbook is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570100" version="1" comment="kde4-kalarm is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570101" version="1" comment="kde4-kjots is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570102" version="1" comment="kde4-kmail is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570103" version="1" comment="kde4-knode is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570104" version="1" comment="kde4-knotes is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570105" version="1" comment="kde4-kontact is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570106" version="1" comment="kde4-korganizer is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570107" version="1" comment="kde4-ktimetracker is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570108" version="1" comment="kde4-ktnef is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570109" version="1" comment="kdepim4 is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570110" version="1" comment="kdepim4-wizards is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570111" version="1" comment="kdepimlibs4 is &lt;4.1.3-9.28.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570112" version="1" comment="libakonadi4 is &lt;4.1.3-9.28.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570113" version="1" comment="libkdepim4 is &lt;4.1.3-9.14.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570114" version="1" comment="libkdepimlibs4 is &lt;4.1.3-9.28.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570115" version="1" comment="kde4-gwenview is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570116" version="1" comment="kde4-kcolorchooser is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570117" version="1" comment="kde4-kruler is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570118" version="1" comment="kde4-ksnapshot is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570119" version="1" comment="kde4-okular is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570120" version="1" comment="libkipi5 is &lt;4.1.3-7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570121" version="1" comment="kde4-kdm is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570122" version="1" comment="kde4-kgreeter-plugins is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570123" version="1" comment="kde4-kwin is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570124" version="1" comment="kdebase4-workspace is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570125" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.1.3-18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570126" version="1" comment="kde4-kget is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570127" version="1" comment="kde4-knewsticker is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570128" version="1" comment="kde4-kopete is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570129" version="1" comment="kde4-krdc is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570130" version="1" comment="kde4-krfb is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570131" version="1" comment="kdenetwork4-filesharing is &lt;4.1.3-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570132" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570133" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570134" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570135" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570136" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570137" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570138" version="1" comment="kdelibs4 is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570139" version="1" comment="kdelibs4-core is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570140" version="1" comment="libkde4 is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570141" version="1" comment="libkde4-32bit is &lt;4.1.3-8.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570142" version="1" comment="libkde4-x86 is &lt;4.1.3-8.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570143" version="1" comment="libkdecore4 is &lt;4.1.3-8.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570144" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570145" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570146" version="1" comment="kdelibs4 is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570147" version="1" comment="kdelibs4-core is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570148" version="1" comment="libkde4 is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570149" version="1" comment="libkde4-32bit is &lt;4.1.3-8.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570150" version="1" comment="libkde4-x86 is &lt;4.1.3-8.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570151" version="1" comment="libkdecore4 is &lt;4.1.3-8.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570152" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570153" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570154" version="1" comment="utempter is &lt;0.5.5-106.18 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570155" version="1" comment="utempter-32bit is &lt;0.5.5-106.18 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570156" version="1" comment="utempter-x86 is &lt;0.5.5-106.18 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570157" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.23_0.1-7.1.7 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570158" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.23_0.1-7.1.7 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570159" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.23_0.1-7.1.7 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570160" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.23_0.1-7.1.7 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570161" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.23_0.1-7.1.7 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570162" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.54_0.2-94.14.8 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570163" version="1" comment="kernel-default is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570164" version="1" comment="kernel-default-base is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570165" version="1" comment="kernel-default-man is &lt;2.6.27.23-0.1.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570166" version="1" comment="kernel-kdump is &lt;2.6.27.23-0.1.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570167" version="1" comment="kernel-pae is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570168" version="1" comment="kernel-pae-base is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570169" version="1" comment="kernel-ppc64 is &lt;2.6.27.23-0.1.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570170" version="1" comment="kernel-ppc64-base is &lt;2.6.27.23-0.1.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570171" version="1" comment="kernel-source is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570172" version="1" comment="kernel-syms is &lt;2.6.27.23-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570173" version="1" comment="kernel-vmi is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570174" version="1" comment="kernel-vmi-base is &lt;2.6.27.23-0.1.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570175" version="1" comment="kernel-xen is &lt;2.6.27.23-0.1.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570176" version="1" comment="kernel-xen-base is &lt;2.6.27.23-0.1.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570177" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.27.54_0.2-7.9.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570178" version="1" comment="krb5 is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570179" version="1" comment="krb5-32bit is &lt;1.6.3-133.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570180" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570181" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570182" version="1" comment="krb5-client is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570183" version="1" comment="krb5-server is &lt;1.6.3-133.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570184" version="1" comment="krb5-x86 is &lt;1.6.3-133.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570185" version="1" comment="kvm is &lt;78.0.10.6-0.3.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570186" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1 for i586,ia64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570187" version="1" comment="kvm-kmp-pae is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570188" version="1" comment="lcms is &lt;1.17-77.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570189" version="1" comment="liblcms1 is &lt;1.17-77.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570190" version="1" comment="liblcms1-32bit is &lt;1.17-77.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570191" version="1" comment="liblcms1-x86 is &lt;1.17-77.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570192" version="1" comment="libHX13 is &lt;1.23-4.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570193" version="1" comment="libHX13-32bit is &lt;1.23-4.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570194" version="1" comment="libHX13-x86 is &lt;1.23-4.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570195" version="1" comment="libapr-util1 is &lt;1.3.4-12.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570196" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.19.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570197" version="1" comment="libapr1 is &lt;1.3.3-11.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570198" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570199" version="1" comment="libesmtp is &lt;1.0.4-157.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570200" version="1" comment="libfreebl3 is &lt;3.12.8-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570201" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570202" version="1" comment="libfreebl3-x86 is &lt;3.12.8-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570203" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570204" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570205" version="1" comment="mozilla-nspr-x86 is &lt;4.8.6-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570206" version="1" comment="mozilla-nss is &lt;3.12.8-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570207" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570208" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570209" version="1" comment="mozilla-nss-x86 is &lt;3.12.8-1.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570210" version="1" comment="zlib is &lt;1.2.3-106.34 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570211" version="1" comment="zlib-32bit is &lt;1.2.3-106.34 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570212" version="1" comment="zlib-x86 is &lt;1.2.3-106.34 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570213" version="1" comment="libgdiplus0 is &lt;2.0-11.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570214" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570215" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570216" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.12-7.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570217" version="1" comment="openldap2 is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570218" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570219" version="1" comment="openldap2-client is &lt;2.4.12-7.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570220" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570221" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570222" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570223" version="1" comment="libtool is &lt;2.2.6-2.131.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570224" version="1" comment="libtool-32bit is &lt;2.2.6-2.131.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570225" version="1" comment="libtool-x86 is &lt;2.2.6-2.131.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570226" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570227" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570228" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570229" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570230" version="1" comment="mysql is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570231" version="1" comment="mysql-Max is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570232" version="1" comment="mysql-client is &lt;5.0.67-13.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570233" version="1" comment="libneon27 is &lt;0.28.3-2.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570234" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570235" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570236" version="1" comment="neon is &lt;0.28.3-2.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570237" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570238" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570239" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570240" version="1" comment="netpbm is &lt;10.26.44-101.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570241" version="1" comment="libopensc2 is &lt;0.11.6-5.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570242" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570243" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570244" version="1" comment="opensc is &lt;0.11.6-5.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570245" version="1" comment="opensc-32bit is &lt;0.11.6-5.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570246" version="1" comment="opensc-x86 is &lt;0.11.6-5.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570247" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570248" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570249" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570250" version="1" comment="openssl is &lt;0.9.8h-30.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570251" version="1" comment="openssl-doc is &lt;0.9.8h-30.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570252" version="1" comment="libpng12-0 is &lt;1.2.31-5.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570253" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570254" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570255" version="1" comment="libpng12-0 is &lt;1.2.31-5.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570256" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570257" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570258" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570259" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570260" version="1" comment="libpoppler4 is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570261" version="1" comment="poppler-tools is &lt;0.10.1-1.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570262" version="1" comment="libpoppler4 is &lt;0.10.1-1.30.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570263" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570264" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570265" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.8.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570266" version="1" comment="python is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570267" version="1" comment="python-32bit is &lt;2.6.0-8.9.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570268" version="1" comment="python-base is &lt;2.6.0-8.8.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570269" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570270" version="1" comment="python-base-x86 is &lt;2.6.0-8.8.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570271" version="1" comment="python-curses is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570272" version="1" comment="python-demo is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570273" version="1" comment="python-gdbm is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570274" version="1" comment="python-idle is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570275" version="1" comment="python-tk is &lt;2.6.0-8.9.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570276" version="1" comment="python-x86 is &lt;2.6.0-8.9.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570277" version="1" comment="python-xml is &lt;2.6.0-8.8.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570278" version="1" comment="libsndfile is &lt;1.0.17-172.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570279" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570280" version="1" comment="libsndfile-x86 is &lt;1.0.17-172.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570281" version="1" comment="libtheora0 is &lt;1.0.beta2-6.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570282" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-6.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570283" version="1" comment="libtheora0-x86 is &lt;1.0.beta2-6.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570284" version="1" comment="libtiff3 is &lt;3.8.2-141.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570285" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570286" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570287" version="1" comment="tiff is &lt;3.8.2-141.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570288" version="1" comment="libtiff3 is &lt;3.8.2-141.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570289" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570290" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570291" version="1" comment="libvolume_id1 is &lt;128-13.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570292" version="1" comment="udev is &lt;128-13.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570293" version="1" comment="libvirt is &lt;0.4.6-14.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570294" version="1" comment="libvirt-doc is &lt;0.4.6-14.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570295" version="1" comment="libvirt-python is &lt;0.4.6-14.63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570296" version="1" comment="libvorbis is &lt;1.2.0-79.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570297" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570298" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570299" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570300" version="1" comment="libxml2 is &lt;2.7.1-10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570301" version="1" comment="libxml2-32bit is &lt;2.7.1-10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570302" version="1" comment="libxml2-doc is &lt;2.7.1-10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570303" version="1" comment="libxml2-x86 is &lt;2.7.1-10.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570304" version="1" comment="lvm2 is &lt;2.02.39-18.26.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570305" version="1" comment="mipv6d is &lt;2.0.2-2.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570306" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570307" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570308" version="1" comment="mozilla-nspr-x86 is &lt;4.8.2-1.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570309" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.9-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570310" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.9-0.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570311" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.9-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570312" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.9-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570313" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.9-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570314" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570315" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570316" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570317" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570318" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.15-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570319" version="1" comment="mutt is &lt;1.5.17-42.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570320" version="1" comment="nagios is &lt;3.0.6-1.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570321" version="1" comment="nagios-www is &lt;3.0.6-1.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570322" version="1" comment="ntp is &lt;4.2.4p6-1.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570323" version="1" comment="ntp-doc is &lt;4.2.4p6-1.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570324" version="1" comment="open-iscsi is &lt;2.0.870-26.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570325" version="1" comment="openslp is &lt;1.2.0-172.10.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570326" version="1" comment="openslp-32bit is &lt;1.2.0-172.10.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570327" version="1" comment="openslp-server is &lt;1.2.0-172.10.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570328" version="1" comment="openslp-x86 is &lt;1.2.0-172.10.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570329" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570330" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570331" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570332" version="1" comment="openssl is &lt;0.9.8h-30.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570333" version="1" comment="openssl-doc is &lt;0.9.8h-30.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570334" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570335" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570336" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570337" version="1" comment="openssl is &lt;0.9.8h-30.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570338" version="1" comment="openssl-doc is &lt;0.9.8h-30.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570339" version="1" comment="openswan is &lt;2.6.16-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570340" version="1" comment="openswan-doc is &lt;2.6.16-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570341" version="1" comment="pango is &lt;1.22.1-3.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570342" version="1" comment="pango-32bit is &lt;1.22.1-3.17.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570343" version="1" comment="pango-doc is &lt;1.22.1-3.17.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570344" version="1" comment="pango-x86 is &lt;1.22.1-3.17.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570345" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570346" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570347" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570348" version="1" comment="perl is &lt;5.10.0-64.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570349" version="1" comment="perl-32bit is &lt;5.10.0-64.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570350" version="1" comment="perl-base is &lt;5.10.0-64.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570351" version="1" comment="perl-doc is &lt;5.10.0-64.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570352" version="1" comment="perl-x86 is &lt;5.10.0-64.43.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570353" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570354" version="1" comment="perl-IO-Socket-SSL is &lt;1.16-3.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570355" version="1" comment="postgresql is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570356" version="1" comment="postgresql-contrib is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570357" version="1" comment="postgresql-docs is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570358" version="1" comment="postgresql-libs is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570359" version="1" comment="postgresql-libs-32bit is &lt;8.3.7-0.1.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570360" version="1" comment="postgresql-libs-x86 is &lt;8.3.7-0.1.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570361" version="1" comment="postgresql-server is &lt;8.3.7-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570362" version="1" comment="pyxml is &lt;0.8.4-194.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570363" version="1" comment="quagga is &lt;0.99.10-17.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570364" version="1" comment="sendmail is &lt;8.14.3-50.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570365" version="1" comment="ruby is &lt;1.8.7.p72-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570366" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570367" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570368" version="1" comment="squid is &lt;2.7.STABLE5-2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570369" version="1" comment="strongswan is &lt;4.2.8-1.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570370" version="1" comment="strongswan-doc is &lt;4.2.8-1.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570371" version="1" comment="sudo is &lt;1.6.9p17-21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570372" version="1" comment="systemtap is &lt;0.7.1-42.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570373" version="1" comment="tar is &lt;1.20-23.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570374" version="1" comment="tgt is &lt;0.9.0-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570375" version="1" comment="w3m is &lt;0.5.2-128.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570376" version="1" comment="websphere-as_ce is &lt;2.1.1.2-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570377" version="1" comment="wget is &lt;1.11.4-1.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570378" version="1" comment="wireshark is &lt;1.0.5-1.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570379" version="1" comment="libcmpiutil is &lt;0.5-15.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570380" version="1" comment="libvirt is &lt;0.4.6-14.60.16 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570381" version="1" comment="libvirt-cim is &lt;0.5.2-8.47.85 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570382" version="1" comment="libvirt-doc is &lt;0.4.6-14.60.16 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570383" version="1" comment="libvirt-python is &lt;0.4.6-14.60.16 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570384" version="1" comment="virt-manager is &lt;0.5.3-66.42.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570385" version="1" comment="virt-viewer is &lt;0.0.3-3.57.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570386" version="1" comment="vm-install is &lt;0.3.27-0.1.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570387" version="1" comment="xen is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570388" version="1" comment="xen-doc-html is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570389" version="1" comment="xen-doc-pdf is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570390" version="1" comment="xen-kmp-default is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570391" version="1" comment="xen-kmp-pae is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570392" version="1" comment="xen-libs is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570393" version="1" comment="xen-tools is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570394" version="1" comment="xen-tools-domU is &lt;3.3.1_18546_24-0.3.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570395" version="1" comment="xerces-j2 is &lt;2.8.1-238.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570396" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570397" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570398" version="1" comment="xpdf-tools is &lt;3.02-138.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570399" version="1" comment="yast2-ldap-server is &lt;2.17.21-0.1.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570400" version="1" comment="ConsoleKit is &lt;0.2.10-64.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570401" version="1" comment="ConsoleKit-32bit is &lt;0.2.10-64.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570402" version="1" comment="ConsoleKit-x11 is &lt;0.2.10-64.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570403" version="1" comment="ConsoleKit-x86 is &lt;0.2.10-64.65.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570404" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570405" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.24 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570406" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570407" version="1" comment="libfreebl3 is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570408" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570409" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570410" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570411" version="1" comment="mozilla-nss is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570412" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570413" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570414" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570415" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570416" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570417" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570418" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570419" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570420" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570421" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570422" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570423" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570424" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570425" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570426" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570427" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570428" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570429" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570430" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570431" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570432" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570433" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570434" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570435" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570436" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570437" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570438" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570439" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570440" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570441" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570442" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570443" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570444" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570445" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570446" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570447" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570448" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570449" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570450" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570451" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570452" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570453" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570454" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570455" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570456" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570457" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570458" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570459" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570460" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570461" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570462" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570463" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570464" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570465" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570466" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570467" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570468" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570469" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570470" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.112.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570471" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.112.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570472" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570473" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570474" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.122.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570475" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.122.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570476" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.125.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570477" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.125.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570478" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.128.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570479" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.128.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570480" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570481" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.135.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570482" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570483" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.140.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570484" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570485" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570486" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570487" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.146.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570488" version="1" comment="LibVNCServer is &lt;0.9.1-159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570489" version="1" comment="LibVNCServer is &lt;0.9.1-160.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570490" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570491" version="1" comment="LibVNCServer is &lt;0.9.1-160.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570492" version="1" comment="LibVNCServer is &lt;0.9.1-160.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570493" version="1" comment="LibVNCServer is &lt;0.9.1-160.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570494" version="1" comment="LibVNCServer is &lt;0.9.1-160.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570495" version="1" comment="Mesa is &lt;7.7-5.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570496" version="1" comment="Mesa-32bit is &lt;7.7-5.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570497" version="1" comment="MozillaFirefox is &lt;10.0.5-0.3.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570498" version="1" comment="MozillaFirefox-translations is &lt;10.0.5-0.3.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570499" version="1" comment="libfreebl3 is &lt;3.13.5-0.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570500" version="1" comment="libfreebl3-32bit is &lt;3.13.5-0.4.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570501" version="1" comment="libfreebl3-x86 is &lt;3.13.5-0.4.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570502" version="1" comment="mozilla-nspr is &lt;4.9.1-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570503" version="1" comment="mozilla-nspr-32bit is &lt;4.9.1-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570504" version="1" comment="mozilla-nspr-x86 is &lt;4.9.1-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570505" version="1" comment="mozilla-nss is &lt;3.13.5-0.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570506" version="1" comment="mozilla-nss-32bit is &lt;3.13.5-0.4.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570507" version="1" comment="mozilla-nss-tools is &lt;3.13.5-0.4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570508" version="1" comment="mozilla-nss-x86 is &lt;3.13.5-0.4.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570509" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570510" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570511" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570512" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570513" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.24-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570514" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570515" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570516" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570517" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570518" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570519" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20.38 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570520" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570521" version="1" comment="firefox-fontconfig is &lt;2.11.0-4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570522" version="1" comment="libfreebl3 is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570523" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570524" version="1" comment="mozilla-nspr is &lt;4.12-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570525" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570526" version="1" comment="mozilla-nss is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570527" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570528" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570529" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570530" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570531" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570532" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570533" version="1" comment="MozillaFirefox is &lt;45.7.0esr-69.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570534" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-69.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570535" version="1" comment="MozillaFirefox is &lt;45.8.0esr-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570536" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570537" version="1" comment="MozillaFirefox is &lt;45.9.0esr-77.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570538" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-77.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570539" version="1" comment="libfreebl3 is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570540" version="1" comment="libfreebl3-32bit is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570541" version="1" comment="mozilla-nspr is &lt;4.13.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570542" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570543" version="1" comment="mozilla-nss is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570544" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570545" version="1" comment="mozilla-nss-tools is &lt;3.29.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570546" version="1" comment="MozillaFirefox is &lt;52.3.0esr-78.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570547" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-21.3.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570548" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-78.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570549" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570550" version="1" comment="firefox-libgcc_s1 is &lt;5.3.1+r233831-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570551" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570552" version="1" comment="MozillaFirefox is &lt;52.5.0esr-78.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570553" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-78.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570554" version="1" comment="MozillaFirefox is &lt;52.6.0esr-78.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570555" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-78.13.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570556" version="1" comment="MozillaFirefox is &lt;52.7.3esr-78.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570557" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-78.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570558" version="1" comment="MozillaFirefox is &lt;52.8.0esr-78.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570559" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-78.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570560" version="1" comment="MozillaFirefox is &lt;52.8.1esr-78.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570561" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-78.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570562" version="1" comment="MozillaFirefox is &lt;52.9.0esr-78.32.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570563" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-78.32.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570564" version="1" comment="MozillaFirefox is &lt;60.8.0esr-78.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570565" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0esr-78.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570566" version="1" comment="MozillaFirefox-translations-other is &lt;60.8.0esr-78.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570567" version="1" comment="MozillaFirefox is &lt;68.3.0-78.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570568" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-78.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570569" version="1" comment="MozillaFirefox-translations-other is &lt;68.3.0-78.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570570" version="1" comment="libfreebl3 is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570571" version="1" comment="libfreebl3-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570572" version="1" comment="libsoftokn3 is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570573" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570574" version="1" comment="mozilla-nspr is &lt;4.23-29.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570575" version="1" comment="mozilla-nspr-32bit is &lt;4.23-29.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570576" version="1" comment="mozilla-nss is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570577" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570578" version="1" comment="mozilla-nss-certs is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570579" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570580" version="1" comment="mozilla-nss-tools is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570581" version="1" comment="MozillaFirefox is &lt;68.4.1-78.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570582" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-78.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570583" version="1" comment="MozillaFirefox-translations-other is &lt;68.4.1-78.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570584" version="1" comment="MozillaFirefox is &lt;68.5.0-78.61.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570585" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-78.61.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570586" version="1" comment="MozillaFirefox-translations-other is &lt;68.5.0-78.61.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570587" version="1" comment="MozillaFirefox is &lt;68.6.0-78.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570588" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-78.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570589" version="1" comment="MozillaFirefox-translations-other is &lt;68.6.0-78.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570590" version="1" comment="MozillaFirefox is &lt;68.6.1-78.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570591" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-78.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570592" version="1" comment="MozillaFirefox-translations-other is &lt;68.6.1-78.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570593" version="1" comment="MozillaFirefox is &lt;68.7.0-78.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570594" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-78.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570595" version="1" comment="MozillaFirefox-translations-other is &lt;68.7.0-78.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570596" version="1" comment="MozillaFirefox is &lt;68.8.0-78.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570597" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-78.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570598" version="1" comment="MozillaFirefox-translations-other is &lt;68.8.0-78.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570599" version="1" comment="MozillaFirefox is &lt;68.9.0-78.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570600" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-78.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570601" version="1" comment="MozillaFirefox-translations-other is &lt;68.9.0-78.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570602" version="1" comment="MozillaFirefox is &lt;78.0.1-78.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570603" version="1" comment="MozillaFirefox-branding-SLED is &lt;78-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570604" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-78.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570605" version="1" comment="MozillaFirefox-translations-other is &lt;78.0.1-78.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570606" version="1" comment="MozillaFirefox is &lt;78.1.0-78.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570607" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-78.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570608" version="1" comment="MozillaFirefox-translations-other is &lt;78.1.0-78.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570609" version="1" comment="MozillaFirefox is &lt;78.2.0-78.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570610" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-78.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570611" version="1" comment="MozillaFirefox-translations-other is &lt;78.2.0-78.90.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570612" version="1" comment="MozillaFirefox is &lt;78.3.0-78.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570613" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-78.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570614" version="1" comment="MozillaFirefox-translations-other is &lt;78.3.0-78.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570615" version="1" comment="MozillaFirefox is &lt;78.4.0-78.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570616" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-78.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570617" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.0-78.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570618" version="1" comment="MozillaFirefox is &lt;78.4.1-78.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570619" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-78.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570620" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.1-78.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570621" version="1" comment="MozillaFirefox is &lt;78.5.0-78.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570622" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-78.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570623" version="1" comment="MozillaFirefox-translations-other is &lt;78.5.0-78.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570624" version="1" comment="MozillaFirefox is &lt;78.6.0-78.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570625" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-78.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570626" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.0-78.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570627" version="1" comment="MozillaFirefox is &lt;78.6.1-78.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570628" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-78.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570629" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.1-78.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570630" version="1" comment="MozillaFirefox is &lt;78.7.0-78.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570631" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-78.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570632" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.0-78.114.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570633" version="1" comment="MozillaFirefox is &lt;78.7.1-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570634" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.1-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570635" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.1-78.117.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570636" version="1" comment="MozillaFirefox is &lt;78.8.0-78.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570637" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-78.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570638" version="1" comment="MozillaFirefox-translations-other is &lt;78.8.0-78.120.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570639" version="1" comment="MozillaFirefox is &lt;78.9.0-78.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570640" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-78.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570641" version="1" comment="MozillaFirefox-translations-other is &lt;78.9.0-78.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570642" version="1" comment="MozillaFirefox is &lt;78.10.0-78.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570643" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-78.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570644" version="1" comment="MozillaFirefox-translations-other is &lt;78.10.0-78.126.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570645" version="1" comment="MozillaFirefox is &lt;78.11.0-78.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570646" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-78.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570647" version="1" comment="MozillaFirefox-translations-other is &lt;78.11.0-78.131.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625243" version="1" comment="MozillaFirefox is &lt;78.12.0-78.134.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625244" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-78.134.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625245" version="1" comment="MozillaFirefox-translations-other is &lt;78.12.0-78.134.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630646" version="1" comment="MozillaFirefox is &lt;78.13.0-78.137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630647" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-78.137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630648" version="1" comment="MozillaFirefox-translations-other is &lt;78.13.0-78.137.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634730" version="1" comment="MozillaFirefox is &lt;78.14.0-78.140.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634731" version="1" comment="MozillaFirefox-translations-common is &lt;78.14.0-78.140.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634732" version="1" comment="MozillaFirefox-translations-other is &lt;78.14.0-78.140.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654421" version="1" comment="MozillaFirefox is &lt;91.3.0-78.151.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654422" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-78.151.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654423" version="1" comment="MozillaFirefox-translations-other is &lt;91.3.0-78.151.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659367" version="1" comment="MozillaFirefox is &lt;91.4.0-78.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659368" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-78.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659369" version="1" comment="MozillaFirefox-translations-other is &lt;91.4.0-78.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663814" version="1" comment="MozillaFirefox is &lt;91.5.0-78.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663815" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-78.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663816" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-78.159.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663817" version="1" comment="libfreebl3 is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663818" version="1" comment="libfreebl3-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663819" version="1" comment="libsoftokn3 is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663820" version="1" comment="libsoftokn3-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663821" version="1" comment="mozilla-nss is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663822" version="1" comment="mozilla-nss-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663823" version="1" comment="mozilla-nss-certs is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663824" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663825" version="1" comment="mozilla-nss-tools is &lt;3.68.2-38.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668898" version="1" comment="MozillaFirefox is &lt;91.6.0-78.162.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668899" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-78.162.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668900" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-78.162.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672457" version="1" comment="MozillaFirefox is &lt;91.7.0-78.167.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672458" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-78.167.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672459" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-78.167.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570648" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570649" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.14 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570650" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570651" version="1" comment="libfreebl3 is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570652" version="1" comment="libfreebl3-32bit is &lt;3.16-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570653" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570654" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570655" version="1" comment="mozilla-nss is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570656" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570657" version="1" comment="mozilla-nss-tools is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570658" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570659" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570660" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652557" version="1" comment="MozillaFirefox is &lt;91.2.0-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652558" version="1" comment="MozillaFirefox-branding-SLED is &lt;91-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652559" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652560" version="1" comment="MozillaFirefox-translations-other is &lt;91.2.0-78.143.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570661" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.9.9.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570662" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.9.9.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570663" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.7.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570664" version="1" comment="wpa_supplicant is &lt;0.6.9-4.5.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570665" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.15.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570666" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570667" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570668" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570669" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570670" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570671" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570672" version="1" comment="OpenEXR is &lt;1.6.1-83.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570673" version="1" comment="OpenEXR is &lt;1.6.1-83.17.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570674" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570675" version="1" comment="OpenEXR is &lt;1.6.1-83.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570676" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570677" version="1" comment="OpenEXR is &lt;1.6.1-83.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570678" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570679" version="1" comment="OpenEXR is &lt;1.6.1-83.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570680" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570681" version="1" comment="OpenEXR is &lt;1.6.1-83.17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570682" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570683" version="1" comment="OpenEXR is &lt;1.6.1-83.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570684" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657133" version="1" comment="OpenEXR is &lt;1.6.1-83.17.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657134" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570685" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.9.20 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570686" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.9.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570687" version="1" comment="SDL is &lt;1.2.13-106.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570688" version="1" comment="SDL is &lt;1.2.13-106.14.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570689" version="1" comment="SDL-32bit is &lt;1.2.13-106.14.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679743" version="1" comment="SDL is &lt;1.2.13-106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679744" version="1" comment="SDL-32bit is &lt;1.2.13-106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570690" version="1" comment="SuSEfirewall2 is &lt;3.6_SVNr208-2.18.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570691" version="1" comment="libadns1 is &lt;1.4-75.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664250" version="1" comment="aide is &lt;0.13.1-40.16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570692" version="1" comment="amanda is &lt;2.5.2.1-188.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570693" version="1" comment="ant is &lt;1.7.0-200.26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570694" version="1" comment="ant-trax is &lt;1.7.0-200.26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570695" version="1" comment="apache2 is &lt;2.2.12-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570696" version="1" comment="apache2-doc is &lt;2.2.12-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570697" version="1" comment="apache2-example-pages is &lt;2.2.12-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570698" version="1" comment="apache2-prefork is &lt;2.2.12-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570699" version="1" comment="apache2-utils is &lt;2.2.12-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570700" version="1" comment="apache2-worker is &lt;2.2.12-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570701" version="1" comment="apache2 is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570702" version="1" comment="apache2-doc is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570703" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570704" version="1" comment="apache2-prefork is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570705" version="1" comment="apache2-utils is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570706" version="1" comment="apache2-worker is &lt;2.2.12-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570707" version="1" comment="apache2 is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570708" version="1" comment="apache2-doc is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570709" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570710" version="1" comment="apache2-prefork is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570711" version="1" comment="apache2-utils is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570712" version="1" comment="apache2-worker is &lt;2.2.12-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570713" version="1" comment="apache2 is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570714" version="1" comment="apache2-doc is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570715" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570716" version="1" comment="apache2-prefork is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570717" version="1" comment="apache2-utils is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570718" version="1" comment="apache2-worker is &lt;2.2.12-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570719" version="1" comment="apache2 is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570720" version="1" comment="apache2-doc is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570721" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570722" version="1" comment="apache2-prefork is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570723" version="1" comment="apache2-utils is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570724" version="1" comment="apache2-worker is &lt;2.2.34-70.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570725" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570726" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570727" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570728" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570729" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570730" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570731" version="1" comment="apache2 is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570732" version="1" comment="apache2-doc is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570733" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570734" version="1" comment="apache2-prefork is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570735" version="1" comment="apache2-utils is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570736" version="1" comment="apache2-worker is &lt;2.2.34-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570737" version="1" comment="apache2 is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570738" version="1" comment="apache2-doc is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570739" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570740" version="1" comment="apache2-prefork is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570741" version="1" comment="apache2-utils is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570742" version="1" comment="apache2-worker is &lt;2.2.34-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570743" version="1" comment="apache2 is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570744" version="1" comment="apache2-doc is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570745" version="1" comment="apache2-example-pages is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570746" version="1" comment="apache2-prefork is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570747" version="1" comment="apache2-utils is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570748" version="1" comment="apache2-worker is &lt;2.2.34-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570749" version="1" comment="apache2 is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570750" version="1" comment="apache2-doc is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570751" version="1" comment="apache2-example-pages is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570752" version="1" comment="apache2-prefork is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570753" version="1" comment="apache2-utils is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570754" version="1" comment="apache2-worker is &lt;2.2.34-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570755" version="1" comment="apache2 is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570756" version="1" comment="apache2-doc is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570757" version="1" comment="apache2-example-pages is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570758" version="1" comment="apache2-prefork is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570759" version="1" comment="apache2-utils is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570760" version="1" comment="apache2-worker is &lt;2.2.34-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570761" version="1" comment="apache2 is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570762" version="1" comment="apache2-doc is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570763" version="1" comment="apache2-example-pages is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570764" version="1" comment="apache2-prefork is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570765" version="1" comment="apache2-utils is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570766" version="1" comment="apache2-worker is &lt;2.2.34-70.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633944" version="1" comment="apache2 is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633945" version="1" comment="apache2-doc is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633946" version="1" comment="apache2-example-pages is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633947" version="1" comment="apache2-prefork is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633948" version="1" comment="apache2-utils is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633949" version="1" comment="apache2-worker is &lt;2.2.34-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673620" version="1" comment="apache2 is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673621" version="1" comment="apache2-doc is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673622" version="1" comment="apache2-example-pages is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673623" version="1" comment="apache2-prefork is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673624" version="1" comment="apache2-utils is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673625" version="1" comment="apache2-worker is &lt;2.2.34-70.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570767" version="1" comment="apache2 is &lt;2.2.12-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570768" version="1" comment="apache2-doc is &lt;2.2.12-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570769" version="1" comment="apache2-example-pages is &lt;2.2.12-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570770" version="1" comment="apache2-prefork is &lt;2.2.12-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570771" version="1" comment="apache2-utils is &lt;2.2.12-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570772" version="1" comment="apache2-worker is &lt;2.2.12-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570773" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570774" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570775" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570776" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570777" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.63.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570778" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570779" version="1" comment="php5 is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570780" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570781" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570782" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570783" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570784" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570785" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570786" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570787" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570788" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570789" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570790" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570791" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570792" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570793" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570794" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570795" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570796" version="1" comment="php5-json is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570797" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570798" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570799" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570800" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570801" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570802" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570803" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570804" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570805" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570806" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570807" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570808" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570809" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570810" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570811" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570812" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570813" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570814" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570815" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570816" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570817" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570818" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570819" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570820" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570821" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570822" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570823" version="1" comment="apache2-mod_python is &lt;3.3.1-147.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570824" version="1" comment="apport is &lt;0.114-12.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570825" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570826" version="1" comment="apport-gtk is &lt;0.114-12.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570827" version="1" comment="apport is &lt;0.114-12.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570828" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570829" version="1" comment="apport-gtk is &lt;0.114-12.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570830" version="1" comment="apport is &lt;0.114-12.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570831" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570832" version="1" comment="apport-gtk is &lt;0.114-12.8.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570833" version="1" comment="ark is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570834" version="1" comment="kcalc is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570835" version="1" comment="kcharselect is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570836" version="1" comment="kdessh is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570837" version="1" comment="kdf is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570838" version="1" comment="kfloppy is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570839" version="1" comment="kgpg is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570840" version="1" comment="ktimer is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570841" version="1" comment="kwalletmanager is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570842" version="1" comment="kwikdisk is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570843" version="1" comment="okteta is &lt;4.3.5-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570844" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616451" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570845" version="1" comment="aspell is &lt;0.60.6-26.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570846" version="1" comment="aspell-32bit is &lt;0.60.6-26.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570847" version="1" comment="aspell-ispell is &lt;0.60.6-26.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570848" version="1" comment="aspell is &lt;0.60.6-26.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570849" version="1" comment="aspell-32bit is &lt;0.60.6-26.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570850" version="1" comment="aspell-ispell is &lt;0.60.6-26.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627833" version="1" comment="aspell is &lt;0.60.6-26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627834" version="1" comment="aspell-32bit is &lt;0.60.6-26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627835" version="1" comment="aspell-ispell is &lt;0.60.6-26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570851" version="1" comment="atftp is &lt;0.7.0-135.16.16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633873" version="1" comment="atftp is &lt;0.7.0-135.16.16.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667670" version="1" comment="atftp is &lt;0.7.0-135.16.16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570852" version="1" comment="audiofile is &lt;0.2.6-142.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570853" version="1" comment="audiofile-32bit is &lt;0.2.6-142.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570854" version="1" comment="augeas is &lt;0.8.1-7.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570855" version="1" comment="augeas-lenses is &lt;0.8.1-7.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570856" version="1" comment="libaugeas0 is &lt;0.8.1-7.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570857" version="1" comment="augeas is &lt;0.8.1-7.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570858" version="1" comment="augeas-lenses is &lt;0.8.1-7.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570859" version="1" comment="libaugeas0 is &lt;0.8.1-7.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570860" version="1" comment="automake is &lt;1.10.1-4.131.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570861" version="1" comment="avahi is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570862" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570863" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570864" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570865" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570866" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570867" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570868" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570869" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570870" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570871" version="1" comment="avahi is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570872" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570873" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570874" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570875" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570876" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570877" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570878" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570879" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570880" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.6.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570881" version="1" comment="avahi is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570882" version="1" comment="avahi-lang is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570883" version="1" comment="avahi-utils is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570884" version="1" comment="libavahi-client3 is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570885" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570886" version="1" comment="libavahi-common3 is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570887" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570888" version="1" comment="libavahi-core5 is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570889" version="1" comment="libdns_sd is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570890" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.25.25.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570891" version="1" comment="axis is &lt;1.4-236.38.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570892" version="1" comment="axis is &lt;1.4-236.38.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570893" version="1" comment="bash is &lt;3.2-147.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570894" version="1" comment="bash-doc is &lt;3.2-147.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570895" version="1" comment="bash-x86 is &lt;3.2-147.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570896" version="1" comment="libreadline5 is &lt;5.2-147.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570897" version="1" comment="libreadline5-32bit is &lt;5.2-147.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570898" version="1" comment="libreadline5-x86 is &lt;5.2-147.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570899" version="1" comment="readline-doc is &lt;5.2-147.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570900" version="1" comment="bash is &lt;3.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570901" version="1" comment="bash-doc is &lt;3.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570902" version="1" comment="libreadline5 is &lt;5.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570903" version="1" comment="libreadline5-32bit is &lt;5.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570904" version="1" comment="readline-doc is &lt;5.2-148.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570905" version="1" comment="bind is &lt;9.6ESVR7P2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570906" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570907" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570908" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570909" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570910" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570911" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570912" version="1" comment="bind is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570913" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570914" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570915" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570916" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570917" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570918" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570919" version="1" comment="bind is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570920" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570921" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570922" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570923" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570924" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570925" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570926" version="1" comment="bind is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570927" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570928" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570929" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570930" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570931" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570932" version="1" comment="bind is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570933" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570934" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570935" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570936" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570937" version="1" comment="bind is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570938" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570939" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570940" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570941" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570942" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570943" version="1" comment="bind is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570944" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570945" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570946" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570947" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570948" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570949" version="1" comment="bind is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570950" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570951" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570952" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570953" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570954" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570955" version="1" comment="bind is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570956" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570957" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570958" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570959" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570960" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570961" version="1" comment="bind is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570962" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570963" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570964" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570965" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570966" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570967" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570968" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570969" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570970" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570971" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570972" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570973" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570974" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570975" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570976" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570977" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570978" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570979" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570980" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570981" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570982" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570983" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570984" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570985" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570986" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570987" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570988" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570989" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570990" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570991" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570992" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570993" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570994" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570995" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570996" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654149" version="1" comment="bind is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654150" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654151" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654152" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654153" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654154" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.31.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570997" version="1" comment="bluez is &lt;4.51-1.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570998" version="1" comment="libbluetooth3 is &lt;4.51-1.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009570999" version="1" comment="boost-license is &lt;1.36.0-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571000" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571001" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571002" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571003" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571004" version="1" comment="libarchive2 is &lt;2.5.5-10.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571005" version="1" comment="mono-core is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571006" version="1" comment="mono-data is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571007" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571008" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571009" version="1" comment="mono-locale-extras is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571010" version="1" comment="mono-nunit is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571011" version="1" comment="mono-web is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571012" version="1" comment="mono-winforms is &lt;2.0.1-1.34.1 for i586,ia64,ppc,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571013" version="1" comment="bzip2 is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571014" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571015" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571016" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571017" version="1" comment="bzip2 is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571018" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571019" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571020" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571021" version="1" comment="cairo is &lt;1.8.8-2.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571022" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571023" version="1" comment="cairo-doc is &lt;1.8.8-2.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633398" version="1" comment="cairo is &lt;1.8.8-2.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633399" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633400" version="1" comment="cairo-doc is &lt;1.8.8-2.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571024" version="1" comment="clamav is &lt;0.97.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571025" version="1" comment="clamav is &lt;0.99.2-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571026" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571027" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571028" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571029" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571030" version="1" comment="clamav is &lt;0.100.3-0.20.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571031" version="1" comment="clamav is &lt;0.100.3-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571032" version="1" comment="clamav is &lt;0.100.3-0.20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571033" version="1" comment="clamav is &lt;0.103.0-0.20.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571034" version="1" comment="clamav is &lt;0.103.2-0.20.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657135" version="1" comment="clamav is &lt;0.103.4-0.20.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657136" version="1" comment="clamav-openssl1 is &lt;0.103.4-0.20.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664013" version="1" comment="clamav is &lt;0.103.5-0.20.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664014" version="1" comment="clamav-openssl1 is &lt;0.103.5-0.20.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571035" version="1" comment="coreutils is &lt;6.12-32.41.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571036" version="1" comment="coreutils-lang is &lt;6.12-32.41.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571037" version="1" comment="cpio is &lt;2.9-75.81.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571038" version="1" comment="cpio-lang is &lt;2.9-75.81.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630756" version="1" comment="cpio is &lt;2.9-75.81.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630757" version="1" comment="cpio-lang is &lt;2.9-75.81.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631548" version="1" comment="cpio is &lt;2.9-75.81.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631549" version="1" comment="cpio-lang is &lt;2.9-75.81.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571039" version="1" comment="cracklib is &lt;2.8.12-56.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571040" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571041" version="1" comment="cron is &lt;4.1-194.211.213.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571042" version="1" comment="ctags is &lt;2013.10.2-0.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571043" version="1" comment="cups is &lt;1.3.9-8.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571044" version="1" comment="cups-client is &lt;1.3.9-8.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571045" version="1" comment="cups-libs is &lt;1.3.9-8.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571046" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571047" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571048" version="1" comment="cups is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571049" version="1" comment="cups-client is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571050" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571051" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571052" version="1" comment="cups is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571053" version="1" comment="cups-client is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571054" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571055" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571056" version="1" comment="cups is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571057" version="1" comment="cups-client is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571058" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571059" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571060" version="1" comment="cups is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571061" version="1" comment="cups-client is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571062" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571063" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571064" version="1" comment="cups is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571065" version="1" comment="cups-client is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571066" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571067" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571068" version="1" comment="curl is &lt;7.19.7-1.20.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571069" version="1" comment="libcurl4 is &lt;7.19.7-1.20.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571070" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571071" version="1" comment="curl is &lt;7.19.7-1.20.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571072" version="1" comment="libcurl4 is &lt;7.19.7-1.20.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571073" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571074" version="1" comment="curl is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571075" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571076" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571077" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571078" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571079" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571080" version="1" comment="curl is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571081" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571082" version="1" comment="libcurl4 is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571083" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571084" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571085" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571086" version="1" comment="curl is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571087" version="1" comment="curl-openssl1 is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571088" version="1" comment="libcurl4 is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571089" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571090" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571091" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571092" version="1" comment="curl is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571093" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571094" version="1" comment="libcurl4 is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571095" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571096" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571097" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571098" version="1" comment="curl is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571099" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571100" version="1" comment="libcurl4 is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571101" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571102" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571103" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571104" version="1" comment="curl is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571105" version="1" comment="curl-openssl1 is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571106" version="1" comment="libcurl4 is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571107" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571108" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571109" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.70.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571110" version="1" comment="curl is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571111" version="1" comment="curl-openssl1 is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571112" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571113" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571114" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571115" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571116" version="1" comment="curl is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571117" version="1" comment="curl-openssl1 is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571118" version="1" comment="libcurl4 is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571119" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571120" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571121" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571122" version="1" comment="curl is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571123" version="1" comment="curl-openssl1 is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571124" version="1" comment="libcurl4 is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571125" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571126" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571127" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571128" version="1" comment="curl is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571129" version="1" comment="curl-openssl1 is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571130" version="1" comment="libcurl4 is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571131" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571132" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571133" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571134" version="1" comment="curl is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571135" version="1" comment="curl-openssl1 is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571136" version="1" comment="libcurl4 is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571137" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571138" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571139" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571140" version="1" comment="curl is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571141" version="1" comment="curl-openssl1 is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571142" version="1" comment="libcurl4 is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571143" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571144" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571145" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571146" version="1" comment="curl is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571147" version="1" comment="curl-openssl1 is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571148" version="1" comment="libcurl4 is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571149" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571150" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571151" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571152" version="1" comment="curl is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571153" version="1" comment="curl-openssl1 is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571154" version="1" comment="libcurl4 is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571155" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571156" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571157" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571158" version="1" comment="curl is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571159" version="1" comment="curl-openssl1 is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571160" version="1" comment="libcurl4 is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571161" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571162" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571163" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571164" version="1" comment="curl is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571165" version="1" comment="curl-openssl1 is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571166" version="1" comment="libcurl4 is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571167" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571168" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571169" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571170" version="1" comment="curl is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571171" version="1" comment="curl-openssl1 is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571172" version="1" comment="libcurl4 is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571173" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571174" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571175" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571176" version="1" comment="curl is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571177" version="1" comment="curl-openssl1 is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571178" version="1" comment="libcurl4 is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571179" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571180" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571181" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626169" version="1" comment="curl is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626170" version="1" comment="curl-openssl1 is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626171" version="1" comment="libcurl4 is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626172" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626173" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626174" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633950" version="1" comment="curl is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633951" version="1" comment="curl-openssl1 is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633952" version="1" comment="libcurl4 is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633953" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633954" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633955" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571182" version="1" comment="cvs is &lt;1.12.12-144.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571183" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571184" version="1" comment="cvs is &lt;1.12.12-144.23.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571185" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571186" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571187" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571188" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571189" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571190" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571191" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571192" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.71.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571193" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.71.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571194" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.71.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632634" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.71.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632635" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.71.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632636" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.71.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571195" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571196" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571197" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571198" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571199" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571200" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571201" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571202" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571203" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571204" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571205" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571206" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571207" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571208" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571209" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571210" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571211" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571212" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571213" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571214" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571215" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571216" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571217" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571218" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669459" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669460" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669461" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669462" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669463" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669464" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669465" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669466" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669467" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669468" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669469" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669470" version="1" comment="cyrus-sasl-openssl1 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669471" version="1" comment="cyrus-sasl-openssl1-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669472" version="1" comment="cyrus-sasl-openssl1-crammd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669473" version="1" comment="cyrus-sasl-openssl1-crammd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669474" version="1" comment="cyrus-sasl-openssl1-digestmd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669475" version="1" comment="cyrus-sasl-openssl1-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669476" version="1" comment="cyrus-sasl-openssl1-gssapi is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669477" version="1" comment="cyrus-sasl-openssl1-gssapi-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669478" version="1" comment="cyrus-sasl-openssl1-ntlm is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669479" version="1" comment="cyrus-sasl-openssl1-otp is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669480" version="1" comment="cyrus-sasl-openssl1-otp-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669481" version="1" comment="cyrus-sasl-openssl1-plain is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669482" version="1" comment="cyrus-sasl-openssl1-plain-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571219" version="1" comment="dbus-1 is &lt;1.2.10-3.34.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571220" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.34.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571221" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571222" version="1" comment="dhcp is &lt;3.1.3.ESV-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571223" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571224" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571225" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571226" version="1" comment="dhcp is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571227" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571228" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571229" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571230" version="1" comment="dhcp is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571231" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571232" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571233" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571234" version="1" comment="dhcp is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571235" version="1" comment="dhcp-client is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571236" version="1" comment="dhcp-relay is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571237" version="1" comment="dhcp-server is &lt;3.1.3.ESV-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571238" version="1" comment="dhcpcd is &lt;3.2.3-44.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571239" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571240" version="1" comment="dhcpv6 is &lt;1.0.22-3.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571241" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571242" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571243" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571244" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624088" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627836" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571245" version="1" comment="dnsmasq is &lt;2.45-12.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571246" version="1" comment="dnsmasq is &lt;2.45-12.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571247" version="1" comment="e2fsprogs is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571248" version="1" comment="libblkid1 is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571249" version="1" comment="libcom_err2 is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571250" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571251" version="1" comment="libext2fs2 is &lt;1.41.9-2.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571252" version="1" comment="libuuid1 is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571253" version="1" comment="libuuid1-32bit is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571254" version="1" comment="uuid-runtime is &lt;2.16-6.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571255" version="1" comment="e2fsprogs is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571256" version="1" comment="libcom_err2 is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571257" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571258" version="1" comment="libext2fs2 is &lt;1.41.9-2.6.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571259" version="1" comment="ecryptfs-utils is &lt;61-1.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571260" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571261" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571262" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571263" version="1" comment="ed is &lt;0.2-1001.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571264" version="1" comment="ed is &lt;0.2-1001.30.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430164" version="1" comment="elfutils is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430165" version="1" comment="libasm1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430166" version="1" comment="libasm1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430167" version="1" comment="libdw1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430168" version="1" comment="libdw1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430169" version="1" comment="libebl1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430170" version="1" comment="libebl1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430171" version="1" comment="libelf1 is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009430172" version="1" comment="libelf1-32bit is &lt;0.137-8.24.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009099347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571265" version="1" comment="elfutils is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571266" version="1" comment="libasm1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571267" version="1" comment="libasm1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571268" version="1" comment="libdw1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571269" version="1" comment="libdw1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571270" version="1" comment="libebl1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571271" version="1" comment="libebl1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571272" version="1" comment="libelf1 is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571273" version="1" comment="libelf1-32bit is &lt;0.137-8.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571274" version="1" comment="emacs is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571275" version="1" comment="emacs-el is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571276" version="1" comment="emacs-info is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571277" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571278" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571279" version="1" comment="evince is &lt;2.28.2-0.7.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571280" version="1" comment="evince-doc is &lt;2.28.2-0.7.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571281" version="1" comment="evince-lang is &lt;2.28.2-0.7.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571282" version="1" comment="evince is &lt;2.28.2-0.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571283" version="1" comment="evince-doc is &lt;2.28.2-0.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571284" version="1" comment="evince-lang is &lt;2.28.2-0.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571285" version="1" comment="evince is &lt;2.28.2-0.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571286" version="1" comment="evince-doc is &lt;2.28.2-0.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571287" version="1" comment="evince-lang is &lt;2.28.2-0.7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571288" version="1" comment="libexempi3 is &lt;2.0.2-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571289" version="1" comment="expat is &lt;2.0.1-88.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571290" version="1" comment="libexpat1 is &lt;2.0.1-88.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571291" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571292" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571293" version="1" comment="expat is &lt;2.0.1-88.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571294" version="1" comment="libexpat1 is &lt;2.0.1-88.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571295" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571296" version="1" comment="expat is &lt;2.0.1-88.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571297" version="1" comment="libexpat1 is &lt;2.0.1-88.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571298" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571299" version="1" comment="expat is &lt;2.0.1-88.42.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571300" version="1" comment="libexpat1 is &lt;2.0.1-88.42.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571301" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571302" version="1" comment="expat is &lt;2.0.1-88.42.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571303" version="1" comment="libexpat1 is &lt;2.0.1-88.42.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571304" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571305" version="1" comment="expat is &lt;2.0.1-88.42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571306" version="1" comment="libexpat1 is &lt;2.0.1-88.42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571307" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664120" version="1" comment="expat is &lt;2.0.1-88.42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664121" version="1" comment="libexpat1 is &lt;2.0.1-88.42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664122" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666458" version="1" comment="expat is &lt;2.0.1-88.42.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666459" version="1" comment="libexpat1 is &lt;2.0.1-88.42.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666460" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669483" version="1" comment="expat is &lt;2.0.1-88.42.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669484" version="1" comment="libexpat1 is &lt;2.0.1-88.42.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669485" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671290" version="1" comment="expat is &lt;2.0.1-88.42.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671291" version="1" comment="libexpat1 is &lt;2.0.1-88.42.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671292" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571308" version="1" comment="facter is &lt;1.6.18-0.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571309" version="1" comment="fastjar is &lt;0.95-1.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571310" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571311" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627042" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627043" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571312" version="1" comment="file-roller is &lt;2.28.2-0.3.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571313" version="1" comment="file-roller-lang is &lt;2.28.2-0.3.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571314" version="1" comment="MozillaFirefox is &lt;10.0-0.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571315" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571316" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571317" version="1" comment="mozilla-kde4-integration is &lt;0.6.3-5.6.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571318" version="1" comment="MozillaFirefox is &lt;10.0.4-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571319" version="1" comment="MozillaFirefox-translations is &lt;10.0.4-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571320" version="1" comment="libfreebl3 is &lt;3.13.4-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571321" version="1" comment="libfreebl3-32bit is &lt;3.13.4-0.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571322" version="1" comment="libfreebl3-x86 is &lt;3.13.4-0.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571323" version="1" comment="mozilla-nss is &lt;3.13.4-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571324" version="1" comment="mozilla-nss-32bit is &lt;3.13.4-0.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571325" version="1" comment="mozilla-nss-tools is &lt;3.13.4-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571326" version="1" comment="mozilla-nss-x86 is &lt;3.13.4-0.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571327" version="1" comment="MozillaFirefox is &lt;10.0.6-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571328" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.70 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571329" version="1" comment="MozillaFirefox-translations is &lt;10.0.6-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571330" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571331" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571332" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571333" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571334" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571335" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571336" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571337" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571338" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571339" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571340" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571341" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571342" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571343" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571344" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571345" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571346" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571347" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571348" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571349" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571350" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571351" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571352" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590759" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590760" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590761" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571356" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571357" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590762" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590325" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590763" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590326" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590764" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571363" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571364" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571365" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571366" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571367" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571368" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571369" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571370" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571371" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571372" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571373" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.20 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571374" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571375" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571376" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571377" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571378" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571379" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571380" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571381" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571382" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571383" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571384" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571385" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571386" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.60 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571387" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592823" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592824" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592825" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571391" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571392" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571393" version="1" comment="libfreebl3 is &lt;3.15.4-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571394" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571395" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571396" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571397" version="1" comment="mozilla-nss is &lt;3.15.4-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571398" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571399" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571400" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571401" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571402" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571403" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571404" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571405" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571406" version="1" comment="libfreebl3 is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571407" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571408" version="1" comment="mozilla-nss is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571409" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571410" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571411" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571412" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571413" version="1" comment="libfreebl3 is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571414" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571415" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571416" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571417" version="1" comment="mozilla-nss is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571418" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571419" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571420" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571421" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571422" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571423" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571424" version="1" comment="libfreebl3 is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571425" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571426" version="1" comment="mozilla-nss is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571427" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571428" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571429" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571430" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571431" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571432" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571433" version="1" comment="MozillaFirefox is &lt;38.2.1esr-17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571434" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571435" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571436" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571437" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571438" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571439" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571440" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571441" version="1" comment="libfreebl3 is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571442" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571443" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571444" version="1" comment="mozilla-nss is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571445" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571446" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571447" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571448" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571449" version="1" comment="libfreebl3 is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571450" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571451" version="1" comment="mozilla-nspr is &lt;4.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571452" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571453" version="1" comment="mozilla-nss is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571454" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571455" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571456" version="1" comment="MozillaFirefox is &lt;52.4.0esr-78.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571457" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-78.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571458" version="1" comment="libfreebl3 is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571459" version="1" comment="libfreebl3-32bit is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571460" version="1" comment="mozilla-nss is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571461" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571462" version="1" comment="mozilla-nss-tools is &lt;3.29.5-38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571463" version="1" comment="MozillaFirefox is &lt;60.9.0esr-78.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571464" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0esr-78.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571465" version="1" comment="MozillaFirefox-translations-other is &lt;60.9.0esr-78.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571466" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571467" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571468" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571469" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571470" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571471" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571472" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571473" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571474" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571475" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571476" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571477" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571478" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571479" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571480" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571481" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571482" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571483" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571484" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571485" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571486" version="1" comment="MozillaFirefox is &lt;68.2.0-78.51.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571487" version="1" comment="MozillaFirefox-branding-SLED is &lt;68-21.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571488" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-78.51.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571489" version="1" comment="MozillaFirefox-translations-other is &lt;68.2.0-78.51.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571490" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571491" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571492" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571493" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571494" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571495" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571496" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571497" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571498" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571499" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571500" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571501" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571502" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571503" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571504" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571505" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571506" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571507" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571508" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571509" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571510" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571511" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571512" version="1" comment="firefox-libffi7 is &lt;3.2.1.git259-2.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571513" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.8.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571514" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571515" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571516" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571517" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571518" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571519" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571520" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571521" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.14.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571522" version="1" comment="libfreebl3 is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571523" version="1" comment="libfreebl3-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571524" version="1" comment="libsoftokn3 is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571525" version="1" comment="libsoftokn3-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571526" version="1" comment="mozilla-nspr is &lt;4.21-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571527" version="1" comment="mozilla-nspr-32bit is &lt;4.21-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571528" version="1" comment="mozilla-nss is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571529" version="1" comment="mozilla-nss-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571530" version="1" comment="mozilla-nss-certs is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571531" version="1" comment="mozilla-nss-certs-32bit is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571532" version="1" comment="mozilla-nss-tools is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571533" version="1" comment="MozillaFirefox is &lt;60.7.0esr-78.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571534" version="1" comment="MozillaFirefox-branding-SLED is &lt;60-21.6.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571535" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0esr-78.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571536" version="1" comment="MozillaFirefox-translations-other is &lt;60.7.0esr-78.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571537" version="1" comment="firefox-at-spi2-core is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571538" version="1" comment="firefox-at-spi2-core-lang is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571539" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571540" version="1" comment="firefox-dbus-1-glib is &lt;0.76-34.2.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571541" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571542" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571543" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571544" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571545" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571546" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571547" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571548" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571549" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571550" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571551" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571552" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571553" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571554" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571555" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571556" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571557" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571558" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571559" version="1" comment="firefox-libatk-bridge-2_0-0 is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571560" version="1" comment="firefox-libatspi0 is &lt;2.10.2-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571561" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.8.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571562" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.8.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571563" version="1" comment="firefox-libfreetype6 is &lt;2.9-2.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571564" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571565" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571566" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571567" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571568" version="1" comment="firefox-libpixman-1-0 is &lt;0.34.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571569" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571570" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571571" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571572" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571573" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571574" version="1" comment="libfreebl3 is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571575" version="1" comment="libfreebl3-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571576" version="1" comment="libsoftokn3 is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571577" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571578" version="1" comment="mozilla-nspr is &lt;4.20-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571579" version="1" comment="mozilla-nspr-32bit is &lt;4.20-29.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571580" version="1" comment="mozilla-nss is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571581" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571582" version="1" comment="mozilla-nss-certs is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571583" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571584" version="1" comment="mozilla-nss-tools is &lt;3.41.1-38.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571585" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.11.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571586" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571587" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.11.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571588" version="1" comment="libfreebl3 is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571589" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571590" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571591" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571592" version="1" comment="mozilla-nss is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571593" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571594" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571595" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571596" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671852" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671853" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671854" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571597" version="1" comment="foomatic-filters is &lt;3.0.2-269.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571598" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571599" version="1" comment="freeradius-server is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571600" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571601" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571602" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571603" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571604" version="1" comment="freeradius-server is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571605" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571606" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571607" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571608" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571609" version="1" comment="freeradius-server is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571610" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571611" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571612" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571613" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571614" version="1" comment="freetype2 is &lt;2.3.7-25.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571615" version="1" comment="freetype2-32bit is &lt;2.3.7-25.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571616" version="1" comment="freetype2-x86 is &lt;2.3.7-25.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571617" version="1" comment="ft2demos is &lt;2.3.7-25.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571618" version="1" comment="freetype2 is &lt;2.3.7-25.41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571619" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571620" version="1" comment="ft2demos is &lt;2.3.7-25.41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571621" version="1" comment="freetype2 is &lt;2.3.7-25.45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571622" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571623" version="1" comment="ft2demos is &lt;2.3.7-25.45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571624" version="1" comment="freetype2 is &lt;2.3.7-25.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571625" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571626" version="1" comment="ft2demos is &lt;2.3.7-25.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571627" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571628" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571629" version="1" comment="fuse is &lt;2.7.2-61.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571630" version="1" comment="libfuse2 is &lt;2.7.2-61.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571631" version="1" comment="cpp43 is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571632" version="1" comment="gcc43 is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571633" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571634" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571635" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571636" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571637" version="1" comment="gcc43-info is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571638" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571639" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571640" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571641" version="1" comment="libstdc++43-doc is &lt;4.3.4_20091019-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571642" version="1" comment="cpp43 is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571643" version="1" comment="gcc43 is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571644" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571645" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571646" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571647" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571648" version="1" comment="gcc43-info is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571649" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571650" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571651" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571652" version="1" comment="libstdc++43-doc is &lt;4.3.4_20091019-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571653" version="1" comment="cpp48 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571654" version="1" comment="gcc48 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571655" version="1" comment="gcc48-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571656" version="1" comment="gcc48-c++ is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571657" version="1" comment="gcc48-fortran is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571658" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571659" version="1" comment="gcc48-info is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571660" version="1" comment="gcc48-locale is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571661" version="1" comment="libasan0 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571662" version="1" comment="libasan0-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571663" version="1" comment="libatomic1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571664" version="1" comment="libatomic1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571665" version="1" comment="libgcc_s1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571666" version="1" comment="libgcc_s1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571667" version="1" comment="libgfortran3 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571668" version="1" comment="libgfortran3-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571669" version="1" comment="libgomp1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571670" version="1" comment="libgomp1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571671" version="1" comment="libitm1 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571672" version="1" comment="libitm1-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571673" version="1" comment="libmpfr4 is &lt;3.1.2-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571674" version="1" comment="libquadmath0 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571675" version="1" comment="libquadmath0-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571676" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571677" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571678" version="1" comment="libstdc++6 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571679" version="1" comment="libstdc++6-32bit is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571680" version="1" comment="libtsan0 is &lt;4.8.5-5.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678381" version="1" comment="cpp48 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678382" version="1" comment="gcc48 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678383" version="1" comment="gcc48-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678384" version="1" comment="gcc48-c++ is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678385" version="1" comment="gcc48-fortran is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678386" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678387" version="1" comment="gcc48-info is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678388" version="1" comment="gcc48-locale is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678389" version="1" comment="libasan0 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678390" version="1" comment="libasan0-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678391" version="1" comment="libatomic1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678392" version="1" comment="libatomic1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678393" version="1" comment="libgcc_s1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678394" version="1" comment="libgcc_s1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678395" version="1" comment="libgfortran3 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678396" version="1" comment="libgfortran3-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678397" version="1" comment="libgomp1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678398" version="1" comment="libgomp1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678399" version="1" comment="libitm1 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678400" version="1" comment="libitm1-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678401" version="1" comment="libquadmath0 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678402" version="1" comment="libquadmath0-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678403" version="1" comment="libstdc++48-devel is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678404" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678405" version="1" comment="libstdc++6 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678406" version="1" comment="libstdc++6-32bit is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678407" version="1" comment="libtsan0 is &lt;4.8.5-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571681" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571682" version="1" comment="gd is &lt;2.0.36.RC1-52.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571683" version="1" comment="gd is &lt;2.0.36.RC1-52.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571684" version="1" comment="gd is &lt;2.0.36.RC1-52.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571685" version="1" comment="gd is &lt;2.0.36.RC1-52.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571686" version="1" comment="gd is &lt;2.0.36.RC1-52.33.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571687" version="1" comment="gd is &lt;2.0.36.RC1-52.33.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571688" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571689" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571690" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571691" version="1" comment="ghostscript-library is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571692" version="1" comment="ghostscript-omni is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571693" version="1" comment="ghostscript-x11 is &lt;8.62-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571694" version="1" comment="libgimpprint is &lt;4.2.7-32.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571695" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571696" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571697" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571698" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571699" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571700" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571701" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571702" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571703" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571704" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571705" version="1" comment="ghostscript-library is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571706" version="1" comment="ghostscript-omni is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571707" version="1" comment="ghostscript-x11 is &lt;8.62-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571708" version="1" comment="libgimpprint is &lt;4.2.7-32.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571709" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571710" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571711" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571712" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571713" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571714" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571715" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571716" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571717" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571718" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571719" version="1" comment="ghostscript-library is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571720" version="1" comment="ghostscript-omni is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571721" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571722" version="1" comment="libgimpprint is &lt;4.2.7-32.47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571723" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571724" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571725" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571726" version="1" comment="ghostscript-library is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571727" version="1" comment="ghostscript-omni is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571728" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571729" version="1" comment="libgimpprint is &lt;4.2.7-32.47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571730" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571731" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571732" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571733" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571734" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571735" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571736" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571737" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571738" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571739" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571740" version="1" comment="ghostscript-library is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571741" version="1" comment="ghostscript-omni is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571742" version="1" comment="ghostscript-x11 is &lt;8.62-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571743" version="1" comment="libgimpprint is &lt;4.2.7-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571744" version="1" comment="giflib is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571745" version="1" comment="giflib-progs is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571746" version="1" comment="giflib is &lt;4.1.6-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571747" version="1" comment="giflib-32bit is &lt;4.1.6-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571748" version="1" comment="giflib-progs is &lt;4.1.6-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571749" version="1" comment="glib2 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571750" version="1" comment="glib2-doc is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571751" version="1" comment="glib2-lang is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571752" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571753" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571754" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571755" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571756" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571757" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571758" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571759" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571760" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571761" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571762" version="1" comment="glib2 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571763" version="1" comment="glib2-doc is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571764" version="1" comment="glib2-lang is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571765" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571766" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571767" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571768" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571769" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571770" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571771" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571772" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571773" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571774" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672765" version="1" comment="glib2 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672766" version="1" comment="glib2-doc is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672767" version="1" comment="glib2-lang is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672768" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672769" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672770" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672771" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672772" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672773" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672774" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672775" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672776" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672777" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571775" version="1" comment="glibc is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571776" version="1" comment="glibc-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571777" version="1" comment="glibc-devel is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571778" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571779" version="1" comment="glibc-html is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571780" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571781" version="1" comment="glibc-info is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571782" version="1" comment="glibc-locale is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571783" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571784" version="1" comment="glibc-profile is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571785" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571786" version="1" comment="nscd is &lt;2.11.1-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571787" version="1" comment="glibc is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571788" version="1" comment="glibc-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571789" version="1" comment="glibc-devel is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571790" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571791" version="1" comment="glibc-html is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571792" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571793" version="1" comment="glibc-info is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571794" version="1" comment="glibc-locale is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571795" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571796" version="1" comment="glibc-profile is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571797" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571798" version="1" comment="nscd is &lt;2.11.1-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571799" version="1" comment="glibc is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571800" version="1" comment="glibc-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571801" version="1" comment="glibc-devel is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571802" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571803" version="1" comment="glibc-html is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571804" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571805" version="1" comment="glibc-info is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571806" version="1" comment="glibc-locale is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571807" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571808" version="1" comment="glibc-profile is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571809" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571810" version="1" comment="nscd is &lt;2.11.1-0.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571811" version="1" comment="glibc is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571812" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571813" version="1" comment="glibc-devel is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571814" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571815" version="1" comment="glibc-html is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571816" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571817" version="1" comment="glibc-info is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571818" version="1" comment="glibc-locale is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571819" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571820" version="1" comment="glibc-profile is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571821" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571822" version="1" comment="nscd is &lt;2.11.1-0.80.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571823" version="1" comment="glibc is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571824" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571825" version="1" comment="glibc-devel is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571826" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571827" version="1" comment="glibc-html is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571828" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571829" version="1" comment="glibc-info is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571830" version="1" comment="glibc-locale is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571831" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571832" version="1" comment="glibc-profile is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571833" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571834" version="1" comment="nscd is &lt;2.11.1-0.80.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571835" version="1" comment="glibc is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571836" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571837" version="1" comment="glibc-devel is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571838" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571839" version="1" comment="glibc-html is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571840" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571841" version="1" comment="glibc-info is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571842" version="1" comment="glibc-locale is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571843" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571844" version="1" comment="glibc-profile is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571845" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571846" version="1" comment="nscd is &lt;2.11.1-0.80.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571847" version="1" comment="glibc is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571848" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571849" version="1" comment="glibc-devel is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571850" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571851" version="1" comment="glibc-html is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571852" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571853" version="1" comment="glibc-info is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571854" version="1" comment="glibc-locale is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571855" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571856" version="1" comment="glibc-profile is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571857" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571858" version="1" comment="nscd is &lt;2.11.1-0.80.12.846 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571859" version="1" comment="glibc is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571860" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571861" version="1" comment="glibc-devel is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571862" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571863" version="1" comment="glibc-html is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571864" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571865" version="1" comment="glibc-info is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571866" version="1" comment="glibc-locale is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571867" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571868" version="1" comment="glibc-profile is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571869" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571870" version="1" comment="nscd is &lt;2.11.1-0.80.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571871" version="1" comment="glibc is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571872" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571873" version="1" comment="glibc-devel is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571874" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571875" version="1" comment="glibc-html is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571876" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571877" version="1" comment="glibc-info is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571878" version="1" comment="glibc-locale is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571879" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571880" version="1" comment="glibc-profile is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571881" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571882" version="1" comment="nscd is &lt;2.11.1-0.80.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673626" version="1" comment="glibc is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673627" version="1" comment="glibc-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673628" version="1" comment="glibc-devel is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673629" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673630" version="1" comment="glibc-html is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673631" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673632" version="1" comment="glibc-info is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673633" version="1" comment="glibc-locale is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673634" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673635" version="1" comment="glibc-profile is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673636" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673637" version="1" comment="nscd is &lt;2.11.1-0.80.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571883" version="1" comment="glibc is &lt;2.11.1-0.32.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571884" version="1" comment="glibc-32bit is &lt;2.11.1-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571885" version="1" comment="glibc-devel is &lt;2.11.1-0.32.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571886" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571887" version="1" comment="glibc-html is &lt;2.11.1-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571888" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571889" version="1" comment="glibc-info is &lt;2.11.1-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571890" version="1" comment="glibc-locale is &lt;2.11.1-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571891" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571892" version="1" comment="glibc-locale-x86 is &lt;2.11.1-0.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571893" version="1" comment="glibc-profile is &lt;2.11.1-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571894" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571895" version="1" comment="glibc-profile-x86 is &lt;2.11.1-0.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571896" version="1" comment="glibc-x86 is &lt;2.11.1-0.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571897" version="1" comment="libxcrypt is &lt;3.0.3-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571898" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571899" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571900" version="1" comment="nscd is &lt;2.11.1-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571901" version="1" comment="pam-modules is &lt;11-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571902" version="1" comment="pam-modules-32bit is &lt;11-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571903" version="1" comment="pam-modules-x86 is &lt;11-1.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571904" version="1" comment="pwdutils is &lt;3.2.8-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571905" version="1" comment="pwdutils-plugin-audit is &lt;3.2.8-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658238" version="1" comment="gmp is &lt;4.2.3-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658239" version="1" comment="gmp-32bit is &lt;4.2.3-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571906" version="1" comment="gnome-session is &lt;2.28.0-3.11.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571907" version="1" comment="gnome-session-lang is &lt;2.28.0-3.11.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571908" version="1" comment="gnuplot is &lt;4.2.3-7.3.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571909" version="1" comment="gnutls is &lt;2.4.1-24.39.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571910" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571911" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571912" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571913" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571914" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571915" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571916" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571917" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571918" version="1" comment="gnutls is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571919" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571920" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571921" version="1" comment="gnutls is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571922" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571923" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571924" version="1" comment="gnutls is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571925" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571926" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571927" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571928" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571929" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571930" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571931" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571932" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571933" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571934" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571935" version="1" comment="graphviz is &lt;2.20.2-8.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571936" version="1" comment="graphviz-gd is &lt;2.20.2-8.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571937" version="1" comment="graphviz-gnome is &lt;2.20.2-8.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571938" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571939" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571940" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571941" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571942" version="1" comment="libgstapp-0_10-0 is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571943" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571944" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571945" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.25-1.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571946" version="1" comment="gtk2 is &lt;2.18.9-0.20.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571947" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571948" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571949" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571950" version="1" comment="gtk2-x86 is &lt;2.18.9-0.20.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571951" version="1" comment="gtk2 is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571952" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571953" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571954" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571955" version="1" comment="gtk2 is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571956" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571957" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571958" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571959" version="1" comment="gtk2 is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571960" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571961" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571962" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.27.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571963" version="1" comment="gtk2 is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571964" version="1" comment="gtk2-32bit is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571965" version="1" comment="gtk2-doc is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571966" version="1" comment="gtk2-lang is &lt;2.18.9-0.20.27.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571967" version="1" comment="guile is &lt;1.8.5-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571968" version="1" comment="gwenview is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571969" version="1" comment="kcolorchooser is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571970" version="1" comment="kruler is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571971" version="1" comment="ksnapshot is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571972" version="1" comment="libkexiv2-7 is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571973" version="1" comment="libkipi6 is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571974" version="1" comment="okular is &lt;4.3.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571975" version="1" comment="hplip is &lt;3.11.10-0.6.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571976" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571977" version="1" comment="hunspell is &lt;1.2.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571978" version="1" comment="hunspell-32bit is &lt;1.2.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571979" version="1" comment="hunspell-tools is &lt;1.2.7-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571980" version="1" comment="libicu is &lt;4.0-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571981" version="1" comment="libicu-32bit is &lt;4.0-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571982" version="1" comment="libicu-doc is &lt;4.0-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571983" version="1" comment="libicu is &lt;4.0-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571984" version="1" comment="libicu-doc is &lt;4.0-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571985" version="1" comment="libicu is &lt;4.0-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571986" version="1" comment="libicu-doc is &lt;4.0-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571987" version="1" comment="libicu is &lt;4.0-47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571988" version="1" comment="libicu-doc is &lt;4.0-47.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571989" version="1" comment="inn is &lt;2.4.2-170.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571990" version="1" comment="inn is &lt;2.4.2-170.21.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571991" version="1" comment="inn is &lt;2.4.2-170.21.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571992" version="1" comment="inst-source-utils is &lt;2012.10.4-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571993" version="1" comment="ipsec-tools is &lt;0.7.3-1.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571994" version="1" comment="ipsec-tools is &lt;0.7.3-1.38.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571995" version="1" comment="jakarta-commons-collections is &lt;3.2.2-88.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571996" version="1" comment="jakarta-commons-collections-javadoc is &lt;3.2.2-88.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571997" version="1" comment="jakarta-commons-collections-tomcat5 is &lt;3.2.2-88.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571998" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571999" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572000" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572001" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-234.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572002" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-234.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572003" version="1" comment="libjasper is &lt;1.900.1-134.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572004" version="1" comment="libjasper-32bit is &lt;1.900.1-134.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572005" version="1" comment="libjasper-x86 is &lt;1.900.1-134.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572006" version="1" comment="libjasper is &lt;1.900.14-134.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572007" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572008" version="1" comment="libjasper is &lt;1.900.14-134.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572009" version="1" comment="libjasper-32bit is &lt;1.900.14-134.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572010" version="1" comment="libjasper is &lt;1.900.14-134.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572011" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572012" version="1" comment="libjasper is &lt;1.900.14-134.33.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572013" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572014" version="1" comment="libjasper is &lt;1.900.14-134.33.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572015" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572016" version="1" comment="libjasper is &lt;1.900.14-134.33.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572017" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668400" version="1" comment="libjasper is &lt;1.900.14-134.33.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668401" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572018" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.12-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572019" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.12-0.2.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572020" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.12-0.2.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572021" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.1-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572022" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.1-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572023" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.1-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572024" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.1-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572025" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572026" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572027" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.7-10.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572028" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572029" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572030" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572031" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572032" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572033" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572034" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572035" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572036" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572037" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572038" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572039" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572040" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572041" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572042" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572043" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572044" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572045" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572046" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572047" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572048" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572049" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572050" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.41-81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572051" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572052" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572053" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572054" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572055" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572056" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572057" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572058" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572059" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572060" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572061" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572062" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572063" version="1" comment="jpeg is &lt;6b-879.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572064" version="1" comment="libjpeg is &lt;6.2.0-879.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572065" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572066" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572067" version="1" comment="jpeg is &lt;6b-879.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572068" version="1" comment="libjpeg is &lt;6.2.0-879.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572069" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572070" version="1" comment="jpeg is &lt;6b-879.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572071" version="1" comment="libjpeg is &lt;6.2.0-879.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572072" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572073" version="1" comment="jpeg is &lt;6b-879.12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572074" version="1" comment="libjpeg is &lt;6.2.0-879.12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572075" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572076" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572077" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572078" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572079" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572080" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572081" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572082" version="1" comment="kget is &lt;4.3.5-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572083" version="1" comment="kopete is &lt;4.3.5-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572084" version="1" comment="krdc is &lt;4.3.5-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572085" version="1" comment="krfb is &lt;4.3.5-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572086" version="1" comment="kde4-l10n-bg is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572087" version="1" comment="kde4-l10n-ca is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572088" version="1" comment="kde4-l10n-csb is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572089" version="1" comment="kde4-l10n-el is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572090" version="1" comment="kde4-l10n-et is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572091" version="1" comment="kde4-l10n-eu is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572092" version="1" comment="kde4-l10n-fi is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572093" version="1" comment="kde4-l10n-ga is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572094" version="1" comment="kde4-l10n-gl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572095" version="1" comment="kde4-l10n-hi is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572096" version="1" comment="kde4-l10n-is is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572097" version="1" comment="kde4-l10n-kk is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572098" version="1" comment="kde4-l10n-km is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572099" version="1" comment="kde4-l10n-ku is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572100" version="1" comment="kde4-l10n-lt is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572101" version="1" comment="kde4-l10n-lv is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572102" version="1" comment="kde4-l10n-mk is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572103" version="1" comment="kde4-l10n-ml is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572104" version="1" comment="kde4-l10n-nds is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572105" version="1" comment="kde4-l10n-nn is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572106" version="1" comment="kde4-l10n-pa is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572107" version="1" comment="kde4-l10n-ro is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572108" version="1" comment="kde4-l10n-sl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572109" version="1" comment="kde4-l10n-th is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572110" version="1" comment="kde4-l10n-tr is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572111" version="1" comment="kde4-l10n-uk is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572112" version="1" comment="kde4-l10n-wa is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572113" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572114" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572115" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572116" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572117" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572118" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572119" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572120" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572121" version="1" comment="kdelibs4 is &lt;4.3.5-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572122" version="1" comment="kdelibs4-core is &lt;4.3.5-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572123" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572124" version="1" comment="libkde4 is &lt;4.3.5-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572125" version="1" comment="libkde4-32bit is &lt;4.3.5-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572126" version="1" comment="libkde4-x86 is &lt;4.3.5-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572127" version="1" comment="libkdecore4 is &lt;4.3.5-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572128" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572129" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572130" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572131" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.3-0.3.92 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572132" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.3-0.3.92 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572133" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.3-0.3.92 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572134" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.3-7.9.59 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572135" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.3-7.9.59 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572136" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.32.59_0.3-7.9.59 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572137" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.3-7.9.59 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572138" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.3-7.9.59 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572139" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.3-0.18.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572140" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.3-0.18.16 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572141" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.3-0.18.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572142" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_2.6.32.19_0.3-0.7.8 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572143" version="1" comment="kernel-default is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572144" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572145" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572146" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.7.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572147" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572148" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572149" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572150" version="1" comment="kernel-pae is &lt;2.6.32.59-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572151" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572152" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572153" version="1" comment="kernel-ppc64 is &lt;2.6.32.59-0.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572154" version="1" comment="kernel-ppc64-base is &lt;2.6.32.59-0.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572155" version="1" comment="kernel-ppc64-devel is &lt;2.6.32.59-0.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572156" version="1" comment="kernel-source is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572157" version="1" comment="kernel-syms is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572158" version="1" comment="kernel-trace is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572159" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572160" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572161" version="1" comment="kernel-xen is &lt;2.6.32.59-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572162" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572163" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572164" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.32.19_0.3-7.10.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572165" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572166" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572167" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572168" version="1" comment="kernel-ec2 is &lt;2.6.32.24-0.2.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572169" version="1" comment="kernel-ec2-base is &lt;2.6.32.24-0.2.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572170" version="1" comment="krb5 is &lt;1.6.3-133.48.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572171" version="1" comment="krb5-32bit is &lt;1.6.3-133.48.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572172" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.48.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572173" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.48.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572174" version="1" comment="krb5-client is &lt;1.6.3-133.48.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572175" version="1" comment="krb5-doc is &lt;1.6.3-133.49.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572176" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572177" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572178" version="1" comment="krb5-server is &lt;1.6.3-133.48.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572179" version="1" comment="krb5-x86 is &lt;1.6.3-133.48.48.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572180" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572181" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572182" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572183" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572184" version="1" comment="krb5-doc is &lt;1.6.3-133.49.97.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572185" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572186" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572187" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572188" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572189" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572190" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572191" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572192" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572193" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572194" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572195" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572196" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572197" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572198" version="1" comment="krb5 is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572199" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572200" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572201" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572202" version="1" comment="krb5-client is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572203" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572204" version="1" comment="krb5 is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572205" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572206" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572207" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572208" version="1" comment="krb5-client is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572209" version="1" comment="krb5-devel is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572210" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572211" version="1" comment="krb5-doc is &lt;1.8.6-133.49.121.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572212" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572213" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572214" version="1" comment="krb5-server is &lt;1.8.6-133.49.121.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572215" version="1" comment="krb5 is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572216" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572217" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572218" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572219" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572220" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572221" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572222" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572223" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572224" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572225" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572226" version="1" comment="krb5 is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572227" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572228" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572229" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572230" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572231" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572232" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572233" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572234" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572235" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572236" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572237" version="1" comment="krb5 is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572238" version="1" comment="krb5-32bit is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572239" version="1" comment="krb5-apps-clients is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572240" version="1" comment="krb5-apps-servers is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572241" version="1" comment="krb5-client is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572242" version="1" comment="krb5-devel is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572243" version="1" comment="krb5-devel-32bit is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572244" version="1" comment="krb5-doc is &lt;1.8.6-133.49.125.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572245" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572246" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572247" version="1" comment="krb5-server is &lt;1.8.6-133.49.125.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572248" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572249" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572250" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572251" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572252" version="1" comment="krb5-doc is &lt;1.6.3-133.49.64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572253" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572254" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572255" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572256" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572257" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572258" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572259" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572260" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572261" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572262" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572263" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572264" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572265" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572266" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572267" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572268" version="1" comment="krb5-doc is &lt;1.6.3-133.49.68.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572269" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572270" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572271" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572272" version="1" comment="kvm is &lt;0.12.5-1.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572273" version="1" comment="kvm is &lt;0.12.5-1.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626551" version="1" comment="kvm is &lt;0.12.5-1.31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630649" version="1" comment="kvm is &lt;0.12.5-1.31.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572274" version="1" comment="lcms is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572275" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572276" version="1" comment="less is &lt;424b-10.24.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572277" version="1" comment="lha is &lt;1.14.0.894-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572278" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572279" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.21.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572280" version="1" comment="libapr1 is &lt;1.3.3-11.18.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572281" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.17.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572282" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572283" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670907" version="1" comment="libcaca is &lt;0.99.beta13b-49.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681248" version="1" comment="libcaca is &lt;0.99.beta13b-49.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572284" version="1" comment="libcap-progs is &lt;2.11-2.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572285" version="1" comment="libcap2 is &lt;2.11-2.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572286" version="1" comment="libcap2-32bit is &lt;2.11-2.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572287" version="1" comment="libcap2-x86 is &lt;2.11-2.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630423" version="1" comment="libcares2 is &lt;1.7.4-7.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572288" version="1" comment="libcdio7 is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572289" version="1" comment="libcdio7-32bit is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572290" version="1" comment="libcdio_cdda0 is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572291" version="1" comment="libcdio_paranoia0 is &lt;0.80-8.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572292" version="1" comment="libcgroup1 is &lt;0.37.1-5.19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572293" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572294" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631918" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631919" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572295" version="1" comment="db-doc is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572296" version="1" comment="db-utils is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572297" version="1" comment="db-utils-doc is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572298" version="1" comment="libdb-4_5 is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572299" version="1" comment="libdb-4_5-32bit is &lt;4.5.20-97.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592414" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592415" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591139" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592416" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592417" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592418" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592419" version="1" comment="postgresql91-server is &lt;9.1.12-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629508" version="1" comment="libesmtp is &lt;1.0.4-157.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572307" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572308" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572309" version="1" comment="libexif is &lt;0.6.17-2.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572310" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572311" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572312" version="1" comment="libexif is &lt;0.6.17-2.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572313" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572314" version="1" comment="libexif is &lt;0.6.17-2.14.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572315" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572316" version="1" comment="libgcrypt11 is &lt;1.4.1-6.10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572317" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572318" version="1" comment="libgcrypt11 is &lt;1.4.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572319" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572320" version="1" comment="libgcrypt11 is &lt;1.4.1-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572321" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572322" version="1" comment="libgcrypt11 is &lt;1.4.1-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572323" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572324" version="1" comment="libgcrypt11 is &lt;1.4.1-6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572325" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572326" version="1" comment="libgcrypt11 is &lt;1.4.1-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572327" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572328" version="1" comment="libgcrypt11 is &lt;1.4.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572329" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572330" version="1" comment="libgnomesu is &lt;1.0.0-307.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572331" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572332" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572333" version="1" comment="libgssglue1 is &lt;0.1-20.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572334" version="1" comment="libical0 is &lt;0.43-1.2.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572335" version="1" comment="libical0-32bit is &lt;0.43-1.2.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572336" version="1" comment="libidn is &lt;1.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572337" version="1" comment="libidn-32bit is &lt;1.10-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572338" version="1" comment="libidn is &lt;1.10-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572339" version="1" comment="libidn-32bit is &lt;1.10-7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572340" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572341" version="1" comment="libksba is &lt;1.0.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572342" version="1" comment="libksba is &lt;1.0.4-1.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572343" version="1" comment="libksba is &lt;1.0.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572344" version="1" comment="libldap-2_4-2 is &lt;2.4.20-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572345" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.20-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572346" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.20-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572347" version="1" comment="openldap2 is &lt;2.4.20-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572348" version="1" comment="openldap2-back-meta is &lt;2.4.20-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572349" version="1" comment="openldap2-client is &lt;2.4.20-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572350" version="1" comment="liblouis is &lt;1.7.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572351" version="1" comment="liblouis0 is &lt;1.7.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572352" version="1" comment="python-louis is &lt;1.7.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572353" version="1" comment="liblouis is &lt;1.7.0-1.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572354" version="1" comment="liblouis0 is &lt;1.7.0-1.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572355" version="1" comment="python-louis is &lt;1.7.0-1.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572356" version="1" comment="liblouis is &lt;1.7.0-1.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572357" version="1" comment="liblouis0 is &lt;1.7.0-1.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572358" version="1" comment="python-louis is &lt;1.7.0-1.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572359" version="1" comment="liblouis is &lt;1.7.0-1.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572360" version="1" comment="liblouis0 is &lt;1.7.0-1.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572361" version="1" comment="python-louis is &lt;1.7.0-1.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572362" version="1" comment="liblouis is &lt;1.7.0-1.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572363" version="1" comment="liblouis0 is &lt;1.7.0-1.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572364" version="1" comment="python-louis is &lt;1.7.0-1.3.19.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572365" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572366" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572367" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572368" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572369" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572370" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572371" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572372" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572373" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572374" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572375" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572376" version="1" comment="mysql is &lt;5.0.96-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572377" version="1" comment="mysql-Max is &lt;5.0.96-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572378" version="1" comment="mysql-client is &lt;5.0.96-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572379" version="1" comment="mysql-tools is &lt;5.0.96-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572380" version="1" comment="libnl is &lt;1.1-49.22.6.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572381" version="1" comment="libnl-32bit is &lt;1.1-49.22.6.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572382" version="1" comment="libopensc2 is &lt;0.11.6-5.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572383" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572384" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572385" version="1" comment="opensc is &lt;0.11.6-5.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572386" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572387" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572388" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572389" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572390" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572391" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572392" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572393" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572394" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572395" version="1" comment="openssl is &lt;0.9.8j-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572396" version="1" comment="openssl-doc is &lt;0.9.8j-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572397" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572398" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572399" version="1" comment="libpciaccess0 is &lt;7.4-8.26.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572400" version="1" comment="libpciaccess0-32bit is &lt;7.4-8.26.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572401" version="1" comment="libpciaccess0-x86 is &lt;7.4-8.26.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572402" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572403" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572404" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572405" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572406" version="1" comment="libpng12-0 is &lt;1.2.31-5.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572407" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572408" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572409" version="1" comment="libpng12-0 is &lt;1.2.31-5.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572410" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572411" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572412" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572413" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572414" version="1" comment="libpng12-0 is &lt;1.2.31-5.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572415" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572416" version="1" comment="libpng12-0 is &lt;1.2.31-5.44.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572417" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.44.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572418" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572419" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572420" version="1" comment="libpoppler5 is &lt;0.12.3-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572421" version="1" comment="poppler-tools is &lt;0.12.3-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572422" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572423" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572424" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572425" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572426" version="1" comment="libpulse-browse0 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572427" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572428" version="1" comment="libpulse0 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572429" version="1" comment="libpulse0-32bit is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572430" version="1" comment="pulseaudio is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572431" version="1" comment="pulseaudio-esound-compat is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572432" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572433" version="1" comment="pulseaudio-lang is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572434" version="1" comment="pulseaudio-module-x11 is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572435" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572436" version="1" comment="pulseaudio-utils is &lt;0.9.21-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572437" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572438" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572439" version="1" comment="libqt4 is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572440" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572441" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572442" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572443" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572444" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572445" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572446" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572447" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572448" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572449" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572450" version="1" comment="libraptor1 is &lt;1.4.18-28.23.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572451" version="1" comment="libneon27 is &lt;0.29.6-6.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572452" version="1" comment="libneon27-32bit is &lt;0.29.6-6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572453" version="1" comment="librsvg is &lt;2.26.0-2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572454" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572455" version="1" comment="librsvg-x86 is &lt;2.26.0-2.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572456" version="1" comment="rsvg-view is &lt;2.26.0-2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572457" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572458" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572459" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572460" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572461" version="1" comment="librsvg is &lt;2.26.0-2.6.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572462" version="1" comment="librsvg-32bit is &lt;2.26.0-2.6.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572463" version="1" comment="rsvg-view is &lt;2.26.0-2.6.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572464" version="1" comment="libsamplerate is &lt;0.1.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572465" version="1" comment="libsamplerate-32bit is &lt;0.1.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572466" version="1" comment="libsndfile is &lt;1.0.20-2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572467" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572468" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572469" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572470" version="1" comment="libsndfile is &lt;1.0.20-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572471" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572472" version="1" comment="libsndfile is &lt;1.0.20-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572473" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572474" version="1" comment="libsndfile is &lt;1.0.20-2.19.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572475" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572476" version="1" comment="libsndfile is &lt;1.0.20-2.19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572477" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626760" version="1" comment="libsndfile is &lt;1.0.20-2.19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626761" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662523" version="1" comment="libsndfile is &lt;1.0.20-2.19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662524" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572478" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572479" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572480" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572481" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572482" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572483" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572484" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572485" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572486" version="1" comment="libsoup-2_4-1-x86 is &lt;2.28.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572487" version="1" comment="libsoup-2_4-1 is &lt;2.28.2-0.3.3.39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572488" version="1" comment="libsoup-2_4-1-32bit is &lt;2.28.2-0.3.3.39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572489" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572490" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572491" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572492" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572493" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.12.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572494" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572495" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572496" version="1" comment="libtasn1 is &lt;1.5-1.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572497" version="1" comment="libtasn1-3 is &lt;1.5-1.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572498" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572499" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572500" version="1" comment="tomcat6 is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572501" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572502" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572503" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572504" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572505" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572506" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572507" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572508" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572509" version="1" comment="libtcnative-1-0 is &lt;1.3.4-12.5.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572510" version="1" comment="libtiff3 is &lt;3.8.2-141.148.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572511" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.148.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572512" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.148.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572513" version="1" comment="tiff is &lt;3.8.2-141.148.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572514" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572515" version="1" comment="rpcbind is &lt;0.1.6+git20080930-8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572516" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572517" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572518" version="1" comment="libunwind is &lt;0.98.6-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572519" version="1" comment="libunwind-devel is &lt;0.98.6-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572520" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572521" version="1" comment="nut is &lt;2.6.2-0.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572522" version="1" comment="nut-classic is &lt;2.6.2-0.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572523" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572524" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572525" version="1" comment="libvorbis is &lt;1.2.0-79.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572526" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572527" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572528" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572529" version="1" comment="libvorbis is &lt;1.2.0-79.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572530" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572531" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572532" version="1" comment="libvorbis is &lt;1.2.0-79.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572533" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572534" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572535" version="1" comment="libvorbis is &lt;1.2.0-79.20.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572536" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572537" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572538" version="1" comment="libvorbis is &lt;1.2.0-79.20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572539" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572540" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572541" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572542" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572543" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572544" version="1" comment="libxcrypt is &lt;3.0.3-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572545" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572546" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572547" version="1" comment="libxml2 is &lt;2.7.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572548" version="1" comment="libxml2-32bit is &lt;2.7.6-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572549" version="1" comment="libxml2-doc is &lt;2.7.6-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588203" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572551" version="1" comment="libxml2-x86 is &lt;2.7.6-0.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572552" version="1" comment="libxml2 is &lt;2.7.6-0.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572553" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572554" version="1" comment="libxml2-doc is &lt;2.7.6-0.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572555" version="1" comment="libxml2-python is &lt;2.7.6-0.40.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572556" version="1" comment="libxml2 is &lt;2.7.6-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572557" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572558" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572559" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572560" version="1" comment="libxml2 is &lt;2.7.6-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572561" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572562" version="1" comment="libxml2-doc is &lt;2.7.6-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572563" version="1" comment="libxml2-python is &lt;2.7.6-0.50.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572564" version="1" comment="libxml2 is &lt;2.7.6-0.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572565" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572566" version="1" comment="libxml2-doc is &lt;2.7.6-0.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572567" version="1" comment="libxml2-python is &lt;2.7.6-0.64.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572568" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572569" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572570" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572571" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572572" version="1" comment="libxml2 is &lt;2.7.6-0.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572573" version="1" comment="libxml2-32bit is &lt;2.7.6-0.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572574" version="1" comment="libxml2-doc is &lt;2.7.6-0.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572575" version="1" comment="libxml2-python is &lt;2.7.6-0.76.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572576" version="1" comment="libxml2 is &lt;2.7.6-0.77.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572577" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572578" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572579" version="1" comment="libxml2-python is &lt;2.7.6-0.77.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572580" version="1" comment="libxml2 is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572581" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572582" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572583" version="1" comment="libxml2-python is &lt;2.7.6-0.77.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572584" version="1" comment="libxml2 is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572585" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572586" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572587" version="1" comment="libxml2-python is &lt;2.7.6-0.77.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572588" version="1" comment="libxml2 is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572589" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572590" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572591" version="1" comment="libxml2-python is &lt;2.7.6-0.77.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572592" version="1" comment="libxml2 is &lt;2.7.6-0.77.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572593" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572594" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572595" version="1" comment="libxml2-python is &lt;2.7.6-0.77.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572596" version="1" comment="libxml2 is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572597" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572598" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572599" version="1" comment="libxml2-python is &lt;2.7.6-0.77.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572600" version="1" comment="libxml2 is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572601" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572602" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572603" version="1" comment="libxml2-python is &lt;2.7.6-0.77.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572604" version="1" comment="libxml2 is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572605" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572606" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572607" version="1" comment="libxml2-python is &lt;2.7.6-0.77.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572608" version="1" comment="libxml2 is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572609" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572610" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572611" version="1" comment="libxml2-python is &lt;2.7.6-0.77.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670908" version="1" comment="libxml2 is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670909" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670910" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670911" version="1" comment="libxml2-python is &lt;2.7.6-0.77.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572612" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572613" version="1" comment="libxml2-doc is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572614" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572615" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572616" version="1" comment="libxml2-doc is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572617" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572618" version="1" comment="libxslt is &lt;1.1.24-19.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572619" version="1" comment="libxslt-32bit is &lt;1.1.24-19.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572620" version="1" comment="libxslt-x86 is &lt;1.1.24-19.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572621" version="1" comment="libxslt is &lt;1.1.24-19.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572622" version="1" comment="libxslt-32bit is &lt;1.1.24-19.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572623" version="1" comment="libxslt is &lt;1.1.24-19.34.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572624" version="1" comment="libxslt-32bit is &lt;1.1.24-19.34.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572625" version="1" comment="libxslt is &lt;1.1.24-19.34.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572626" version="1" comment="libxslt-32bit is &lt;1.1.24-19.34.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572627" version="1" comment="libzip1 is &lt;0.9-1.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572628" version="1" comment="lvm2 is &lt;2.02.39-18.31.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572629" version="1" comment="mailman is &lt;2.1.15-9.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572630" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572631" version="1" comment="mailman is &lt;2.1.15-9.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572632" version="1" comment="mailman is &lt;2.1.15-9.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572633" version="1" comment="mailman is &lt;2.1.15-9.6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572634" version="1" comment="mailman is &lt;2.1.15-9.6.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572635" version="1" comment="mailman is &lt;2.1.15-9.6.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572636" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572637" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572638" version="1" comment="libfreebl3 is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572639" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572640" version="1" comment="mozilla-nss is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572641" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572642" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572643" version="1" comment="g3utils is &lt;1.1.36-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572644" version="1" comment="mgetty is &lt;1.1.36-28.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572645" version="1" comment="g3utils is &lt;1.1.36-28.6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572646" version="1" comment="mgetty is &lt;1.1.36-28.6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572647" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572648" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572649" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572650" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572651" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572652" version="1" comment="microcode_ctl is &lt;1.17-102.57.64.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572653" version="1" comment="minicom is &lt;2.3-27.24.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572654" version="1" comment="mono-core is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572655" version="1" comment="mono-data is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572656" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572657" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572658" version="1" comment="mono-locale-extras is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572659" version="1" comment="mono-nunit is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572660" version="1" comment="mono-web is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572661" version="1" comment="mono-winforms is &lt;2.0.1-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572662" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572663" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572664" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572665" version="1" comment="libfreebl3 is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572666" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572667" version="1" comment="mozilla-nss is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572668" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572669" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572670" version="1" comment="MozillaFirefox is &lt;38.2.0esr-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572671" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.7.11 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572672" version="1" comment="MozillaFirefox-translations is &lt;38.2.0esr-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572673" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.37.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572674" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.37.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572675" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572676" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572677" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572678" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572679" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572680" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572681" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572682" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572683" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659163" version="1" comment="libfreebl3 is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659164" version="1" comment="libfreebl3-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659165" version="1" comment="libsoftokn3 is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659166" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659167" version="1" comment="mozilla-nss is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659168" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659169" version="1" comment="mozilla-nss-certs is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659170" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659171" version="1" comment="mozilla-nss-tools is &lt;3.68.1-38.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572684" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572685" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572686" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572687" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572688" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572689" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572690" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572691" version="1" comment="libfreebl3 is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572692" version="1" comment="libfreebl3-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572693" version="1" comment="libsoftokn3 is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572694" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572695" version="1" comment="mozilla-nspr is &lt;4.25-29.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572696" version="1" comment="mozilla-nspr-32bit is &lt;4.25-29.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572697" version="1" comment="mozilla-nss is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572698" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572699" version="1" comment="mozilla-nss-certs is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572700" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572701" version="1" comment="mozilla-nss-tools is &lt;3.53.1-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572702" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572703" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572704" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572705" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.19-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572706" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.19-0.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572707" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572708" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572709" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572710" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572711" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.27-0.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572712" version="1" comment="mutt is &lt;1.5.17-42.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572713" version="1" comment="mutt is &lt;1.5.17-42.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572714" version="1" comment="mutt is &lt;1.5.17-42.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572715" version="1" comment="mutt is &lt;1.5.17-42.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572716" version="1" comment="mutt is &lt;1.5.17-42.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680095" version="1" comment="mutt is &lt;1.5.17-42.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572717" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572718" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572719" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572720" version="1" comment="mysql is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572721" version="1" comment="mysql-Max is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572722" version="1" comment="mysql-client is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572723" version="1" comment="mysql-tools is &lt;5.0.96-0.8.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572724" version="1" comment="nagios is &lt;3.0.6-1.25.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572725" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572726" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572727" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572728" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572729" version="1" comment="nautilus is &lt;2.28.4-1.16.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572730" version="1" comment="nautilus-32bit is &lt;2.28.4-1.16.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572731" version="1" comment="nautilus-lang is &lt;2.28.4-1.16.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572732" version="1" comment="libncurses5 is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572733" version="1" comment="libncurses5-32bit is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572734" version="1" comment="libncurses6 is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572735" version="1" comment="libncurses6-32bit is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572736" version="1" comment="ncurses-devel is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572737" version="1" comment="ncurses-utils is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572738" version="1" comment="tack is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572739" version="1" comment="terminfo is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572740" version="1" comment="terminfo-base is &lt;5.6-92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572741" version="1" comment="libncurses5 is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572742" version="1" comment="libncurses5-32bit is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572743" version="1" comment="libncurses6 is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572744" version="1" comment="libncurses6-32bit is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572745" version="1" comment="ncurses-devel is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572746" version="1" comment="ncurses-utils is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572747" version="1" comment="tack is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572748" version="1" comment="terminfo is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572749" version="1" comment="terminfo-base is &lt;5.6-93.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572750" version="1" comment="libncurses5 is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572751" version="1" comment="libncurses5-32bit is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572752" version="1" comment="libncurses6 is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572753" version="1" comment="libncurses6-32bit is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572754" version="1" comment="ncurses-devel is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572755" version="1" comment="ncurses-utils is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572756" version="1" comment="tack is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572757" version="1" comment="terminfo is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572758" version="1" comment="terminfo-base is &lt;5.6-93.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572759" version="1" comment="libncurses5 is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572760" version="1" comment="libncurses5-32bit is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572761" version="1" comment="libncurses6 is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572762" version="1" comment="libncurses6-32bit is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572763" version="1" comment="ncurses-devel is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572764" version="1" comment="ncurses-utils is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572765" version="1" comment="tack is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572766" version="1" comment="terminfo is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572767" version="1" comment="terminfo-base is &lt;5.6-93.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572768" version="1" comment="libncurses5 is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572769" version="1" comment="libncurses5-32bit is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572770" version="1" comment="libncurses6 is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572771" version="1" comment="libncurses6-32bit is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572772" version="1" comment="ncurses-devel is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572773" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572774" version="1" comment="ncurses-utils is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572775" version="1" comment="tack is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572776" version="1" comment="terminfo is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572777" version="1" comment="terminfo-base is &lt;5.6-93.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572778" version="1" comment="libncurses5 is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572779" version="1" comment="libncurses5-32bit is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572780" version="1" comment="libncurses6 is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572781" version="1" comment="libncurses6-32bit is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572782" version="1" comment="ncurses-devel is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572783" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572784" version="1" comment="ncurses-utils is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572785" version="1" comment="tack is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572786" version="1" comment="terminfo is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572787" version="1" comment="terminfo-base is &lt;5.6-93.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652290" version="1" comment="libncurses5 is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652291" version="1" comment="libncurses5-32bit is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652292" version="1" comment="libncurses6 is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652293" version="1" comment="libncurses6-32bit is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652294" version="1" comment="ncurses-devel is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652295" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652296" version="1" comment="ncurses-utils is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652297" version="1" comment="tack is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652298" version="1" comment="terminfo is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652299" version="1" comment="terminfo-base is &lt;5.6-93.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572788" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572789" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572790" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572791" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572792" version="1" comment="libnetpbm10 is &lt;10.26.44-101.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572793" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572794" version="1" comment="netpbm is &lt;10.26.44-101.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572795" version="1" comment="libnetpbm10 is &lt;10.26.44-101.15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572796" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572797" version="1" comment="netpbm is &lt;10.26.44-101.15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572798" version="1" comment="nmap is &lt;4.75-1.30.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572799" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572800" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572801" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572802" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572803" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572804" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572805" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572806" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572807" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572808" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572809" version="1" comment="libfreebl3 is &lt;3.12.11-3.2.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572810" version="1" comment="libfreebl3-32bit is &lt;3.12.11-3.2.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572811" version="1" comment="libfreebl3-x86 is &lt;3.12.11-3.2.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572812" version="1" comment="mozilla-nspr is &lt;4.8.9-1.2.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572813" version="1" comment="mozilla-nspr-32bit is &lt;4.8.9-1.2.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572814" version="1" comment="mozilla-nspr-x86 is &lt;4.8.9-1.2.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572815" version="1" comment="mozilla-nss is &lt;3.12.11-3.2.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572816" version="1" comment="mozilla-nss-32bit is &lt;3.12.11-3.2.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572817" version="1" comment="mozilla-nss-tools is &lt;3.12.11-3.2.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572818" version="1" comment="mozilla-nss-x86 is &lt;3.12.11-3.2.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572819" version="1" comment="ntp is &lt;4.2.8p6-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572820" version="1" comment="ntp-doc is &lt;4.2.8p6-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572821" version="1" comment="yast2-ntp-client is &lt;2.17.14.1-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572822" version="1" comment="ntp is &lt;4.2.8p7-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572823" version="1" comment="ntp-doc is &lt;4.2.8p7-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572824" version="1" comment="libtasn1 is &lt;1.5-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572825" version="1" comment="libtasn1-3 is &lt;1.5-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572826" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572827" version="1" comment="ntp is &lt;4.2.8p8-47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572828" version="1" comment="ntp-doc is &lt;4.2.8p8-47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572829" version="1" comment="ntp is &lt;4.2.8p9-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572830" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572831" version="1" comment="ntp is &lt;4.2.8p10-48.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572832" version="1" comment="ntp-doc is &lt;4.2.8p10-48.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572833" version="1" comment="ntp is &lt;4.2.8p11-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572834" version="1" comment="ntp-doc is &lt;4.2.8p11-48.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572835" version="1" comment="ntp is &lt;4.2.8p12-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572836" version="1" comment="ntp-doc is &lt;4.2.8p12-48.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572837" version="1" comment="ntp is &lt;4.2.8p13-48.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572838" version="1" comment="ntp-doc is &lt;4.2.8p13-48.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572839" version="1" comment="ntp is &lt;4.2.8p15-48.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572840" version="1" comment="ntp-doc is &lt;4.2.8p15-48.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572841" version="1" comment="cxgb3-firmware is &lt;1.5.2-0.9.13.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572842" version="1" comment="ofed is &lt;1.5.2-0.9.13.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572843" version="1" comment="ofed-doc is &lt;1.5.2-0.9.13.1 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572844" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572845" version="1" comment="ofed-kmp-pae is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572846" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_2.6.32.46_0.3-0.9.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572847" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572848" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572849" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572850" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572851" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572852" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572853" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572854" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572855" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572856" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572857" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572858" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572859" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572860" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572861" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572862" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572863" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572864" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572865" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572866" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572867" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572868" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572869" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572870" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572871" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572872" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572873" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572874" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572875" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572876" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572877" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572878" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572879" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572880" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572881" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572882" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572883" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572884" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572885" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572886" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572887" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572888" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572889" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572890" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572891" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572892" version="1" comment="openldap2 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572893" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572894" version="1" comment="openldap2-client is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572895" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572896" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.17.31.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572897" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572898" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572899" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572900" version="1" comment="openldap2 is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572901" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572902" version="1" comment="openldap2-client is &lt;2.4.26-0.17.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572903" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572904" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572905" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572906" version="1" comment="openldap2 is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572907" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572908" version="1" comment="openldap2-client is &lt;2.4.26-0.17.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572909" version="1" comment="libopensc2 is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572910" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572911" version="1" comment="opensc is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572912" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572913" version="1" comment="libopensc2 is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572914" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572915" version="1" comment="opensc is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572916" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572917" version="1" comment="libopensc2 is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572918" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572919" version="1" comment="opensc is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572920" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653634" version="1" comment="libopensc2 is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653635" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653636" version="1" comment="opensc is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653637" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572921" version="1" comment="libslp1-openssl1 is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572922" version="1" comment="libslp1-openssl1-32bit is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572923" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572924" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572925" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572926" version="1" comment="openssh is &lt;5.1p1-41.55.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572927" version="1" comment="openssh-askpass is &lt;5.1p1-41.55.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572928" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572929" version="1" comment="openssh is &lt;5.1p1-41.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572930" version="1" comment="openssh-askpass is &lt;5.1p1-41.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572931" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572932" version="1" comment="openssh is &lt;5.1p1-41.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572933" version="1" comment="openssh-askpass is &lt;5.1p1-41.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572934" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.74.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572935" version="1" comment="openssh is &lt;5.1p1-41.79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572936" version="1" comment="openssh-askpass is &lt;5.1p1-41.79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572937" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.79.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572938" version="1" comment="openssh is &lt;5.1p1-41.80.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572939" version="1" comment="openssh-askpass is &lt;1.2.4.1-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572940" version="1" comment="openssh-openssl1 is &lt;6.6p1-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572941" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572942" version="1" comment="openssh is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572943" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572944" version="1" comment="openssh-openssl1 is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572945" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-80.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572946" version="1" comment="openssh is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572947" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572948" version="1" comment="openssh-openssl1 is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572949" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-80.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572950" version="1" comment="openssh is &lt;5.1p1-41.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572951" version="1" comment="openssh-askpass is &lt;5.1p1-41.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572952" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572953" version="1" comment="openssh-openssl1 is &lt;6.6p1-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572954" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572955" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572956" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572957" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572958" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572959" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572960" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572961" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572962" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572963" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572964" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572965" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572966" version="1" comment="openssl is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572967" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572968" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572969" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572970" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572971" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572972" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572973" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572974" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572975" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572976" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572977" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572978" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572979" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572980" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572981" version="1" comment="openssl is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572982" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572983" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572984" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572985" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572986" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572987" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572988" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572989" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572990" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572991" version="1" comment="openssl is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572992" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572993" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572994" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572995" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572996" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572997" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572998" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009572999" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573000" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573001" version="1" comment="openssl is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573002" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573003" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573004" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573005" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573006" version="1" comment="openssl is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573007" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573008" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573009" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573010" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573011" version="1" comment="openssl is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573012" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573013" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573014" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573015" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573016" version="1" comment="openssl is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573017" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573018" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573019" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573020" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573021" version="1" comment="openssl is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573022" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573023" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573024" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573025" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573026" version="1" comment="openssl is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573027" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631740" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631741" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631742" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631743" version="1" comment="openssl is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631744" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632461" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632462" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632463" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632464" version="1" comment="openssl is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632465" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673400" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673401" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673402" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673403" version="1" comment="openssl is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673404" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573028" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573029" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573030" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573031" version="1" comment="openssl1 is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573032" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573033" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573034" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573035" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573036" version="1" comment="openssl1 is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573037" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573038" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573039" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573040" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573041" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573042" version="1" comment="openssl1 is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573043" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573044" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573045" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573046" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573047" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573048" version="1" comment="openssl1 is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573049" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573050" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573051" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573052" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573053" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573054" version="1" comment="openssl1 is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573055" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573056" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573057" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573058" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573059" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573060" version="1" comment="openssl1 is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573061" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573062" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573063" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573064" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573065" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573066" version="1" comment="openssl1 is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573067" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573068" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573069" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573070" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573071" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573072" version="1" comment="openssl1 is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573073" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573074" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573075" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573076" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573077" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573078" version="1" comment="openssl1 is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573079" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573080" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573081" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573082" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573083" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573084" version="1" comment="openssl1 is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573085" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573086" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573087" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573088" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573089" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573090" version="1" comment="openssl1 is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573091" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573092" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573093" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573094" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573095" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573096" version="1" comment="openssl1 is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573097" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573098" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573099" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573100" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573101" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573102" version="1" comment="openssl1 is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573103" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631745" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631746" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631747" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631748" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631749" version="1" comment="openssl1 is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631750" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.36.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632543" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632544" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632545" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632546" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632547" version="1" comment="openssl1 is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632548" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673405" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673406" version="1" comment="libopenssl1-devel-32bit is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673407" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673408" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673409" version="1" comment="openssl1 is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673410" version="1" comment="openssl1-doc is &lt;1.0.1g-0.58.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573104" version="1" comment="openswan is &lt;2.6.16-1.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573105" version="1" comment="openswan-doc is &lt;2.6.16-1.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573106" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573107" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573108" version="1" comment="openvpn is &lt;2.0.9-143.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573109" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573110" version="1" comment="openvpn is &lt;2.0.9-143.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573111" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573112" version="1" comment="openvpn is &lt;2.0.9-143.35.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573113" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573114" version="1" comment="openvpn is &lt;2.0.9-143.35.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573115" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.35.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573116" version="1" comment="libwsman1 is &lt;2.2.3-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573117" version="1" comment="openwsman-client is &lt;2.2.3-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573118" version="1" comment="openwsman-server is &lt;2.2.3-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573119" version="1" comment="opie is &lt;2.4-662.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573120" version="1" comment="opie-32bit is &lt;2.4-662.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573121" version="1" comment="opie-x86 is &lt;2.4-662.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573122" version="1" comment="permissions is &lt;2011.6.28-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573123" version="1" comment="orca is &lt;2.28.3-0.5.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573124" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573125" version="1" comment="pam is &lt;1.0.4-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573126" version="1" comment="pam-32bit is &lt;1.0.4-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573127" version="1" comment="pam-doc is &lt;1.0.4-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573128" version="1" comment="pam-modules is &lt;11-1.22.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573129" version="1" comment="pam-modules-32bit is &lt;11-1.22.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573130" version="1" comment="pam_pkcs11 is &lt;0.6.0-141.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573131" version="1" comment="pam_pkcs11-32bit is &lt;0.6.0-141.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573132" version="1" comment="pango is &lt;1.26.2-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573133" version="1" comment="pango-32bit is &lt;1.26.2-1.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573134" version="1" comment="pango-doc is &lt;1.26.2-1.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573135" version="1" comment="pango-x86 is &lt;1.26.2-1.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573136" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573137" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573138" version="1" comment="pcsc-lite is &lt;1.4.102-1.37.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573139" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573140" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.37.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573141" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573142" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573143" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573144" version="1" comment="perf is &lt;2.6.32.46-2.5.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573145" version="1" comment="perl is &lt;5.10.0-64.55.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573146" version="1" comment="perl-32bit is &lt;5.10.0-64.55.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573147" version="1" comment="perl-base is &lt;5.10.0-64.55.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573148" version="1" comment="perl-doc is &lt;5.10.0-64.55.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573149" version="1" comment="perl-x86 is &lt;5.10.0-64.55.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573150" version="1" comment="perl is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573151" version="1" comment="perl-32bit is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573152" version="1" comment="perl-base is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573153" version="1" comment="perl-doc is &lt;5.10.0-64.61.63.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573154" version="1" comment="perl-Archive-Zip is &lt;1.24-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573155" version="1" comment="perl-Config-General is &lt;2.33-2.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573156" version="1" comment="perl-Convert-ASN1 is &lt;0.22-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573157" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573158" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573159" version="1" comment="perl-DBD-mysql is &lt;4.008-10.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573160" version="1" comment="perl-DBI is &lt;1.607-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573161" version="1" comment="perl-DBI is &lt;1.607-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573162" version="1" comment="perl-PlRPC is &lt;0.2019-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573163" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573164" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573165" version="1" comment="php5 is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573166" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573167" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573168" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573169" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573170" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573171" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573172" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573173" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573174" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573175" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573176" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573177" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573178" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573179" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573180" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573181" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573182" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573183" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573184" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573185" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573186" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573187" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573188" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573189" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573190" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573191" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573192" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573193" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573194" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573195" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573196" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573197" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573198" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573199" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573200" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573201" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573202" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573203" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573204" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573205" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573206" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573207" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573208" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573209" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573210" version="1" comment="php5 is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573211" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573212" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573213" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573214" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573215" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573216" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573217" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573218" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573219" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573220" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573221" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573222" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573223" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573224" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573225" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573226" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573227" version="1" comment="php5-json is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573228" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573229" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573230" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573231" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573232" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573233" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573234" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573235" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573236" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573237" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573238" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573239" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573240" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573241" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573242" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573243" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573244" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573245" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573246" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573247" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573248" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573249" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573250" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573251" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573252" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573253" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573254" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573255" version="1" comment="php5 is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573256" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573257" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573258" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573259" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573260" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573261" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573262" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573263" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573264" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573265" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573266" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573267" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573268" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573269" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573270" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573271" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573272" version="1" comment="php5-json is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573273" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573274" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573275" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573276" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573277" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573278" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573279" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573280" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573281" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573282" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573283" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573284" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573285" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573286" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573287" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573288" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573289" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573290" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573291" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573292" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573293" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573294" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573295" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573296" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573297" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573298" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573299" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573300" version="1" comment="php5 is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573301" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573302" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573303" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573304" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573305" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573306" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573307" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573308" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573309" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573310" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573311" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573312" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573313" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573314" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573315" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573316" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573317" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573318" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573319" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573320" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573321" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573322" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573323" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573324" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573325" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573326" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573327" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573328" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573329" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573330" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573331" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573332" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573333" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573334" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573335" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573336" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573337" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573338" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573339" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573340" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573341" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573342" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573343" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573344" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573345" version="1" comment="php5 is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573346" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573347" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573348" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573349" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573350" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573351" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573352" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573353" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573354" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573355" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573356" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573357" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573358" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573359" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573360" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573361" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573362" version="1" comment="php5-json is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573363" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573364" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573365" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573366" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573367" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573368" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573369" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573370" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573371" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573372" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573373" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573374" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573375" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573376" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573377" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573378" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573379" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573380" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573381" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573382" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573383" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573384" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573385" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573386" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573387" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573388" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573389" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573390" version="1" comment="php5 is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573391" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573392" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573393" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573394" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573395" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573396" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573397" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573398" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573399" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573400" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573401" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573402" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573403" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573404" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573405" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573406" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573407" version="1" comment="php5-json is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573408" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573409" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573410" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573411" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573412" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573413" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573414" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573415" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573416" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573417" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573418" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573419" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573420" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573421" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573422" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573423" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573424" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573425" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573426" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573427" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573428" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573429" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573430" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573431" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573432" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573433" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573434" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573435" version="1" comment="php5 is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573436" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573437" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573438" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573439" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573440" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573441" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573442" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573443" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573444" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573445" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573446" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573447" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573448" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573449" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573450" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573451" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573452" version="1" comment="php5-json is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573453" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573454" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573455" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573456" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573457" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573458" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573459" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573460" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573461" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573462" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573463" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573464" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573465" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573466" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573467" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573468" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573469" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573470" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573471" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573472" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573473" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573474" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573475" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573476" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573477" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573478" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.100.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573479" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573480" version="1" comment="php5 is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573481" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573482" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573483" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573484" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573485" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573486" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573487" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573488" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573489" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573490" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573491" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573492" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573493" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573494" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573495" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573496" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573497" version="1" comment="php5-json is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573498" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573499" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573500" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573501" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573502" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573503" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573504" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573505" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573506" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573507" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573508" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573509" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573510" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573511" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573512" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573513" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573514" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573515" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573516" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573517" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573518" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573519" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573520" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573521" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573522" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573523" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573524" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573525" version="1" comment="php5 is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573526" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573527" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573528" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573529" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573530" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573531" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573532" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573533" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573534" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573535" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573536" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573537" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573538" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573539" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573540" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573541" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573542" version="1" comment="php5-json is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573543" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573544" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573545" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573546" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573547" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573548" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573549" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573550" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573551" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573552" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573553" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573554" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573555" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573556" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573557" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573558" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573559" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573560" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573561" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573562" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573563" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573564" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573565" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573566" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573567" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573568" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573569" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573570" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573571" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573572" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573573" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573574" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573575" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573576" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573577" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573578" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573579" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573580" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573581" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573582" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573583" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573584" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573585" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573586" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573587" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573588" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573589" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573590" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573591" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573592" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573593" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573594" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573595" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573596" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573597" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573598" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573599" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573600" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573601" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573602" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573603" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573604" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573605" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573606" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573607" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573608" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573609" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573610" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573611" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573612" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573613" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573614" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573615" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573616" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573617" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573618" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573619" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573620" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573621" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573622" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573623" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573624" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573625" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573626" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573627" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573628" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573629" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573630" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573631" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573632" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573633" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573634" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573635" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573636" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573637" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573638" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573639" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573640" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573641" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573642" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573643" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573644" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573645" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573646" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573647" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573648" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573649" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573650" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573651" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573652" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573653" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573654" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573655" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573656" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573657" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573658" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573659" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573660" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573661" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573662" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573663" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573664" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573665" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573666" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573667" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573668" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573669" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573670" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573671" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573672" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573673" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573674" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573675" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573676" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573677" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573678" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573679" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573680" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573681" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573682" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573683" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573684" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573685" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573686" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573687" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573688" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573689" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573690" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573691" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573692" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573693" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573694" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573695" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573696" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573697" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573698" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573699" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573700" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573701" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573702" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573703" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573704" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573705" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573706" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573707" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573708" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573709" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573710" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573711" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573712" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573713" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573714" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573715" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573716" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573717" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573718" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573719" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573720" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573721" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573722" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573723" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573724" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573725" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573726" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573727" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573728" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573729" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573730" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573731" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573732" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573733" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573734" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573735" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573736" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573737" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573738" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573739" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573740" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573741" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573742" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573743" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573744" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573745" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573746" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573747" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573748" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573749" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573750" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573751" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573752" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573753" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573754" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573755" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573756" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573757" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573758" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573759" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573760" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573761" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573762" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573763" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573764" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573765" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573766" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573767" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573768" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573769" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573770" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573771" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573772" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573773" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573774" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573775" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573776" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573777" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573778" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573779" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573780" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573781" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573782" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573783" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573784" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573785" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573786" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573787" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573788" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573789" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573790" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573791" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573792" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573793" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573794" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573795" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573796" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573797" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573798" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573799" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573800" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573801" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573802" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573803" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573804" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573805" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573806" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573807" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573808" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573809" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573810" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573811" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573812" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573813" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573814" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573815" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573816" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573817" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573818" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573819" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573820" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573821" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573822" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573823" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573824" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573825" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573826" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573827" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573828" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573829" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573830" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573831" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573832" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573833" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573834" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573835" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573836" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573837" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573838" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573839" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573840" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573841" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573842" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573843" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573844" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573845" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573846" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573847" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573848" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573849" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573850" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573851" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573852" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573853" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573854" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573855" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573856" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573857" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573858" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573859" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573860" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573861" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573862" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573863" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573864" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573865" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573866" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573867" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573868" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573869" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573870" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573871" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573872" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573873" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573874" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573875" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573876" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573877" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573878" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573879" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573880" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573881" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573882" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573883" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573884" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573885" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573886" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573887" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573888" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573889" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573890" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573891" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573892" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573893" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573894" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573895" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573896" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573897" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573898" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573899" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573900" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573901" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573902" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573903" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573904" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573905" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573906" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573907" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573908" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573909" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573910" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573911" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573912" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573913" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573914" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573915" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573916" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573917" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573918" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573919" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573920" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573921" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573922" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573923" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573924" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573925" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573926" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573927" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573928" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573929" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573930" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573931" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573932" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573933" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573934" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573935" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573936" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573937" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573938" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573939" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573940" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573941" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573942" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573943" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573944" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573945" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573946" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573947" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573948" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573949" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573950" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573951" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573952" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573953" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573954" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573955" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573956" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573957" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573958" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573959" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573960" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573961" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573962" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573963" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573964" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573965" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573966" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573967" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573968" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573969" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573970" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573971" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573972" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573973" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573974" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573975" version="1" comment="php5 is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573976" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573977" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573978" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573979" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573980" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573981" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573982" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573983" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573984" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573985" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573986" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573987" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573988" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573989" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573990" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573991" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573992" version="1" comment="php5-json is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573993" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573994" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573995" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573996" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573997" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573998" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009573999" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574000" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574001" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574002" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574003" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574004" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574005" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574006" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574007" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574008" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574009" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574010" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574011" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574012" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574013" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574014" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574015" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574016" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574017" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574018" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.111.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574019" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574020" version="1" comment="php5 is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574021" version="1" comment="php5-bcmath is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574022" version="1" comment="php5-bz2 is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574023" version="1" comment="php5-calendar is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574024" version="1" comment="php5-ctype is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574025" version="1" comment="php5-curl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574026" version="1" comment="php5-dba is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574027" version="1" comment="php5-dbase is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574028" version="1" comment="php5-dom is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574029" version="1" comment="php5-exif is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574030" version="1" comment="php5-fastcgi is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574031" version="1" comment="php5-ftp is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574032" version="1" comment="php5-gd is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574033" version="1" comment="php5-gettext is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574034" version="1" comment="php5-gmp is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574035" version="1" comment="php5-hash is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574036" version="1" comment="php5-iconv is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574037" version="1" comment="php5-json is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574038" version="1" comment="php5-ldap is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574039" version="1" comment="php5-mbstring is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574040" version="1" comment="php5-mcrypt is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574041" version="1" comment="php5-mysql is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574042" version="1" comment="php5-odbc is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574043" version="1" comment="php5-openssl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574044" version="1" comment="php5-pcntl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574045" version="1" comment="php5-pdo is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574046" version="1" comment="php5-pear is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574047" version="1" comment="php5-pgsql is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574048" version="1" comment="php5-pspell is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574049" version="1" comment="php5-shmop is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574050" version="1" comment="php5-snmp is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574051" version="1" comment="php5-soap is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574052" version="1" comment="php5-suhosin is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574053" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574054" version="1" comment="php5-sysvsem is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574055" version="1" comment="php5-sysvshm is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574056" version="1" comment="php5-tokenizer is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574057" version="1" comment="php5-wddx is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574058" version="1" comment="php5-xmlreader is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574059" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574060" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574061" version="1" comment="php5-xsl is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574062" version="1" comment="php5-zip is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574063" version="1" comment="php5-zlib is &lt;5.2.14-111.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574064" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574065" version="1" comment="php5 is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574066" version="1" comment="php5-bcmath is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574067" version="1" comment="php5-bz2 is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574068" version="1" comment="php5-calendar is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574069" version="1" comment="php5-ctype is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574070" version="1" comment="php5-curl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574071" version="1" comment="php5-dba is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574072" version="1" comment="php5-dbase is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574073" version="1" comment="php5-dom is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574074" version="1" comment="php5-exif is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574075" version="1" comment="php5-fastcgi is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574076" version="1" comment="php5-ftp is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574077" version="1" comment="php5-gd is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574078" version="1" comment="php5-gettext is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574079" version="1" comment="php5-gmp is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574080" version="1" comment="php5-hash is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574081" version="1" comment="php5-iconv is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574082" version="1" comment="php5-json is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574083" version="1" comment="php5-ldap is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574084" version="1" comment="php5-mbstring is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574085" version="1" comment="php5-mcrypt is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574086" version="1" comment="php5-mysql is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574087" version="1" comment="php5-odbc is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574088" version="1" comment="php5-openssl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574089" version="1" comment="php5-pcntl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574090" version="1" comment="php5-pdo is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574091" version="1" comment="php5-pear is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574092" version="1" comment="php5-pgsql is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574093" version="1" comment="php5-pspell is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574094" version="1" comment="php5-shmop is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574095" version="1" comment="php5-snmp is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574096" version="1" comment="php5-soap is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574097" version="1" comment="php5-suhosin is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574098" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574099" version="1" comment="php5-sysvsem is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574100" version="1" comment="php5-sysvshm is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574101" version="1" comment="php5-tokenizer is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574102" version="1" comment="php5-wddx is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574103" version="1" comment="php5-xmlreader is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574104" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574105" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574106" version="1" comment="php5-xsl is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574107" version="1" comment="php5-zip is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574108" version="1" comment="php5-zlib is &lt;5.2.14-111.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574109" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574110" version="1" comment="php5 is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574111" version="1" comment="php5-bcmath is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574112" version="1" comment="php5-bz2 is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574113" version="1" comment="php5-calendar is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574114" version="1" comment="php5-ctype is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574115" version="1" comment="php5-curl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574116" version="1" comment="php5-dba is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574117" version="1" comment="php5-dbase is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574118" version="1" comment="php5-dom is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574119" version="1" comment="php5-exif is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574120" version="1" comment="php5-fastcgi is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574121" version="1" comment="php5-ftp is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574122" version="1" comment="php5-gd is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574123" version="1" comment="php5-gettext is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574124" version="1" comment="php5-gmp is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574125" version="1" comment="php5-hash is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574126" version="1" comment="php5-iconv is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574127" version="1" comment="php5-json is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574128" version="1" comment="php5-ldap is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574129" version="1" comment="php5-mbstring is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574130" version="1" comment="php5-mcrypt is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574131" version="1" comment="php5-mysql is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574132" version="1" comment="php5-odbc is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574133" version="1" comment="php5-openssl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574134" version="1" comment="php5-pcntl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574135" version="1" comment="php5-pdo is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574136" version="1" comment="php5-pear is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574137" version="1" comment="php5-pgsql is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574138" version="1" comment="php5-pspell is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574139" version="1" comment="php5-shmop is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574140" version="1" comment="php5-snmp is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574141" version="1" comment="php5-soap is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574142" version="1" comment="php5-suhosin is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574143" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574144" version="1" comment="php5-sysvsem is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574145" version="1" comment="php5-sysvshm is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574146" version="1" comment="php5-tokenizer is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574147" version="1" comment="php5-wddx is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574148" version="1" comment="php5-xmlreader is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574149" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574150" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574151" version="1" comment="php5-xsl is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574152" version="1" comment="php5-zip is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574153" version="1" comment="php5-zlib is &lt;5.2.14-111.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574154" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574155" version="1" comment="php5 is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574156" version="1" comment="php5-bcmath is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574157" version="1" comment="php5-bz2 is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574158" version="1" comment="php5-calendar is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574159" version="1" comment="php5-ctype is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574160" version="1" comment="php5-curl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574161" version="1" comment="php5-dba is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574162" version="1" comment="php5-dbase is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574163" version="1" comment="php5-dom is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574164" version="1" comment="php5-exif is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574165" version="1" comment="php5-fastcgi is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574166" version="1" comment="php5-ftp is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574167" version="1" comment="php5-gd is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574168" version="1" comment="php5-gettext is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574169" version="1" comment="php5-gmp is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574170" version="1" comment="php5-hash is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574171" version="1" comment="php5-iconv is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574172" version="1" comment="php5-json is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574173" version="1" comment="php5-ldap is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574174" version="1" comment="php5-mbstring is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574175" version="1" comment="php5-mcrypt is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574176" version="1" comment="php5-mysql is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574177" version="1" comment="php5-odbc is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574178" version="1" comment="php5-openssl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574179" version="1" comment="php5-pcntl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574180" version="1" comment="php5-pdo is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574181" version="1" comment="php5-pear is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574182" version="1" comment="php5-pgsql is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574183" version="1" comment="php5-pspell is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574184" version="1" comment="php5-shmop is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574185" version="1" comment="php5-snmp is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574186" version="1" comment="php5-soap is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574187" version="1" comment="php5-suhosin is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574188" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574189" version="1" comment="php5-sysvsem is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574190" version="1" comment="php5-sysvshm is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574191" version="1" comment="php5-tokenizer is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574192" version="1" comment="php5-wddx is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574193" version="1" comment="php5-xmlreader is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574194" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574195" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574196" version="1" comment="php5-xsl is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574197" version="1" comment="php5-zip is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574198" version="1" comment="php5-zlib is &lt;5.2.14-111.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574199" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574200" version="1" comment="php5 is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574201" version="1" comment="php5-bcmath is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574202" version="1" comment="php5-bz2 is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574203" version="1" comment="php5-calendar is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574204" version="1" comment="php5-ctype is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574205" version="1" comment="php5-curl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574206" version="1" comment="php5-dba is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574207" version="1" comment="php5-dbase is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574208" version="1" comment="php5-dom is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574209" version="1" comment="php5-exif is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574210" version="1" comment="php5-fastcgi is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574211" version="1" comment="php5-ftp is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574212" version="1" comment="php5-gd is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574213" version="1" comment="php5-gettext is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574214" version="1" comment="php5-gmp is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574215" version="1" comment="php5-hash is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574216" version="1" comment="php5-iconv is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574217" version="1" comment="php5-json is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574218" version="1" comment="php5-ldap is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574219" version="1" comment="php5-mbstring is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574220" version="1" comment="php5-mcrypt is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574221" version="1" comment="php5-mysql is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574222" version="1" comment="php5-odbc is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574223" version="1" comment="php5-openssl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574224" version="1" comment="php5-pcntl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574225" version="1" comment="php5-pdo is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574226" version="1" comment="php5-pear is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574227" version="1" comment="php5-pgsql is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574228" version="1" comment="php5-pspell is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574229" version="1" comment="php5-shmop is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574230" version="1" comment="php5-snmp is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574231" version="1" comment="php5-soap is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574232" version="1" comment="php5-suhosin is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574233" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574234" version="1" comment="php5-sysvsem is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574235" version="1" comment="php5-sysvshm is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574236" version="1" comment="php5-tokenizer is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574237" version="1" comment="php5-wddx is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574238" version="1" comment="php5-xmlreader is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574239" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574240" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574241" version="1" comment="php5-xsl is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574242" version="1" comment="php5-zip is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574243" version="1" comment="php5-zlib is &lt;5.2.14-111.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574244" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574245" version="1" comment="php5 is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574246" version="1" comment="php5-bcmath is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574247" version="1" comment="php5-bz2 is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574248" version="1" comment="php5-calendar is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574249" version="1" comment="php5-ctype is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574250" version="1" comment="php5-curl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574251" version="1" comment="php5-dba is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574252" version="1" comment="php5-dbase is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574253" version="1" comment="php5-dom is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574254" version="1" comment="php5-exif is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574255" version="1" comment="php5-fastcgi is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574256" version="1" comment="php5-ftp is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574257" version="1" comment="php5-gd is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574258" version="1" comment="php5-gettext is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574259" version="1" comment="php5-gmp is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574260" version="1" comment="php5-hash is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574261" version="1" comment="php5-iconv is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574262" version="1" comment="php5-json is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574263" version="1" comment="php5-ldap is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574264" version="1" comment="php5-mbstring is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574265" version="1" comment="php5-mcrypt is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574266" version="1" comment="php5-mysql is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574267" version="1" comment="php5-odbc is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574268" version="1" comment="php5-openssl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574269" version="1" comment="php5-pcntl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574270" version="1" comment="php5-pdo is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574271" version="1" comment="php5-pear is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574272" version="1" comment="php5-pgsql is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574273" version="1" comment="php5-pspell is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574274" version="1" comment="php5-shmop is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574275" version="1" comment="php5-snmp is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574276" version="1" comment="php5-soap is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574277" version="1" comment="php5-suhosin is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574278" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574279" version="1" comment="php5-sysvsem is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574280" version="1" comment="php5-sysvshm is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574281" version="1" comment="php5-tokenizer is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574282" version="1" comment="php5-wddx is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574283" version="1" comment="php5-xmlreader is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574284" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574285" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574286" version="1" comment="php5-xsl is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574287" version="1" comment="php5-zip is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574288" version="1" comment="php5-zlib is &lt;5.2.14-111.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574289" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574290" version="1" comment="php5 is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574291" version="1" comment="php5-bcmath is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574292" version="1" comment="php5-bz2 is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574293" version="1" comment="php5-calendar is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574294" version="1" comment="php5-ctype is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574295" version="1" comment="php5-curl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574296" version="1" comment="php5-dba is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574297" version="1" comment="php5-dbase is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574298" version="1" comment="php5-dom is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574299" version="1" comment="php5-exif is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574300" version="1" comment="php5-fastcgi is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574301" version="1" comment="php5-ftp is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574302" version="1" comment="php5-gd is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574303" version="1" comment="php5-gettext is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574304" version="1" comment="php5-gmp is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574305" version="1" comment="php5-hash is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574306" version="1" comment="php5-iconv is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574307" version="1" comment="php5-json is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574308" version="1" comment="php5-ldap is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574309" version="1" comment="php5-mbstring is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574310" version="1" comment="php5-mcrypt is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574311" version="1" comment="php5-mysql is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574312" version="1" comment="php5-odbc is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574313" version="1" comment="php5-openssl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574314" version="1" comment="php5-pcntl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574315" version="1" comment="php5-pdo is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574316" version="1" comment="php5-pear is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574317" version="1" comment="php5-pgsql is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574318" version="1" comment="php5-pspell is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574319" version="1" comment="php5-shmop is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574320" version="1" comment="php5-snmp is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574321" version="1" comment="php5-soap is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574322" version="1" comment="php5-suhosin is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574323" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574324" version="1" comment="php5-sysvsem is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574325" version="1" comment="php5-sysvshm is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574326" version="1" comment="php5-tokenizer is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574327" version="1" comment="php5-wddx is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574328" version="1" comment="php5-xmlreader is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574329" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574330" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574331" version="1" comment="php5-xsl is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574332" version="1" comment="php5-zip is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574333" version="1" comment="php5-zlib is &lt;5.2.14-111.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574334" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574335" version="1" comment="php5 is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574336" version="1" comment="php5-bcmath is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574337" version="1" comment="php5-bz2 is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574338" version="1" comment="php5-calendar is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574339" version="1" comment="php5-ctype is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574340" version="1" comment="php5-curl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574341" version="1" comment="php5-dba is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574342" version="1" comment="php5-dbase is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574343" version="1" comment="php5-dom is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574344" version="1" comment="php5-exif is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574345" version="1" comment="php5-fastcgi is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574346" version="1" comment="php5-ftp is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574347" version="1" comment="php5-gd is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574348" version="1" comment="php5-gettext is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574349" version="1" comment="php5-gmp is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574350" version="1" comment="php5-hash is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574351" version="1" comment="php5-iconv is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574352" version="1" comment="php5-json is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574353" version="1" comment="php5-ldap is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574354" version="1" comment="php5-mbstring is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574355" version="1" comment="php5-mcrypt is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574356" version="1" comment="php5-mysql is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574357" version="1" comment="php5-odbc is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574358" version="1" comment="php5-openssl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574359" version="1" comment="php5-pcntl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574360" version="1" comment="php5-pdo is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574361" version="1" comment="php5-pear is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574362" version="1" comment="php5-pgsql is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574363" version="1" comment="php5-pspell is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574364" version="1" comment="php5-shmop is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574365" version="1" comment="php5-snmp is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574366" version="1" comment="php5-soap is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574367" version="1" comment="php5-suhosin is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574368" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574369" version="1" comment="php5-sysvsem is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574370" version="1" comment="php5-sysvshm is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574371" version="1" comment="php5-tokenizer is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574372" version="1" comment="php5-wddx is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574373" version="1" comment="php5-xmlreader is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574374" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574375" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574376" version="1" comment="php5-xsl is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574377" version="1" comment="php5-zip is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574378" version="1" comment="php5-zlib is &lt;5.2.14-111.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627044" version="1" comment="apache2-mod_php5 is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627045" version="1" comment="php5 is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627046" version="1" comment="php5-bcmath is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627047" version="1" comment="php5-bz2 is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627048" version="1" comment="php5-calendar is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627049" version="1" comment="php5-ctype is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627050" version="1" comment="php5-curl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627051" version="1" comment="php5-dba is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627052" version="1" comment="php5-dbase is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627053" version="1" comment="php5-dom is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627054" version="1" comment="php5-exif is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627055" version="1" comment="php5-fastcgi is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627056" version="1" comment="php5-ftp is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627057" version="1" comment="php5-gd is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627058" version="1" comment="php5-gettext is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627059" version="1" comment="php5-gmp is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627060" version="1" comment="php5-hash is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627061" version="1" comment="php5-iconv is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627062" version="1" comment="php5-json is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627063" version="1" comment="php5-ldap is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627064" version="1" comment="php5-mbstring is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627065" version="1" comment="php5-mcrypt is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627066" version="1" comment="php5-mysql is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627067" version="1" comment="php5-odbc is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627068" version="1" comment="php5-openssl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627069" version="1" comment="php5-pcntl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627070" version="1" comment="php5-pdo is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627071" version="1" comment="php5-pear is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627072" version="1" comment="php5-pgsql is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627073" version="1" comment="php5-pspell is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627074" version="1" comment="php5-shmop is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627075" version="1" comment="php5-snmp is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627076" version="1" comment="php5-soap is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627077" version="1" comment="php5-suhosin is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627078" version="1" comment="php5-sysvmsg is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627079" version="1" comment="php5-sysvsem is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627080" version="1" comment="php5-sysvshm is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627081" version="1" comment="php5-tokenizer is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627082" version="1" comment="php5-wddx is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627083" version="1" comment="php5-xmlreader is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627084" version="1" comment="php5-xmlrpc is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627085" version="1" comment="php5-xmlwriter is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627086" version="1" comment="php5-xsl is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627087" version="1" comment="php5-zip is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627088" version="1" comment="php5-zlib is &lt;5.2.14-111.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574379" version="1" comment="libpixman-1-0 is &lt;0.16.0-2.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574380" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-2.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574381" version="1" comment="policycoreutils is &lt;2.0.79-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574382" version="1" comment="policycoreutils is &lt;2.0.79-4.9.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574383" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574384" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574385" version="1" comment="libpoppler5 is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574386" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574387" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574388" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574389" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574390" version="1" comment="poppler-tools is &lt;0.12.3-1.13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574391" version="1" comment="popt is &lt;1.7-37.29.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574392" version="1" comment="popt-32bit is &lt;1.7-37.29.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574393" version="1" comment="popt-x86 is &lt;1.7-37.29.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574394" version="1" comment="rpm is &lt;4.4.2.3-37.29.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574395" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.29.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574396" version="1" comment="rpm-python is &lt;4.4.2.3-37.29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574397" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.29.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574398" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574399" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574400" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574401" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574402" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574403" version="1" comment="postgresql94-server is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574404" version="1" comment="postgresql is &lt;8.3.20-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574405" version="1" comment="postgresql-contrib is &lt;8.3.20-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574406" version="1" comment="postgresql-docs is &lt;8.3.20-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574407" version="1" comment="postgresql-init is &lt;9.1-0.6.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574408" version="1" comment="postgresql-libs is &lt;8.3.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574409" version="1" comment="postgresql-libs-32bit is &lt;8.3.18-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574410" version="1" comment="postgresql-libs-x86 is &lt;8.3.18-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574411" version="1" comment="postgresql-server is &lt;8.3.20-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574412" version="1" comment="postgresql-init is &lt;9.4-0.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574413" version="1" comment="libecpg6 is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574414" version="1" comment="libpq5 is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574415" version="1" comment="libpq5-32bit is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574416" version="1" comment="postgresql-init is &lt;10-0.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574417" version="1" comment="postgresql10 is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574418" version="1" comment="postgresql10-contrib is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574419" version="1" comment="postgresql10-docs is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574420" version="1" comment="postgresql10-server is &lt;10.6-0.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574421" version="1" comment="libecpg6 is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574422" version="1" comment="libpq5 is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574423" version="1" comment="libpq5-32bit is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574424" version="1" comment="postgresql10 is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574425" version="1" comment="postgresql10-contrib is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574426" version="1" comment="postgresql10-docs is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574427" version="1" comment="postgresql10-server is &lt;10.8-0.2.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574428" version="1" comment="libecpg6 is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574429" version="1" comment="libpq5 is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574430" version="1" comment="libpq5-32bit is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574431" version="1" comment="postgresql10 is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574432" version="1" comment="postgresql10-contrib is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574433" version="1" comment="postgresql10-docs is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574434" version="1" comment="postgresql10-server is &lt;10.9-0.2.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574435" version="1" comment="libecpg6 is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574436" version="1" comment="libpq5 is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574437" version="1" comment="libpq5-32bit is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574438" version="1" comment="postgresql10 is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574439" version="1" comment="postgresql10-contrib is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574440" version="1" comment="postgresql10-devel is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574441" version="1" comment="postgresql10-docs is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574442" version="1" comment="postgresql10-server is &lt;10.10-0.2.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574443" version="1" comment="libecpg6 is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574444" version="1" comment="libpq5 is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574445" version="1" comment="libpq5-32bit is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574446" version="1" comment="postgresql10 is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574447" version="1" comment="postgresql10-contrib is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574448" version="1" comment="postgresql10-devel is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574449" version="1" comment="postgresql10-docs is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574450" version="1" comment="postgresql10-server is &lt;10.12-0.2.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574451" version="1" comment="libecpg6 is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574452" version="1" comment="libpq5 is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574453" version="1" comment="libpq5-32bit is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574454" version="1" comment="postgresql10 is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574455" version="1" comment="postgresql10-contrib is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574456" version="1" comment="postgresql10-devel is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574457" version="1" comment="postgresql10-docs is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574458" version="1" comment="postgresql10-server is &lt;10.14-0.2.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574459" version="1" comment="libecpg6 is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574460" version="1" comment="libpq5 is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574461" version="1" comment="libpq5-32bit is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574462" version="1" comment="postgresql10 is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574463" version="1" comment="postgresql10-contrib is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574464" version="1" comment="postgresql10-devel is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574465" version="1" comment="postgresql10-docs is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574466" version="1" comment="postgresql10-server is &lt;10.15-0.2.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574467" version="1" comment="libecpg6 is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574468" version="1" comment="libpq5 is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574469" version="1" comment="libpq5-32bit is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574470" version="1" comment="postgresql10 is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574471" version="1" comment="postgresql10-contrib is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574472" version="1" comment="postgresql10-devel is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574473" version="1" comment="postgresql10-docs is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574474" version="1" comment="postgresql10-server is &lt;10.17-0.2.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656585" version="1" comment="libecpg6 is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656586" version="1" comment="libpq5 is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656587" version="1" comment="libpq5-32bit is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656588" version="1" comment="postgresql10 is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656589" version="1" comment="postgresql10-contrib is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656590" version="1" comment="postgresql10-devel is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656591" version="1" comment="postgresql10-docs is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656592" version="1" comment="postgresql10-server is &lt;10.19-0.2.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574475" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574476" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574477" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574478" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574479" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574480" version="1" comment="postgresql91-server is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574481" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574482" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574483" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574484" version="1" comment="postgresql91-server is &lt;9.1.18-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574485" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574486" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574487" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574488" version="1" comment="postgresql91-server is &lt;9.1.19-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574489" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574490" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574491" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574492" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574493" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574494" version="1" comment="postgresql94-server is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574495" version="1" comment="libecpg6 is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574496" version="1" comment="libpq5 is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574497" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574498" version="1" comment="postgresql94 is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574499" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574500" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574501" version="1" comment="postgresql94-server is &lt;9.4.9-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574502" version="1" comment="libecpg6 is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574503" version="1" comment="libpq5 is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574504" version="1" comment="libpq5-32bit is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574505" version="1" comment="postgresql94 is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574506" version="1" comment="postgresql94-contrib is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574507" version="1" comment="postgresql94-docs is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574508" version="1" comment="postgresql94-server is &lt;9.4.12-0.22.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574509" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574510" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574511" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574512" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574513" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574514" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574515" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574516" version="1" comment="libecpg6 is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574517" version="1" comment="libpq5 is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574518" version="1" comment="libpq5-32bit is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574519" version="1" comment="postgresql94 is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574520" version="1" comment="postgresql94-contrib is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574521" version="1" comment="postgresql94-docs is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574522" version="1" comment="postgresql94-server is &lt;9.4.15-0.23.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574523" version="1" comment="libecpg6 is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574524" version="1" comment="libpq5 is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574525" version="1" comment="libpq5-32bit is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574526" version="1" comment="postgresql94 is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574527" version="1" comment="postgresql94-contrib is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574528" version="1" comment="postgresql94-docs is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574529" version="1" comment="postgresql94-server is &lt;9.4.16-0.23.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574530" version="1" comment="libecpg6 is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574531" version="1" comment="libpq5 is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574532" version="1" comment="libpq5-32bit is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574533" version="1" comment="postgresql94 is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574534" version="1" comment="postgresql94-contrib is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574535" version="1" comment="postgresql94-docs is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574536" version="1" comment="postgresql94-server is &lt;9.4.17-0.23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574537" version="1" comment="libecpg6 is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574538" version="1" comment="libpq5 is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574539" version="1" comment="libpq5-32bit is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574540" version="1" comment="postgresql94 is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574541" version="1" comment="postgresql94-contrib is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574542" version="1" comment="postgresql94-docs is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574543" version="1" comment="postgresql94-server is &lt;9.4.19-0.23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574544" version="1" comment="postgresql94 is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574545" version="1" comment="postgresql94-contrib is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574546" version="1" comment="postgresql94-devel is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574547" version="1" comment="postgresql94-docs is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574548" version="1" comment="postgresql94-server is &lt;9.4.24-0.23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574549" version="1" comment="ppp is &lt;2.4.5.git-2.31.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574550" version="1" comment="ppp is &lt;2.4.5.git-2.32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574551" version="1" comment="procmail is &lt;3.22-240.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574552" version="1" comment="procmail is &lt;3.22-240.8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574553" version="1" comment="puppet is &lt;2.6.17-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574554" version="1" comment="puppet-server is &lt;2.6.17-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574555" version="1" comment="pwdutils is &lt;3.2.8-0.2.35 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574556" version="1" comment="puppet is &lt;2.7.26-0.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574557" version="1" comment="puppet-server is &lt;2.7.26-0.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574558" version="1" comment="puppet is &lt;2.7.26-0.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574559" version="1" comment="puppet-server is &lt;2.7.26-0.5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574560" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574561" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574562" version="1" comment="python is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574563" version="1" comment="python-base is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574564" version="1" comment="python-base-32bit is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574565" version="1" comment="python-curses is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574566" version="1" comment="python-demo is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574567" version="1" comment="python-gdbm is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574568" version="1" comment="python-idle is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574569" version="1" comment="python-tk is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574570" version="1" comment="python-xml is &lt;2.6.9-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574571" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574572" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574573" version="1" comment="python is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574574" version="1" comment="python-base is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574575" version="1" comment="python-base-32bit is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574576" version="1" comment="python-curses is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574577" version="1" comment="python-demo is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574578" version="1" comment="python-gdbm is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574579" version="1" comment="python-idle is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574580" version="1" comment="python-tk is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574581" version="1" comment="python-xml is &lt;2.6.9-40.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574582" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574583" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574584" version="1" comment="python is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574585" version="1" comment="python-base is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574586" version="1" comment="python-base-32bit is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574587" version="1" comment="python-curses is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574588" version="1" comment="python-demo is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574589" version="1" comment="python-gdbm is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574590" version="1" comment="python-idle is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574591" version="1" comment="python-tk is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574592" version="1" comment="python-xml is &lt;2.6.9-40.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574593" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574594" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574595" version="1" comment="python is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574596" version="1" comment="python-base is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574597" version="1" comment="python-base-32bit is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574598" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574599" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574600" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574601" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574602" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574603" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574604" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574605" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574606" version="1" comment="python is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574607" version="1" comment="python-base is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574608" version="1" comment="python-base-32bit is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574609" version="1" comment="python-curses is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574610" version="1" comment="python-demo is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574611" version="1" comment="python-gdbm is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574612" version="1" comment="python-idle is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574613" version="1" comment="python-tk is &lt;2.6.9-40.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574614" version="1" comment="python-xml is &lt;2.6.9-40.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574615" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574616" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574617" version="1" comment="python is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574618" version="1" comment="python-32bit is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574619" version="1" comment="python-base is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574620" version="1" comment="python-base-32bit is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574621" version="1" comment="python-curses is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574622" version="1" comment="python-demo is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574623" version="1" comment="python-gdbm is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574624" version="1" comment="python-idle is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574625" version="1" comment="python-tk is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574626" version="1" comment="python-xml is &lt;2.6.9-40.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574627" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574628" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574629" version="1" comment="python is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574630" version="1" comment="python-32bit is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574631" version="1" comment="python-base is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574632" version="1" comment="python-base-32bit is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574633" version="1" comment="python-curses is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574634" version="1" comment="python-demo is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574635" version="1" comment="python-gdbm is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574636" version="1" comment="python-idle is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574637" version="1" comment="python-tk is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574638" version="1" comment="python-xml is &lt;2.6.9-40.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574639" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574640" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574641" version="1" comment="python is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574642" version="1" comment="python-32bit is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574643" version="1" comment="python-base is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574644" version="1" comment="python-base-32bit is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574645" version="1" comment="python-curses is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574646" version="1" comment="python-demo is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574647" version="1" comment="python-gdbm is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574648" version="1" comment="python-idle is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574649" version="1" comment="python-tk is &lt;2.6.9-40.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574650" version="1" comment="python-xml is &lt;2.6.9-40.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574651" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574652" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574653" version="1" comment="python is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574654" version="1" comment="python-32bit is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574655" version="1" comment="python-base is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574656" version="1" comment="python-base-32bit is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574657" version="1" comment="python-curses is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574658" version="1" comment="python-demo is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574659" version="1" comment="python-gdbm is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574660" version="1" comment="python-idle is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574661" version="1" comment="python-tk is &lt;2.6.9-40.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574662" version="1" comment="python-xml is &lt;2.6.9-40.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574663" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574664" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574665" version="1" comment="python is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574666" version="1" comment="python-32bit is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574667" version="1" comment="python-base is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574668" version="1" comment="python-base-32bit is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574669" version="1" comment="python-curses is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574670" version="1" comment="python-demo is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574671" version="1" comment="python-doc is &lt;2.6-8.40.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574672" version="1" comment="python-doc-pdf is &lt;2.6-8.40.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574673" version="1" comment="python-gdbm is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574674" version="1" comment="python-idle is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574675" version="1" comment="python-tk is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574676" version="1" comment="python-xml is &lt;2.6.9-40.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574677" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574678" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574679" version="1" comment="python is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574680" version="1" comment="python-32bit is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574681" version="1" comment="python-base is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574682" version="1" comment="python-base-32bit is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574683" version="1" comment="python-curses is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574684" version="1" comment="python-demo is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574685" version="1" comment="python-doc is &lt;2.6-8.40.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574686" version="1" comment="python-doc-pdf is &lt;2.6-8.40.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574687" version="1" comment="python-gdbm is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574688" version="1" comment="python-idle is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574689" version="1" comment="python-tk is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574690" version="1" comment="python-xml is &lt;2.6.9-40.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574691" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574692" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574693" version="1" comment="python is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574694" version="1" comment="python-32bit is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574695" version="1" comment="python-base is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574696" version="1" comment="python-base-32bit is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574697" version="1" comment="python-curses is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574698" version="1" comment="python-demo is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574699" version="1" comment="python-gdbm is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574700" version="1" comment="python-idle is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574701" version="1" comment="python-tk is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574702" version="1" comment="python-xml is &lt;2.6.9-40.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631986" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631987" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631988" version="1" comment="python is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631989" version="1" comment="python-32bit is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631990" version="1" comment="python-base is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631991" version="1" comment="python-base-32bit is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631992" version="1" comment="python-curses is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631993" version="1" comment="python-demo is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631994" version="1" comment="python-doc is &lt;2.6-8.40.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631995" version="1" comment="python-doc-pdf is &lt;2.6-8.40.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631996" version="1" comment="python-gdbm is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631997" version="1" comment="python-idle is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631998" version="1" comment="python-tk is &lt;2.6.9-40.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631999" version="1" comment="python-xml is &lt;2.6.9-40.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651289" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651290" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651291" version="1" comment="python is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651292" version="1" comment="python-32bit is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651293" version="1" comment="python-base is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651294" version="1" comment="python-base-32bit is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651295" version="1" comment="python-curses is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651296" version="1" comment="python-demo is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651297" version="1" comment="python-doc is &lt;2.6-8.40.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651298" version="1" comment="python-doc-pdf is &lt;2.6-8.40.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651299" version="1" comment="python-gdbm is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651300" version="1" comment="python-idle is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651301" version="1" comment="python-tk is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651302" version="1" comment="python-xml is &lt;2.6.9-40.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574717" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574718" version="1" comment="python is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574719" version="1" comment="python-base is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574720" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574721" version="1" comment="python-demo is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574722" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574723" version="1" comment="python-idle is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574724" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574725" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574726" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574727" version="1" comment="python is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574728" version="1" comment="python-base is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574729" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574730" version="1" comment="python-demo is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574731" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574732" version="1" comment="python-idle is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574733" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574734" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574735" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574736" version="1" comment="python is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574737" version="1" comment="python-base is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574738" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574739" version="1" comment="python-demo is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574740" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574741" version="1" comment="python-idle is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574742" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574743" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574744" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574745" version="1" comment="python is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574746" version="1" comment="python-base is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574747" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574748" version="1" comment="python-demo is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574749" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574750" version="1" comment="python-idle is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574751" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574752" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574753" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574754" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574755" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574756" version="1" comment="python-32bit is &lt;2.6.9-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574757" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574758" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574759" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574760" version="1" comment="python-demo is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574761" version="1" comment="python-devel is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574762" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574763" version="1" comment="python-idle is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574764" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574765" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574766" version="1" comment="python-imaging is &lt;1.1.6-168.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574767" version="1" comment="python-numpy is &lt;1.3.0-1.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574768" version="1" comment="python-pam is &lt;0.5.0-3.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574769" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574770" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574771" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574772" version="1" comment="python is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574773" version="1" comment="python-32bit is &lt;2.6.8-0.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574774" version="1" comment="python-base is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574775" version="1" comment="python-base-32bit is &lt;2.6.8-0.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574776" version="1" comment="python-base-x86 is &lt;2.6.8-0.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574777" version="1" comment="python-curses is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574778" version="1" comment="python-demo is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574779" version="1" comment="python-doc is &lt;2.6-8.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574780" version="1" comment="python-doc-pdf is &lt;2.6-8.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574781" version="1" comment="python-gdbm is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574782" version="1" comment="python-idle is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574783" version="1" comment="python-tk is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574784" version="1" comment="python-x86 is &lt;2.6.8-0.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574785" version="1" comment="python-xml is &lt;2.6.8-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574786" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574787" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574788" version="1" comment="python27 is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574789" version="1" comment="python27-32bit is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574790" version="1" comment="python27-base is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574791" version="1" comment="python27-base-32bit is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574792" version="1" comment="python27-curses is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574793" version="1" comment="python27-demo is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574794" version="1" comment="python27-devel is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574795" version="1" comment="python27-doc is &lt;2.7.9-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574796" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574797" version="1" comment="python27-gdbm is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574798" version="1" comment="python27-idle is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574799" version="1" comment="python27-tk is &lt;2.7.9-6.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574800" version="1" comment="python27-xml is &lt;2.7.9-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574801" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574802" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574803" version="1" comment="python27 is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574804" version="1" comment="python27-32bit is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574805" version="1" comment="python27-base is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574806" version="1" comment="python27-base-32bit is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574807" version="1" comment="python27-curses is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574808" version="1" comment="python27-demo is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574809" version="1" comment="python27-devel is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574810" version="1" comment="python27-doc is &lt;2.7.9-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574811" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574812" version="1" comment="python27-gdbm is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574813" version="1" comment="python27-idle is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574814" version="1" comment="python27-tk is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574815" version="1" comment="python27-xml is &lt;2.7.9-6.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574816" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574817" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574818" version="1" comment="python27 is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574819" version="1" comment="python27-32bit is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574820" version="1" comment="python27-base is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574821" version="1" comment="python27-base-32bit is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574822" version="1" comment="python27-curses is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574823" version="1" comment="python27-demo is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574824" version="1" comment="python27-devel is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574825" version="1" comment="python27-doc is &lt;2.7.9-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574826" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574827" version="1" comment="python27-gdbm is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574828" version="1" comment="python27-idle is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574829" version="1" comment="python27-tk is &lt;2.7.9-6.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574830" version="1" comment="python27-xml is &lt;2.7.9-6.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574831" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574832" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574833" version="1" comment="python27 is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574834" version="1" comment="python27-32bit is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574835" version="1" comment="python27-base is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574836" version="1" comment="python27-base-32bit is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574837" version="1" comment="python27-curses is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574838" version="1" comment="python27-demo is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574839" version="1" comment="python27-devel is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574840" version="1" comment="python27-doc is &lt;2.7.9-6.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574841" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574842" version="1" comment="python27-gdbm is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574843" version="1" comment="python27-idle is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574844" version="1" comment="python27-tk is &lt;2.7.9-6.17.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574845" version="1" comment="python27-xml is &lt;2.7.9-6.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574846" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574847" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574848" version="1" comment="python27 is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574849" version="1" comment="python27-32bit is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574850" version="1" comment="python27-base is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574851" version="1" comment="python27-base-32bit is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574852" version="1" comment="python27-curses is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574853" version="1" comment="python27-demo is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574854" version="1" comment="python27-devel is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574855" version="1" comment="python27-doc is &lt;2.7.9-6.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574856" version="1" comment="python27-doc-pdf is &lt;2.7.9-6.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574857" version="1" comment="python27-gdbm is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574858" version="1" comment="python27-idle is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574859" version="1" comment="python27-tk is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574860" version="1" comment="python27-xml is &lt;2.7.9-6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574861" version="1" comment="libpython2_7-1_0 is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574862" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574863" version="1" comment="python27 is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574864" version="1" comment="python27-32bit is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574865" version="1" comment="python27-base is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574866" version="1" comment="python27-base-32bit is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574867" version="1" comment="python27-curses is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574868" version="1" comment="python27-demo is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574869" version="1" comment="python27-devel is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574870" version="1" comment="python27-doc is &lt;2.7.16-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574871" version="1" comment="python27-doc-pdf is &lt;2.7.16-6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574872" version="1" comment="python27-gdbm is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574873" version="1" comment="python27-idle is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574874" version="1" comment="python27-tk is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574875" version="1" comment="python27-xml is &lt;2.7.16-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574876" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574877" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574878" version="1" comment="python-rpm-macros is &lt;20190408.32abece-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574879" version="1" comment="python27 is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574880" version="1" comment="python27-32bit is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574881" version="1" comment="python27-base is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574882" version="1" comment="python27-base-32bit is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574883" version="1" comment="python27-curses is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574884" version="1" comment="python27-demo is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574885" version="1" comment="python27-devel is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574886" version="1" comment="python27-doc is &lt;2.7.17-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574887" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574888" version="1" comment="python27-gdbm is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574889" version="1" comment="python27-idle is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574890" version="1" comment="python27-tk is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574891" version="1" comment="python27-xml is &lt;2.7.17-6.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574892" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574893" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574894" version="1" comment="python27 is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574895" version="1" comment="python27-32bit is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574896" version="1" comment="python27-base is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574897" version="1" comment="python27-base-32bit is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574898" version="1" comment="python27-curses is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574899" version="1" comment="python27-demo is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574900" version="1" comment="python27-devel is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574901" version="1" comment="python27-doc is &lt;2.7.17-6.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574902" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574903" version="1" comment="python27-gdbm is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574904" version="1" comment="python27-idle is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574905" version="1" comment="python27-tk is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574906" version="1" comment="python27-xml is &lt;2.7.17-6.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574907" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574908" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574909" version="1" comment="python27 is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574910" version="1" comment="python27-32bit is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574911" version="1" comment="python27-base is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574912" version="1" comment="python27-base-32bit is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574913" version="1" comment="python27-curses is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574914" version="1" comment="python27-demo is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574915" version="1" comment="python27-devel is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574916" version="1" comment="python27-doc is &lt;2.7.17-6.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574917" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574918" version="1" comment="python27-gdbm is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574919" version="1" comment="python27-idle is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574920" version="1" comment="python27-tk is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574921" version="1" comment="python27-xml is &lt;2.7.17-6.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574922" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574923" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574924" version="1" comment="python27 is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574925" version="1" comment="python27-32bit is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574926" version="1" comment="python27-base is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574927" version="1" comment="python27-base-32bit is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574928" version="1" comment="python27-curses is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574929" version="1" comment="python27-demo is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574930" version="1" comment="python27-devel is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574931" version="1" comment="python27-doc is &lt;2.7.17-6.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574932" version="1" comment="python27-doc-pdf is &lt;2.7.17-6.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574933" version="1" comment="python27-gdbm is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574934" version="1" comment="python27-idle is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574935" version="1" comment="python27-tk is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574936" version="1" comment="python27-xml is &lt;2.7.17-6.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574937" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574938" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574939" version="1" comment="python27 is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574940" version="1" comment="python27-32bit is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574941" version="1" comment="python27-base is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574942" version="1" comment="python27-base-32bit is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574943" version="1" comment="python27-curses is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574944" version="1" comment="python27-demo is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574945" version="1" comment="python27-devel is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574946" version="1" comment="python27-doc is &lt;2.7.18-6.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574947" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574948" version="1" comment="python27-gdbm is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574949" version="1" comment="python27-idle is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574950" version="1" comment="python27-tk is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574951" version="1" comment="python27-xml is &lt;2.7.18-6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634733" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634734" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634735" version="1" comment="python27 is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634736" version="1" comment="python27-32bit is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634737" version="1" comment="python27-base is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634738" version="1" comment="python27-base-32bit is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634739" version="1" comment="python27-curses is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634740" version="1" comment="python27-demo is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634741" version="1" comment="python27-devel is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634742" version="1" comment="python27-doc is &lt;2.7.18-6.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634743" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634744" version="1" comment="python27-gdbm is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634745" version="1" comment="python27-idle is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634746" version="1" comment="python27-tk is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634747" version="1" comment="python27-xml is &lt;2.7.18-6.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668229" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668230" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668231" version="1" comment="python27 is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668232" version="1" comment="python27-32bit is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668233" version="1" comment="python27-base is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668234" version="1" comment="python27-base-32bit is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668235" version="1" comment="python27-curses is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668236" version="1" comment="python27-demo is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668237" version="1" comment="python27-devel is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668238" version="1" comment="python27-doc is &lt;2.7.18-6.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668239" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668240" version="1" comment="python27-gdbm is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668241" version="1" comment="python27-idle is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668242" version="1" comment="python27-tk is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668243" version="1" comment="python27-xml is &lt;2.7.18-6.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677044" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677045" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677046" version="1" comment="python27 is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677047" version="1" comment="python27-32bit is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677048" version="1" comment="python27-base is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677049" version="1" comment="python27-base-32bit is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677050" version="1" comment="python27-curses is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677051" version="1" comment="python27-demo is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677052" version="1" comment="python27-devel is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677053" version="1" comment="python27-doc is &lt;2.7.18-6.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677054" version="1" comment="python27-doc-pdf is &lt;2.7.18-6.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677055" version="1" comment="python27-gdbm is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677056" version="1" comment="python27-idle is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677057" version="1" comment="python27-tk is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677058" version="1" comment="python27-xml is &lt;2.7.18-6.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574952" version="1" comment="libpython2_7-1_0 is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574953" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574954" version="1" comment="python27 is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574955" version="1" comment="python27-32bit is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574956" version="1" comment="python27-base is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574957" version="1" comment="python27-base-32bit is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574958" version="1" comment="python27-curses is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574959" version="1" comment="python27-demo is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574960" version="1" comment="python27-devel is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574961" version="1" comment="python27-doc is &lt;2.7.16-6.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574962" version="1" comment="python27-doc-pdf is &lt;2.7.16-6.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574963" version="1" comment="python27-gdbm is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574964" version="1" comment="python27-idle is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574965" version="1" comment="python27-setuptools is &lt;18.0.1-4.2.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574966" version="1" comment="python27-tk is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574967" version="1" comment="python27-xml is &lt;2.7.16-6.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574968" version="1" comment="quagga is &lt;0.99.15-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574969" version="1" comment="quagga is &lt;0.99.15-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574970" version="1" comment="quagga is &lt;0.99.15-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574971" version="1" comment="quagga is &lt;0.99.15-0.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574972" version="1" comment="quagga is &lt;0.99.15-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574973" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574974" version="1" comment="quota is &lt;3.16-50.36.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574975" version="1" comment="quota-nfs is &lt;3.16-50.36.36.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574976" version="1" comment="radvd is &lt;1.1-1.24.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574977" version="1" comment="sendmail is &lt;8.14.3-50.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574978" version="1" comment="rsync is &lt;3.0.4-2.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574979" version="1" comment="rsync is &lt;3.0.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574980" version="1" comment="rsync is &lt;3.0.4-2.48.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574981" version="1" comment="rsync is &lt;3.0.4-2.48.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574982" version="1" comment="ruby is &lt;1.8.7.p357-0.9.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574983" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574984" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574985" version="1" comment="ruby is &lt;1.8.7.p357-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574986" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574987" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574988" version="1" comment="rzsz is &lt;0.12.21~rc-936.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574989" version="1" comment="cifs-mount is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574990" version="1" comment="ldapsmb is &lt;1.34b-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574991" version="1" comment="libsmbclient0 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574992" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574993" version="1" comment="libtalloc1 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574994" version="1" comment="libtalloc1-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574995" version="1" comment="libtdb1 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574996" version="1" comment="libtdb1-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574997" version="1" comment="libwbclient0 is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574998" version="1" comment="libwbclient0-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009574999" version="1" comment="samba is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575000" version="1" comment="samba-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575001" version="1" comment="samba-client is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575002" version="1" comment="samba-client-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575003" version="1" comment="samba-krb-printing is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575004" version="1" comment="samba-winbind is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575005" version="1" comment="samba-winbind-32bit is &lt;3.4.3-56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575006" version="1" comment="cifs-mount is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575007" version="1" comment="ldapsmb is &lt;1.34b-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575008" version="1" comment="libsmbclient0 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575009" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575010" version="1" comment="libtalloc1 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575011" version="1" comment="libtalloc1-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575012" version="1" comment="libtdb1 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575013" version="1" comment="libtdb1-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575014" version="1" comment="libwbclient0 is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575015" version="1" comment="libwbclient0-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575016" version="1" comment="samba is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575017" version="1" comment="samba-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575018" version="1" comment="samba-client is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575019" version="1" comment="samba-client-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575020" version="1" comment="samba-krb-printing is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575021" version="1" comment="samba-winbind is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575022" version="1" comment="samba-winbind-32bit is &lt;3.4.3-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575023" version="1" comment="cifs-mount is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575024" version="1" comment="ldapsmb is &lt;1.34b-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575025" version="1" comment="libsmbclient0 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575026" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575027" version="1" comment="libtalloc1 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575028" version="1" comment="libtalloc1-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575029" version="1" comment="libtdb1 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575030" version="1" comment="libtdb1-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575031" version="1" comment="libwbclient0 is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575032" version="1" comment="libwbclient0-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575033" version="1" comment="samba is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575034" version="1" comment="samba-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575035" version="1" comment="samba-client is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575036" version="1" comment="samba-client-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575037" version="1" comment="samba-krb-printing is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575038" version="1" comment="samba-winbind is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575039" version="1" comment="samba-winbind-32bit is &lt;3.4.3-63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575040" version="1" comment="cifs-mount is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575041" version="1" comment="ldapsmb is &lt;1.34b-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575042" version="1" comment="libsmbclient0 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575043" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575044" version="1" comment="libtalloc1 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575045" version="1" comment="libtalloc1-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575046" version="1" comment="libtdb1 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575047" version="1" comment="libtdb1-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575048" version="1" comment="libwbclient0 is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575049" version="1" comment="libwbclient0-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575050" version="1" comment="samba is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575051" version="1" comment="samba-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575052" version="1" comment="samba-client is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575053" version="1" comment="samba-client-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575054" version="1" comment="samba-krb-printing is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575055" version="1" comment="samba-winbind is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575056" version="1" comment="samba-winbind-32bit is &lt;3.4.3-66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575057" version="1" comment="cifs-mount is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575058" version="1" comment="ldapsmb is &lt;1.34b-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575059" version="1" comment="libsmbclient0 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575060" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575061" version="1" comment="libtalloc1 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575062" version="1" comment="libtalloc1-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575063" version="1" comment="libtdb1 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575064" version="1" comment="libtdb1-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575065" version="1" comment="libwbclient0 is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575066" version="1" comment="libwbclient0-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575067" version="1" comment="samba is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575068" version="1" comment="samba-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575069" version="1" comment="samba-client is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575070" version="1" comment="samba-client-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575071" version="1" comment="samba-krb-printing is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575072" version="1" comment="samba-winbind is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575073" version="1" comment="samba-winbind-32bit is &lt;3.4.3-69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575074" version="1" comment="cifs-mount is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575075" version="1" comment="ldapsmb is &lt;1.34b-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575076" version="1" comment="libsmbclient0 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575077" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575078" version="1" comment="libtalloc1 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575079" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575080" version="1" comment="libtdb1 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575081" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575082" version="1" comment="libwbclient0 is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575083" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575084" version="1" comment="samba is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575085" version="1" comment="samba-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575086" version="1" comment="samba-client is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575087" version="1" comment="samba-client-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575088" version="1" comment="samba-krb-printing is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575089" version="1" comment="samba-winbind is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575090" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575091" version="1" comment="cifs-mount is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575092" version="1" comment="ldapsmb is &lt;1.34b-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575093" version="1" comment="libsmbclient0 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575094" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575095" version="1" comment="libtalloc1 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575096" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575097" version="1" comment="libtdb1 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575098" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575099" version="1" comment="libwbclient0 is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575100" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575101" version="1" comment="samba is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575102" version="1" comment="samba-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575103" version="1" comment="samba-client is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575104" version="1" comment="samba-client-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575105" version="1" comment="samba-krb-printing is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575106" version="1" comment="samba-winbind is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575107" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575108" version="1" comment="cifs-mount is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575109" version="1" comment="ldapsmb is &lt;1.34b-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575110" version="1" comment="libsmbclient0 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575111" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575112" version="1" comment="libtalloc1 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575113" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575114" version="1" comment="libtdb1 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575115" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575116" version="1" comment="libwbclient0 is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575117" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575118" version="1" comment="samba is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575119" version="1" comment="samba-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575120" version="1" comment="samba-client is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575121" version="1" comment="samba-client-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575122" version="1" comment="samba-krb-printing is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575123" version="1" comment="samba-winbind is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575124" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575125" version="1" comment="cifs-mount is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575126" version="1" comment="ldapsmb is &lt;1.34b-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575127" version="1" comment="libsmbclient0 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575128" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575129" version="1" comment="libtalloc1 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575130" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575131" version="1" comment="libtdb1 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575132" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575133" version="1" comment="libwbclient0 is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575134" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575135" version="1" comment="samba is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575136" version="1" comment="samba-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575137" version="1" comment="samba-client is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575138" version="1" comment="samba-client-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575139" version="1" comment="samba-krb-printing is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575140" version="1" comment="samba-winbind is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575141" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575142" version="1" comment="cifs-mount is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575143" version="1" comment="ldapsmb is &lt;1.34b-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575144" version="1" comment="libsmbclient0 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575145" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575146" version="1" comment="libtalloc1 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575147" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575148" version="1" comment="libtdb1 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575149" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575150" version="1" comment="libwbclient0 is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575151" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575152" version="1" comment="samba is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575153" version="1" comment="samba-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575154" version="1" comment="samba-client is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575155" version="1" comment="samba-client-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575156" version="1" comment="samba-krb-printing is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575157" version="1" comment="samba-winbind is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575158" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575159" version="1" comment="cifs-mount is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575160" version="1" comment="ldapsmb is &lt;1.34b-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575161" version="1" comment="libsmbclient0 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575162" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575163" version="1" comment="libtalloc1 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575164" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575165" version="1" comment="libtdb1 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575166" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575167" version="1" comment="libwbclient0 is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575168" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575169" version="1" comment="samba is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575170" version="1" comment="samba-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575171" version="1" comment="samba-client is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575172" version="1" comment="samba-client-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575173" version="1" comment="samba-krb-printing is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575174" version="1" comment="samba-winbind is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575175" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672778" version="1" comment="cifs-mount is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672779" version="1" comment="ldapsmb is &lt;1.34b-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672780" version="1" comment="libsmbclient0 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672781" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672782" version="1" comment="libtalloc1 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672783" version="1" comment="libtalloc1-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672784" version="1" comment="libtdb1 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672785" version="1" comment="libtdb1-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672786" version="1" comment="libwbclient0 is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672787" version="1" comment="libwbclient0-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672788" version="1" comment="samba is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672789" version="1" comment="samba-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672790" version="1" comment="samba-client is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672791" version="1" comment="samba-client-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672792" version="1" comment="samba-krb-printing is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672793" version="1" comment="samba-winbind is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672794" version="1" comment="samba-winbind-32bit is &lt;3.4.3-70.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575176" version="1" comment="sane-backends is &lt;1.0.20-7.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575177" version="1" comment="sblim-sfcb is &lt;1.3.7-0.21.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575178" version="1" comment="screen is &lt;4.0.2-162.19.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575179" version="1" comment="socat is &lt;1.7.0.0-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575180" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656593" version="1" comment="libspeex is &lt;1.1.99.91-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656594" version="1" comment="libspeex-32bit is &lt;1.1.99.91-16.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575181" version="1" comment="libsqlite3-0 is &lt;3.6.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575182" version="1" comment="libsqlite3-0-32bit is &lt;3.6.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575183" version="1" comment="sqlite3 is &lt;3.6.4-4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575184" version="1" comment="libsqlite3-0 is &lt;3.6.4-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575185" version="1" comment="libsqlite3-0-32bit is &lt;3.6.4-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575186" version="1" comment="sqlite3 is &lt;3.6.4-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575187" version="1" comment="squid is &lt;2.7.STABLE5-2.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575188" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575189" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575190" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670261" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575191" version="1" comment="squid3 is &lt;3.1.12-8.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575192" version="1" comment="squid3 is &lt;3.1.23-8.16.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575193" version="1" comment="squid3 is &lt;3.1.23-8.16.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575194" version="1" comment="squid3 is &lt;3.1.23-8.16.37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575195" version="1" comment="squid3 is &lt;3.1.23-8.16.37.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575196" version="1" comment="squid3 is &lt;3.1.23-8.16.37.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575197" version="1" comment="squid3 is &lt;3.1.23-8.16.37.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575198" version="1" comment="squid3 is &lt;3.1.23-8.16.37.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671855" version="1" comment="squid3 is &lt;3.1.23-8.16.37.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575199" version="1" comment="squidGuard is &lt;1.4-13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575200" version="1" comment="squidGuard-doc is &lt;1.4-13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575201" version="1" comment="strongswan is &lt;4.4.0-6.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575202" version="1" comment="strongswan-doc is &lt;4.4.0-6.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575203" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575204" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575205" version="1" comment="strongswan is &lt;4.4.0-6.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575206" version="1" comment="strongswan-doc is &lt;4.4.0-6.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575207" version="1" comment="strongswan is &lt;4.4.0-6.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575208" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575209" version="1" comment="strongswan is &lt;4.4.0-6.36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575210" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652840" version="1" comment="strongswan is &lt;4.4.0-6.36.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652841" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664947" version="1" comment="strongswan is &lt;4.4.0-6.36.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664948" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575211" version="1" comment="sudo is &lt;1.7.6p2-0.2.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575212" version="1" comment="sudo is &lt;1.7.6p2-0.2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575213" version="1" comment="sudo is &lt;1.7.6p2-0.2.21.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575214" version="1" comment="syslog-ng is &lt;2.0.9-27.34.40.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575215" version="1" comment="system-config-printer is &lt;1.0.8-9.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575216" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575217" version="1" comment="t1lib is &lt;5.1.1-100.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575218" version="1" comment="taglib is &lt;1.5-19.23.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575219" version="1" comment="taglib-32bit is &lt;1.5-19.23.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575220" version="1" comment="taglib-x86 is &lt;1.5-19.23.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575221" version="1" comment="tar is &lt;1.26-1.2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575222" version="1" comment="tar is &lt;1.27.1-14.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575223" version="1" comment="tar is &lt;1.27.1-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575224" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575225" version="1" comment="tcpdump is &lt;3.9.8-1.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575226" version="1" comment="tcpdump is &lt;3.9.8-1.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575227" version="1" comment="tcpdump is &lt;3.9.8-1.30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575228" version="1" comment="tcpdump is &lt;3.9.8-1.30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668244" version="1" comment="tcpdump is &lt;3.9.8-1.30.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575229" version="1" comment="tftp is &lt;0.48-101.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575230" version="1" comment="tgt is &lt;0.9.10-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575231" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575232" version="1" comment="tiff is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575233" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575234" version="1" comment="tiff is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575235" version="1" comment="libtiff3 is &lt;3.8.2-141.168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575236" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575237" version="1" comment="tiff is &lt;3.8.2-141.168.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575238" version="1" comment="libtiff3 is &lt;3.8.2-141.169.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575239" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575240" version="1" comment="tiff is &lt;3.8.2-141.169.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575241" version="1" comment="libtiff3 is &lt;3.8.2-141.169.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575242" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575243" version="1" comment="tiff is &lt;3.8.2-141.169.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575244" version="1" comment="libtiff3 is &lt;3.8.2-141.169.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575245" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575246" version="1" comment="tiff is &lt;3.8.2-141.169.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575247" version="1" comment="libtiff3 is &lt;3.8.2-141.169.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575248" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575249" version="1" comment="tiff is &lt;3.8.2-141.169.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575250" version="1" comment="libtiff3 is &lt;3.8.2-141.169.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575251" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575252" version="1" comment="tiff is &lt;3.8.2-141.169.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575253" version="1" comment="libtiff3 is &lt;3.8.2-141.169.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575254" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575255" version="1" comment="tiff is &lt;3.8.2-141.169.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575256" version="1" comment="libtiff3 is &lt;3.8.2-141.169.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575257" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575258" version="1" comment="tiff is &lt;3.8.2-141.169.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575259" version="1" comment="libtiff3 is &lt;3.8.2-141.169.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575260" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575261" version="1" comment="tiff is &lt;3.8.2-141.169.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666461" version="1" comment="libtiff3 is &lt;3.8.2-141.169.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666462" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666463" version="1" comment="tiff is &lt;3.8.2-141.169.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575262" version="1" comment="tightvnc is &lt;1.3.9-81.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575263" version="1" comment="tomcat6 is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575264" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575265" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575266" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575267" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575268" version="1" comment="tomcat6-lib is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575269" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575270" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575271" version="1" comment="tomcat6 is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575272" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575273" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575274" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575275" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575276" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575277" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575278" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575279" version="1" comment="tomcat6 is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575280" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575281" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575282" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575283" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575284" version="1" comment="tomcat6-lib is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575285" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575286" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575287" version="1" comment="tomcat6 is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575288" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575289" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575290" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575291" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575292" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575293" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575294" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575295" version="1" comment="tomcat6 is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575296" version="1" comment="tomcat6-admin-webapps is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575297" version="1" comment="tomcat6-docs-webapp is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575298" version="1" comment="tomcat6-javadoc is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575299" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575300" version="1" comment="tomcat6-lib is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575301" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575302" version="1" comment="tomcat6-webapps is &lt;6.0.53-0.57.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575303" version="1" comment="transfig is &lt;3.2.5-160.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575304" version="1" comment="transfig is &lt;3.2.5-160.6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651176" version="1" comment="transfig is &lt;3.2.8a-1.160.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653706" version="1" comment="transfig is &lt;3.2.8b-160.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575305" version="1" comment="unrar is &lt;3.80.2-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575306" version="1" comment="unrar is &lt;5.6.1-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575307" version="1" comment="unzip is &lt;5.52-142.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575308" version="1" comment="unzip is &lt;5.52-142.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575309" version="1" comment="unzip is &lt;5.52-142.34.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575310" version="1" comment="unzip is &lt;5.52-142.34.8.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669728" version="1" comment="unzip is &lt;5.52-142.34.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575311" version="1" comment="fuse is &lt;2.7.2-61.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575312" version="1" comment="libblkid1 is &lt;2.16-6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575313" version="1" comment="libfuse2 is &lt;2.7.2-61.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575314" version="1" comment="libuuid1 is &lt;2.16-6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575315" version="1" comment="libuuid1-32bit is &lt;2.16-6.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575316" version="1" comment="libuuid1-x86 is &lt;2.16-6.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575317" version="1" comment="util-linux is &lt;2.16-6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575318" version="1" comment="util-linux-lang is &lt;2.16-6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575319" version="1" comment="uuid-runtime is &lt;2.16-6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575320" version="1" comment="gvim is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575321" version="1" comment="vim is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575322" version="1" comment="vim-base is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575323" version="1" comment="vim-data is &lt;7.2-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575324" version="1" comment="gvim is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575325" version="1" comment="vim is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575326" version="1" comment="vim-base is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575327" version="1" comment="vim-data is &lt;7.2-13.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575328" version="1" comment="gvim is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575329" version="1" comment="vim is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575330" version="1" comment="vim-base is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575331" version="1" comment="vim-data is &lt;7.2-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575332" version="1" comment="gvim is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575333" version="1" comment="vim is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575334" version="1" comment="vim-base is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575335" version="1" comment="vim-data is &lt;7.2-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575336" version="1" comment="vino is &lt;2.28.1-2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575337" version="1" comment="vino-lang is &lt;2.28.1-2.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575338" version="1" comment="vino is &lt;2.28.1-2.5.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575339" version="1" comment="vino-lang is &lt;2.28.1-2.5.3.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575340" version="1" comment="vte is &lt;0.22.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575341" version="1" comment="vte-doc is &lt;0.22.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575342" version="1" comment="vte-lang is &lt;0.22.5-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575343" version="1" comment="w3m is &lt;0.5.2-132.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575344" version="1" comment="w3m is &lt;0.5.3.git20161120-4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575345" version="1" comment="w3m is &lt;0.5.3.git20161120-5.3.37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575346" version="1" comment="libwavpack1 is &lt;4.50.1-1.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575347" version="1" comment="libwavpack1 is &lt;4.50.1-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575348" version="1" comment="libwavpack1 is &lt;4.50.1-1.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575349" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575350" version="1" comment="wget is &lt;1.11.4-1.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575351" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575352" version="1" comment="wget is &lt;1.11.4-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575353" version="1" comment="wget-openssl1 is &lt;1.11.4-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575354" version="1" comment="wget is &lt;1.11.4-1.41.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575355" version="1" comment="wget-openssl1 is &lt;1.11.4-1.41.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575356" version="1" comment="wireshark is &lt;1.4.13-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575357" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575358" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575359" version="1" comment="wireshark is &lt;1.12.11-0.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575360" version="1" comment="wireshark is &lt;1.12.13-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575361" version="1" comment="libcares2 is &lt;1.7.4-7.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575362" version="1" comment="wireshark is &lt;2.0.12-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575363" version="1" comment="wireshark-gtk is &lt;2.0.12-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575364" version="1" comment="wireshark is &lt;2.0.13-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575365" version="1" comment="wireshark-gtk is &lt;2.0.13-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575366" version="1" comment="wireshark is &lt;2.0.14-40.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575367" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575368" version="1" comment="libjack0 is &lt;0.109.2-67.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575369" version="1" comment="libsmi is &lt;0.4.5-2.7.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575370" version="1" comment="libwireshark8 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575371" version="1" comment="libwiretap6 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575372" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575373" version="1" comment="libwsutil7 is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575374" version="1" comment="portaudio is &lt;19-234.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575375" version="1" comment="wireshark is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575376" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575377" version="1" comment="libwireshark8 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575378" version="1" comment="libwiretap6 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575379" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575380" version="1" comment="libwsutil7 is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575381" version="1" comment="wireshark is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575382" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575383" version="1" comment="libwireshark8 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575384" version="1" comment="libwiretap6 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575385" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575386" version="1" comment="libwsutil7 is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575387" version="1" comment="wireshark is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575388" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575389" version="1" comment="libwireshark8 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575390" version="1" comment="libwiretap6 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575391" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575392" version="1" comment="libwsutil7 is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575393" version="1" comment="wireshark is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575394" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575395" version="1" comment="libwireshark8 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575396" version="1" comment="libwiretap6 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575397" version="1" comment="libwscodecs1 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575398" version="1" comment="libwsutil7 is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575399" version="1" comment="wireshark is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575400" version="1" comment="wireshark-gtk is &lt;2.2.16-40.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575401" version="1" comment="libwireshark8 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575402" version="1" comment="libwiretap6 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575403" version="1" comment="libwscodecs1 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575404" version="1" comment="libwsutil7 is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575405" version="1" comment="wireshark is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575406" version="1" comment="wireshark-gtk is &lt;2.2.17-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575407" version="1" comment="wpa_supplicant is &lt;0.6.9-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590281" version="1" comment="xen is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590282" version="1" comment="xen-doc-html is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590283" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590284" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575412" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590285" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590286" version="1" comment="xen-libs is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590287" version="1" comment="xen-tools is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590288" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575417" version="1" comment="xen is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575418" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575419" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575420" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575421" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575422" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575423" version="1" comment="xen-libs is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575424" version="1" comment="xen-tools is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575425" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575426" version="1" comment="xen is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575427" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575428" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575429" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575430" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575431" version="1" comment="xen-libs is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575432" version="1" comment="xen-tools is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575433" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-27.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575434" version="1" comment="xen is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575435" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575436" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575437" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575438" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575439" version="1" comment="xen-libs is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575440" version="1" comment="xen-tools is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575441" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575442" version="1" comment="xen is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575443" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575444" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575445" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575446" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575447" version="1" comment="xen-libs is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575448" version="1" comment="xen-tools is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575449" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-36.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575450" version="1" comment="xen is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575451" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575452" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575453" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575454" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575455" version="1" comment="xen-libs is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575456" version="1" comment="xen-tools is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575457" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-41.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575458" version="1" comment="xen is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575459" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575460" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575461" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575462" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575463" version="1" comment="xen-libs is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575464" version="1" comment="xen-tools is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575465" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575466" version="1" comment="xen is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575467" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575468" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575469" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575470" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575471" version="1" comment="xen-libs is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575472" version="1" comment="xen-tools is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575473" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575474" version="1" comment="xen is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575475" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575476" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575477" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575478" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575479" version="1" comment="xen-libs is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575480" version="1" comment="xen-tools is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575481" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575482" version="1" comment="xen is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575483" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575484" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575485" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575486" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575487" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575488" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575489" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575490" version="1" comment="xen is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575491" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575492" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575493" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575494" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575495" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575496" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575497" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575498" version="1" comment="xen is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575499" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575500" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575501" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575502" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575503" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575504" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575505" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575506" version="1" comment="xen is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575507" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575508" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575509" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575510" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575511" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575512" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575513" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.14.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575514" version="1" comment="xen is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575515" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575516" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575517" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575518" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575519" version="1" comment="xen-libs is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575520" version="1" comment="xen-tools is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575521" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-53.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575522" version="1" comment="xen is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575523" version="1" comment="xen-doc-html is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575524" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575525" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575526" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575527" version="1" comment="xen-libs is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575528" version="1" comment="xen-tools is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575529" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_20-53.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575530" version="1" comment="xen is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575531" version="1" comment="xen-doc-html is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575532" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575533" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575534" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575535" version="1" comment="xen-libs is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575536" version="1" comment="xen-tools is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575537" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_20-53.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575538" version="1" comment="libvirt is &lt;0.7.6-1.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575539" version="1" comment="libvirt-doc is &lt;0.7.6-1.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575540" version="1" comment="libvirt-python is &lt;0.7.6-1.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575541" version="1" comment="vm-install is &lt;0.4.30-0.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575542" version="1" comment="xen is &lt;4.0.1_21326_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575543" version="1" comment="xen-doc-html is &lt;4.0.1_21326_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575544" version="1" comment="xen-doc-pdf is &lt;4.0.1_21326_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575545" version="1" comment="xen-kmp-default is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575546" version="1" comment="xen-kmp-pae is &lt;4.0.1_21326_08_2.6.32.36_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575547" version="1" comment="xen-libs is &lt;4.0.1_21326_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575548" version="1" comment="xen-tools is &lt;4.0.1_21326_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575549" version="1" comment="xen-tools-domU is &lt;4.0.1_21326_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575550" version="1" comment="vm-install is &lt;0.4.31-0.3.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575551" version="1" comment="xen is &lt;4.0.2_21511_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575552" version="1" comment="xen-doc-html is &lt;4.0.2_21511_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575553" version="1" comment="xen-doc-pdf is &lt;4.0.2_21511_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575554" version="1" comment="xen-kmp-default is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575555" version="1" comment="xen-kmp-pae is &lt;4.0.2_21511_02_2.6.32.43_0.4-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575556" version="1" comment="xen-libs is &lt;4.0.2_21511_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575557" version="1" comment="xen-tools is &lt;4.0.2_21511_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575558" version="1" comment="xen-tools-domU is &lt;4.0.2_21511_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575559" version="1" comment="libvirt is &lt;0.7.6-1.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575560" version="1" comment="libvirt-doc is &lt;0.7.6-1.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575561" version="1" comment="libvirt-python is &lt;0.7.6-1.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575562" version="1" comment="virt-utils is &lt;1.1.3-1.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575563" version="1" comment="xen is &lt;4.0.3_21548_02-0.5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575564" version="1" comment="xen-doc-html is &lt;4.0.3_21548_02-0.5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575565" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_02-0.5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575566" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575567" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575568" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_02_2.6.32.54_0.3-0.5.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575569" version="1" comment="xen-libs is &lt;4.0.3_21548_02-0.5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575570" version="1" comment="xen-tools is &lt;4.0.3_21548_02-0.5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575571" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_02-0.5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575572" version="1" comment="xen is &lt;4.0.3_21548_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575573" version="1" comment="xen-doc-html is &lt;4.0.3_21548_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575574" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575575" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575576" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575577" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_04_2.6.32.59_0.5-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575578" version="1" comment="xen-libs is &lt;4.0.3_21548_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575579" version="1" comment="xen-tools is &lt;4.0.3_21548_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575580" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575581" version="1" comment="vm-install is &lt;0.4.34-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575582" version="1" comment="xen is &lt;4.0.3_21548_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575583" version="1" comment="xen-doc-html is &lt;4.0.3_21548_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575584" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575585" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575586" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575587" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_08_2.6.32.59_0.7-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575588" version="1" comment="xen-libs is &lt;4.0.3_21548_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575589" version="1" comment="xen-tools is &lt;4.0.3_21548_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575590" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575591" version="1" comment="xen is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575592" version="1" comment="xen-doc-html is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575593" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575594" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575595" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575596" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575597" version="1" comment="xen-libs is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575598" version="1" comment="xen-tools is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575599" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_10-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575600" version="1" comment="xen is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575601" version="1" comment="xen-doc-html is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575602" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575603" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575604" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575605" version="1" comment="xen-libs is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575606" version="1" comment="xen-tools is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575607" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_11-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575608" version="1" comment="xen is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575609" version="1" comment="xen-doc-html is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575610" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575611" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575612" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575613" version="1" comment="xen-libs is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575614" version="1" comment="xen-tools is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575615" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_14-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591430" version="1" comment="xen is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591431" version="1" comment="xen-doc-html is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591432" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591433" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575620" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591434" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591435" version="1" comment="xen-libs is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591436" version="1" comment="xen-tools is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591437" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_16-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575625" version="1" comment="xen is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575626" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575627" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575628" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575629" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575630" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575631" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575632" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593940" version="1" comment="xen is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593941" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593942" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593943" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575637" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593944" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593945" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593946" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593947" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594039" version="1" comment="xen is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594040" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594041" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594042" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575646" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594043" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594044" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594045" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594046" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575651" version="1" comment="xen is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575652" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575653" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575654" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575655" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575656" version="1" comment="xen-libs is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575657" version="1" comment="xen-tools is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575658" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575659" version="1" comment="xerces-j2 is &lt;2.8.1-238.29.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592637" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592638" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575662" version="1" comment="xorg-x11-libICE is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575663" version="1" comment="xorg-x11-libICE-32bit is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575664" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575665" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575666" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575667" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575668" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575669" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575670" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575671" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575672" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575673" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575674" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575675" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575676" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575677" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575678" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575679" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575680" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575681" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575682" version="1" comment="xorg-x11-libXdmcp is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591187" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591188" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591189" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591190" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575687" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575688" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591220" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591221" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575691" version="1" comment="xorg-x11-libXpm is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575692" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591206" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591207" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575695" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575696" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591214" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591215" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591208" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591209" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575701" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575702" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575703" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575704" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575705" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575706" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575707" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575708" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591222" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591223" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575711" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575712" version="1" comment="xorg-x11-server is &lt;7.4-27.40.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575713" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575714" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575715" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575716" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575717" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575718" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575719" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575720" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575721" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575722" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575723" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575724" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575725" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575726" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575727" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575728" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575729" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575730" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575731" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659909" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659910" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659911" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660156" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.79.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660157" version="1" comment="xorg-x11-server is &lt;7.4-27.40.79.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660158" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.79.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575732" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575733" version="1" comment="libpciaccess0 is &lt;7.4_0.11.0-0.4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575734" version="1" comment="libpciaccess0-32bit is &lt;7.4_0.11.0-0.4.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575735" version="1" comment="libpciaccess0-x86 is &lt;7.4_0.11.0-0.4.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575736" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575737" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575738" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575739" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575740" version="1" comment="xorg-x11-server is &lt;7.4-27.40.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575741" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575742" version="1" comment="xpdf-tools is &lt;3.02-138.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575743" version="1" comment="xpdf-tools is &lt;3.02-138.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575744" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575745" version="1" comment="xterm is &lt;238-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679343" version="1" comment="liblzma5 is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679344" version="1" comment="liblzma5-32bit is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679345" version="1" comment="xz is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679346" version="1" comment="xz-lang is &lt;5.0.3-0.12.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575746" version="1" comment="yast2-storage is &lt;2.17.99.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575747" version="1" comment="yast2-storage-lib is &lt;2.17.99.5-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575748" version="1" comment="zlib is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575749" version="1" comment="zlib-32bit is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575750" version="1" comment="zlib-devel is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575751" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677059" version="1" comment="zlib is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677060" version="1" comment="zlib-32bit is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677061" version="1" comment="zlib-devel is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677062" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575752" version="1" comment="zsh is &lt;4.3.6-67.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671293" version="1" comment="zsh is &lt;4.3.6-67.9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575753" version="1" comment="zypper is &lt;1.3.21-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575754" version="1" comment="MozillaFirefox is &lt;10.0.2-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575755" version="1" comment="MozillaFirefox-translations is &lt;10.0.2-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575756" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.0-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575757" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.0-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575758" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.0-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575759" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.0-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575760" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.0-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575761" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575762" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575763" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575764" version="1" comment="openssl is &lt;0.9.8j-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575765" version="1" comment="openssl-doc is &lt;0.9.8j-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575766" version="1" comment="libpng12-0 is &lt;1.2.31-5.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575767" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575768" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575769" version="1" comment="puppet is &lt;2.6.12-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575770" version="1" comment="puppet-server is &lt;2.6.12-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575771" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575772" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575773" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575774" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575775" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575776" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575777" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575778" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575779" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575780" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575781" version="1" comment="Mesa is &lt;7.11.2-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575782" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575783" version="1" comment="Mesa-x86 is &lt;7.11.2-0.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575784" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575785" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575786" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575787" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575788" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575789" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575790" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575791" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20.38 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575792" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575793" version="1" comment="firefox-fontconfig is &lt;2.11.0-4.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575794" version="1" comment="libfreebl3 is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575795" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575796" version="1" comment="mozilla-nspr is &lt;4.12-25.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575797" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575798" version="1" comment="mozilla-nspr-devel is &lt;4.12-25.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575799" version="1" comment="mozilla-nss is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575800" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575801" version="1" comment="mozilla-nss-devel is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575802" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575803" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575804" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575805" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575806" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575807" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575808" version="1" comment="mozilla-nss-devel is &lt;3.16-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575809" version="1" comment="xen is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575810" version="1" comment="xen-devel is &lt;4.1.6_08-17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575811" version="1" comment="xen-doc-html is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575812" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575813" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575814" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575815" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575816" version="1" comment="xen-libs is &lt;4.1.6_08-17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575817" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575818" version="1" comment="xen-tools is &lt;4.1.6_08-17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575819" version="1" comment="xen-tools-domU is &lt;4.1.6_08-17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575820" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575821" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575822" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575823" version="1" comment="php5 is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575824" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575825" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575826" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575827" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575828" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575829" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575830" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575831" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575832" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575833" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575834" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575835" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575836" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575837" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575838" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575839" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575840" version="1" comment="php5-json is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575841" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575842" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575843" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575844" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575845" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575846" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575847" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575848" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575849" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575850" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575851" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575852" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575853" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575854" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575855" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575856" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575857" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575858" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575859" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575860" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575861" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575862" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575863" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575864" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575865" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575866" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575867" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575868" version="1" comment="php53 is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575869" version="1" comment="php53-bcmath is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575870" version="1" comment="php53-bz2 is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575871" version="1" comment="php53-calendar is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575872" version="1" comment="php53-ctype is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575873" version="1" comment="php53-curl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575874" version="1" comment="php53-dba is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575875" version="1" comment="php53-dom is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575876" version="1" comment="php53-exif is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575877" version="1" comment="php53-fastcgi is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575878" version="1" comment="php53-fileinfo is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575879" version="1" comment="php53-ftp is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575880" version="1" comment="php53-gd is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575881" version="1" comment="php53-gettext is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575882" version="1" comment="php53-gmp is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575883" version="1" comment="php53-iconv is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575884" version="1" comment="php53-intl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575885" version="1" comment="php53-json is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575886" version="1" comment="php53-ldap is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575887" version="1" comment="php53-mbstring is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575888" version="1" comment="php53-mcrypt is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575889" version="1" comment="php53-mysql is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575890" version="1" comment="php53-odbc is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575891" version="1" comment="php53-openssl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575892" version="1" comment="php53-pcntl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575893" version="1" comment="php53-pdo is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575894" version="1" comment="php53-pear is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575895" version="1" comment="php53-pgsql is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575896" version="1" comment="php53-pspell is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575897" version="1" comment="php53-shmop is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575898" version="1" comment="php53-snmp is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575899" version="1" comment="php53-soap is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575900" version="1" comment="php53-suhosin is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575901" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575902" version="1" comment="php53-sysvsem is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575903" version="1" comment="php53-sysvshm is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575904" version="1" comment="php53-tokenizer is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575905" version="1" comment="php53-wddx is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575906" version="1" comment="php53-xmlreader is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575907" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575908" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575909" version="1" comment="php53-xsl is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575910" version="1" comment="php53-zip is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575911" version="1" comment="php53-zlib is &lt;5.3.8-0.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575912" version="1" comment="automake is &lt;1.10.1-4.131.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575913" version="1" comment="bind is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575914" version="1" comment="bind-chrootenv is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575915" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575916" version="1" comment="bind-doc is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575917" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575918" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575919" version="1" comment="bind-libs-x86 is &lt;9.9.4P2-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575920" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575921" version="1" comment="bind is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575922" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575923" version="1" comment="bind-devel is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575924" version="1" comment="bind-doc is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575925" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575926" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575927" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575928" version="1" comment="bind is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575929" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575930" version="1" comment="bind-devel is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575931" version="1" comment="bind-doc is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575932" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575933" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575934" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575935" version="1" comment="bind is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575936" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575937" version="1" comment="bind-devel is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575938" version="1" comment="bind-doc is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575939" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575940" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575941" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575942" version="1" comment="bind is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575943" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575944" version="1" comment="bind-devel is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575945" version="1" comment="bind-doc is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575946" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575947" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575948" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575949" version="1" comment="bind is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575950" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575951" version="1" comment="bind-devel is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575952" version="1" comment="bind-doc is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575953" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575954" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575955" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575956" version="1" comment="bind is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575957" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575958" version="1" comment="bind-devel is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575959" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575960" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575961" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575962" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575963" version="1" comment="bind is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575964" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575965" version="1" comment="bind-devel is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575966" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575967" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575968" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575969" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575970" version="1" comment="bind is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575971" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575972" version="1" comment="bind-devel is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575973" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575974" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575975" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575976" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575977" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575978" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575979" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575980" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575981" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575982" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575983" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575984" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575985" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575986" version="1" comment="ldapsmb is &lt;1.34b-12.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575987" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575988" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575989" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575990" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575991" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575992" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575993" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575994" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575995" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575996" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575997" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575998" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009575999" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576000" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576001" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576002" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576003" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576004" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576005" version="1" comment="samba is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576006" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576007" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576008" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576009" version="1" comment="samba-client-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576010" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576011" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576012" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576013" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576014" version="1" comment="samba-x86 is &lt;3.6.3-0.33.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576015" version="1" comment="clamav is &lt;0.97.8-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576016" version="1" comment="coreutils is &lt;8.12-6.25.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576017" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576018" version="1" comment="coreutils-x86 is &lt;8.12-6.25.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576019" version="1" comment="cups is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576020" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576021" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576022" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576023" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.48.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576024" version="1" comment="curl is &lt;7.19.7-1.20.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576025" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576026" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576027" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.20.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576028" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576029" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576030" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576031" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576032" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576033" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576034" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576035" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576036" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576037" version="1" comment="fastjar is &lt;0.95-1.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576038" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576039" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576040" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576041" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576042" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576043" version="1" comment="libfreebl3-x86 is &lt;3.13.6-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576044" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576045" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576046" version="1" comment="mozilla-nspr-x86 is &lt;4.9.2-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576047" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576048" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576049" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576050" version="1" comment="mozilla-nss-x86 is &lt;3.13.6-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576051" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576052" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576053" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576054" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576055" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576056" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576057" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576058" version="1" comment="mozilla-nspr-x86 is &lt;4.9.3-0.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576059" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576060" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576061" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576062" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576063" version="1" comment="libfreebl3-x86 is &lt;3.14-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576064" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576065" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576066" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576067" version="1" comment="mozilla-nss-x86 is &lt;3.14-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576068" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576069" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576070" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576071" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576072" version="1" comment="libfreebl3-x86 is &lt;3.14.1-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576073" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576074" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576075" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576076" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576077" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576078" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576079" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576080" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576081" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576082" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576083" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576084" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576085" version="1" comment="libfreebl3-x86 is &lt;3.14.2-0.4.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576086" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576087" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576088" version="1" comment="mozilla-nspr-x86 is &lt;4.9.5-0.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576089" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576090" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576091" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576092" version="1" comment="mozilla-nss-x86 is &lt;3.14.2-0.4.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576093" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576094" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576095" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576096" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576097" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576098" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.4.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576099" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576100" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576101" version="1" comment="mozilla-nspr-x86 is &lt;4.9.6-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576102" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576103" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576104" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576105" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.4.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576106" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576107" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576108" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576109" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576110" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576111" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576112" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576113" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571388" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571389" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009571390" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576114" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576115" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576116" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576117" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576118" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576119" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576120" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576121" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576122" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576123" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576124" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12.19 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576125" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576126" version="1" comment="libfreebl3 is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576127" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576128" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576129" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576130" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-16.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576131" version="1" comment="mozilla-nss is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576132" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576133" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576134" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576135" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576136" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576137" version="1" comment="libfreebl3 is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576138" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576139" version="1" comment="mozilla-nspr is &lt;4.12-19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576140" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576141" version="1" comment="mozilla-nspr-devel is &lt;4.12-19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576142" version="1" comment="mozilla-nss is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576143" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576144" version="1" comment="mozilla-nss-devel is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576145" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576146" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576147" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576148" version="1" comment="freeradius-server is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576149" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576150" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576151" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576152" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576153" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576154" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576155" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576156" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576157" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576158" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576159" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576160" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576161" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576162" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576163" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576164" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576165" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576166" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576167" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576168" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576169" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576170" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576171" version="1" comment="glibc is &lt;2.11.3-17.45.49.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576172" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576173" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576174" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576175" version="1" comment="glibc-html is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576176" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576177" version="1" comment="glibc-info is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576178" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576179" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576180" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.45.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576181" version="1" comment="glibc-profile is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576182" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576183" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.45.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576184" version="1" comment="glibc-x86 is &lt;2.11.3-17.45.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576185" version="1" comment="nscd is &lt;2.11.3-17.45.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576186" version="1" comment="glibc is &lt;2.11.3-17.45.66.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576187" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576188" version="1" comment="glibc-devel is &lt;2.11.3-17.45.66.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576189" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576190" version="1" comment="glibc-html is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576191" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576192" version="1" comment="glibc-info is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576193" version="1" comment="glibc-locale is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576194" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576195" version="1" comment="glibc-profile is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576196" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576197" version="1" comment="nscd is &lt;2.11.3-17.45.66.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576198" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576199" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576200" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576201" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576202" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576203" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576204" version="1" comment="gtk2 is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576205" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576206" version="1" comment="gtk2-doc is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576207" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576208" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576209" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576210" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576211" version="1" comment="libicu is &lt;4.0-7.26.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576212" version="1" comment="libicu-32bit is &lt;4.0-7.26.15 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576213" version="1" comment="libicu-doc is &lt;4.0-7.26.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576214" version="1" comment="libicu-x86 is &lt;4.0-7.26.15 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576215" version="1" comment="inn is &lt;2.4.2-170.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576216" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576217" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.18-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576218" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.18-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576219" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576220" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576221" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576222" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576223" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576224" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576225" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.7-10.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576226" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576227" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-49.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576228" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576229" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576230" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576231" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576232" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576233" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.25-69.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576234" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576235" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576236" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576237" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576238" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576239" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576240" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576241" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576242" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576243" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576244" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576245" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576246" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576247" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576248" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576249" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.15-46.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576250" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576251" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576252" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576253" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576254" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.0-0.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576255" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.0-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576256" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.0-0.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576257" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.0-0.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576258" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.0-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576259" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576260" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.10-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576261" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.10-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576262" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576263" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.10-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576264" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576265" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.20-42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576266" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.20-42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576267" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576268" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.20-42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576269" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576270" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576271" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.30-45.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576272" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576273" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576274" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.40-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576275" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.40-52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576276" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.40-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576277" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.40-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576278" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.40-52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576279" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.50-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576280" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.50-55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576281" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.50-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576282" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.50-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576283" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.50-55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576284" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.60-58.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576285" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.60-58.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576286" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.60-58.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576287" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.60-58.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576288" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.60-58.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576289" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576290" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576291" version="1" comment="libkde4 is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576292" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576293" version="1" comment="libkde4-x86 is &lt;4.3.5-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576294" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576295" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576296" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576297" version="1" comment="kernel-default is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576298" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576299" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576300" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.17.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576301" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576302" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576303" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576304" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.7.17.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576305" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.7.17.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576306" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.7.17.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576307" version="1" comment="kernel-source is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576308" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576309" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576310" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576311" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.17.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576312" version="1" comment="kernel-default is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576313" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576314" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576315" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.47.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576316" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576317" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576318" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576319" version="1" comment="kernel-pae is &lt;3.0.101-0.7.47.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576320" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.47.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576321" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.47.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576322" version="1" comment="kernel-source is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576323" version="1" comment="kernel-syms is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576324" version="1" comment="kernel-trace is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576325" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576326" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.47.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576327" version="1" comment="kernel-xen is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576328" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576329" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.47.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576330" version="1" comment="kernel-default is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576331" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576332" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576333" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.53.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576334" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576335" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576336" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576337" version="1" comment="kernel-pae is &lt;3.0.101-0.7.53.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576338" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.53.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576339" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.53.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576340" version="1" comment="kernel-source is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576341" version="1" comment="kernel-syms is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576342" version="1" comment="kernel-trace is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576343" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576344" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.53.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576345" version="1" comment="kernel-xen is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576346" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576347" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.53.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576348" version="1" comment="kernel-default is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576349" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576350" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576351" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.37.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576352" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576353" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576354" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576355" version="1" comment="kernel-pae is &lt;3.0.101-0.7.37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576356" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576357" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576358" version="1" comment="kernel-source is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576359" version="1" comment="kernel-syms is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576360" version="1" comment="kernel-trace is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576361" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576362" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.37.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576363" version="1" comment="kernel-xen is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576364" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576365" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576366" version="1" comment="kernel-default is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576367" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576368" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576369" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.40.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576370" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576371" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576372" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576373" version="1" comment="kernel-pae is &lt;3.0.101-0.7.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576374" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576375" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576376" version="1" comment="kernel-source is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576377" version="1" comment="kernel-syms is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576378" version="1" comment="kernel-trace is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576379" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576380" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.40.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576381" version="1" comment="kernel-xen is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576382" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576383" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576384" version="1" comment="kernel-default is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576385" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576386" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576387" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.44.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576388" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576389" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576390" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576391" version="1" comment="kernel-pae is &lt;3.0.101-0.7.44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576392" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576393" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.44.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576394" version="1" comment="kernel-source is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576395" version="1" comment="kernel-syms is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576396" version="1" comment="kernel-trace is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576397" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576398" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.44.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576399" version="1" comment="kernel-xen is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576400" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576401" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576402" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576403" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576404" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576405" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576406" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576407" version="1" comment="krb5-doc is &lt;1.6.3-133.49.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576408" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576409" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576410" version="1" comment="krb5-server is &lt;1.6.3-133.49.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576411" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.58.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576412" version="1" comment="kvm is &lt;0.15.1-0.32.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576413" version="1" comment="lcms is &lt;1.17-77.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576414" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576415" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576416" version="1" comment="liblcms1-x86 is &lt;1.17-77.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576417" version="1" comment="ldapsmb is &lt;1.34b-12.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576418" version="1" comment="libldb1 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576419" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576420" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576421" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576422" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576423" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576424" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576425" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576426" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576427" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576428" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576429" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576430" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576431" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576432" version="1" comment="samba is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576433" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576434" version="1" comment="samba-client is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576435" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576436" version="1" comment="samba-client-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576437" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576438" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576439" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576440" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576441" version="1" comment="samba-x86 is &lt;3.6.3-0.24.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576442" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576443" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576444" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576445" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576446" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576447" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576448" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576449" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576450" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576451" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576452" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576453" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576454" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576455" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576456" version="1" comment="libqt4-x86 is &lt;4.6.3-5.20.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576457" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576458" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576459" version="1" comment="libpq5 is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576460" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576461" version="1" comment="libpq5-x86 is &lt;9.1.9-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576462" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576463" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576464" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576465" version="1" comment="postgresql91-server is &lt;9.1.9-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576466" version="1" comment="libfreebl3 is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576467" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576468" version="1" comment="mozilla-nss is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576469" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.4.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576470" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576471" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.4.2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576472" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576473" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576474" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.15.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576475" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576476" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576477" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576478" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576479" version="1" comment="mysql is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576480" version="1" comment="mysql-Max is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576481" version="1" comment="mysql-client is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576482" version="1" comment="mysql-tools is &lt;5.0.96-0.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576483" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576484" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576485" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576486" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576487" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576488" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576489" version="1" comment="openssl is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576490" version="1" comment="openssl-doc is &lt;0.9.8j-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576491" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576492" version="1" comment="permissions is &lt;2013.1.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576493" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576494" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576495" version="1" comment="libpixman-1-0-x86 is &lt;0.16.0-1.4.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576496" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576497" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576498" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576499" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576500" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576501" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576502" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576503" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576504" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576505" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576506" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576507" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576508" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576509" version="1" comment="tiff is &lt;3.8.2-141.154.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576510" version="1" comment="libvirt is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576511" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576512" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576513" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576514" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576515" version="1" comment="libxml2 is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576516" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576517" version="1" comment="libxml2-doc is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576518" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576519" version="1" comment="libxml2-x86 is &lt;2.7.6-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576520" version="1" comment="libxml2 is &lt;2.7.6-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576521" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576522" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576523" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576524" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576525" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576526" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576527" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576528" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576529" version="1" comment="libfreebl3 is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576530" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576531" version="1" comment="mozilla-nss is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576532" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576533" version="1" comment="mozilla-nss-devel is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576534" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576535" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576536" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.58 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576537" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576538" version="1" comment="libfreebl3 is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576539" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576540" version="1" comment="mozilla-nss is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576541" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576542" version="1" comment="mozilla-nss-devel is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576543" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576544" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576545" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576546" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576547" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576548" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576549" version="1" comment="mozilla-nspr-x86 is &lt;4.10.1-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576550" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576551" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576552" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576553" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576554" version="1" comment="nagios is &lt;3.0.6-1.25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576555" version="1" comment="nagios-www is &lt;3.0.6-1.25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576556" version="1" comment="nagios-nrpe is &lt;2.12-24.4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576557" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576558" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576559" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576560" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576561" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576562" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576563" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576564" version="1" comment="mozilla-nspr-x86 is &lt;4.10.2-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576565" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576566" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576567" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576568" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576569" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576570" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576571" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.4.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576572" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576573" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576574" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576575" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.4.2.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576576" version="1" comment="ntp is &lt;4.2.8p6-41.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576577" version="1" comment="ntp-doc is &lt;4.2.8p6-41.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576578" version="1" comment="ntp is &lt;4.2.8p7-44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576579" version="1" comment="ntp-doc is &lt;4.2.8p7-44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576580" version="1" comment="ntp is &lt;4.2.8p8-47.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576581" version="1" comment="ntp-doc is &lt;4.2.8p8-47.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576582" version="1" comment="ntp is &lt;4.2.8p9-48.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576583" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576584" version="1" comment="openssh is &lt;5.1p1-41.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576585" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576586" version="1" comment="openssh is &lt;5.1p1-41.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576587" version="1" comment="openssh-askpass is &lt;5.1p1-41.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576588" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576589" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576590" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576591" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576592" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576593" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576594" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576595" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576596" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576597" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576598" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576599" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576600" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576601" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576602" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576603" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576604" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576605" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576606" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576607" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576608" version="1" comment="openssl is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576609" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576610" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576611" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576612" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576613" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576614" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576615" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576616" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576617" version="1" comment="openswan is &lt;2.6.16-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576618" version="1" comment="openswan-doc is &lt;2.6.16-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576619" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576620" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576621" version="1" comment="perl is &lt;5.10.0-64.61.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576622" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576623" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576624" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576625" version="1" comment="perl-x86 is &lt;5.10.0-64.61.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576626" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576627" version="1" comment="php5 is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576628" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576629" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576630" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576631" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576632" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576633" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576634" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576635" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576636" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576637" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576638" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576639" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576640" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576641" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576642" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576643" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576644" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576645" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576646" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576647" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576648" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576649" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576650" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576651" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576652" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576653" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576654" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576655" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576656" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576657" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576658" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576659" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576660" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576661" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576662" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576663" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576664" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576665" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576666" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576667" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576668" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576669" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576670" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576671" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576672" version="1" comment="php5 is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576673" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576674" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576675" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576676" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576677" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576678" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576679" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576680" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576681" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576682" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576683" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576684" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576685" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576686" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576687" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576688" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576689" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576690" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576691" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576692" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576693" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576694" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576695" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576696" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576697" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576698" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576699" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576700" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576701" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576702" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576703" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576704" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576705" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576706" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576707" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576708" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576709" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576710" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576711" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576712" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576713" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576714" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576715" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576716" version="1" comment="apache2-mod_php53 is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576717" version="1" comment="php53 is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576718" version="1" comment="php53-bcmath is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576719" version="1" comment="php53-bz2 is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576720" version="1" comment="php53-calendar is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576721" version="1" comment="php53-ctype is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576722" version="1" comment="php53-curl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576723" version="1" comment="php53-dba is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576724" version="1" comment="php53-dom is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576725" version="1" comment="php53-exif is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576726" version="1" comment="php53-fastcgi is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576727" version="1" comment="php53-fileinfo is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576728" version="1" comment="php53-ftp is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576729" version="1" comment="php53-gd is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576730" version="1" comment="php53-gettext is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576731" version="1" comment="php53-gmp is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576732" version="1" comment="php53-iconv is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576733" version="1" comment="php53-intl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576734" version="1" comment="php53-json is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576735" version="1" comment="php53-ldap is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576736" version="1" comment="php53-mbstring is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576737" version="1" comment="php53-mcrypt is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576738" version="1" comment="php53-mysql is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576739" version="1" comment="php53-odbc is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576740" version="1" comment="php53-openssl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576741" version="1" comment="php53-pcntl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576742" version="1" comment="php53-pdo is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576743" version="1" comment="php53-pear is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576744" version="1" comment="php53-pgsql is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576745" version="1" comment="php53-pspell is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576746" version="1" comment="php53-shmop is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576747" version="1" comment="php53-snmp is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576748" version="1" comment="php53-soap is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576749" version="1" comment="php53-suhosin is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576750" version="1" comment="php53-sysvmsg is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576751" version="1" comment="php53-sysvsem is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576752" version="1" comment="php53-sysvshm is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576753" version="1" comment="php53-tokenizer is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576754" version="1" comment="php53-wddx is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576755" version="1" comment="php53-xmlreader is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576756" version="1" comment="php53-xmlrpc is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576757" version="1" comment="php53-xmlwriter is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576758" version="1" comment="php53-xsl is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576759" version="1" comment="php53-zip is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576760" version="1" comment="php53-zlib is &lt;5.3.17-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576761" version="1" comment="apache2-mod_php53 is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576762" version="1" comment="php53 is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576763" version="1" comment="php53-bcmath is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576764" version="1" comment="php53-bz2 is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576765" version="1" comment="php53-calendar is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576766" version="1" comment="php53-ctype is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576767" version="1" comment="php53-curl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576768" version="1" comment="php53-dba is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576769" version="1" comment="php53-dom is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576770" version="1" comment="php53-exif is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576771" version="1" comment="php53-fastcgi is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576772" version="1" comment="php53-fileinfo is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576773" version="1" comment="php53-ftp is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576774" version="1" comment="php53-gd is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576775" version="1" comment="php53-gettext is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576776" version="1" comment="php53-gmp is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576777" version="1" comment="php53-iconv is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576778" version="1" comment="php53-intl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576779" version="1" comment="php53-json is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576780" version="1" comment="php53-ldap is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576781" version="1" comment="php53-mbstring is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576782" version="1" comment="php53-mcrypt is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576783" version="1" comment="php53-mysql is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576784" version="1" comment="php53-odbc is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576785" version="1" comment="php53-openssl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576786" version="1" comment="php53-pcntl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576787" version="1" comment="php53-pdo is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576788" version="1" comment="php53-pear is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576789" version="1" comment="php53-pgsql is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576790" version="1" comment="php53-pspell is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576791" version="1" comment="php53-shmop is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576792" version="1" comment="php53-snmp is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576793" version="1" comment="php53-soap is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576794" version="1" comment="php53-suhosin is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576795" version="1" comment="php53-sysvmsg is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576796" version="1" comment="php53-sysvsem is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576797" version="1" comment="php53-sysvshm is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576798" version="1" comment="php53-tokenizer is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576799" version="1" comment="php53-wddx is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576800" version="1" comment="php53-xmlreader is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576801" version="1" comment="php53-xmlrpc is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576802" version="1" comment="php53-xmlwriter is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576803" version="1" comment="php53-xsl is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576804" version="1" comment="php53-zip is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576805" version="1" comment="php53-zlib is &lt;5.3.17-55.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576806" version="1" comment="apache2-mod_php53 is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576807" version="1" comment="php53 is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576808" version="1" comment="php53-bcmath is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576809" version="1" comment="php53-bz2 is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576810" version="1" comment="php53-calendar is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576811" version="1" comment="php53-ctype is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576812" version="1" comment="php53-curl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576813" version="1" comment="php53-dba is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576814" version="1" comment="php53-dom is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576815" version="1" comment="php53-exif is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576816" version="1" comment="php53-fastcgi is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576817" version="1" comment="php53-fileinfo is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576818" version="1" comment="php53-ftp is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576819" version="1" comment="php53-gd is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576820" version="1" comment="php53-gettext is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576821" version="1" comment="php53-gmp is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576822" version="1" comment="php53-iconv is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576823" version="1" comment="php53-intl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576824" version="1" comment="php53-json is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576825" version="1" comment="php53-ldap is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576826" version="1" comment="php53-mbstring is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576827" version="1" comment="php53-mcrypt is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576828" version="1" comment="php53-mysql is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576829" version="1" comment="php53-odbc is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576830" version="1" comment="php53-openssl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576831" version="1" comment="php53-pcntl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576832" version="1" comment="php53-pdo is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576833" version="1" comment="php53-pear is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576834" version="1" comment="php53-pgsql is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576835" version="1" comment="php53-pspell is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576836" version="1" comment="php53-shmop is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576837" version="1" comment="php53-snmp is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576838" version="1" comment="php53-soap is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576839" version="1" comment="php53-suhosin is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576840" version="1" comment="php53-sysvmsg is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576841" version="1" comment="php53-sysvsem is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576842" version="1" comment="php53-sysvshm is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576843" version="1" comment="php53-tokenizer is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576844" version="1" comment="php53-wddx is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576845" version="1" comment="php53-xmlreader is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576846" version="1" comment="php53-xmlrpc is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576847" version="1" comment="php53-xmlwriter is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576848" version="1" comment="php53-xsl is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576849" version="1" comment="php53-zip is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576850" version="1" comment="php53-zlib is &lt;5.3.17-58.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576851" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576852" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576853" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576854" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576855" version="1" comment="puppet is &lt;2.6.18-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576856" version="1" comment="puppet-server is &lt;2.6.18-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576857" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576858" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576859" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576860" version="1" comment="python is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576861" version="1" comment="python-32bit is &lt;2.6.8-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576862" version="1" comment="python-base is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576863" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576864" version="1" comment="python-base-x86 is &lt;2.6.8-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576865" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576866" version="1" comment="python-demo is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576867" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576868" version="1" comment="python-idle is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576869" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576870" version="1" comment="python-x86 is &lt;2.6.8-0.23.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576871" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576872" version="1" comment="quagga is &lt;0.99.15-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576873" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576874" version="1" comment="ldapsmb is &lt;1.34b-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576875" version="1" comment="libldb1 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576876" version="1" comment="libsmbclient0 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576877" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576878" version="1" comment="libtalloc2 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576879" version="1" comment="libtalloc2-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576880" version="1" comment="libtdb1 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576881" version="1" comment="libtdb1-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576882" version="1" comment="libtevent0 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576883" version="1" comment="libtevent0-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576884" version="1" comment="libwbclient0 is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576885" version="1" comment="libwbclient0-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576886" version="1" comment="samba is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576887" version="1" comment="samba-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576888" version="1" comment="samba-client is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576889" version="1" comment="samba-client-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576890" version="1" comment="samba-doc is &lt;3.6.3-45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576891" version="1" comment="samba-krb-printing is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576892" version="1" comment="samba-winbind is &lt;3.6.3-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576893" version="1" comment="samba-winbind-32bit is &lt;3.6.3-45.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576894" version="1" comment="ldapsmb is &lt;1.34b-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576895" version="1" comment="libldb1 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576896" version="1" comment="libsmbclient0 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576897" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576898" version="1" comment="libtalloc2 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576899" version="1" comment="libtalloc2-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576900" version="1" comment="libtdb1 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576901" version="1" comment="libtdb1-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576902" version="1" comment="libtevent0 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576903" version="1" comment="libtevent0-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576904" version="1" comment="libwbclient0 is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576905" version="1" comment="libwbclient0-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576906" version="1" comment="samba is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576907" version="1" comment="samba-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576908" version="1" comment="samba-client is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576909" version="1" comment="samba-client-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576910" version="1" comment="samba-doc is &lt;3.6.3-48.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576911" version="1" comment="samba-krb-printing is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576912" version="1" comment="samba-winbind is &lt;3.6.3-48.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576913" version="1" comment="samba-winbind-32bit is &lt;3.6.3-48.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576914" version="1" comment="ldapsmb is &lt;1.34b-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576915" version="1" comment="libldb1 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576916" version="1" comment="libsmbclient0 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576917" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576918" version="1" comment="libtalloc2 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576919" version="1" comment="libtalloc2-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576920" version="1" comment="libtdb1 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576921" version="1" comment="libtdb1-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576922" version="1" comment="libtevent0 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576923" version="1" comment="libtevent0-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576924" version="1" comment="libwbclient0 is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576925" version="1" comment="libwbclient0-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576926" version="1" comment="samba is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576927" version="1" comment="samba-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576928" version="1" comment="samba-client is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576929" version="1" comment="samba-client-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576930" version="1" comment="samba-doc is &lt;3.6.3-52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576931" version="1" comment="samba-krb-printing is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576932" version="1" comment="samba-winbind is &lt;3.6.3-52.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576933" version="1" comment="samba-winbind-32bit is &lt;3.6.3-52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576934" version="1" comment="ldapsmb is &lt;1.34b-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576935" version="1" comment="libldb1 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576936" version="1" comment="libsmbclient0 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576937" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576938" version="1" comment="libtalloc2 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576939" version="1" comment="libtalloc2-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576940" version="1" comment="libtdb1 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576941" version="1" comment="libtdb1-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576942" version="1" comment="libtevent0 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576943" version="1" comment="libtevent0-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576944" version="1" comment="libwbclient0 is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576945" version="1" comment="libwbclient0-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576946" version="1" comment="samba is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576947" version="1" comment="samba-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576948" version="1" comment="samba-client is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576949" version="1" comment="samba-client-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576950" version="1" comment="samba-doc is &lt;3.6.3-56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576951" version="1" comment="samba-krb-printing is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576952" version="1" comment="samba-winbind is &lt;3.6.3-56.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576953" version="1" comment="samba-winbind-32bit is &lt;3.6.3-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576954" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576955" version="1" comment="squid3 is &lt;3.1.12-8.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576956" version="1" comment="strongswan is &lt;4.4.0-6.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576957" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576958" version="1" comment="stunnel is &lt;4.36-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576959" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576960" version="1" comment="systemtap is &lt;1.5-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576961" version="1" comment="systemtap-server is &lt;1.5-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576962" version="1" comment="tomcat6 is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576963" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576964" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576965" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576966" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576967" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576968" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576969" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576970" version="1" comment="vino is &lt;2.28.1-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576971" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576972" version="1" comment="wireshark is &lt;1.8.12-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576973" version="1" comment="xen-devel is &lt;4.1.6_08-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576974" version="1" comment="xen is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576975" version="1" comment="xen-devel is &lt;4.1.6_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576976" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576977" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576978" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576979" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576980" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576981" version="1" comment="xen-libs is &lt;4.1.6_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576982" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576983" version="1" comment="xen-tools is &lt;4.1.6_08-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576984" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576985" version="1" comment="xen is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576986" version="1" comment="xen-devel is &lt;4.1.6_08-20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576987" version="1" comment="xen-doc-html is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576988" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576989" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-20.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576990" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-20.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576991" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-20.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576992" version="1" comment="xen-libs is &lt;4.1.6_08-20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576993" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576994" version="1" comment="xen-tools is &lt;4.1.6_08-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576995" version="1" comment="xen-tools-domU is &lt;4.1.6_08-20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576996" version="1" comment="xen is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576997" version="1" comment="xen-devel is &lt;4.1.6_08-26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576998" version="1" comment="xen-doc-html is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009576999" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577000" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-26.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577001" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-26.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577002" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-26.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577003" version="1" comment="xen-libs is &lt;4.1.6_08-26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577004" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577005" version="1" comment="xen-tools is &lt;4.1.6_08-26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577006" version="1" comment="xen-tools-domU is &lt;4.1.6_08-26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577007" version="1" comment="xen is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577008" version="1" comment="xen-devel is &lt;4.1.6_08-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577009" version="1" comment="xen-doc-html is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577010" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577011" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.40-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577012" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.40-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577013" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.40-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577014" version="1" comment="xen-libs is &lt;4.1.6_08-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577015" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577016" version="1" comment="xen-tools is &lt;4.1.6_08-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577017" version="1" comment="xen-tools-domU is &lt;4.1.6_08-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577018" version="1" comment="xen is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577019" version="1" comment="xen-devel is &lt;4.1.6_08-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577020" version="1" comment="xen-doc-html is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577021" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577022" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.44-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577023" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.44-32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577024" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.44-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577025" version="1" comment="xen-libs is &lt;4.1.6_08-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577026" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577027" version="1" comment="xen-tools is &lt;4.1.6_08-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577028" version="1" comment="xen-tools-domU is &lt;4.1.6_08-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577029" version="1" comment="xen is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577030" version="1" comment="xen-devel is &lt;4.1.6_06-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577031" version="1" comment="xen-doc-html is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577032" version="1" comment="xen-doc-pdf is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577033" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577034" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577035" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577036" version="1" comment="xen-libs is &lt;4.1.6_06-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577037" version="1" comment="xen-libs-32bit is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577038" version="1" comment="xen-tools is &lt;4.1.6_06-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577039" version="1" comment="xen-tools-domU is &lt;4.1.6_06-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577040" version="1" comment="xen is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577041" version="1" comment="xen-devel is &lt;4.1.6_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577042" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577043" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577044" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577045" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577046" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577047" version="1" comment="xen-libs is &lt;4.1.6_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577048" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577049" version="1" comment="xen-tools is &lt;4.1.6_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577050" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577051" version="1" comment="xen is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577052" version="1" comment="xen-devel is &lt;4.1.6_08-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577053" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577054" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577055" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577056" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577057" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577058" version="1" comment="xen-libs is &lt;4.1.6_08-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577059" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577060" version="1" comment="xen-tools is &lt;4.1.6_08-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577061" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577062" version="1" comment="xen is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577063" version="1" comment="xen-devel is &lt;4.1.6_08-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577064" version="1" comment="xen-doc-html is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577065" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577066" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577067" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-23.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577068" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577069" version="1" comment="xen-libs is &lt;4.1.6_08-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577070" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577071" version="1" comment="xen-tools is &lt;4.1.6_08-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577072" version="1" comment="xen-tools-domU is &lt;4.1.6_08-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577073" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577074" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577075" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577076" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577077" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577078" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577079" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577080" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577081" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577082" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577083" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577084" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577085" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577086" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577087" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577088" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577089" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577090" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577091" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577092" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577093" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577094" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577095" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577096" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577097" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577098" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577099" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577100" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577101" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577102" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577103" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.22.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577104" version="1" comment="zypper is &lt;1.6.166-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577105" version="1" comment="zypper-log is &lt;1.6.166-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577106" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577107" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577108" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577109" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577110" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577111" version="1" comment="libfreebl3-x86 is &lt;3.16.1-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577112" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577113" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577114" version="1" comment="libsoftokn3-x86 is &lt;3.16.1-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577115" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577116" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577117" version="1" comment="mozilla-nspr-x86 is &lt;4.10.6-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577118" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577119" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577120" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577121" version="1" comment="mozilla-nss-x86 is &lt;3.16.1-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577122" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577123" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684102" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.149.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684103" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.149.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577124" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577125" version="1" comment="Mesa is &lt;9.0.3-0.29.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577126" version="1" comment="Mesa-32bit is &lt;9.0.3-0.29.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577127" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577128" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577129" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577130" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577131" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577132" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577133" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577134" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577135" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577136" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577137" version="1" comment="libfreebl3 is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577138" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577139" version="1" comment="libsoftokn3 is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577140" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577141" version="1" comment="mozilla-nspr is &lt;4.12-26.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577142" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577143" version="1" comment="mozilla-nss is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577144" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577145" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577146" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577147" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577148" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577149" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577150" version="1" comment="libfreebl3 is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577151" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577152" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577153" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577154" version="1" comment="mozilla-nspr is &lt;4.12-29.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577155" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577156" version="1" comment="mozilla-nss is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577157" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577158" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577159" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577160" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577161" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577162" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577163" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577164" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577165" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577166" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577167" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577168" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577169" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577170" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577171" version="1" comment="libfreebl3 is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577172" version="1" comment="libfreebl3-32bit is &lt;3.29.5-46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577173" version="1" comment="libsoftokn3 is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577174" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577175" version="1" comment="mozilla-nspr is &lt;4.13.1-32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577176" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577177" version="1" comment="mozilla-nss is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577178" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577179" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577180" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577181" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3.44 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577182" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577183" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577184" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577185" version="1" comment="libfreebl3 is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577186" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577187" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577188" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577189" version="1" comment="mozilla-nss is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577190" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577191" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577192" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577193" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577194" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577195" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577196" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577197" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577198" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577199" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577200" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577201" version="1" comment="MozillaFirefox is &lt;52.8.0esr-72.32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577202" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-72.32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577203" version="1" comment="MozillaFirefox is &lt;52.8.1esr-72.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577204" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-72.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577205" version="1" comment="MozillaFirefox is &lt;52.9.0esr-72.38.6 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577206" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-72.38.6 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684104" version="1" comment="MozillaFirefox is &lt;91.9.0-78.179.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684105" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-78.179.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684106" version="1" comment="MozillaFirefox-translations-other is &lt;91.9.0-78.179.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577207" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577208" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577209" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577210" version="1" comment="libfreebl3 is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577211" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577212" version="1" comment="libfreebl3-x86 is &lt;3.16-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577213" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577214" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577215" version="1" comment="libsoftokn3-x86 is &lt;3.16-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577216" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577217" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577218" version="1" comment="mozilla-nspr-x86 is &lt;4.10.4-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577219" version="1" comment="mozilla-nss is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577220" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577221" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577222" version="1" comment="mozilla-nss-x86 is &lt;3.16-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577223" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577224" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577225" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577226" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577227" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577228" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577229" version="1" comment="libfreebl3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577230" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577231" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577232" version="1" comment="libsoftokn3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577233" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577234" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577235" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577236" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577237" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577238" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577239" version="1" comment="mozilla-nss-x86 is &lt;3.19.2_CKBI_1.98-0.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577240" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577241" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577242" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577243" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577244" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577245" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577246" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577247" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577248" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577249" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577250" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577251" version="1" comment="a2ps is &lt;4.13-1326.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577252" version="1" comment="ansible is &lt;2.2.0.0-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577253" version="1" comment="ansible is &lt;2.2.0.0-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577254" version="1" comment="ansible is &lt;2.3.2.0-11.5.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577255" version="1" comment="libyaml-0-2 is &lt;0.1.3-0.10.22.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577256" version="1" comment="python-Jinja2 is &lt;2.6-2.19.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577257" version="1" comment="python-PyYAML is &lt;3.10-0.15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577258" version="1" comment="python-ecdsa is &lt;0.10-0.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577259" version="1" comment="python-paramiko is &lt;1.13.1-0.3.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577260" version="1" comment="python-pycrypto is &lt;2.6-0.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577261" version="1" comment="ansible is &lt;2.9.9-11.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577262" version="1" comment="python-coverage is &lt;3.6-0.11.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577263" version="1" comment="python-passlib is &lt;1.6.1-0.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577264" version="1" comment="ansible is &lt;2.9.9-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577265" version="1" comment="ansible is &lt;2.9.14-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577266" version="1" comment="ansible is &lt;2.9.22-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659370" version="1" comment="ansible is &lt;2.9.27-11.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677827" version="1" comment="ant is &lt;1.7.1-20.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677828" version="1" comment="ant-trax is &lt;1.7.1-16.11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577267" version="1" comment="apache2 is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577268" version="1" comment="apache2-doc is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577269" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577270" version="1" comment="apache2-prefork is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577271" version="1" comment="apache2-utils is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577272" version="1" comment="apache2-worker is &lt;2.2.12-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577273" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577274" version="1" comment="apache2-devel is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577275" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577276" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577277" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577278" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577279" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577280" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577281" version="1" comment="php53 is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577282" version="1" comment="php53-bcmath is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577283" version="1" comment="php53-bz2 is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577284" version="1" comment="php53-calendar is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577285" version="1" comment="php53-ctype is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577286" version="1" comment="php53-curl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577287" version="1" comment="php53-dba is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577288" version="1" comment="php53-dom is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577289" version="1" comment="php53-exif is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577290" version="1" comment="php53-fastcgi is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577291" version="1" comment="php53-fileinfo is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577292" version="1" comment="php53-ftp is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577293" version="1" comment="php53-gd is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577294" version="1" comment="php53-gettext is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577295" version="1" comment="php53-gmp is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577296" version="1" comment="php53-iconv is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577297" version="1" comment="php53-intl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577298" version="1" comment="php53-json is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577299" version="1" comment="php53-ldap is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577300" version="1" comment="php53-mbstring is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577301" version="1" comment="php53-mcrypt is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577302" version="1" comment="php53-mysql is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577303" version="1" comment="php53-odbc is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577304" version="1" comment="php53-openssl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577305" version="1" comment="php53-pcntl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577306" version="1" comment="php53-pdo is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577307" version="1" comment="php53-pear is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577308" version="1" comment="php53-pgsql is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577309" version="1" comment="php53-pspell is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577310" version="1" comment="php53-shmop is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577311" version="1" comment="php53-snmp is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577312" version="1" comment="php53-soap is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577313" version="1" comment="php53-suhosin is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577314" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577315" version="1" comment="php53-sysvsem is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577316" version="1" comment="php53-sysvshm is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577317" version="1" comment="php53-tokenizer is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577318" version="1" comment="php53-wddx is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577319" version="1" comment="php53-xmlreader is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577320" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577321" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577322" version="1" comment="php53-xsl is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577323" version="1" comment="php53-zip is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577324" version="1" comment="php53-zlib is &lt;5.3.17-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577325" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577326" version="1" comment="atftp is &lt;0.7.0-135.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633874" version="1" comment="atftp is &lt;0.7.0-135.23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667671" version="1" comment="atftp is &lt;0.7.0-135.23.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577327" version="1" comment="augeas is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577328" version="1" comment="augeas-lenses is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577329" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577330" version="1" comment="augeas is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577331" version="1" comment="augeas-lenses is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577332" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577333" version="1" comment="augeas is &lt;0.9.0-3.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577334" version="1" comment="augeas-lenses is &lt;0.9.0-3.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577335" version="1" comment="libaugeas0 is &lt;0.9.0-3.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577336" version="1" comment="avahi is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577337" version="1" comment="avahi-lang is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577338" version="1" comment="avahi-utils is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577339" version="1" comment="libavahi-client3 is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577340" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577341" version="1" comment="libavahi-common3 is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577342" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577343" version="1" comment="libavahi-core5 is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577344" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577345" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577346" version="1" comment="libdns_sd is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577347" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577348" version="1" comment="avahi is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577349" version="1" comment="avahi-lang is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577350" version="1" comment="avahi-utils is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577351" version="1" comment="libavahi-client3 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577352" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577353" version="1" comment="libavahi-common3 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577354" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577355" version="1" comment="libavahi-core5 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577356" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577357" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577358" version="1" comment="libdns_sd is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577359" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577360" version="1" comment="avahi is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577361" version="1" comment="avahi-lang is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577362" version="1" comment="avahi-utils is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577363" version="1" comment="libavahi-client3 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577364" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577365" version="1" comment="libavahi-common3 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577366" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577367" version="1" comment="libavahi-core5 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577368" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577369" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577370" version="1" comment="libdns_sd is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577371" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577372" version="1" comment="avahi is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577373" version="1" comment="avahi-lang is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577374" version="1" comment="avahi-utils is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577375" version="1" comment="libavahi-client3 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577376" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577377" version="1" comment="libavahi-common3 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577378" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577379" version="1" comment="libavahi-core5 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577380" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577381" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577382" version="1" comment="libdns_sd is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577383" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577384" version="1" comment="axis is &lt;1.4-236.236.44.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577385" version="1" comment="axis is &lt;1.4-236.236.44.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577386" version="1" comment="bash is &lt;3.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577387" version="1" comment="bash-doc is &lt;3.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577388" version="1" comment="bash-x86 is &lt;3.2-147.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577389" version="1" comment="libreadline5 is &lt;5.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577390" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577391" version="1" comment="libreadline5-x86 is &lt;5.2-147.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577392" version="1" comment="readline-doc is &lt;5.2-147.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577393" version="1" comment="bash is &lt;3.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577394" version="1" comment="bash-doc is &lt;3.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577395" version="1" comment="libreadline5 is &lt;5.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577396" version="1" comment="libreadline5-32bit is &lt;5.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577397" version="1" comment="readline-doc is &lt;5.2-147.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577398" version="1" comment="bash is &lt;3.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577399" version="1" comment="bash-doc is &lt;3.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577400" version="1" comment="libreadline5 is &lt;5.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577401" version="1" comment="libreadline5-32bit is &lt;5.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577402" version="1" comment="readline-doc is &lt;5.2-147.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577403" version="1" comment="bind is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577404" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577405" version="1" comment="bind-doc is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577406" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577407" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577408" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577409" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577410" version="1" comment="bind is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577411" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577412" version="1" comment="bind-doc is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577413" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577414" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577415" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577416" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577417" version="1" comment="bind is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577418" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577419" version="1" comment="bind-doc is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577420" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577421" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577422" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577423" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577424" version="1" comment="bind is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577425" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577426" version="1" comment="bind-doc is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577427" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577428" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577429" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577430" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577431" version="1" comment="bind is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577432" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577433" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577434" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577435" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577436" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577437" version="1" comment="bind is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577438" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577439" version="1" comment="bind-devel is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577440" version="1" comment="bind-doc is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577441" version="1" comment="bind-libs is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577442" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577443" version="1" comment="bind-utils is &lt;9.9.6P1-0.44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577444" version="1" comment="bind is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577445" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577446" version="1" comment="bind-devel is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577447" version="1" comment="bind-doc is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577448" version="1" comment="bind-libs is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577449" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577450" version="1" comment="bind-utils is &lt;9.9.6P1-0.47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577451" version="1" comment="bind is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577452" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577453" version="1" comment="bind-devel is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577454" version="1" comment="bind-doc is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577455" version="1" comment="bind-libs is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577456" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577457" version="1" comment="bind-utils is &lt;9.9.6P1-0.50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577458" version="1" comment="bind is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577459" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577460" version="1" comment="bind-devel is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577461" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577462" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577463" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577464" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577465" version="1" comment="bind is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577466" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577467" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577468" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577469" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577470" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577471" version="1" comment="bind is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577472" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577473" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577474" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577475" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577476" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577477" version="1" comment="bind is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577478" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577479" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577480" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577481" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577482" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577483" version="1" comment="bind is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577484" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577485" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577486" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577487" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577488" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654155" version="1" comment="bind is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654156" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654157" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654158" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654159" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654160" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683753" version="1" comment="bind is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683754" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683755" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683756" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683757" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683758" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577489" version="1" comment="binutils is &lt;2.23.1-0.23.15 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577490" version="1" comment="bluez is &lt;4.99-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577491" version="1" comment="libbluetooth3 is &lt;4.99-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577492" version="1" comment="bzip2 is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577493" version="1" comment="bzip2-doc is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577494" version="1" comment="libbz2-1 is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577495" version="1" comment="libbz2-1-32bit is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577496" version="1" comment="libbz2-devel is &lt;1.0.6-257.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577497" version="1" comment="bzip2 is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577498" version="1" comment="bzip2-doc is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577499" version="1" comment="libbz2-1 is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577500" version="1" comment="libbz2-1-32bit is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577501" version="1" comment="libbz2-devel is &lt;1.0.6-257.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577502" version="1" comment="cifs-utils is &lt;5.1-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681249" version="1" comment="cifs-utils is &lt;5.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577503" version="1" comment="clamav is &lt;0.99.2-0.19.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577504" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577505" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577506" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577507" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682693" version="1" comment="clamav is &lt;0.103.6-0.20.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682694" version="1" comment="clamav-openssl1 is &lt;0.103.6-0.20.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577508" version="1" comment="rhnlib is &lt;2.5.69.8-11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577509" version="1" comment="suseRegisterInfo is &lt;2.1.12-14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577510" version="1" comment="cloud-init is &lt;19.4-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577511" version="1" comment="cloud-init-config-suse is &lt;19.4-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577512" version="1" comment="cloud-init-doc is &lt;19.4-3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577513" version="1" comment="coreutils is &lt;8.12-6.25.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577514" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577515" version="1" comment="coreutils is &lt;8.12-6.25.33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577516" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577517" version="1" comment="cpio is &lt;2.9-75.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577518" version="1" comment="cpio-lang is &lt;2.9-75.78.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577519" version="1" comment="cups is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577520" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577521" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577522" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577523" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.52.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577524" version="1" comment="curl is &lt;7.19.7-1.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577525" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577526" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577527" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577528" version="1" comment="curl is &lt;7.19.7-1.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577529" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577530" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577531" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577532" version="1" comment="curl is &lt;7.19.7-1.61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577533" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577534" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577535" version="1" comment="curl is &lt;7.37.0-70.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577536" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577537" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577538" version="1" comment="libcurl-devel is &lt;7.37.0-70.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577539" version="1" comment="libcurl-devel is &lt;7.37.0-70.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577540" version="1" comment="libcurl-devel is &lt;7.37.0-70.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577541" version="1" comment="libcurl-devel is &lt;7.37.0-70.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577542" version="1" comment="libcurl-devel is &lt;7.37.0-70.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577543" version="1" comment="libcurl-devel is &lt;7.37.0-70.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577544" version="1" comment="libcurl-devel is &lt;7.37.0-70.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577545" version="1" comment="libcurl-devel is &lt;7.37.0-70.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577546" version="1" comment="libcurl-devel is &lt;7.37.0-70.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626175" version="1" comment="libcurl-devel is &lt;7.37.0-70.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633956" version="1" comment="libcurl-devel is &lt;7.37.0-70.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682695" version="1" comment="curl is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682696" version="1" comment="curl-openssl1 is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682697" version="1" comment="libcurl-devel is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682698" version="1" comment="libcurl4 is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682699" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682700" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682701" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577547" version="1" comment="curl is &lt;7.19.7-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577548" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577549" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577550" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685703" version="1" comment="curl is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685704" version="1" comment="curl-openssl1 is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685705" version="1" comment="libcurl-devel is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685706" version="1" comment="libcurl4 is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685707" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685708" version="1" comment="libcurl4-openssl1 is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685709" version="1" comment="libcurl4-openssl1-32bit is &lt;7.37.0-70.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577551" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577552" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577553" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577554" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577555" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577556" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577557" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577558" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577559" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577560" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577561" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577562" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577563" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577564" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577565" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669486" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669487" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669488" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669489" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669490" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669491" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669492" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669493" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669494" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669495" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669496" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669497" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669498" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669499" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669500" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577566" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577567" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577568" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577569" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577570" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577571" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577572" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577573" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577574" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577575" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577576" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577577" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577578" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577579" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577580" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577581" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577582" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577583" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577584" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577585" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577586" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577587" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577588" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577589" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577590" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577591" version="1" comment="dnsmasq is &lt;2.71-0.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577592" version="1" comment="dnsmasq is &lt;2.78-0.16.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577593" version="1" comment="dnsmasq is &lt;2.78-0.16.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577594" version="1" comment="dnsmasq is &lt;2.78-0.16.11.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577595" version="1" comment="dnsmasq is &lt;2.78-0.16.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679569" version="1" comment="dnsmasq is &lt;2.78-0.16.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577596" version="1" comment="dosfstools is &lt;2.11-121.31.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577597" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577598" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577599" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577600" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62.7 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577601" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577602" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577603" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.10.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577604" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577605" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577606" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577607" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62.7 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577608" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577609" version="1" comment="e2fsprogs is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577610" version="1" comment="libcom_err2 is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577611" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577612" version="1" comment="libext2fs2 is &lt;1.41.9-2.11.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577613" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577614" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577615" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577616" version="1" comment="elfutils is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577617" version="1" comment="libasm1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577618" version="1" comment="libasm1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577619" version="1" comment="libdw1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577620" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577621" version="1" comment="libdw1-x86 is &lt;0.152-4.9.17 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577622" version="1" comment="libebl1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577623" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577624" version="1" comment="libebl1-x86 is &lt;0.152-4.9.17 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577625" version="1" comment="libelf1 is &lt;0.152-4.9.17 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577626" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577627" version="1" comment="libelf1-x86 is &lt;0.152-4.9.17 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577628" version="1" comment="elfutils is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577629" version="1" comment="libasm1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577630" version="1" comment="libasm1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577631" version="1" comment="libdw1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577632" version="1" comment="libdw1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577633" version="1" comment="libebl1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577634" version="1" comment="libebl1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577635" version="1" comment="libelf1 is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577636" version="1" comment="libelf1-32bit is &lt;0.152-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577637" version="1" comment="emacs is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577638" version="1" comment="emacs-el is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577639" version="1" comment="emacs-info is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577640" version="1" comment="emacs-nox is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577641" version="1" comment="emacs-x11 is &lt;22.3-4.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577642" version="1" comment="emacs is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577643" version="1" comment="emacs-el is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577644" version="1" comment="emacs-info is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577645" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577646" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577647" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577648" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577649" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577650" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577651" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.3.109 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577652" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.3.109 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577653" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.3.109 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577654" version="1" comment="file is &lt;4.24-43.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577655" version="1" comment="file-32bit is &lt;4.24-43.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577656" version="1" comment="file-x86 is &lt;4.24-43.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577657" version="1" comment="file-roller is &lt;2.28.2-0.10.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577658" version="1" comment="file-roller-lang is &lt;2.28.2-0.10.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577659" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577660" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577661" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577662" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577663" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577664" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577665" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577666" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577667" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577668" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577669" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577670" version="1" comment="libfreebl3-x86 is &lt;3.15.4-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577671" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577672" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577673" version="1" comment="libsoftokn3-x86 is &lt;3.15.4-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577674" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577675" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577676" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577677" version="1" comment="mozilla-nss-x86 is &lt;3.15.4-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577678" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577679" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577680" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577681" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577682" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577683" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577684" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577685" version="1" comment="libfreebl3-x86 is &lt;3.16.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577686" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577687" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577688" version="1" comment="libsoftokn3-x86 is &lt;3.16.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577689" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577690" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577691" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577692" version="1" comment="mozilla-nss-x86 is &lt;3.16.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577693" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577694" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577695" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577696" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577697" version="1" comment="libfreebl3-x86 is &lt;3.16.4-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577698" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577699" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577700" version="1" comment="libsoftokn3-x86 is &lt;3.16.4-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577701" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577702" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577703" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577704" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577705" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577706" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577707" version="1" comment="mozilla-nss-x86 is &lt;3.16.4-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577708" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577709" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577710" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577711" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577712" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577713" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577714" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8.11 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577715" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577716" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577717" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8.11 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577718" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577719" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577720" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577721" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8.11 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577722" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577723" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577724" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577725" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577726" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577727" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577728" version="1" comment="mozilla-nspr-x86 is &lt;4.10.9-11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577729" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577730" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577731" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577732" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577733" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;38-10.27 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577734" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577735" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577736" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577737" version="1" comment="libfreebl3-x86 is &lt;3.19.2.1-19.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577738" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577739" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577740" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.1-19.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577741" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577742" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577743" version="1" comment="mozilla-nspr-x86 is &lt;4.10.10-16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577744" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577745" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577746" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577747" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.1-19.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577748" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577749" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577750" version="1" comment="libfreebl3 is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577751" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577752" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577753" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577754" version="1" comment="mozilla-nss is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577755" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577756" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577757" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577758" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577759" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577760" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577761" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577762" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577763" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577764" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577765" version="1" comment="libsoftokn3-x86 is &lt;3.15.3.1-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577766" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577767" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577768" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577769" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577770" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577771" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577772" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577773" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577774" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577775" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577776" version="1" comment="libfreebl3-x86 is &lt;3.17.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577777" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577778" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577779" version="1" comment="libsoftokn3-x86 is &lt;3.17.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577780" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577781" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577782" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577783" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577784" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577785" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577786" version="1" comment="mozilla-nss-x86 is &lt;3.17.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577787" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577788" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577789" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.7.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577790" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577791" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577792" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577793" version="1" comment="libfreebl3-x86 is &lt;3.19.2.0-0.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577794" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577795" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577796" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.0-0.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577797" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577798" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577799" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577800" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.0-0.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577801" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577802" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577803" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577804" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577805" version="1" comment="fontconfig is &lt;2.6.0-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577806" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577807" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577808" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577809" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577810" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577811" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577812" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679676" version="1" comment="freetype2 is &lt;2.3.7-25.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679677" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679678" version="1" comment="ft2demos is &lt;2.3.7-25.45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577813" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577814" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577815" version="1" comment="freetype2-x86 is &lt;2.3.7-25.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577816" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685710" version="1" comment="fribidi is &lt;0.10.9-59.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685711" version="1" comment="fribidi-32bit is &lt;0.10.9-59.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577817" version="1" comment="fuse is &lt;2.8.7-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577818" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577819" version="1" comment="fuse is &lt;2.8.7-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577820" version="1" comment="libfuse2 is &lt;2.8.7-0.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577821" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577822" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577823" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577824" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577825" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577826" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577827" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577828" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577829" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577830" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577831" version="1" comment="cpp43 is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577832" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577833" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577834" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577835" version="1" comment="gcc43-fortran is &lt;4.3.4_20091019-37.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577836" version="1" comment="gcc43-fortran-32bit is &lt;4.3.4_20091019-37.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577837" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577838" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577839" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577840" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577841" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577842" version="1" comment="gdb is &lt;7.5.1-0.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577843" version="1" comment="gdb is &lt;7.5.1-0.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577844" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577845" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577846" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577847" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577848" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577849" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577850" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577851" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577852" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577853" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577854" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577855" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577856" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577857" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577858" version="1" comment="giflib is &lt;4.1.6-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577859" version="1" comment="giflib-32bit is &lt;4.1.6-13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577860" version="1" comment="giflib-progs is &lt;4.1.6-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577861" version="1" comment="giflib-x86 is &lt;4.1.6-13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577862" version="1" comment="glibc is &lt;2.11.3-17.72.14 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577863" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577864" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577865" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577866" version="1" comment="glibc-html is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577867" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577868" version="1" comment="glibc-info is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577869" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577870" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577871" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.72.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577872" version="1" comment="glibc-profile is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577873" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.72.14 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577874" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.72.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577875" version="1" comment="glibc-x86 is &lt;2.11.3-17.72.14 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577876" version="1" comment="nscd is &lt;2.11.3-17.72.14 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577877" version="1" comment="glibc is &lt;2.11.3-17.87.3 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577878" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577879" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577880" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577881" version="1" comment="glibc-html is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577882" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577883" version="1" comment="glibc-info is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577884" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577885" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577886" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.87.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577887" version="1" comment="glibc-profile is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577888" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.87.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577889" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.87.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577890" version="1" comment="glibc-x86 is &lt;2.11.3-17.87.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577891" version="1" comment="nscd is &lt;2.11.3-17.87.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577892" version="1" comment="glibc is &lt;2.11.3-17.95.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577893" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577894" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577895" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577896" version="1" comment="glibc-html is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577897" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577898" version="1" comment="glibc-info is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577899" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577900" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577901" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.95.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577902" version="1" comment="glibc-profile is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577903" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.95.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577904" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.95.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577905" version="1" comment="glibc-x86 is &lt;2.11.3-17.95.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577906" version="1" comment="nscd is &lt;2.11.3-17.95.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577907" version="1" comment="glibc is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577908" version="1" comment="glibc-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577909" version="1" comment="glibc-devel is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577910" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577911" version="1" comment="glibc-html is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577912" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577913" version="1" comment="glibc-info is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577914" version="1" comment="glibc-locale is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577915" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577916" version="1" comment="glibc-profile is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577917" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577918" version="1" comment="nscd is &lt;2.11.3-17.102.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577919" version="1" comment="glibc is &lt;2.11.3-17.109.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577920" version="1" comment="glibc-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577921" version="1" comment="glibc-devel is &lt;2.11.3-17.109.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577922" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577923" version="1" comment="glibc-html is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577924" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577925" version="1" comment="glibc-info is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577926" version="1" comment="glibc-locale is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577927" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577928" version="1" comment="glibc-profile is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577929" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.109.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577930" version="1" comment="nscd is &lt;2.11.3-17.109.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577931" version="1" comment="glibc is &lt;2.11.3-17.110.3.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577932" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577933" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577934" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577935" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577936" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577937" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577938" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577939" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577940" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577941" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577942" version="1" comment="nscd is &lt;2.11.3-17.110.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577943" version="1" comment="glibc is &lt;2.11.3-17.110.6.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577944" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577945" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577946" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577947" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577948" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577949" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577950" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577951" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577952" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577953" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577954" version="1" comment="nscd is &lt;2.11.3-17.110.6.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577955" version="1" comment="glibc is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577956" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577957" version="1" comment="glibc-devel is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577958" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577959" version="1" comment="glibc-html is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577960" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577961" version="1" comment="glibc-info is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577962" version="1" comment="glibc-locale is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577963" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577964" version="1" comment="glibc-profile is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577965" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577966" version="1" comment="nscd is &lt;2.11.3-17.110.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577967" version="1" comment="glibc is &lt;2.11.3-17.110.14.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577968" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577969" version="1" comment="glibc-devel is &lt;2.11.3-17.110.14.1 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577970" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577971" version="1" comment="glibc-html is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577972" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577973" version="1" comment="glibc-info is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577974" version="1" comment="glibc-locale is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577975" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577976" version="1" comment="glibc-profile is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577977" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577978" version="1" comment="nscd is &lt;2.11.3-17.110.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577979" version="1" comment="glibc is &lt;2.11.3-17.110.19.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577980" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577981" version="1" comment="glibc-devel is &lt;2.11.3-17.110.19.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577982" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577983" version="1" comment="glibc-html is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577984" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577985" version="1" comment="glibc-info is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577986" version="1" comment="glibc-locale is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577987" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577988" version="1" comment="glibc-profile is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577989" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577990" version="1" comment="nscd is &lt;2.11.3-17.110.19.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577991" version="1" comment="glibc is &lt;2.11.3-17.110.24.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577992" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577993" version="1" comment="glibc-devel is &lt;2.11.3-17.110.24.2 for i586,i686,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577994" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577995" version="1" comment="glibc-html is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577996" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577997" version="1" comment="glibc-info is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577998" version="1" comment="glibc-locale is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009577999" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578000" version="1" comment="glibc-profile is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578001" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.24.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578002" version="1" comment="nscd is &lt;2.11.3-17.110.24.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578003" version="1" comment="glibc is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578004" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578005" version="1" comment="glibc-devel is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578006" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578007" version="1" comment="glibc-html is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578008" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578009" version="1" comment="glibc-info is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578010" version="1" comment="glibc-locale is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578011" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578012" version="1" comment="glibc-profile is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578013" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578014" version="1" comment="nscd is &lt;2.11.3-17.110.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578015" version="1" comment="glibc is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578016" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578017" version="1" comment="glibc-devel is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578018" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578019" version="1" comment="glibc-html is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578020" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578021" version="1" comment="glibc-info is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578022" version="1" comment="glibc-locale is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578023" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578024" version="1" comment="glibc-profile is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578025" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578026" version="1" comment="nscd is &lt;2.11.3-17.110.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634748" version="1" comment="glibc is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634749" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634750" version="1" comment="glibc-devel is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634751" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634752" version="1" comment="glibc-html is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634753" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634754" version="1" comment="glibc-info is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634755" version="1" comment="glibc-locale is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634756" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634757" version="1" comment="glibc-profile is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634758" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634759" version="1" comment="nscd is &lt;2.11.3-17.110.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673411" version="1" comment="glibc is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673412" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673413" version="1" comment="glibc-devel is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673414" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673415" version="1" comment="glibc-html is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673416" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673417" version="1" comment="glibc-info is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673418" version="1" comment="glibc-locale is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673419" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673420" version="1" comment="glibc-profile is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673421" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673422" version="1" comment="nscd is &lt;2.11.3-17.110.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578027" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578028" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578029" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578030" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.51.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578031" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578032" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578033" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578034" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.57.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578035" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578036" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578037" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578038" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.60.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578039" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578040" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578041" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578042" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578043" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578044" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578045" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578046" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578047" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578048" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578049" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679679" version="1" comment="grep is &lt;2.7-5.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578050" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.53.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578051" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.53.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578052" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.53.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578053" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.53.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578054" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.53.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578055" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.53.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578056" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578057" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578058" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578059" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578060" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578061" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578062" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578063" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578064" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578065" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578066" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578067" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578068" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578069" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578070" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578071" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578072" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578073" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578074" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578075" version="1" comment="gtk2 is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578076" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578077" version="1" comment="gtk2-doc is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578078" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578079" version="1" comment="gtk2-x86 is &lt;2.18.9-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578080" version="1" comment="gtk2 is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578081" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578082" version="1" comment="gtk2-doc is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578083" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578084" version="1" comment="gtk2-x86 is &lt;2.18.9-0.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578085" version="1" comment="gtk2 is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578086" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578087" version="1" comment="gtk2-doc is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578088" version="1" comment="gtk2-lang is &lt;2.18.9-0.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578089" version="1" comment="gtk2 is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578090" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578091" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578092" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578093" version="1" comment="gtk2 is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578094" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578095" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578096" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578097" version="1" comment="guestfs-data is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578098" version="1" comment="guestfs-tools is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578099" version="1" comment="guestfsd is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578100" version="1" comment="libguestfs0 is &lt;1.20.4-0.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683759" version="1" comment="gzip is &lt;1.3.12-69.23.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578101" version="1" comment="libicu is &lt;4.0-7.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578102" version="1" comment="libicu-32bit is &lt;4.0-7.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578103" version="1" comment="libicu-doc is &lt;4.0-7.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578104" version="1" comment="libicu-x86 is &lt;4.0-7.28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578105" version="1" comment="libicu is &lt;4.0-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578106" version="1" comment="libicu-doc is &lt;4.0-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578107" version="1" comment="intel-SINIT is &lt;1-0.81.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578108" version="1" comment="ipsec-tools is &lt;0.7.3-1.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578109" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578110" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578111" version="1" comment="libjasper is &lt;1.900.1-134.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578112" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578113" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680672" version="1" comment="libjasper is &lt;1.900.14-134.33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680673" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578114" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578115" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.2-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578116" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578117" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-0.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578118" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578119" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578120" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578121" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578122" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578123" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-51.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578124" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578125" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578126" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-51.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578127" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578128" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578129" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578130" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578131" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.45-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578132" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.45-84.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578133" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578134" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578135" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578136" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.50-85.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578137" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.50-85.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578138" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578139" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578140" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578141" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578142" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578143" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.0-0.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578144" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.0-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578145" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578146" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578147" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578148" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578149" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578150" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578151" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578152" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578153" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578154" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578155" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578156" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578157" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.1-61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578158" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.1-61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578159" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.1-61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578160" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.1-61.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578161" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.1-61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578162" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.5-64.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578163" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.5-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578164" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.5-64.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578165" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.5-64.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578166" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.5-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578167" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578168" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578169" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578170" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.10-65.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578171" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.15-65.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578172" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.15-65.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578173" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.15-65.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578174" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.15-65.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578175" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.15-65.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578176" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.20-65.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578177" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.20-65.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578178" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.20-65.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578179" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.20-65.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578180" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.20-65.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578181" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.25-65.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578182" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.25-65.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578183" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.25-65.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578184" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.25-65.25.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578185" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.25-65.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578186" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.30-65.28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578187" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.30-65.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578188" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.30-65.28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578189" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.30-65.28.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578190" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.30-65.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578191" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.35-65.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578192" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.35-65.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578193" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.35-65.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578194" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.35-65.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578195" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.35-65.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578196" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578197" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578198" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578199" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.40-65.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578200" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578201" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578202" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578203" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.45-65.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578204" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578205" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578206" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578207" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.50-65.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578208" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578209" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578210" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578211" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.55-65.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578212" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578213" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578214" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578215" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.60-65.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578216" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578217" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578218" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578219" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.65-65.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578220" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578221" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578222" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578223" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.70-65.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578224" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578225" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578226" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578227" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.75-65.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578228" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578229" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578230" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578231" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.80-65.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674103" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674104" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674105" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674106" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.5-65.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662525" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662526" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662527" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662528" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr11.0-65.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578232" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578233" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578234" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578235" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578236" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578237" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578238" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578239" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578240" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578241" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578242" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578243" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578244" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578245" version="1" comment="libkde4 is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578246" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578247" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578248" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578249" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578250" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578251" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578252" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578253" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578254" version="1" comment="kernel-default is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578255" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578256" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578257" version="1" comment="kernel-default-man is &lt;3.0.101-0.40.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578258" version="1" comment="kernel-ec2 is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578259" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578260" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578261" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.40.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578262" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.40.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578263" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.40.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578264" version="1" comment="kernel-source is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578265" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578266" version="1" comment="kernel-trace is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578267" version="1" comment="kernel-trace-base is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578268" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578269" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.86.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578270" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.86.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578271" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.86.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578272" version="1" comment="kernel-default is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578273" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578274" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578275" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.86.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578276" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578277" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578278" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578279" version="1" comment="kernel-source is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578280" version="1" comment="kernel-syms is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578281" version="1" comment="kernel-trace is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578282" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578283" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.86.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578284" version="1" comment="kernel-xen is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578285" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578286" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.86.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578287" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578288" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578289" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578290" version="1" comment="kernel-default is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578291" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578292" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578293" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.93.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578294" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578295" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578296" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578297" version="1" comment="kernel-source is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578298" version="1" comment="kernel-syms is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578299" version="1" comment="kernel-trace is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578300" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578301" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.93.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578302" version="1" comment="kernel-xen is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578303" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578304" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.93.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578305" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578306" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578307" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578308" version="1" comment="kernel-default is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578309" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578310" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578311" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.99.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578312" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578313" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578314" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578315" version="1" comment="kernel-source is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578316" version="1" comment="kernel-syms is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578317" version="1" comment="kernel-trace is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578318" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578319" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.99.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578320" version="1" comment="kernel-xen is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578321" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578322" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.99.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578323" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578324" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578325" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578326" version="1" comment="kernel-default is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578327" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578328" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578329" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.102.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578330" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578331" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578332" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578333" version="1" comment="kernel-source is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578334" version="1" comment="kernel-syms is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578335" version="1" comment="kernel-trace is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578336" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578337" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.102.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578338" version="1" comment="kernel-xen is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578339" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578340" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.102.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578341" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.105.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578342" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.105.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578343" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.105.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578344" version="1" comment="kernel-default is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578345" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578346" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578347" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.105.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578348" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578349" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578350" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578351" version="1" comment="kernel-source is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578352" version="1" comment="kernel-syms is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578353" version="1" comment="kernel-trace is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578354" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578355" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.105.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578356" version="1" comment="kernel-xen is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578357" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578358" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.105.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578359" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578360" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578361" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578362" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578363" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578364" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578365" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.8.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578366" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578367" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578368" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578369" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578370" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578371" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578372" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578373" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.8.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578374" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578375" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578376" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578377" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578378" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578379" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578380" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578381" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578382" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578383" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.50.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578384" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578385" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578386" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578387" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578388" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578389" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578390" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578391" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.50.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578392" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578393" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578394" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578395" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578396" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578397" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578398" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578399" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578400" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.67.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578401" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578402" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578403" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578404" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.67.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578405" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.67.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578406" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.67.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578407" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578408" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578409" version="1" comment="kernel-trace is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578410" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578411" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578412" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578413" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578414" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578415" version="1" comment="kernel-default is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578416" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578417" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578418" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.79.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578419" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578420" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578421" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578422" version="1" comment="kernel-pae is &lt;3.0.101-0.47.79.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578423" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.79.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578424" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.79.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578425" version="1" comment="kernel-source is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578426" version="1" comment="kernel-syms is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578427" version="1" comment="kernel-trace is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578428" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578429" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.79.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578430" version="1" comment="kernel-xen is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578431" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578432" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.79.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578433" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578434" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578435" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578436" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578437" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578438" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578439" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.11.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578440" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578441" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578442" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578443" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578444" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578445" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578446" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578447" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.11.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578448" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578449" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578450" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578451" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578452" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578453" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578454" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578455" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578456" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578457" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578458" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578459" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578460" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578461" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578462" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578463" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578464" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578465" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578466" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.19.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578467" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578468" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578469" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578470" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578471" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578472" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578473" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578474" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.19.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578475" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578476" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578477" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578478" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578479" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578480" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578481" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578482" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578483" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578484" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.29.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578485" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578486" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578487" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578488" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578489" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578490" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578491" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578492" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.29.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578493" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578494" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578495" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578496" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578497" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578498" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578499" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578500" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578501" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578502" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.43.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578503" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578504" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578505" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578506" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578507" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578508" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578509" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578510" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.43.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578511" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578512" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578513" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.43.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578514" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578515" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578516" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578517" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578518" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578519" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578520" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578521" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578522" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578523" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578524" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578525" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578526" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578527" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578528" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.59.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578529" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578530" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578531" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.59.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578532" version="1" comment="iscsitarget-kmp-bigsmp is &lt;1.4.20_3.0.101_0.40-0.38.83 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578533" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578534" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578535" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.4.1_3.0.101_0.40-0.13.89 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578536" version="1" comment="oracleasm-kmp-bigsmp is &lt;2.0.5_3.0.101_0.40-7.39.89 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578537" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578538" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578539" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578540" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578541" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578542" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578543" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.35.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578544" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578545" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578546" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578547" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578548" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578549" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578550" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578551" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.35.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578552" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578553" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578554" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578555" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578556" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578557" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578558" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578559" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578560" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.71.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578561" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578562" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578563" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578564" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578565" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578566" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578567" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578568" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578569" version="1" comment="kernel-trace is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578570" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578571" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578572" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578573" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578574" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.90.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578575" version="1" comment="kernel-default is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578576" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578577" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578578" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578579" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578580" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578581" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578582" version="1" comment="kernel-source is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578583" version="1" comment="kernel-syms is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578584" version="1" comment="kernel-trace is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578585" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578586" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.90.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578587" version="1" comment="kernel-xen is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578588" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578589" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578590" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578591" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578592" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578593" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578594" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578595" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578596" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.5.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578597" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578598" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578599" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578600" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578601" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578602" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578603" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578604" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.5.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578605" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578606" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578607" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578608" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578609" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578610" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578611" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578612" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578613" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578614" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.56.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578615" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578616" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578617" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578618" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578619" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578620" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578621" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578622" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.56.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578623" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578624" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578625" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.56.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578626" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.106.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578627" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.106.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578628" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.106.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578629" version="1" comment="kernel-default is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578630" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578631" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578632" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.106.22.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578633" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578634" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578635" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578636" version="1" comment="kernel-source is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578637" version="1" comment="kernel-syms is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578638" version="1" comment="kernel-trace is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578639" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578640" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.106.22.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578641" version="1" comment="kernel-xen is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578642" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578643" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.106.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578644" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578645" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578646" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578647" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578648" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578649" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578650" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578651" version="1" comment="krb5-server is &lt;1.6.3-133.49.62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578652" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.62.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578653" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578654" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578655" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578656" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578657" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578658" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578659" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578660" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578661" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.97.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578662" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578663" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578664" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578665" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578666" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578667" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578668" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.103.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578669" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578670" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578671" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578672" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578673" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578674" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578675" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578676" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578677" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578678" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578679" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578680" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578681" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578682" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578683" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578684" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578685" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578686" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578687" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578688" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578689" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578690" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578691" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578692" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578693" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578694" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578695" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.68.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578696" version="1" comment="kvm is &lt;1.4.2-0.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578697" version="1" comment="kvm is &lt;1.4.2-0.22.34.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578698" version="1" comment="kvm is &lt;1.4.2-37.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578699" version="1" comment="kvm is &lt;1.4.2-46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578700" version="1" comment="kvm is &lt;1.4.2-49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578701" version="1" comment="kvm is &lt;1.4.2-52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578702" version="1" comment="kvm is &lt;1.4.2-53.11.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578703" version="1" comment="kvm is &lt;1.4.2-53.14.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578704" version="1" comment="kvm is &lt;1.4.2-53.17.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578705" version="1" comment="kvm is &lt;1.4.2-53.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578706" version="1" comment="kvm is &lt;1.4.2-53.23.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578707" version="1" comment="kvm is &lt;1.4.2-53.26.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578708" version="1" comment="kvm is &lt;1.4.2-53.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578709" version="1" comment="kvm is &lt;1.4.2-53.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578710" version="1" comment="kvm is &lt;1.4.2-53.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578711" version="1" comment="kvm is &lt;1.4.2-53.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626873" version="1" comment="kvm is &lt;1.4.2-53.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630650" version="1" comment="kvm is &lt;1.4.2-53.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578712" version="1" comment="kvm is &lt;1.4.2-0.21.4 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578713" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578714" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578715" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578716" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578717" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578718" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578719" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578720" version="1" comment="libqt4 is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578721" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578722" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578723" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578724" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578725" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578726" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578727" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578728" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578729" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578730" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578731" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578732" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578733" version="1" comment="libqt4-x86 is &lt;4.6.3-5.29.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578734" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578735" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578736" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578737" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578738" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578739" version="1" comment="libcares2 is &lt;1.7.4-7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630424" version="1" comment="libcares2 is &lt;1.7.4-7.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578740" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578741" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578742" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578743" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578744" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578745" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578746" version="1" comment="postgresql91-server is &lt;9.1.12-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578747" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578748" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578749" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578750" version="1" comment="libfreebl3-x86 is &lt;3.16.5-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578751" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578752" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578753" version="1" comment="libsoftokn3-x86 is &lt;3.16.5-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578754" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578755" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578756" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578757" version="1" comment="mozilla-nss-x86 is &lt;3.16.5-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578758" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578759" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578760" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578761" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578762" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578763" version="1" comment="libgcrypt11 is &lt;1.5.0-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578764" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578765" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578766" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578767" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578768" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578769" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578770" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578771" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578772" version="1" comment="libical0 is &lt;0.43-1.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578773" version="1" comment="libical0-32bit is &lt;0.43-1.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578774" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578775" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578776" version="1" comment="libjasper-x86 is &lt;1.900.1-134.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578777" version="1" comment="libksba is &lt;1.0.4-1.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578778" version="1" comment="libksba is &lt;1.0.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578779" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578780" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578781" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578782" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578783" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578784" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578785" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578786" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578787" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578788" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578789" version="1" comment="libmysql55client18-x86 is &lt;5.5.39-0.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578790" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578791" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578792" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578793" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.13 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578794" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578795" version="1" comment="mysql is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578796" version="1" comment="mysql-client is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578797" version="1" comment="mysql-tools is &lt;5.5.39-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578798" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578799" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578800" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578801" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578802" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.66.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578803" version="1" comment="openssl is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578804" version="1" comment="openssl-doc is &lt;0.9.8j-0.66.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578805" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578806" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578807" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578808" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578809" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578810" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578811" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578812" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578813" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578814" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578815" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578816" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578817" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578818" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578819" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578820" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578821" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578822" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578823" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578824" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578825" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578826" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578827" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578828" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578829" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578830" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578831" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578832" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578833" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578834" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578835" version="1" comment="libqt4 is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578836" version="1" comment="libqt4-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578837" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578838" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578839" version="1" comment="libqt4-sql is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578840" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578841" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578842" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578843" version="1" comment="libqt4-x11 is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578844" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578845" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.42.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578846" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578847" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578848" version="1" comment="libqt4 is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578849" version="1" comment="libqt4-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578850" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578851" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578852" version="1" comment="libqt4-sql is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578853" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578854" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578855" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578856" version="1" comment="libqt4-x11 is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578857" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578858" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.42.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578859" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578860" version="1" comment="libqt4 is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578861" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578862" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578863" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578864" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578865" version="1" comment="libqt4-sql is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578866" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578867" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578868" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578869" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578870" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578871" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578872" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578873" version="1" comment="libqt4-x86 is &lt;4.6.3-5.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578874" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578875" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578876" version="1" comment="libqt4 is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578877" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578878" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578879" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578880" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578881" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578882" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578883" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578884" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578885" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578886" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578887" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578888" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578889" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578890" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578891" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578892" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578893" version="1" comment="librsvg-x86 is &lt;2.26.0-2.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578894" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578895" version="1" comment="libsndfile is &lt;1.0.20-2.6.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578896" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578897" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578898" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578899" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578900" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.10.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578901" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578902" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578903" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578904" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578905" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578906" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578907" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.16.3.37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578908" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.16.3.37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578909" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578910" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578911" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578912" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578913" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578914" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578915" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578916" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578917" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578918" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578919" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578920" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578921" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578922" version="1" comment="libvirt is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578923" version="1" comment="libvirt-client is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578924" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578925" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578926" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578927" version="1" comment="libvirt-python is &lt;1.0.5.9-21.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578928" version="1" comment="libvirt is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578929" version="1" comment="libvirt-client is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578930" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578931" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578932" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578933" version="1" comment="libvirt-python is &lt;1.0.5.9-21.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578934" version="1" comment="libvirt is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578935" version="1" comment="libvirt-client is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578936" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578937" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578938" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578939" version="1" comment="libvirt-python is &lt;1.0.5.9-21.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578940" version="1" comment="libvirt is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578941" version="1" comment="libvirt-client is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578942" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578943" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578944" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578945" version="1" comment="libvirt-python is &lt;1.0.5.9-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578946" version="1" comment="libvirt is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578947" version="1" comment="libvirt-client is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578948" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578949" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578950" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578951" version="1" comment="libvirt-python is &lt;1.0.5.9-21.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578952" version="1" comment="libvirt is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578953" version="1" comment="libvirt-client is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578954" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578955" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578956" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578957" version="1" comment="libvirt-python is &lt;1.0.5.9-21.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681450" version="1" comment="libvirt is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681451" version="1" comment="libvirt-client is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681452" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681453" version="1" comment="libvirt-doc is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681454" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681455" version="1" comment="libvirt-python is &lt;1.0.5.9-21.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578958" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578959" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578960" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578961" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578962" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578963" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578964" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578965" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578966" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578967" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578968" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578969" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578970" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682702" version="1" comment="libxml2 is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682703" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682704" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682705" version="1" comment="libxml2-python is &lt;2.7.6-0.77.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578971" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578972" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578973" version="1" comment="libxml2-doc is &lt;2.7.6-0.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578974" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578975" version="1" comment="libxml2-x86 is &lt;2.7.6-0.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578976" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578977" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578978" version="1" comment="libxml2-doc is &lt;2.7.6-0.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578979" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578980" version="1" comment="libxml2-x86 is &lt;2.7.6-0.37.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578981" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578982" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578983" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578984" version="1" comment="kernel-default is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578985" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578986" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578987" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.96.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578988" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578989" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578990" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578991" version="1" comment="kernel-source is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578992" version="1" comment="kernel-syms is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578993" version="1" comment="kernel-trace is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578994" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578995" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.96.1 for i586,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578996" version="1" comment="kernel-xen is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578997" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578998" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.96.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009578999" version="1" comment="lxc is &lt;0.8.0-0.21.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579000" version="1" comment="lxc is &lt;0.8.0-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579001" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579002" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579003" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579004" version="1" comment="libfreebl3 is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579005" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579006" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579007" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579008" version="1" comment="mozilla-nss is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579009" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579010" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579011" version="1" comment="microcode_ctl is &lt;1.17-102.83.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579012" version="1" comment="microcode_ctl is &lt;1.17-102.83.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579013" version="1" comment="microcode_ctl is &lt;1.17-102.83.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579014" version="1" comment="microcode_ctl is &lt;1.17-102.83.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579015" version="1" comment="microcode_ctl is &lt;1.17-102.83.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579016" version="1" comment="microcode_ctl is &lt;1.17-102.83.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579017" version="1" comment="microcode_ctl is &lt;1.17-102.83.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579018" version="1" comment="microcode_ctl is &lt;1.17-102.83.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009136999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579019" version="1" comment="microcode_ctl is &lt;1.17-102.83.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579020" version="1" comment="microcode_ctl is &lt;1.17-102.83.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579021" version="1" comment="microcode_ctl is &lt;1.17-102.83.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579022" version="1" comment="microcode_ctl is &lt;1.17-102.83.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579023" version="1" comment="microcode_ctl is &lt;1.17-102.83.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683760" version="1" comment="microcode_ctl is &lt;1.17-102.83.75.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579024" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579025" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579026" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579027" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579028" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579029" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579030" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579031" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579032" version="1" comment="mono-core is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579033" version="1" comment="mono-data is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579034" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579035" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579036" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579037" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579038" version="1" comment="mono-web is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579039" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579040" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579041" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579042" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579043" version="1" comment="libfreebl3 is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579044" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579045" version="1" comment="libfreebl3-x86 is &lt;3.20.2-25.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579046" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579047" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579048" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-25.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579049" version="1" comment="mozilla-nss is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579050" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579051" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579052" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-25.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579053" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579054" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579055" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579056" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579057" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579058" version="1" comment="libfreebl3-x86 is &lt;3.19.2.2-22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579059" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579060" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579061" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.2-22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579062" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579063" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579064" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579065" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.2-22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659172" version="1" comment="libfreebl3 is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659173" version="1" comment="libfreebl3-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659174" version="1" comment="libsoftokn3 is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659175" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659176" version="1" comment="mozilla-nss is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659177" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659178" version="1" comment="mozilla-nss-certs is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659179" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659180" version="1" comment="mozilla-nss-tools is &lt;3.68.1-47.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678408" version="1" comment="libfreebl3 is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678409" version="1" comment="libfreebl3-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678410" version="1" comment="libsoftokn3 is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678411" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678412" version="1" comment="mozilla-nss is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678413" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678414" version="1" comment="mozilla-nss-certs is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678415" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678416" version="1" comment="mozilla-nss-tools is &lt;3.68.3-47.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579066" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579067" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579068" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579069" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579070" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579071" version="1" comment="libsoftokn3-x86 is &lt;3.15.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579072" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579073" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579074" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579075" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579076" version="1" comment="mutt is &lt;1.5.17-42.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579077" version="1" comment="mutt is &lt;1.5.17-42.43.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579078" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579079" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579080" version="1" comment="libmysql55client18-x86 is &lt;5.5.45-0.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579081" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579082" version="1" comment="mysql is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579083" version="1" comment="mysql-client is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579084" version="1" comment="mysql-tools is &lt;5.5.45-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579085" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579086" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579087" version="1" comment="libmysql55client18-x86 is &lt;5.5.46-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579088" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579089" version="1" comment="mysql is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579090" version="1" comment="mysql-client is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579091" version="1" comment="mysql-tools is &lt;5.5.46-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579092" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579093" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579094" version="1" comment="libmysql55client18-x86 is &lt;5.5.47-0.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579095" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579096" version="1" comment="mysql is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579097" version="1" comment="mysql-client is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579098" version="1" comment="mysql-tools is &lt;5.5.47-0.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579099" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579100" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579101" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579102" version="1" comment="mysql is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579103" version="1" comment="mysql-client is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579104" version="1" comment="mysql-tools is &lt;5.5.49-0.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579105" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579106" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579107" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579108" version="1" comment="mysql is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579109" version="1" comment="mysql-client is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579110" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579111" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579112" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579113" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579114" version="1" comment="mysql is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579115" version="1" comment="mysql-client is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579116" version="1" comment="mysql-tools is &lt;5.5.53-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579117" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579118" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579119" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579120" version="1" comment="mysql is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579121" version="1" comment="mysql-client is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579122" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579123" version="1" comment="libmysql55client18 is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579124" version="1" comment="libmysql55client18-32bit is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579125" version="1" comment="libmysql55client_r18 is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579126" version="1" comment="mysql is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579127" version="1" comment="mysql-client is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579128" version="1" comment="mysql-tools is &lt;5.5.55-0.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579129" version="1" comment="libmysql55client18 is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579130" version="1" comment="libmysql55client18-32bit is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579131" version="1" comment="libmysql55client_r18 is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579132" version="1" comment="mysql is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579133" version="1" comment="mysql-client is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579134" version="1" comment="mysql-tools is &lt;5.5.57-0.39.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579135" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579136" version="1" comment="libmysql55client18-32bit is &lt;5.5.58-0.39.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579137" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579138" version="1" comment="mysql is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579139" version="1" comment="mysql-client is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579140" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579141" version="1" comment="libmysql55client18 is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579142" version="1" comment="libmysql55client18-32bit is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579143" version="1" comment="libmysql55client_r18 is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579144" version="1" comment="mysql is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579145" version="1" comment="mysql-client is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579146" version="1" comment="mysql-tools is &lt;5.5.59-0.39.9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579147" version="1" comment="libmysql55client18 is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579148" version="1" comment="libmysql55client18-32bit is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579149" version="1" comment="libmysql55client_r18 is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579150" version="1" comment="mysql is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579151" version="1" comment="mysql-client is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579152" version="1" comment="mysql-tools is &lt;5.5.60-0.39.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579153" version="1" comment="libmysql55client18 is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579154" version="1" comment="libmysql55client18-32bit is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579155" version="1" comment="libmysql55client_r18 is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579156" version="1" comment="mysql is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579157" version="1" comment="mysql-client is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579158" version="1" comment="mysql-tools is &lt;5.5.61-0.39.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579159" version="1" comment="libmysql55client18 is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579160" version="1" comment="libmysql55client18-32bit is &lt;5.5.62-0.39.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579161" version="1" comment="libmysql55client_r18 is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579162" version="1" comment="mysql is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579163" version="1" comment="mysql-client is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579164" version="1" comment="mysql-tools is &lt;5.5.62-0.39.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579165" version="1" comment="nagios is &lt;3.0.6-1.25.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579166" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579167" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579168" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579169" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579170" version="1" comment="nagios-plugins is &lt;1.4.16-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579171" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579172" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579173" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579174" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579175" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579176" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579177" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579178" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579179" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579180" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579181" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579182" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579183" version="1" comment="libsoftokn3-x86 is &lt;3.15.3-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579184" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579185" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579186" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579187" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579188" version="1" comment="ntp is &lt;4.2.8p12-48.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579189" version="1" comment="ntp-doc is &lt;4.2.8p12-48.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579190" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579191" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579192" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579193" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579194" version="1" comment="openldap2 is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579195" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579196" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579197" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579198" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579199" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579200" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579201" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579202" version="1" comment="openldap2 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579203" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579204" version="1" comment="openldap2-client is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579205" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579206" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579207" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579208" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579209" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579210" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579211" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579212" version="1" comment="openldap2 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579213" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579214" version="1" comment="openldap2-client is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579215" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579216" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579217" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579218" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579219" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579220" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579221" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579222" version="1" comment="openldap2 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579223" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579224" version="1" comment="openldap2-client is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579225" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579226" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579227" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579228" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579229" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579230" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579231" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579232" version="1" comment="openldap2 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579233" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579234" version="1" comment="openldap2-client is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579235" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579236" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579237" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579238" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579239" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579240" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579241" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579242" version="1" comment="openldap2 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579243" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579244" version="1" comment="openldap2-client is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579245" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579246" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579247" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579248" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579249" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579250" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579251" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579252" version="1" comment="openldap2 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579253" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579254" version="1" comment="openldap2-client is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579255" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579256" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682706" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682707" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682708" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682709" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682710" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682711" version="1" comment="openldap2 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682712" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682713" version="1" comment="openldap2-client is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682714" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682715" version="1" comment="openldap2-openssl1 is &lt;2.4.26-0.74.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579257" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579258" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579259" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579260" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579261" version="1" comment="openldap2 is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579262" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579263" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579264" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579265" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579266" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579267" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.62.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579268" version="1" comment="openldap2 is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579269" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579270" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579271" version="1" comment="openslp is &lt;1.2.0-172.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579272" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579273" version="1" comment="openslp-server is &lt;1.2.0-172.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579274" version="1" comment="openslp-x86 is &lt;1.2.0-172.24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579275" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579276" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579277" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579278" version="1" comment="openssh is &lt;6.2p2-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579279" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579280" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579281" version="1" comment="openssh is &lt;6.2p2-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579282" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579283" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579284" version="1" comment="openssh is &lt;6.2p2-0.33.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579285" version="1" comment="openssh-askpass is &lt;6.2p2-0.33.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579286" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.33.5 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579287" version="1" comment="openssh is &lt;6.2p2-0.40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579288" version="1" comment="openssh-askpass is &lt;6.2p2-0.40.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579289" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.40.3 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579290" version="1" comment="openssh is &lt;6.2p2-0.41.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579291" version="1" comment="openssh-askpass is &lt;6.2p2-0.41.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579292" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.41.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579293" version="1" comment="openssh is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579294" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579295" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579296" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579297" version="1" comment="openssh is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579298" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579299" version="1" comment="openssh-openssl1 is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579300" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-41.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579301" version="1" comment="openssh is &lt;6.2p2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579302" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579303" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579304" version="1" comment="openssh-openssl1 is &lt;6.6p1-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579305" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579306" version="1" comment="openssh-openssl1 is &lt;6.6p1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579307" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579308" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579309" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579310" version="1" comment="openssh-openssl1 is &lt;6.6p1-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579311" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579312" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579313" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579314" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579315" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579316" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.80.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579317" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579318" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579319" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579320" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579321" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579322" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579323" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579324" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579325" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579326" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579327" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579328" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579329" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579330" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579331" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579332" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579333" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579334" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579335" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579336" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579337" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579338" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579339" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579340" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579341" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579342" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579343" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579344" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579345" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579346" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579347" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631751" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632466" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673423" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579348" version="1" comment="openvpn is &lt;2.0.9-143.40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579349" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579350" version="1" comment="openvpn is &lt;2.0.9-143.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579351" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579352" version="1" comment="openvpn is &lt;2.0.9-143.47.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579353" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579354" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579355" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579356" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579357" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579358" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579359" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579360" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579361" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676888" version="1" comment="openvpn-openssl1 is &lt;2.3.2-0.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676889" version="1" comment="openvpn-openssl1-down-root-plugin is &lt;2.3.2-0.10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579362" version="1" comment="orca is &lt;2.28.3-0.5.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579363" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579364" version="1" comment="pam is &lt;1.1.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579365" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579366" version="1" comment="pam-doc is &lt;1.1.5-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579367" version="1" comment="pam-x86 is &lt;1.1.5-0.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579368" version="1" comment="pam is &lt;1.1.5-0.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579369" version="1" comment="pam-32bit is &lt;1.1.5-0.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579370" version="1" comment="pam-doc is &lt;1.1.5-0.12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579371" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579372" version="1" comment="perl is &lt;5.10.0-64.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579373" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579374" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579375" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579376" version="1" comment="perl-base is &lt;5.10.0-64.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579377" version="1" comment="perl-doc is &lt;5.10.0-64.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579378" version="1" comment="perl-x86 is &lt;5.10.0-64.70.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579379" version="1" comment="perl is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579380" version="1" comment="perl-32bit is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579381" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579382" version="1" comment="perl-Test-Simple is &lt;0.72-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579383" version="1" comment="perl-base is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579384" version="1" comment="perl-doc is &lt;5.10.0-64.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579385" version="1" comment="perl is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579386" version="1" comment="perl-32bit is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579387" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579388" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579389" version="1" comment="perl-base is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579390" version="1" comment="perl-doc is &lt;5.10.0-64.81.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579391" version="1" comment="perl is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579392" version="1" comment="perl-32bit is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579393" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579394" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579395" version="1" comment="perl-base is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579396" version="1" comment="perl-doc is &lt;5.10.0-64.81.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579397" version="1" comment="perl is &lt;5.10.0-64.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579398" version="1" comment="perl-32bit is &lt;5.10.0-64.81.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579399" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579400" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579401" version="1" comment="perl-base is &lt;5.10.0-64.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579402" version="1" comment="perl-doc is &lt;5.10.0-64.81.13.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579403" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579404" version="1" comment="permissions is &lt;2013.1.7-0.6.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579405" version="1" comment="apache2-mod_php53 is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579406" version="1" comment="php53 is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579407" version="1" comment="php53-bcmath is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579408" version="1" comment="php53-bz2 is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579409" version="1" comment="php53-calendar is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579410" version="1" comment="php53-ctype is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579411" version="1" comment="php53-curl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579412" version="1" comment="php53-dba is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579413" version="1" comment="php53-dom is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579414" version="1" comment="php53-exif is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579415" version="1" comment="php53-fastcgi is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579416" version="1" comment="php53-fileinfo is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579417" version="1" comment="php53-ftp is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579418" version="1" comment="php53-gd is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579419" version="1" comment="php53-gettext is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579420" version="1" comment="php53-gmp is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579421" version="1" comment="php53-iconv is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579422" version="1" comment="php53-intl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579423" version="1" comment="php53-json is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579424" version="1" comment="php53-ldap is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579425" version="1" comment="php53-mbstring is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579426" version="1" comment="php53-mcrypt is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579427" version="1" comment="php53-mysql is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579428" version="1" comment="php53-odbc is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579429" version="1" comment="php53-openssl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579430" version="1" comment="php53-pcntl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579431" version="1" comment="php53-pdo is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579432" version="1" comment="php53-pear is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579433" version="1" comment="php53-pgsql is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579434" version="1" comment="php53-pspell is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579435" version="1" comment="php53-shmop is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579436" version="1" comment="php53-snmp is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579437" version="1" comment="php53-soap is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579438" version="1" comment="php53-suhosin is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579439" version="1" comment="php53-sysvmsg is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579440" version="1" comment="php53-sysvsem is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579441" version="1" comment="php53-sysvshm is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579442" version="1" comment="php53-tokenizer is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579443" version="1" comment="php53-wddx is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579444" version="1" comment="php53-xmlreader is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579445" version="1" comment="php53-xmlrpc is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579446" version="1" comment="php53-xmlwriter is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579447" version="1" comment="php53-xsl is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579448" version="1" comment="php53-zip is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579449" version="1" comment="php53-zlib is &lt;5.3.17-45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579450" version="1" comment="apache2-mod_php53 is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579451" version="1" comment="php53 is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579452" version="1" comment="php53-bcmath is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579453" version="1" comment="php53-bz2 is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579454" version="1" comment="php53-calendar is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579455" version="1" comment="php53-ctype is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579456" version="1" comment="php53-curl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579457" version="1" comment="php53-dba is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579458" version="1" comment="php53-dom is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579459" version="1" comment="php53-exif is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579460" version="1" comment="php53-fastcgi is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579461" version="1" comment="php53-fileinfo is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579462" version="1" comment="php53-ftp is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579463" version="1" comment="php53-gd is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579464" version="1" comment="php53-gettext is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579465" version="1" comment="php53-gmp is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579466" version="1" comment="php53-iconv is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579467" version="1" comment="php53-intl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579468" version="1" comment="php53-json is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579469" version="1" comment="php53-ldap is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579470" version="1" comment="php53-mbstring is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579471" version="1" comment="php53-mcrypt is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579472" version="1" comment="php53-mysql is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579473" version="1" comment="php53-odbc is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579474" version="1" comment="php53-openssl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579475" version="1" comment="php53-pcntl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579476" version="1" comment="php53-pdo is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579477" version="1" comment="php53-pear is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579478" version="1" comment="php53-pgsql is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579479" version="1" comment="php53-pspell is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579480" version="1" comment="php53-shmop is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579481" version="1" comment="php53-snmp is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579482" version="1" comment="php53-soap is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579483" version="1" comment="php53-suhosin is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579484" version="1" comment="php53-sysvmsg is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579485" version="1" comment="php53-sysvsem is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579486" version="1" comment="php53-sysvshm is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579487" version="1" comment="php53-tokenizer is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579488" version="1" comment="php53-wddx is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579489" version="1" comment="php53-xmlreader is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579490" version="1" comment="php53-xmlrpc is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579491" version="1" comment="php53-xmlwriter is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579492" version="1" comment="php53-xsl is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579493" version="1" comment="php53-zip is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579494" version="1" comment="php53-zlib is &lt;5.3.17-48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579495" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579496" version="1" comment="php53 is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579497" version="1" comment="php53-bcmath is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579498" version="1" comment="php53-bz2 is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579499" version="1" comment="php53-calendar is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579500" version="1" comment="php53-ctype is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579501" version="1" comment="php53-curl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579502" version="1" comment="php53-dba is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579503" version="1" comment="php53-dom is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579504" version="1" comment="php53-exif is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579505" version="1" comment="php53-fastcgi is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579506" version="1" comment="php53-fileinfo is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579507" version="1" comment="php53-ftp is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579508" version="1" comment="php53-gd is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579509" version="1" comment="php53-gettext is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579510" version="1" comment="php53-gmp is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579511" version="1" comment="php53-iconv is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579512" version="1" comment="php53-intl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579513" version="1" comment="php53-json is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579514" version="1" comment="php53-ldap is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579515" version="1" comment="php53-mbstring is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579516" version="1" comment="php53-mcrypt is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579517" version="1" comment="php53-mysql is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579518" version="1" comment="php53-odbc is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579519" version="1" comment="php53-openssl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579520" version="1" comment="php53-pcntl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579521" version="1" comment="php53-pdo is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579522" version="1" comment="php53-pear is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579523" version="1" comment="php53-pgsql is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579524" version="1" comment="php53-pspell is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579525" version="1" comment="php53-shmop is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579526" version="1" comment="php53-snmp is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579527" version="1" comment="php53-soap is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579528" version="1" comment="php53-suhosin is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579529" version="1" comment="php53-sysvmsg is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579530" version="1" comment="php53-sysvsem is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579531" version="1" comment="php53-sysvshm is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579532" version="1" comment="php53-tokenizer is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579533" version="1" comment="php53-wddx is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579534" version="1" comment="php53-xmlreader is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579535" version="1" comment="php53-xmlrpc is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579536" version="1" comment="php53-xmlwriter is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579537" version="1" comment="php53-xsl is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579538" version="1" comment="php53-zip is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579539" version="1" comment="php53-zlib is &lt;5.3.17-59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579540" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579541" version="1" comment="php53 is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579542" version="1" comment="php53-bcmath is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579543" version="1" comment="php53-bz2 is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579544" version="1" comment="php53-calendar is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579545" version="1" comment="php53-ctype is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579546" version="1" comment="php53-curl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579547" version="1" comment="php53-dba is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579548" version="1" comment="php53-dom is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579549" version="1" comment="php53-exif is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579550" version="1" comment="php53-fastcgi is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579551" version="1" comment="php53-fileinfo is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579552" version="1" comment="php53-ftp is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579553" version="1" comment="php53-gd is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579554" version="1" comment="php53-gettext is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579555" version="1" comment="php53-gmp is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579556" version="1" comment="php53-iconv is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579557" version="1" comment="php53-intl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579558" version="1" comment="php53-json is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579559" version="1" comment="php53-ldap is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579560" version="1" comment="php53-mbstring is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579561" version="1" comment="php53-mcrypt is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579562" version="1" comment="php53-mysql is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579563" version="1" comment="php53-odbc is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579564" version="1" comment="php53-openssl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579565" version="1" comment="php53-pcntl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579566" version="1" comment="php53-pdo is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579567" version="1" comment="php53-pear is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579568" version="1" comment="php53-pgsql is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579569" version="1" comment="php53-pspell is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579570" version="1" comment="php53-shmop is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579571" version="1" comment="php53-snmp is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579572" version="1" comment="php53-soap is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579573" version="1" comment="php53-suhosin is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579574" version="1" comment="php53-sysvmsg is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579575" version="1" comment="php53-sysvsem is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579576" version="1" comment="php53-sysvshm is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579577" version="1" comment="php53-tokenizer is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579578" version="1" comment="php53-wddx is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579579" version="1" comment="php53-xmlreader is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579580" version="1" comment="php53-xmlrpc is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579581" version="1" comment="php53-xmlwriter is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579582" version="1" comment="php53-xsl is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579583" version="1" comment="php53-zip is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579584" version="1" comment="php53-zlib is &lt;5.3.17-62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579585" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579586" version="1" comment="php53 is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579587" version="1" comment="php53-bcmath is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579588" version="1" comment="php53-bz2 is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579589" version="1" comment="php53-calendar is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579590" version="1" comment="php53-ctype is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579591" version="1" comment="php53-curl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579592" version="1" comment="php53-dba is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579593" version="1" comment="php53-dom is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579594" version="1" comment="php53-exif is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579595" version="1" comment="php53-fastcgi is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579596" version="1" comment="php53-fileinfo is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579597" version="1" comment="php53-ftp is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579598" version="1" comment="php53-gd is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579599" version="1" comment="php53-gettext is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579600" version="1" comment="php53-gmp is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579601" version="1" comment="php53-iconv is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579602" version="1" comment="php53-intl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579603" version="1" comment="php53-json is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579604" version="1" comment="php53-ldap is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579605" version="1" comment="php53-mbstring is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579606" version="1" comment="php53-mcrypt is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579607" version="1" comment="php53-mysql is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579608" version="1" comment="php53-odbc is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579609" version="1" comment="php53-openssl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579610" version="1" comment="php53-pcntl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579611" version="1" comment="php53-pdo is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579612" version="1" comment="php53-pear is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579613" version="1" comment="php53-pgsql is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579614" version="1" comment="php53-pspell is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579615" version="1" comment="php53-shmop is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579616" version="1" comment="php53-snmp is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579617" version="1" comment="php53-soap is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579618" version="1" comment="php53-suhosin is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579619" version="1" comment="php53-sysvmsg is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579620" version="1" comment="php53-sysvsem is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579621" version="1" comment="php53-sysvshm is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579622" version="1" comment="php53-tokenizer is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579623" version="1" comment="php53-wddx is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579624" version="1" comment="php53-xmlreader is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579625" version="1" comment="php53-xmlrpc is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579626" version="1" comment="php53-xmlwriter is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579627" version="1" comment="php53-xsl is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579628" version="1" comment="php53-zip is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579629" version="1" comment="php53-zlib is &lt;5.3.17-71.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579630" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579631" version="1" comment="php53 is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579632" version="1" comment="php53-bcmath is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579633" version="1" comment="php53-bz2 is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579634" version="1" comment="php53-calendar is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579635" version="1" comment="php53-ctype is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579636" version="1" comment="php53-curl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579637" version="1" comment="php53-dba is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579638" version="1" comment="php53-dom is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579639" version="1" comment="php53-exif is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579640" version="1" comment="php53-fastcgi is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579641" version="1" comment="php53-fileinfo is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579642" version="1" comment="php53-ftp is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579643" version="1" comment="php53-gd is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579644" version="1" comment="php53-gettext is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579645" version="1" comment="php53-gmp is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579646" version="1" comment="php53-iconv is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579647" version="1" comment="php53-intl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579648" version="1" comment="php53-json is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579649" version="1" comment="php53-ldap is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579650" version="1" comment="php53-mbstring is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579651" version="1" comment="php53-mcrypt is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579652" version="1" comment="php53-mysql is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579653" version="1" comment="php53-odbc is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579654" version="1" comment="php53-openssl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579655" version="1" comment="php53-pcntl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579656" version="1" comment="php53-pdo is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579657" version="1" comment="php53-pear is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579658" version="1" comment="php53-pgsql is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579659" version="1" comment="php53-pspell is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579660" version="1" comment="php53-shmop is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579661" version="1" comment="php53-snmp is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579662" version="1" comment="php53-soap is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579663" version="1" comment="php53-suhosin is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579664" version="1" comment="php53-sysvmsg is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579665" version="1" comment="php53-sysvsem is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579666" version="1" comment="php53-sysvshm is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579667" version="1" comment="php53-tokenizer is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579668" version="1" comment="php53-wddx is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579669" version="1" comment="php53-xmlreader is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579670" version="1" comment="php53-xmlrpc is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579671" version="1" comment="php53-xmlwriter is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579672" version="1" comment="php53-xsl is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579673" version="1" comment="php53-zip is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579674" version="1" comment="php53-zlib is &lt;5.3.17-74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579675" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579676" version="1" comment="php53 is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579677" version="1" comment="php53-bcmath is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579678" version="1" comment="php53-bz2 is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579679" version="1" comment="php53-calendar is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579680" version="1" comment="php53-ctype is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579681" version="1" comment="php53-curl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579682" version="1" comment="php53-dba is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579683" version="1" comment="php53-dom is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579684" version="1" comment="php53-exif is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579685" version="1" comment="php53-fastcgi is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579686" version="1" comment="php53-fileinfo is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579687" version="1" comment="php53-ftp is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579688" version="1" comment="php53-gd is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579689" version="1" comment="php53-gettext is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579690" version="1" comment="php53-gmp is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579691" version="1" comment="php53-iconv is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579692" version="1" comment="php53-intl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579693" version="1" comment="php53-json is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579694" version="1" comment="php53-ldap is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579695" version="1" comment="php53-mbstring is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579696" version="1" comment="php53-mcrypt is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579697" version="1" comment="php53-mysql is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579698" version="1" comment="php53-odbc is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579699" version="1" comment="php53-openssl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579700" version="1" comment="php53-pcntl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579701" version="1" comment="php53-pdo is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579702" version="1" comment="php53-pear is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579703" version="1" comment="php53-pgsql is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579704" version="1" comment="php53-pspell is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579705" version="1" comment="php53-shmop is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579706" version="1" comment="php53-snmp is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579707" version="1" comment="php53-soap is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579708" version="1" comment="php53-suhosin is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579709" version="1" comment="php53-sysvmsg is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579710" version="1" comment="php53-sysvsem is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579711" version="1" comment="php53-sysvshm is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579712" version="1" comment="php53-tokenizer is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579713" version="1" comment="php53-wddx is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579714" version="1" comment="php53-xmlreader is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579715" version="1" comment="php53-xmlrpc is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579716" version="1" comment="php53-xmlwriter is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579717" version="1" comment="php53-xsl is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579718" version="1" comment="php53-zip is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579719" version="1" comment="php53-zlib is &lt;5.3.17-79.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579720" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579721" version="1" comment="php53 is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579722" version="1" comment="php53-bcmath is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579723" version="1" comment="php53-bz2 is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579724" version="1" comment="php53-calendar is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579725" version="1" comment="php53-ctype is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579726" version="1" comment="php53-curl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579727" version="1" comment="php53-dba is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579728" version="1" comment="php53-dom is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579729" version="1" comment="php53-exif is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579730" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579731" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579732" version="1" comment="php53-ftp is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579733" version="1" comment="php53-gd is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579734" version="1" comment="php53-gettext is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579735" version="1" comment="php53-gmp is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579736" version="1" comment="php53-iconv is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579737" version="1" comment="php53-intl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579738" version="1" comment="php53-json is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579739" version="1" comment="php53-ldap is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579740" version="1" comment="php53-mbstring is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579741" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579742" version="1" comment="php53-mysql is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579743" version="1" comment="php53-odbc is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579744" version="1" comment="php53-openssl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579745" version="1" comment="php53-pcntl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579746" version="1" comment="php53-pdo is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579747" version="1" comment="php53-pear is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579748" version="1" comment="php53-pgsql is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579749" version="1" comment="php53-pspell is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579750" version="1" comment="php53-shmop is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579751" version="1" comment="php53-snmp is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579752" version="1" comment="php53-soap is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579753" version="1" comment="php53-suhosin is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579754" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579755" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579756" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579757" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579758" version="1" comment="php53-wddx is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579759" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579760" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579761" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579762" version="1" comment="php53-xsl is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579763" version="1" comment="php53-zip is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579764" version="1" comment="php53-zlib is &lt;5.3.17-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579765" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579766" version="1" comment="php53 is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579767" version="1" comment="php53-bcmath is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579768" version="1" comment="php53-bz2 is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579769" version="1" comment="php53-calendar is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579770" version="1" comment="php53-ctype is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579771" version="1" comment="php53-curl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579772" version="1" comment="php53-dba is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579773" version="1" comment="php53-dom is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579774" version="1" comment="php53-exif is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579775" version="1" comment="php53-fastcgi is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579776" version="1" comment="php53-fileinfo is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579777" version="1" comment="php53-ftp is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579778" version="1" comment="php53-gd is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579779" version="1" comment="php53-gettext is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579780" version="1" comment="php53-gmp is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579781" version="1" comment="php53-iconv is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579782" version="1" comment="php53-intl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579783" version="1" comment="php53-json is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579784" version="1" comment="php53-ldap is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579785" version="1" comment="php53-mbstring is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579786" version="1" comment="php53-mcrypt is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579787" version="1" comment="php53-mysql is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579788" version="1" comment="php53-odbc is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579789" version="1" comment="php53-openssl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579790" version="1" comment="php53-pcntl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579791" version="1" comment="php53-pdo is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579792" version="1" comment="php53-pear is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579793" version="1" comment="php53-pgsql is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579794" version="1" comment="php53-pspell is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579795" version="1" comment="php53-shmop is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579796" version="1" comment="php53-snmp is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579797" version="1" comment="php53-soap is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579798" version="1" comment="php53-suhosin is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579799" version="1" comment="php53-sysvmsg is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579800" version="1" comment="php53-sysvsem is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579801" version="1" comment="php53-sysvshm is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579802" version="1" comment="php53-tokenizer is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579803" version="1" comment="php53-wddx is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579804" version="1" comment="php53-xmlreader is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579805" version="1" comment="php53-xmlrpc is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579806" version="1" comment="php53-xmlwriter is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579807" version="1" comment="php53-xsl is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579808" version="1" comment="php53-zip is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579809" version="1" comment="php53-zlib is &lt;5.3.17-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579810" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579811" version="1" comment="php53 is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579812" version="1" comment="php53-bcmath is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579813" version="1" comment="php53-bz2 is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579814" version="1" comment="php53-calendar is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579815" version="1" comment="php53-ctype is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579816" version="1" comment="php53-curl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579817" version="1" comment="php53-dba is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579818" version="1" comment="php53-dom is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579819" version="1" comment="php53-exif is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579820" version="1" comment="php53-fastcgi is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579821" version="1" comment="php53-fileinfo is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579822" version="1" comment="php53-ftp is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579823" version="1" comment="php53-gd is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579824" version="1" comment="php53-gettext is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579825" version="1" comment="php53-gmp is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579826" version="1" comment="php53-iconv is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579827" version="1" comment="php53-intl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579828" version="1" comment="php53-json is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579829" version="1" comment="php53-ldap is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579830" version="1" comment="php53-mbstring is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579831" version="1" comment="php53-mcrypt is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579832" version="1" comment="php53-mysql is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579833" version="1" comment="php53-odbc is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579834" version="1" comment="php53-openssl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579835" version="1" comment="php53-pcntl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579836" version="1" comment="php53-pdo is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579837" version="1" comment="php53-pear is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579838" version="1" comment="php53-pgsql is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579839" version="1" comment="php53-pspell is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579840" version="1" comment="php53-shmop is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579841" version="1" comment="php53-snmp is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579842" version="1" comment="php53-soap is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579843" version="1" comment="php53-suhosin is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579844" version="1" comment="php53-sysvmsg is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579845" version="1" comment="php53-sysvsem is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579846" version="1" comment="php53-sysvshm is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579847" version="1" comment="php53-tokenizer is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579848" version="1" comment="php53-wddx is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579849" version="1" comment="php53-xmlreader is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579850" version="1" comment="php53-xmlrpc is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579851" version="1" comment="php53-xmlwriter is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579852" version="1" comment="php53-xsl is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579853" version="1" comment="php53-zip is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579854" version="1" comment="php53-zlib is &lt;5.3.17-94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579855" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579856" version="1" comment="php53 is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579857" version="1" comment="php53-bcmath is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579858" version="1" comment="php53-bz2 is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579859" version="1" comment="php53-calendar is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579860" version="1" comment="php53-ctype is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579861" version="1" comment="php53-curl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579862" version="1" comment="php53-dba is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579863" version="1" comment="php53-dom is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579864" version="1" comment="php53-exif is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579865" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579866" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579867" version="1" comment="php53-ftp is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579868" version="1" comment="php53-gd is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579869" version="1" comment="php53-gettext is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579870" version="1" comment="php53-gmp is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579871" version="1" comment="php53-iconv is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579872" version="1" comment="php53-intl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579873" version="1" comment="php53-json is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579874" version="1" comment="php53-ldap is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579875" version="1" comment="php53-mbstring is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579876" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579877" version="1" comment="php53-mysql is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579878" version="1" comment="php53-odbc is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579879" version="1" comment="php53-openssl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579880" version="1" comment="php53-pcntl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579881" version="1" comment="php53-pdo is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579882" version="1" comment="php53-pear is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579883" version="1" comment="php53-pgsql is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579884" version="1" comment="php53-pspell is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579885" version="1" comment="php53-shmop is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579886" version="1" comment="php53-snmp is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579887" version="1" comment="php53-soap is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579888" version="1" comment="php53-suhosin is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579889" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579890" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579891" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579892" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579893" version="1" comment="php53-wddx is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579894" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579895" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579896" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579897" version="1" comment="php53-xsl is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579898" version="1" comment="php53-zip is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579899" version="1" comment="php53-zlib is &lt;5.3.17-101.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579900" version="1" comment="apache2-mod_php53 is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579901" version="1" comment="php53 is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579902" version="1" comment="php53-bcmath is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579903" version="1" comment="php53-bz2 is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579904" version="1" comment="php53-calendar is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579905" version="1" comment="php53-ctype is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579906" version="1" comment="php53-curl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579907" version="1" comment="php53-dba is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579908" version="1" comment="php53-dom is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579909" version="1" comment="php53-exif is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579910" version="1" comment="php53-fastcgi is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579911" version="1" comment="php53-fileinfo is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579912" version="1" comment="php53-ftp is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579913" version="1" comment="php53-gd is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579914" version="1" comment="php53-gettext is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579915" version="1" comment="php53-gmp is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579916" version="1" comment="php53-iconv is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579917" version="1" comment="php53-intl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579918" version="1" comment="php53-json is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579919" version="1" comment="php53-ldap is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579920" version="1" comment="php53-mbstring is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579921" version="1" comment="php53-mcrypt is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579922" version="1" comment="php53-mysql is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579923" version="1" comment="php53-odbc is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579924" version="1" comment="php53-openssl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579925" version="1" comment="php53-pcntl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579926" version="1" comment="php53-pdo is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579927" version="1" comment="php53-pear is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579928" version="1" comment="php53-pgsql is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579929" version="1" comment="php53-pspell is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579930" version="1" comment="php53-shmop is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579931" version="1" comment="php53-snmp is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579932" version="1" comment="php53-soap is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579933" version="1" comment="php53-suhosin is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579934" version="1" comment="php53-sysvmsg is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579935" version="1" comment="php53-sysvsem is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579936" version="1" comment="php53-sysvshm is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579937" version="1" comment="php53-tokenizer is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579938" version="1" comment="php53-wddx is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579939" version="1" comment="php53-xmlreader is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579940" version="1" comment="php53-xmlrpc is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579941" version="1" comment="php53-xmlwriter is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579942" version="1" comment="php53-xsl is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579943" version="1" comment="php53-zip is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579944" version="1" comment="php53-zlib is &lt;5.3.17-108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579945" version="1" comment="apache2-mod_php53 is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579946" version="1" comment="php53 is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579947" version="1" comment="php53-bcmath is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579948" version="1" comment="php53-bz2 is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579949" version="1" comment="php53-calendar is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579950" version="1" comment="php53-ctype is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579951" version="1" comment="php53-curl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579952" version="1" comment="php53-dba is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579953" version="1" comment="php53-dom is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579954" version="1" comment="php53-exif is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579955" version="1" comment="php53-fastcgi is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579956" version="1" comment="php53-fileinfo is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579957" version="1" comment="php53-ftp is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579958" version="1" comment="php53-gd is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579959" version="1" comment="php53-gettext is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579960" version="1" comment="php53-gmp is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579961" version="1" comment="php53-iconv is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579962" version="1" comment="php53-intl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579963" version="1" comment="php53-json is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579964" version="1" comment="php53-ldap is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579965" version="1" comment="php53-mbstring is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579966" version="1" comment="php53-mcrypt is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579967" version="1" comment="php53-mysql is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579968" version="1" comment="php53-odbc is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579969" version="1" comment="php53-openssl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579970" version="1" comment="php53-pcntl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579971" version="1" comment="php53-pdo is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579972" version="1" comment="php53-pear is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579973" version="1" comment="php53-pgsql is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579974" version="1" comment="php53-pspell is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579975" version="1" comment="php53-shmop is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579976" version="1" comment="php53-snmp is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579977" version="1" comment="php53-soap is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579978" version="1" comment="php53-suhosin is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579979" version="1" comment="php53-sysvmsg is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579980" version="1" comment="php53-sysvsem is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579981" version="1" comment="php53-sysvshm is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579982" version="1" comment="php53-tokenizer is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579983" version="1" comment="php53-wddx is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579984" version="1" comment="php53-xmlreader is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579985" version="1" comment="php53-xmlrpc is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579986" version="1" comment="php53-xmlwriter is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579987" version="1" comment="php53-xsl is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579988" version="1" comment="php53-zip is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579989" version="1" comment="php53-zlib is &lt;5.3.17-111.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579990" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579991" version="1" comment="php53 is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579992" version="1" comment="php53-bcmath is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579993" version="1" comment="php53-bz2 is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579994" version="1" comment="php53-calendar is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579995" version="1" comment="php53-ctype is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579996" version="1" comment="php53-curl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579997" version="1" comment="php53-dba is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579998" version="1" comment="php53-dom is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009579999" version="1" comment="php53-exif is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580000" version="1" comment="php53-fastcgi is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580001" version="1" comment="php53-fileinfo is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580002" version="1" comment="php53-ftp is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580003" version="1" comment="php53-gd is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580004" version="1" comment="php53-gettext is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580005" version="1" comment="php53-gmp is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580006" version="1" comment="php53-iconv is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580007" version="1" comment="php53-intl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580008" version="1" comment="php53-json is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580009" version="1" comment="php53-ldap is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580010" version="1" comment="php53-mbstring is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580011" version="1" comment="php53-mcrypt is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580012" version="1" comment="php53-mysql is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580013" version="1" comment="php53-odbc is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580014" version="1" comment="php53-openssl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580015" version="1" comment="php53-pcntl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580016" version="1" comment="php53-pdo is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580017" version="1" comment="php53-pear is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580018" version="1" comment="php53-pgsql is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580019" version="1" comment="php53-pspell is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580020" version="1" comment="php53-shmop is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580021" version="1" comment="php53-snmp is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580022" version="1" comment="php53-soap is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580023" version="1" comment="php53-suhosin is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580024" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580025" version="1" comment="php53-sysvsem is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580026" version="1" comment="php53-sysvshm is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580027" version="1" comment="php53-tokenizer is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580028" version="1" comment="php53-wddx is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580029" version="1" comment="php53-xmlreader is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580030" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580031" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580032" version="1" comment="php53-xsl is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580033" version="1" comment="php53-zip is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580034" version="1" comment="php53-zlib is &lt;5.3.17-112.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580035" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580036" version="1" comment="php53 is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580037" version="1" comment="php53-bcmath is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580038" version="1" comment="php53-bz2 is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580039" version="1" comment="php53-calendar is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580040" version="1" comment="php53-ctype is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580041" version="1" comment="php53-curl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580042" version="1" comment="php53-dba is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580043" version="1" comment="php53-dom is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580044" version="1" comment="php53-exif is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580045" version="1" comment="php53-fastcgi is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580046" version="1" comment="php53-fileinfo is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580047" version="1" comment="php53-ftp is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580048" version="1" comment="php53-gd is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580049" version="1" comment="php53-gettext is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580050" version="1" comment="php53-gmp is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580051" version="1" comment="php53-iconv is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580052" version="1" comment="php53-intl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580053" version="1" comment="php53-json is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580054" version="1" comment="php53-ldap is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580055" version="1" comment="php53-mbstring is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580056" version="1" comment="php53-mcrypt is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580057" version="1" comment="php53-mysql is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580058" version="1" comment="php53-odbc is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580059" version="1" comment="php53-openssl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580060" version="1" comment="php53-pcntl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580061" version="1" comment="php53-pdo is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580062" version="1" comment="php53-pear is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580063" version="1" comment="php53-pgsql is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580064" version="1" comment="php53-pspell is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580065" version="1" comment="php53-shmop is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580066" version="1" comment="php53-snmp is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580067" version="1" comment="php53-soap is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580068" version="1" comment="php53-suhosin is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580069" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580070" version="1" comment="php53-sysvsem is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580071" version="1" comment="php53-sysvshm is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580072" version="1" comment="php53-tokenizer is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580073" version="1" comment="php53-wddx is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580074" version="1" comment="php53-xmlreader is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580075" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580076" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580077" version="1" comment="php53-xsl is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580078" version="1" comment="php53-zip is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580079" version="1" comment="php53-zlib is &lt;5.3.17-112.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580080" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580081" version="1" comment="php53 is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580082" version="1" comment="php53-bcmath is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580083" version="1" comment="php53-bz2 is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580084" version="1" comment="php53-calendar is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580085" version="1" comment="php53-ctype is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580086" version="1" comment="php53-curl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580087" version="1" comment="php53-dba is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580088" version="1" comment="php53-dom is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580089" version="1" comment="php53-exif is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580090" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580091" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580092" version="1" comment="php53-ftp is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580093" version="1" comment="php53-gd is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580094" version="1" comment="php53-gettext is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580095" version="1" comment="php53-gmp is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580096" version="1" comment="php53-iconv is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580097" version="1" comment="php53-intl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580098" version="1" comment="php53-json is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580099" version="1" comment="php53-ldap is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580100" version="1" comment="php53-mbstring is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580101" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580102" version="1" comment="php53-mysql is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580103" version="1" comment="php53-odbc is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580104" version="1" comment="php53-openssl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580105" version="1" comment="php53-pcntl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580106" version="1" comment="php53-pdo is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580107" version="1" comment="php53-pear is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580108" version="1" comment="php53-pgsql is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580109" version="1" comment="php53-pspell is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580110" version="1" comment="php53-shmop is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580111" version="1" comment="php53-snmp is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580112" version="1" comment="php53-soap is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580113" version="1" comment="php53-suhosin is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580114" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580115" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580116" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580117" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580118" version="1" comment="php53-wddx is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580119" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580120" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580121" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580122" version="1" comment="php53-xsl is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580123" version="1" comment="php53-zip is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580124" version="1" comment="php53-zlib is &lt;5.3.17-112.20.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580125" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580126" version="1" comment="php53 is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580127" version="1" comment="php53-bcmath is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580128" version="1" comment="php53-bz2 is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580129" version="1" comment="php53-calendar is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580130" version="1" comment="php53-ctype is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580131" version="1" comment="php53-curl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580132" version="1" comment="php53-dba is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580133" version="1" comment="php53-dom is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580134" version="1" comment="php53-exif is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580135" version="1" comment="php53-fastcgi is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580136" version="1" comment="php53-fileinfo is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580137" version="1" comment="php53-ftp is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580138" version="1" comment="php53-gd is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580139" version="1" comment="php53-gettext is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580140" version="1" comment="php53-gmp is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580141" version="1" comment="php53-iconv is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580142" version="1" comment="php53-intl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580143" version="1" comment="php53-json is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580144" version="1" comment="php53-ldap is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580145" version="1" comment="php53-mbstring is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580146" version="1" comment="php53-mcrypt is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580147" version="1" comment="php53-mysql is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580148" version="1" comment="php53-odbc is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580149" version="1" comment="php53-openssl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580150" version="1" comment="php53-pcntl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580151" version="1" comment="php53-pdo is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580152" version="1" comment="php53-pear is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580153" version="1" comment="php53-pgsql is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580154" version="1" comment="php53-pspell is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580155" version="1" comment="php53-shmop is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580156" version="1" comment="php53-snmp is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580157" version="1" comment="php53-soap is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580158" version="1" comment="php53-suhosin is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580159" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580160" version="1" comment="php53-sysvsem is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580161" version="1" comment="php53-sysvshm is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580162" version="1" comment="php53-tokenizer is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580163" version="1" comment="php53-wddx is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580164" version="1" comment="php53-xmlreader is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580165" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580166" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580167" version="1" comment="php53-xsl is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580168" version="1" comment="php53-zip is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580169" version="1" comment="php53-zlib is &lt;5.3.17-112.23.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580170" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580171" version="1" comment="php53 is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580172" version="1" comment="php53-bcmath is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580173" version="1" comment="php53-bz2 is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580174" version="1" comment="php53-calendar is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580175" version="1" comment="php53-ctype is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580176" version="1" comment="php53-curl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580177" version="1" comment="php53-dba is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580178" version="1" comment="php53-dom is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580179" version="1" comment="php53-exif is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580180" version="1" comment="php53-fastcgi is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580181" version="1" comment="php53-fileinfo is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580182" version="1" comment="php53-ftp is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580183" version="1" comment="php53-gd is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580184" version="1" comment="php53-gettext is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580185" version="1" comment="php53-gmp is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580186" version="1" comment="php53-iconv is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580187" version="1" comment="php53-intl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580188" version="1" comment="php53-json is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580189" version="1" comment="php53-ldap is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580190" version="1" comment="php53-mbstring is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580191" version="1" comment="php53-mcrypt is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580192" version="1" comment="php53-mysql is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580193" version="1" comment="php53-odbc is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580194" version="1" comment="php53-openssl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580195" version="1" comment="php53-pcntl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580196" version="1" comment="php53-pdo is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580197" version="1" comment="php53-pear is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580198" version="1" comment="php53-pgsql is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580199" version="1" comment="php53-pspell is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580200" version="1" comment="php53-shmop is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580201" version="1" comment="php53-snmp is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580202" version="1" comment="php53-soap is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580203" version="1" comment="php53-suhosin is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580204" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580205" version="1" comment="php53-sysvsem is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580206" version="1" comment="php53-sysvshm is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580207" version="1" comment="php53-tokenizer is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580208" version="1" comment="php53-wddx is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580209" version="1" comment="php53-xmlreader is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580210" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580211" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580212" version="1" comment="php53-xsl is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580213" version="1" comment="php53-zip is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580214" version="1" comment="php53-zlib is &lt;5.3.17-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580215" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580216" version="1" comment="php53 is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580217" version="1" comment="php53-bcmath is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580218" version="1" comment="php53-bz2 is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580219" version="1" comment="php53-calendar is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580220" version="1" comment="php53-ctype is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580221" version="1" comment="php53-curl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580222" version="1" comment="php53-dba is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580223" version="1" comment="php53-dom is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580224" version="1" comment="php53-exif is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580225" version="1" comment="php53-fastcgi is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580226" version="1" comment="php53-fileinfo is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580227" version="1" comment="php53-ftp is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580228" version="1" comment="php53-gd is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580229" version="1" comment="php53-gettext is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580230" version="1" comment="php53-gmp is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580231" version="1" comment="php53-iconv is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580232" version="1" comment="php53-intl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580233" version="1" comment="php53-json is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580234" version="1" comment="php53-ldap is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580235" version="1" comment="php53-mbstring is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580236" version="1" comment="php53-mcrypt is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580237" version="1" comment="php53-mysql is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580238" version="1" comment="php53-odbc is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580239" version="1" comment="php53-openssl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580240" version="1" comment="php53-pcntl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580241" version="1" comment="php53-pdo is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580242" version="1" comment="php53-pear is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580243" version="1" comment="php53-pgsql is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580244" version="1" comment="php53-pspell is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580245" version="1" comment="php53-shmop is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580246" version="1" comment="php53-snmp is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580247" version="1" comment="php53-soap is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580248" version="1" comment="php53-suhosin is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580249" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580250" version="1" comment="php53-sysvsem is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580251" version="1" comment="php53-sysvshm is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580252" version="1" comment="php53-tokenizer is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580253" version="1" comment="php53-wddx is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580254" version="1" comment="php53-xmlreader is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580255" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580256" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580257" version="1" comment="php53-xsl is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580258" version="1" comment="php53-zip is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580259" version="1" comment="php53-zlib is &lt;5.3.17-112.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580260" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580261" version="1" comment="php53 is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580262" version="1" comment="php53-bcmath is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580263" version="1" comment="php53-bz2 is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580264" version="1" comment="php53-calendar is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580265" version="1" comment="php53-ctype is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580266" version="1" comment="php53-curl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580267" version="1" comment="php53-dba is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580268" version="1" comment="php53-dom is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580269" version="1" comment="php53-exif is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580270" version="1" comment="php53-fastcgi is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580271" version="1" comment="php53-fileinfo is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580272" version="1" comment="php53-ftp is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580273" version="1" comment="php53-gd is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580274" version="1" comment="php53-gettext is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580275" version="1" comment="php53-gmp is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580276" version="1" comment="php53-iconv is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580277" version="1" comment="php53-intl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580278" version="1" comment="php53-json is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580279" version="1" comment="php53-ldap is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580280" version="1" comment="php53-mbstring is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580281" version="1" comment="php53-mcrypt is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580282" version="1" comment="php53-mysql is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580283" version="1" comment="php53-odbc is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580284" version="1" comment="php53-openssl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580285" version="1" comment="php53-pcntl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580286" version="1" comment="php53-pdo is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580287" version="1" comment="php53-pear is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580288" version="1" comment="php53-pgsql is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580289" version="1" comment="php53-pspell is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580290" version="1" comment="php53-shmop is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580291" version="1" comment="php53-snmp is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580292" version="1" comment="php53-soap is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580293" version="1" comment="php53-suhosin is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580294" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580295" version="1" comment="php53-sysvsem is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580296" version="1" comment="php53-sysvshm is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580297" version="1" comment="php53-tokenizer is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580298" version="1" comment="php53-wddx is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580299" version="1" comment="php53-xmlreader is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580300" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580301" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580302" version="1" comment="php53-xsl is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580303" version="1" comment="php53-zip is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580304" version="1" comment="php53-zlib is &lt;5.3.17-112.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580305" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580306" version="1" comment="php53 is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580307" version="1" comment="php53-bcmath is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580308" version="1" comment="php53-bz2 is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580309" version="1" comment="php53-calendar is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580310" version="1" comment="php53-ctype is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580311" version="1" comment="php53-curl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580312" version="1" comment="php53-dba is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580313" version="1" comment="php53-dom is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580314" version="1" comment="php53-exif is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580315" version="1" comment="php53-fastcgi is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580316" version="1" comment="php53-fileinfo is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580317" version="1" comment="php53-ftp is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580318" version="1" comment="php53-gd is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580319" version="1" comment="php53-gettext is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580320" version="1" comment="php53-gmp is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580321" version="1" comment="php53-iconv is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580322" version="1" comment="php53-intl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580323" version="1" comment="php53-json is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580324" version="1" comment="php53-ldap is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580325" version="1" comment="php53-mbstring is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580326" version="1" comment="php53-mcrypt is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580327" version="1" comment="php53-mysql is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580328" version="1" comment="php53-odbc is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580329" version="1" comment="php53-openssl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580330" version="1" comment="php53-pcntl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580331" version="1" comment="php53-pdo is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580332" version="1" comment="php53-pear is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580333" version="1" comment="php53-pgsql is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580334" version="1" comment="php53-pspell is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580335" version="1" comment="php53-shmop is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580336" version="1" comment="php53-snmp is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580337" version="1" comment="php53-soap is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580338" version="1" comment="php53-suhosin is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580339" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580340" version="1" comment="php53-sysvsem is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580341" version="1" comment="php53-sysvshm is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580342" version="1" comment="php53-tokenizer is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580343" version="1" comment="php53-wddx is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580344" version="1" comment="php53-xmlreader is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580345" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580346" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580347" version="1" comment="php53-xsl is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580348" version="1" comment="php53-zip is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580349" version="1" comment="php53-zlib is &lt;5.3.17-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580350" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580351" version="1" comment="php53 is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580352" version="1" comment="php53-bcmath is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580353" version="1" comment="php53-bz2 is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580354" version="1" comment="php53-calendar is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580355" version="1" comment="php53-ctype is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580356" version="1" comment="php53-curl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580357" version="1" comment="php53-dba is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580358" version="1" comment="php53-dom is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580359" version="1" comment="php53-exif is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580360" version="1" comment="php53-fastcgi is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580361" version="1" comment="php53-fileinfo is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580362" version="1" comment="php53-ftp is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580363" version="1" comment="php53-gd is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580364" version="1" comment="php53-gettext is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580365" version="1" comment="php53-gmp is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580366" version="1" comment="php53-iconv is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580367" version="1" comment="php53-intl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580368" version="1" comment="php53-json is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580369" version="1" comment="php53-ldap is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580370" version="1" comment="php53-mbstring is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580371" version="1" comment="php53-mcrypt is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580372" version="1" comment="php53-mysql is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580373" version="1" comment="php53-odbc is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580374" version="1" comment="php53-openssl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580375" version="1" comment="php53-pcntl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580376" version="1" comment="php53-pdo is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580377" version="1" comment="php53-pear is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580378" version="1" comment="php53-pgsql is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580379" version="1" comment="php53-pspell is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580380" version="1" comment="php53-shmop is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580381" version="1" comment="php53-snmp is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580382" version="1" comment="php53-soap is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580383" version="1" comment="php53-suhosin is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580384" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580385" version="1" comment="php53-sysvsem is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580386" version="1" comment="php53-sysvshm is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580387" version="1" comment="php53-tokenizer is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580388" version="1" comment="php53-wddx is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580389" version="1" comment="php53-xmlreader is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580390" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580391" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580392" version="1" comment="php53-xsl is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580393" version="1" comment="php53-zip is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580394" version="1" comment="php53-zlib is &lt;5.3.17-112.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580395" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580396" version="1" comment="php53 is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580397" version="1" comment="php53-bcmath is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580398" version="1" comment="php53-bz2 is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580399" version="1" comment="php53-calendar is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580400" version="1" comment="php53-ctype is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580401" version="1" comment="php53-curl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580402" version="1" comment="php53-dba is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580403" version="1" comment="php53-dom is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580404" version="1" comment="php53-exif is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580405" version="1" comment="php53-fastcgi is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580406" version="1" comment="php53-fileinfo is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580407" version="1" comment="php53-ftp is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580408" version="1" comment="php53-gd is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580409" version="1" comment="php53-gettext is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580410" version="1" comment="php53-gmp is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580411" version="1" comment="php53-iconv is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580412" version="1" comment="php53-intl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580413" version="1" comment="php53-json is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580414" version="1" comment="php53-ldap is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580415" version="1" comment="php53-mbstring is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580416" version="1" comment="php53-mcrypt is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580417" version="1" comment="php53-mysql is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580418" version="1" comment="php53-odbc is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580419" version="1" comment="php53-openssl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580420" version="1" comment="php53-pcntl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580421" version="1" comment="php53-pdo is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580422" version="1" comment="php53-pear is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580423" version="1" comment="php53-pgsql is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580424" version="1" comment="php53-pspell is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580425" version="1" comment="php53-shmop is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580426" version="1" comment="php53-snmp is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580427" version="1" comment="php53-soap is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580428" version="1" comment="php53-suhosin is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580429" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580430" version="1" comment="php53-sysvsem is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580431" version="1" comment="php53-sysvshm is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580432" version="1" comment="php53-tokenizer is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580433" version="1" comment="php53-wddx is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580434" version="1" comment="php53-xmlreader is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580435" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580436" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580437" version="1" comment="php53-xsl is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580438" version="1" comment="php53-zip is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580439" version="1" comment="php53-zlib is &lt;5.3.17-112.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580440" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580441" version="1" comment="php53 is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580442" version="1" comment="php53-bcmath is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580443" version="1" comment="php53-bz2 is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580444" version="1" comment="php53-calendar is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580445" version="1" comment="php53-ctype is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580446" version="1" comment="php53-curl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580447" version="1" comment="php53-dba is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580448" version="1" comment="php53-dom is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580449" version="1" comment="php53-exif is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580450" version="1" comment="php53-fastcgi is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580451" version="1" comment="php53-fileinfo is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580452" version="1" comment="php53-ftp is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580453" version="1" comment="php53-gd is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580454" version="1" comment="php53-gettext is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580455" version="1" comment="php53-gmp is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580456" version="1" comment="php53-iconv is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580457" version="1" comment="php53-intl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580458" version="1" comment="php53-json is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580459" version="1" comment="php53-ldap is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580460" version="1" comment="php53-mbstring is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580461" version="1" comment="php53-mcrypt is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580462" version="1" comment="php53-mysql is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580463" version="1" comment="php53-odbc is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580464" version="1" comment="php53-openssl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580465" version="1" comment="php53-pcntl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580466" version="1" comment="php53-pdo is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580467" version="1" comment="php53-pear is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580468" version="1" comment="php53-pgsql is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580469" version="1" comment="php53-pspell is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580470" version="1" comment="php53-shmop is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580471" version="1" comment="php53-snmp is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580472" version="1" comment="php53-soap is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580473" version="1" comment="php53-suhosin is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580474" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580475" version="1" comment="php53-sysvsem is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580476" version="1" comment="php53-sysvshm is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580477" version="1" comment="php53-tokenizer is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580478" version="1" comment="php53-wddx is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580479" version="1" comment="php53-xmlreader is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580480" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580481" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580482" version="1" comment="php53-xsl is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580483" version="1" comment="php53-zip is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580484" version="1" comment="php53-zlib is &lt;5.3.17-112.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580485" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580486" version="1" comment="php53 is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580487" version="1" comment="php53-bcmath is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580488" version="1" comment="php53-bz2 is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580489" version="1" comment="php53-calendar is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580490" version="1" comment="php53-ctype is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580491" version="1" comment="php53-curl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580492" version="1" comment="php53-dba is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580493" version="1" comment="php53-dom is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580494" version="1" comment="php53-exif is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580495" version="1" comment="php53-fastcgi is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580496" version="1" comment="php53-fileinfo is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580497" version="1" comment="php53-ftp is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580498" version="1" comment="php53-gd is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580499" version="1" comment="php53-gettext is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580500" version="1" comment="php53-gmp is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580501" version="1" comment="php53-iconv is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580502" version="1" comment="php53-intl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580503" version="1" comment="php53-json is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580504" version="1" comment="php53-ldap is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580505" version="1" comment="php53-mbstring is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580506" version="1" comment="php53-mcrypt is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580507" version="1" comment="php53-mysql is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580508" version="1" comment="php53-odbc is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580509" version="1" comment="php53-openssl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580510" version="1" comment="php53-pcntl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580511" version="1" comment="php53-pdo is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580512" version="1" comment="php53-pear is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580513" version="1" comment="php53-pgsql is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580514" version="1" comment="php53-pspell is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580515" version="1" comment="php53-shmop is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580516" version="1" comment="php53-snmp is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580517" version="1" comment="php53-soap is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580518" version="1" comment="php53-suhosin is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580519" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580520" version="1" comment="php53-sysvsem is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580521" version="1" comment="php53-sysvshm is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580522" version="1" comment="php53-tokenizer is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580523" version="1" comment="php53-wddx is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580524" version="1" comment="php53-xmlreader is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580525" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580526" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580527" version="1" comment="php53-xsl is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580528" version="1" comment="php53-zip is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580529" version="1" comment="php53-zlib is &lt;5.3.17-112.66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580530" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580531" version="1" comment="php53 is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580532" version="1" comment="php53-bcmath is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580533" version="1" comment="php53-bz2 is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580534" version="1" comment="php53-calendar is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580535" version="1" comment="php53-ctype is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580536" version="1" comment="php53-curl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580537" version="1" comment="php53-dba is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580538" version="1" comment="php53-dom is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580539" version="1" comment="php53-exif is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580540" version="1" comment="php53-fastcgi is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580541" version="1" comment="php53-fileinfo is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580542" version="1" comment="php53-ftp is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580543" version="1" comment="php53-gd is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580544" version="1" comment="php53-gettext is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580545" version="1" comment="php53-gmp is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580546" version="1" comment="php53-iconv is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580547" version="1" comment="php53-intl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580548" version="1" comment="php53-json is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580549" version="1" comment="php53-ldap is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580550" version="1" comment="php53-mbstring is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580551" version="1" comment="php53-mcrypt is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580552" version="1" comment="php53-mysql is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580553" version="1" comment="php53-odbc is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580554" version="1" comment="php53-openssl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580555" version="1" comment="php53-pcntl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580556" version="1" comment="php53-pdo is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580557" version="1" comment="php53-pear is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580558" version="1" comment="php53-pgsql is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580559" version="1" comment="php53-pspell is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580560" version="1" comment="php53-shmop is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580561" version="1" comment="php53-snmp is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580562" version="1" comment="php53-soap is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580563" version="1" comment="php53-suhosin is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580564" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580565" version="1" comment="php53-sysvsem is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580566" version="1" comment="php53-sysvshm is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580567" version="1" comment="php53-tokenizer is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580568" version="1" comment="php53-wddx is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580569" version="1" comment="php53-xmlreader is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580570" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580571" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580572" version="1" comment="php53-xsl is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580573" version="1" comment="php53-zip is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580574" version="1" comment="php53-zlib is &lt;5.3.17-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580575" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580576" version="1" comment="php53 is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580577" version="1" comment="php53-bcmath is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580578" version="1" comment="php53-bz2 is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580579" version="1" comment="php53-calendar is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580580" version="1" comment="php53-ctype is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580581" version="1" comment="php53-curl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580582" version="1" comment="php53-dba is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580583" version="1" comment="php53-dom is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580584" version="1" comment="php53-exif is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580585" version="1" comment="php53-fastcgi is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580586" version="1" comment="php53-fileinfo is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580587" version="1" comment="php53-ftp is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580588" version="1" comment="php53-gd is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580589" version="1" comment="php53-gettext is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580590" version="1" comment="php53-gmp is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580591" version="1" comment="php53-iconv is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580592" version="1" comment="php53-intl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580593" version="1" comment="php53-json is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580594" version="1" comment="php53-ldap is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580595" version="1" comment="php53-mbstring is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580596" version="1" comment="php53-mcrypt is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580597" version="1" comment="php53-mysql is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580598" version="1" comment="php53-odbc is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580599" version="1" comment="php53-openssl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580600" version="1" comment="php53-pcntl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580601" version="1" comment="php53-pdo is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580602" version="1" comment="php53-pear is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580603" version="1" comment="php53-pgsql is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580604" version="1" comment="php53-pspell is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580605" version="1" comment="php53-shmop is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580606" version="1" comment="php53-snmp is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580607" version="1" comment="php53-soap is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580608" version="1" comment="php53-suhosin is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580609" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580610" version="1" comment="php53-sysvsem is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580611" version="1" comment="php53-sysvshm is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580612" version="1" comment="php53-tokenizer is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580613" version="1" comment="php53-wddx is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580614" version="1" comment="php53-xmlreader is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580615" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580616" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580617" version="1" comment="php53-xsl is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580618" version="1" comment="php53-zip is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580619" version="1" comment="php53-zlib is &lt;5.3.17-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580620" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580621" version="1" comment="php53 is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580622" version="1" comment="php53-bcmath is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580623" version="1" comment="php53-bz2 is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580624" version="1" comment="php53-calendar is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580625" version="1" comment="php53-ctype is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580626" version="1" comment="php53-curl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580627" version="1" comment="php53-dba is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580628" version="1" comment="php53-dom is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580629" version="1" comment="php53-exif is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580630" version="1" comment="php53-fastcgi is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580631" version="1" comment="php53-fileinfo is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580632" version="1" comment="php53-ftp is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580633" version="1" comment="php53-gd is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580634" version="1" comment="php53-gettext is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580635" version="1" comment="php53-gmp is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580636" version="1" comment="php53-iconv is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580637" version="1" comment="php53-intl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580638" version="1" comment="php53-json is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580639" version="1" comment="php53-ldap is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580640" version="1" comment="php53-mbstring is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580641" version="1" comment="php53-mcrypt is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580642" version="1" comment="php53-mysql is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580643" version="1" comment="php53-odbc is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580644" version="1" comment="php53-openssl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580645" version="1" comment="php53-pcntl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580646" version="1" comment="php53-pdo is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580647" version="1" comment="php53-pear is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580648" version="1" comment="php53-pgsql is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580649" version="1" comment="php53-pspell is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580650" version="1" comment="php53-shmop is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580651" version="1" comment="php53-snmp is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580652" version="1" comment="php53-soap is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580653" version="1" comment="php53-suhosin is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580654" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580655" version="1" comment="php53-sysvsem is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580656" version="1" comment="php53-sysvshm is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580657" version="1" comment="php53-tokenizer is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580658" version="1" comment="php53-wddx is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580659" version="1" comment="php53-xmlreader is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580660" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580661" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580662" version="1" comment="php53-xsl is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580663" version="1" comment="php53-zip is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580664" version="1" comment="php53-zlib is &lt;5.3.17-112.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580665" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580666" version="1" comment="php53 is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580667" version="1" comment="php53-bcmath is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580668" version="1" comment="php53-bz2 is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580669" version="1" comment="php53-calendar is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580670" version="1" comment="php53-ctype is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580671" version="1" comment="php53-curl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580672" version="1" comment="php53-dba is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580673" version="1" comment="php53-dom is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580674" version="1" comment="php53-exif is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580675" version="1" comment="php53-fastcgi is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580676" version="1" comment="php53-fileinfo is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580677" version="1" comment="php53-ftp is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580678" version="1" comment="php53-gd is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580679" version="1" comment="php53-gettext is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580680" version="1" comment="php53-gmp is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580681" version="1" comment="php53-iconv is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580682" version="1" comment="php53-intl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580683" version="1" comment="php53-json is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580684" version="1" comment="php53-ldap is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580685" version="1" comment="php53-mbstring is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580686" version="1" comment="php53-mcrypt is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580687" version="1" comment="php53-mysql is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580688" version="1" comment="php53-odbc is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580689" version="1" comment="php53-openssl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580690" version="1" comment="php53-pcntl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580691" version="1" comment="php53-pdo is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580692" version="1" comment="php53-pear is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580693" version="1" comment="php53-pgsql is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580694" version="1" comment="php53-pspell is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580695" version="1" comment="php53-shmop is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580696" version="1" comment="php53-snmp is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580697" version="1" comment="php53-soap is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580698" version="1" comment="php53-suhosin is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580699" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580700" version="1" comment="php53-sysvsem is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580701" version="1" comment="php53-sysvshm is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580702" version="1" comment="php53-tokenizer is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580703" version="1" comment="php53-wddx is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580704" version="1" comment="php53-xmlreader is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580705" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580706" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580707" version="1" comment="php53-xsl is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580708" version="1" comment="php53-zip is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580709" version="1" comment="php53-zlib is &lt;5.3.17-112.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580710" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580711" version="1" comment="php53 is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580712" version="1" comment="php53-bcmath is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580713" version="1" comment="php53-bz2 is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580714" version="1" comment="php53-calendar is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580715" version="1" comment="php53-ctype is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580716" version="1" comment="php53-curl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580717" version="1" comment="php53-dba is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580718" version="1" comment="php53-dom is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580719" version="1" comment="php53-exif is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580720" version="1" comment="php53-fastcgi is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580721" version="1" comment="php53-fileinfo is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580722" version="1" comment="php53-ftp is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580723" version="1" comment="php53-gd is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580724" version="1" comment="php53-gettext is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580725" version="1" comment="php53-gmp is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580726" version="1" comment="php53-iconv is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580727" version="1" comment="php53-intl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580728" version="1" comment="php53-json is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580729" version="1" comment="php53-ldap is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580730" version="1" comment="php53-mbstring is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580731" version="1" comment="php53-mcrypt is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580732" version="1" comment="php53-mysql is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580733" version="1" comment="php53-odbc is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580734" version="1" comment="php53-openssl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580735" version="1" comment="php53-pcntl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580736" version="1" comment="php53-pdo is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580737" version="1" comment="php53-pear is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580738" version="1" comment="php53-pgsql is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580739" version="1" comment="php53-pspell is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580740" version="1" comment="php53-shmop is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580741" version="1" comment="php53-snmp is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580742" version="1" comment="php53-soap is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580743" version="1" comment="php53-suhosin is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580744" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580745" version="1" comment="php53-sysvsem is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580746" version="1" comment="php53-sysvshm is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580747" version="1" comment="php53-tokenizer is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580748" version="1" comment="php53-wddx is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580749" version="1" comment="php53-xmlreader is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580750" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580751" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580752" version="1" comment="php53-xsl is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580753" version="1" comment="php53-zip is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580754" version="1" comment="php53-zlib is &lt;5.3.17-112.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580755" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580756" version="1" comment="php53 is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580757" version="1" comment="php53-bcmath is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580758" version="1" comment="php53-bz2 is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580759" version="1" comment="php53-calendar is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580760" version="1" comment="php53-ctype is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580761" version="1" comment="php53-curl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580762" version="1" comment="php53-dba is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580763" version="1" comment="php53-dom is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580764" version="1" comment="php53-exif is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580765" version="1" comment="php53-fastcgi is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580766" version="1" comment="php53-fileinfo is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580767" version="1" comment="php53-ftp is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580768" version="1" comment="php53-gd is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580769" version="1" comment="php53-gettext is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580770" version="1" comment="php53-gmp is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580771" version="1" comment="php53-iconv is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580772" version="1" comment="php53-intl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580773" version="1" comment="php53-json is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580774" version="1" comment="php53-ldap is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580775" version="1" comment="php53-mbstring is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580776" version="1" comment="php53-mcrypt is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580777" version="1" comment="php53-mysql is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580778" version="1" comment="php53-odbc is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580779" version="1" comment="php53-openssl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580780" version="1" comment="php53-pcntl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580781" version="1" comment="php53-pdo is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580782" version="1" comment="php53-pear is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580783" version="1" comment="php53-pgsql is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580784" version="1" comment="php53-pspell is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580785" version="1" comment="php53-shmop is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580786" version="1" comment="php53-snmp is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580787" version="1" comment="php53-soap is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580788" version="1" comment="php53-suhosin is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580789" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580790" version="1" comment="php53-sysvsem is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580791" version="1" comment="php53-sysvshm is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580792" version="1" comment="php53-tokenizer is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580793" version="1" comment="php53-wddx is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580794" version="1" comment="php53-xmlreader is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580795" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580796" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580797" version="1" comment="php53-xsl is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580798" version="1" comment="php53-zip is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580799" version="1" comment="php53-zlib is &lt;5.3.17-112.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580800" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580801" version="1" comment="php53 is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580802" version="1" comment="php53-bcmath is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580803" version="1" comment="php53-bz2 is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580804" version="1" comment="php53-calendar is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580805" version="1" comment="php53-ctype is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580806" version="1" comment="php53-curl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580807" version="1" comment="php53-dba is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580808" version="1" comment="php53-dom is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580809" version="1" comment="php53-exif is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580810" version="1" comment="php53-fastcgi is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580811" version="1" comment="php53-fileinfo is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580812" version="1" comment="php53-ftp is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580813" version="1" comment="php53-gd is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580814" version="1" comment="php53-gettext is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580815" version="1" comment="php53-gmp is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580816" version="1" comment="php53-iconv is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580817" version="1" comment="php53-intl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580818" version="1" comment="php53-json is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580819" version="1" comment="php53-ldap is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580820" version="1" comment="php53-mbstring is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580821" version="1" comment="php53-mcrypt is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580822" version="1" comment="php53-mysql is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580823" version="1" comment="php53-odbc is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580824" version="1" comment="php53-openssl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580825" version="1" comment="php53-pcntl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580826" version="1" comment="php53-pdo is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580827" version="1" comment="php53-pear is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580828" version="1" comment="php53-pgsql is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580829" version="1" comment="php53-pspell is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580830" version="1" comment="php53-shmop is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580831" version="1" comment="php53-snmp is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580832" version="1" comment="php53-soap is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580833" version="1" comment="php53-suhosin is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580834" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580835" version="1" comment="php53-sysvsem is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580836" version="1" comment="php53-sysvshm is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580837" version="1" comment="php53-tokenizer is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580838" version="1" comment="php53-wddx is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580839" version="1" comment="php53-xmlreader is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580840" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580841" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580842" version="1" comment="php53-xsl is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580843" version="1" comment="php53-zip is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580844" version="1" comment="php53-zlib is &lt;5.3.17-112.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580845" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580846" version="1" comment="php53 is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580847" version="1" comment="php53-bcmath is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580848" version="1" comment="php53-bz2 is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580849" version="1" comment="php53-calendar is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580850" version="1" comment="php53-ctype is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580851" version="1" comment="php53-curl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580852" version="1" comment="php53-dba is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580853" version="1" comment="php53-dom is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580854" version="1" comment="php53-exif is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580855" version="1" comment="php53-fastcgi is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580856" version="1" comment="php53-fileinfo is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580857" version="1" comment="php53-ftp is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580858" version="1" comment="php53-gd is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580859" version="1" comment="php53-gettext is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580860" version="1" comment="php53-gmp is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580861" version="1" comment="php53-iconv is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580862" version="1" comment="php53-intl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580863" version="1" comment="php53-json is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580864" version="1" comment="php53-ldap is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580865" version="1" comment="php53-mbstring is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580866" version="1" comment="php53-mcrypt is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580867" version="1" comment="php53-mysql is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580868" version="1" comment="php53-odbc is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580869" version="1" comment="php53-openssl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580870" version="1" comment="php53-pcntl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580871" version="1" comment="php53-pdo is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580872" version="1" comment="php53-pear is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580873" version="1" comment="php53-pgsql is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580874" version="1" comment="php53-pspell is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580875" version="1" comment="php53-shmop is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580876" version="1" comment="php53-snmp is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580877" version="1" comment="php53-soap is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580878" version="1" comment="php53-suhosin is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580879" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580880" version="1" comment="php53-sysvsem is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580881" version="1" comment="php53-sysvshm is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580882" version="1" comment="php53-tokenizer is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580883" version="1" comment="php53-wddx is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580884" version="1" comment="php53-xmlreader is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580885" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580886" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580887" version="1" comment="php53-xsl is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580888" version="1" comment="php53-zip is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580889" version="1" comment="php53-zlib is &lt;5.3.17-112.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580890" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580891" version="1" comment="php53 is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580892" version="1" comment="php53-bcmath is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580893" version="1" comment="php53-bz2 is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580894" version="1" comment="php53-calendar is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580895" version="1" comment="php53-ctype is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580896" version="1" comment="php53-curl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580897" version="1" comment="php53-dba is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580898" version="1" comment="php53-dom is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580899" version="1" comment="php53-exif is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580900" version="1" comment="php53-fastcgi is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580901" version="1" comment="php53-fileinfo is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580902" version="1" comment="php53-ftp is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580903" version="1" comment="php53-gd is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580904" version="1" comment="php53-gettext is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580905" version="1" comment="php53-gmp is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580906" version="1" comment="php53-iconv is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580907" version="1" comment="php53-intl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580908" version="1" comment="php53-json is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580909" version="1" comment="php53-ldap is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580910" version="1" comment="php53-mbstring is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580911" version="1" comment="php53-mcrypt is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580912" version="1" comment="php53-mysql is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580913" version="1" comment="php53-odbc is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580914" version="1" comment="php53-openssl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580915" version="1" comment="php53-pcntl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580916" version="1" comment="php53-pdo is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580917" version="1" comment="php53-pear is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580918" version="1" comment="php53-pgsql is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580919" version="1" comment="php53-pspell is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580920" version="1" comment="php53-shmop is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580921" version="1" comment="php53-snmp is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580922" version="1" comment="php53-soap is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580923" version="1" comment="php53-suhosin is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580924" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580925" version="1" comment="php53-sysvsem is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580926" version="1" comment="php53-sysvshm is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580927" version="1" comment="php53-tokenizer is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580928" version="1" comment="php53-wddx is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580929" version="1" comment="php53-xmlreader is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580930" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580931" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580932" version="1" comment="php53-xsl is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580933" version="1" comment="php53-zip is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580934" version="1" comment="php53-zlib is &lt;5.3.17-112.99.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627089" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627090" version="1" comment="php53 is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627091" version="1" comment="php53-bcmath is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627092" version="1" comment="php53-bz2 is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627093" version="1" comment="php53-calendar is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627094" version="1" comment="php53-ctype is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627095" version="1" comment="php53-curl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627096" version="1" comment="php53-dba is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627097" version="1" comment="php53-dom is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627098" version="1" comment="php53-exif is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627099" version="1" comment="php53-fastcgi is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627100" version="1" comment="php53-fileinfo is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627101" version="1" comment="php53-ftp is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627102" version="1" comment="php53-gd is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627103" version="1" comment="php53-gettext is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627104" version="1" comment="php53-gmp is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627105" version="1" comment="php53-iconv is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627106" version="1" comment="php53-intl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627107" version="1" comment="php53-json is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627108" version="1" comment="php53-ldap is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627109" version="1" comment="php53-mbstring is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627110" version="1" comment="php53-mcrypt is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627111" version="1" comment="php53-mysql is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627112" version="1" comment="php53-odbc is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627113" version="1" comment="php53-openssl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627114" version="1" comment="php53-pcntl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627115" version="1" comment="php53-pdo is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627116" version="1" comment="php53-pear is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627117" version="1" comment="php53-pgsql is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627118" version="1" comment="php53-pspell is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627119" version="1" comment="php53-shmop is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627120" version="1" comment="php53-snmp is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627121" version="1" comment="php53-soap is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627122" version="1" comment="php53-suhosin is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627123" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627124" version="1" comment="php53-sysvsem is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627125" version="1" comment="php53-sysvshm is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627126" version="1" comment="php53-tokenizer is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627127" version="1" comment="php53-wddx is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627128" version="1" comment="php53-xmlreader is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627129" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627130" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627131" version="1" comment="php53-xsl is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627132" version="1" comment="php53-zip is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627133" version="1" comment="php53-zlib is &lt;5.3.17-112.102.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632089" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632090" version="1" comment="php53 is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632091" version="1" comment="php53-bcmath is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632092" version="1" comment="php53-bz2 is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632093" version="1" comment="php53-calendar is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632094" version="1" comment="php53-ctype is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632095" version="1" comment="php53-curl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632096" version="1" comment="php53-dba is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632097" version="1" comment="php53-dom is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632098" version="1" comment="php53-exif is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632099" version="1" comment="php53-fastcgi is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632100" version="1" comment="php53-fileinfo is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632101" version="1" comment="php53-ftp is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632102" version="1" comment="php53-gd is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632103" version="1" comment="php53-gettext is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632104" version="1" comment="php53-gmp is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632105" version="1" comment="php53-iconv is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632106" version="1" comment="php53-intl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632107" version="1" comment="php53-json is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632108" version="1" comment="php53-ldap is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632109" version="1" comment="php53-mbstring is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632110" version="1" comment="php53-mcrypt is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632111" version="1" comment="php53-mysql is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632112" version="1" comment="php53-odbc is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632113" version="1" comment="php53-openssl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632114" version="1" comment="php53-pcntl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632115" version="1" comment="php53-pdo is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632116" version="1" comment="php53-pear is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632117" version="1" comment="php53-pgsql is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632118" version="1" comment="php53-pspell is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632119" version="1" comment="php53-shmop is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632120" version="1" comment="php53-snmp is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632121" version="1" comment="php53-soap is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632122" version="1" comment="php53-suhosin is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632123" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632124" version="1" comment="php53-sysvsem is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632125" version="1" comment="php53-sysvshm is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632126" version="1" comment="php53-tokenizer is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632127" version="1" comment="php53-wddx is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632128" version="1" comment="php53-xmlreader is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632129" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632130" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632131" version="1" comment="php53-xsl is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632132" version="1" comment="php53-zip is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632133" version="1" comment="php53-zlib is &lt;5.3.17-112.105.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658692" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658693" version="1" comment="php53 is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658694" version="1" comment="php53-bcmath is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658695" version="1" comment="php53-bz2 is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658696" version="1" comment="php53-calendar is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658697" version="1" comment="php53-ctype is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658698" version="1" comment="php53-curl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658699" version="1" comment="php53-dba is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658700" version="1" comment="php53-dom is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658701" version="1" comment="php53-exif is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658702" version="1" comment="php53-fastcgi is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658703" version="1" comment="php53-fileinfo is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658704" version="1" comment="php53-ftp is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658705" version="1" comment="php53-gd is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658706" version="1" comment="php53-gettext is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658707" version="1" comment="php53-gmp is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658708" version="1" comment="php53-iconv is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658709" version="1" comment="php53-intl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658710" version="1" comment="php53-json is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658711" version="1" comment="php53-ldap is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658712" version="1" comment="php53-mbstring is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658713" version="1" comment="php53-mcrypt is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658714" version="1" comment="php53-mysql is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658715" version="1" comment="php53-odbc is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658716" version="1" comment="php53-openssl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658717" version="1" comment="php53-pcntl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658718" version="1" comment="php53-pdo is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658719" version="1" comment="php53-pear is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658720" version="1" comment="php53-pgsql is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658721" version="1" comment="php53-pspell is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658722" version="1" comment="php53-shmop is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658723" version="1" comment="php53-snmp is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658724" version="1" comment="php53-soap is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658725" version="1" comment="php53-suhosin is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658726" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658727" version="1" comment="php53-sysvsem is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658728" version="1" comment="php53-sysvshm is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658729" version="1" comment="php53-tokenizer is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658730" version="1" comment="php53-wddx is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658731" version="1" comment="php53-xmlreader is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658732" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658733" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658734" version="1" comment="php53-xsl is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658735" version="1" comment="php53-zip is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658736" version="1" comment="php53-zlib is &lt;5.3.17-112.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668128" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668129" version="1" comment="php53 is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668130" version="1" comment="php53-bcmath is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668131" version="1" comment="php53-bz2 is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668132" version="1" comment="php53-calendar is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668133" version="1" comment="php53-ctype is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668134" version="1" comment="php53-curl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668135" version="1" comment="php53-dba is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668136" version="1" comment="php53-dom is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668137" version="1" comment="php53-exif is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668138" version="1" comment="php53-fastcgi is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668139" version="1" comment="php53-fileinfo is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668140" version="1" comment="php53-ftp is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668141" version="1" comment="php53-gd is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668142" version="1" comment="php53-gettext is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668143" version="1" comment="php53-gmp is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668144" version="1" comment="php53-iconv is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668145" version="1" comment="php53-intl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668146" version="1" comment="php53-json is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668147" version="1" comment="php53-ldap is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668148" version="1" comment="php53-mbstring is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668149" version="1" comment="php53-mcrypt is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668150" version="1" comment="php53-mysql is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668151" version="1" comment="php53-odbc is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668152" version="1" comment="php53-openssl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668153" version="1" comment="php53-pcntl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668154" version="1" comment="php53-pdo is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668155" version="1" comment="php53-pear is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668156" version="1" comment="php53-pgsql is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668157" version="1" comment="php53-pspell is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668158" version="1" comment="php53-shmop is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668159" version="1" comment="php53-snmp is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668160" version="1" comment="php53-soap is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668161" version="1" comment="php53-suhosin is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668162" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668163" version="1" comment="php53-sysvsem is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668164" version="1" comment="php53-sysvshm is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668165" version="1" comment="php53-tokenizer is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668166" version="1" comment="php53-wddx is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668167" version="1" comment="php53-xmlreader is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668168" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668169" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668170" version="1" comment="php53-xsl is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668171" version="1" comment="php53-zip is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668172" version="1" comment="php53-zlib is &lt;5.3.17-112.111.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580935" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580936" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681124" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681125" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681126" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681127" version="1" comment="poppler-tools is &lt;0.12.3-1.13.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580937" version="1" comment="popt is &lt;1.7-37.60.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580938" version="1" comment="popt-32bit is &lt;1.7-37.60.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580939" version="1" comment="popt-x86 is &lt;1.7-37.60.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580940" version="1" comment="rpm is &lt;4.4.2.3-37.60.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580941" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580942" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580943" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580944" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580945" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580946" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580947" version="1" comment="postgresql94-server is &lt;9.4.5-0.8.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685712" version="1" comment="libecpg6 is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685713" version="1" comment="libpq5 is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685714" version="1" comment="libpq5-32bit is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685715" version="1" comment="postgresql10 is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685716" version="1" comment="postgresql10-contrib is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685717" version="1" comment="postgresql10-devel is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685718" version="1" comment="postgresql10-docs is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685719" version="1" comment="postgresql10-server is &lt;10.21-0.2.42.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580948" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580949" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580950" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580951" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580952" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580953" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580954" version="1" comment="postgresql91-server is &lt;9.1.15-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580955" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580956" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580957" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580958" version="1" comment="postgresql91-server is &lt;9.1.18-0.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580959" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580960" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580961" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580962" version="1" comment="postgresql91-server is &lt;9.1.19-0.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580963" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580964" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580965" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580966" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580967" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580968" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580969" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580970" version="1" comment="powerpc-utils is &lt;1.2.16-0.13.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580971" version="1" comment="ppc64-diag is &lt;2.6.1-0.14.1 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580972" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580973" version="1" comment="procmail is &lt;3.22-240.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580974" version="1" comment="procps is &lt;3.2.7-152.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580975" version="1" comment="puppet is &lt;2.6.18-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580976" version="1" comment="puppet-server is &lt;2.6.18-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580977" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580978" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580979" version="1" comment="python is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580980" version="1" comment="python-32bit is &lt;2.6.9-40.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580981" version="1" comment="python-base is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580982" version="1" comment="python-base-32bit is &lt;2.6.9-40.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580983" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580984" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580985" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580986" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580987" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580988" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580989" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580990" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580991" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580992" version="1" comment="python is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580993" version="1" comment="python-32bit is &lt;2.6.9-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580994" version="1" comment="python-base is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580995" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580996" version="1" comment="python-base-x86 is &lt;2.6.9-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580997" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580998" version="1" comment="python-demo is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009580999" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581000" version="1" comment="python-idle is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581001" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581002" version="1" comment="python-x86 is &lt;2.6.9-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581003" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581004" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581005" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581006" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581007" version="1" comment="python is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581008" version="1" comment="python-32bit is &lt;2.6.9-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581009" version="1" comment="python-base is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581010" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581011" version="1" comment="python-base-x86 is &lt;2.6.9-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581012" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581013" version="1" comment="python-demo is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581014" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581015" version="1" comment="python-idle is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581016" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581017" version="1" comment="python-x86 is &lt;2.6.9-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581018" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581019" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581020" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581021" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581022" version="1" comment="python is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581023" version="1" comment="python-32bit is &lt;2.6.9-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581024" version="1" comment="python-base is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581025" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581026" version="1" comment="python-base-x86 is &lt;2.6.9-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581027" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581028" version="1" comment="python-demo is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581029" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581030" version="1" comment="python-idle is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581031" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581032" version="1" comment="python-x86 is &lt;2.6.9-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581033" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581034" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581035" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581036" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581037" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581038" version="1" comment="python-32bit is &lt;2.6.9-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581039" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581040" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581041" version="1" comment="python-base-x86 is &lt;2.6.9-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581042" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581043" version="1" comment="python-demo is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581044" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581045" version="1" comment="python-idle is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581046" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581047" version="1" comment="python-x86 is &lt;2.6.9-0.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581048" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581049" version="1" comment="python-Jinja2 is &lt;2.6-2.19.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581050" version="1" comment="python-httplib2 is &lt;0.19.0-14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581051" version="1" comment="python-imaging is &lt;1.1.6-168.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581052" version="1" comment="python-paramiko is &lt;1.13.1-0.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581053" version="1" comment="python-paramiko is &lt;1.13.1-0.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659259" version="1" comment="python-pip is &lt;1.4.1-0.10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581054" version="1" comment="python-pycrypto is &lt;2.6-0.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581055" version="1" comment="python27-Jinja2 is &lt;2.7.2-2.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581056" version="1" comment="python27-ecdsa is &lt;0.13.3-0.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581057" version="1" comment="python27-boto3 is &lt;1.9.213-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581058" version="1" comment="python27-botocore is &lt;1.12.213-3.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581059" version="1" comment="python27-s3transfer is &lt;0.2.1-3.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581060" version="1" comment="python27-urllib3 is &lt;1.24-0.3.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581061" version="1" comment="cloud-init is &lt;18.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581062" version="1" comment="cloud-init-config-suse is &lt;18.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581063" version="1" comment="cloud-init-doc is &lt;18.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581064" version="1" comment="growpart is &lt;0.30-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581065" version="1" comment="python27-Cheetah is &lt;2.4.4-0.3.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581066" version="1" comment="python27-Jinja2 is &lt;2.7.2-2.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581067" version="1" comment="python27-MarkupSafe is &lt;0.18-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581068" version="1" comment="python27-PrettyTable is &lt;0.7.2-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581069" version="1" comment="python27-PyJWT is &lt;1.4.2-3.3.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581070" version="1" comment="python27-PyYAML is &lt;3.10-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581071" version="1" comment="python27-argparse is &lt;1.2.1-2.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581072" version="1" comment="python27-blinker is &lt;1.4-3.3.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581073" version="1" comment="python27-boto3 is &lt;1.7.42-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581074" version="1" comment="python27-botocore is &lt;1.10.57-3.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581075" version="1" comment="python27-cffi is &lt;1.5.2-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581076" version="1" comment="python27-configobj is &lt;5.0.6-1.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581077" version="1" comment="python27-cryptography is &lt;1.3.1-3.5.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581078" version="1" comment="python27-dateutil is &lt;2.1-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581079" version="1" comment="python27-docutils is &lt;0.11-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581080" version="1" comment="python27-ecdsa is &lt;0.10-0.3.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581081" version="1" comment="python27-enum34 is &lt;1.1.3-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581082" version="1" comment="python27-futures is &lt;3.0.2-3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581083" version="1" comment="python27-httplib2 is &lt;0.9.2-3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581084" version="1" comment="python27-idna is &lt;2.0-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581085" version="1" comment="python27-ipaddress is &lt;1.0.18-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581086" version="1" comment="python27-jmespath is &lt;0.9.2-3.3.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581087" version="1" comment="python27-jsonpatch is &lt;1.1-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581088" version="1" comment="python27-jsonpointer is &lt;1.0-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581089" version="1" comment="python27-jsonschema is &lt;2.4.0-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581090" version="1" comment="python27-lockfile is &lt;0.9.1-2.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581091" version="1" comment="python27-oauth is &lt;1.0.1-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581092" version="1" comment="python27-oauthlib is &lt;0.7.2-3.3.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581093" version="1" comment="python27-paramiko is &lt;1.13.1-0.3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581094" version="1" comment="python27-ply is &lt;3.4-3.3.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581095" version="1" comment="python27-pyasn1 is &lt;0.1.9-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581096" version="1" comment="python27-pyasn1-modules is &lt;0.0.5-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581097" version="1" comment="python27-pycparser is &lt;2.10-3.3.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581098" version="1" comment="python27-pycrypto is &lt;2.6-0.3.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581099" version="1" comment="python27-pyserial is &lt;2.7-3.3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581100" version="1" comment="python27-pytest is &lt;2.5.1-0.3.4.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581101" version="1" comment="python27-python-daemon is &lt;1.5.5-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581102" version="1" comment="python27-requests is &lt;2.0.1-0.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581103" version="1" comment="python27-s3transfer is &lt;0.1.13-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581104" version="1" comment="python27-simplejson is &lt;3.8.2-3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581105" version="1" comment="python27-six is &lt;1.7.2-0.3.3.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581106" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581107" version="1" comment="sendmail is &lt;8.14.3-50.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581108" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581109" version="1" comment="rsync is &lt;3.0.4-2.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581110" version="1" comment="rsync is &lt;3.0.4-2.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581111" version="1" comment="rsync is &lt;3.0.4-2.53.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581112" version="1" comment="rsync is &lt;3.0.4-2.53.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581113" version="1" comment="rsyslog is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581114" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581115" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581116" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581117" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581118" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581119" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581120" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581121" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581122" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581123" version="1" comment="rsyslog is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581124" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581125" version="1" comment="rsyslog-doc is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581126" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581127" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581128" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581129" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581130" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581131" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581132" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.14.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581133" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581134" version="1" comment="ldapsmb is &lt;1.34b-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581135" version="1" comment="libldb1 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581136" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581137" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581138" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581139" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581140" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581141" version="1" comment="samba is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581142" version="1" comment="samba-client is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581143" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581144" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581145" version="1" comment="ldapsmb is &lt;1.34b-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581146" version="1" comment="libldb1 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581147" version="1" comment="libsmbclient0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581148" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581149" version="1" comment="libtalloc2 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581150" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581151" version="1" comment="libtdb1 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581152" version="1" comment="libtdb1-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581153" version="1" comment="libtevent0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581154" version="1" comment="libtevent0-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581155" version="1" comment="libwbclient0 is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581156" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581157" version="1" comment="samba is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581158" version="1" comment="samba-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581159" version="1" comment="samba-client is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581160" version="1" comment="samba-client-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581161" version="1" comment="samba-doc is &lt;3.6.3-76.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581162" version="1" comment="samba-krb-printing is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581163" version="1" comment="samba-winbind is &lt;3.6.3-76.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581164" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581165" version="1" comment="ldapsmb is &lt;1.34b-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581166" version="1" comment="libldb1 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581167" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581168" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581169" version="1" comment="libtalloc2 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581170" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581171" version="1" comment="libtdb1 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581172" version="1" comment="libtdb1-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581173" version="1" comment="libtevent0 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581174" version="1" comment="libtevent0-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581175" version="1" comment="libwbclient0 is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581176" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581177" version="1" comment="samba is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581178" version="1" comment="samba-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581179" version="1" comment="samba-client is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581180" version="1" comment="samba-client-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581181" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581182" version="1" comment="samba-winbind is &lt;3.6.3-84.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581183" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581184" version="1" comment="ldapsmb is &lt;1.34b-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581185" version="1" comment="libldb1 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581186" version="1" comment="libsmbclient0 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581187" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581188" version="1" comment="libtalloc2 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581189" version="1" comment="libtalloc2-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581190" version="1" comment="libtdb1 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581191" version="1" comment="libtdb1-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581192" version="1" comment="libtevent0 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581193" version="1" comment="libtevent0-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581194" version="1" comment="libwbclient0 is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581195" version="1" comment="libwbclient0-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581196" version="1" comment="samba is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581197" version="1" comment="samba-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581198" version="1" comment="samba-client is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581199" version="1" comment="samba-client-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581200" version="1" comment="samba-doc is &lt;3.6.3-87.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581201" version="1" comment="samba-krb-printing is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581202" version="1" comment="samba-winbind is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581203" version="1" comment="samba-winbind-32bit is &lt;3.6.3-87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581204" version="1" comment="ldapsmb is &lt;1.34b-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581205" version="1" comment="libldb1 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581206" version="1" comment="libsmbclient0 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581207" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581208" version="1" comment="libtalloc2 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581209" version="1" comment="libtalloc2-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581210" version="1" comment="libtdb1 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581211" version="1" comment="libtdb1-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581212" version="1" comment="libtevent0 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581213" version="1" comment="libtevent0-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581214" version="1" comment="libwbclient0 is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581215" version="1" comment="libwbclient0-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581216" version="1" comment="samba is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581217" version="1" comment="samba-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581218" version="1" comment="samba-client is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581219" version="1" comment="samba-client-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581220" version="1" comment="samba-krb-printing is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581221" version="1" comment="samba-winbind is &lt;3.6.3-90.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581222" version="1" comment="samba-winbind-32bit is &lt;3.6.3-90.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581223" version="1" comment="ldapsmb is &lt;1.34b-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581224" version="1" comment="libldb1 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581225" version="1" comment="libsmbclient0 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581226" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581227" version="1" comment="libtalloc2 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581228" version="1" comment="libtalloc2-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581229" version="1" comment="libtdb1 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581230" version="1" comment="libtdb1-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581231" version="1" comment="libtevent0 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581232" version="1" comment="libtevent0-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581233" version="1" comment="libwbclient0 is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581234" version="1" comment="libwbclient0-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581235" version="1" comment="samba is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581236" version="1" comment="samba-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581237" version="1" comment="samba-client is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581238" version="1" comment="samba-client-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581239" version="1" comment="samba-krb-printing is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581240" version="1" comment="samba-winbind is &lt;3.6.3-93.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581241" version="1" comment="samba-winbind-32bit is &lt;3.6.3-93.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581242" version="1" comment="ldapsmb is &lt;1.34b-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581243" version="1" comment="libldb1 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581244" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581245" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581246" version="1" comment="libtalloc2 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581247" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581248" version="1" comment="libtdb1 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581249" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581250" version="1" comment="libtevent0 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581251" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581252" version="1" comment="libwbclient0 is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581253" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581254" version="1" comment="samba is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581255" version="1" comment="samba-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581256" version="1" comment="samba-client is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581257" version="1" comment="samba-client-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581258" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581259" version="1" comment="samba-winbind is &lt;3.6.3-94.5.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581260" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581261" version="1" comment="ldapsmb is &lt;1.34b-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581262" version="1" comment="libldb1 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581263" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581264" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581265" version="1" comment="libtalloc2 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581266" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581267" version="1" comment="libtdb1 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581268" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581269" version="1" comment="libtevent0 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581270" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581271" version="1" comment="libwbclient0 is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581272" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581273" version="1" comment="samba is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581274" version="1" comment="samba-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581275" version="1" comment="samba-client is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581276" version="1" comment="samba-client-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581277" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581278" version="1" comment="samba-winbind is &lt;3.6.3-94.8.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581279" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581280" version="1" comment="ldapsmb is &lt;1.34b-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581281" version="1" comment="libldb1 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581282" version="1" comment="libsmbclient0 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581283" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581284" version="1" comment="libtalloc2 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581285" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581286" version="1" comment="libtdb1 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581287" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581288" version="1" comment="libtevent0 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581289" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581290" version="1" comment="libwbclient0 is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581291" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581292" version="1" comment="samba is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581293" version="1" comment="samba-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581294" version="1" comment="samba-client is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581295" version="1" comment="samba-client-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581296" version="1" comment="samba-doc is &lt;3.6.3-94.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581297" version="1" comment="samba-krb-printing is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581298" version="1" comment="samba-winbind is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581299" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581300" version="1" comment="ldapsmb is &lt;1.34b-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581301" version="1" comment="libldb1 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581302" version="1" comment="libsmbclient0 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581303" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581304" version="1" comment="libtalloc2 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581305" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581306" version="1" comment="libtdb1 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581307" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581308" version="1" comment="libtevent0 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581309" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581310" version="1" comment="libwbclient0 is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581311" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581312" version="1" comment="samba is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581313" version="1" comment="samba-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581314" version="1" comment="samba-client is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581315" version="1" comment="samba-client-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581316" version="1" comment="samba-krb-printing is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581317" version="1" comment="samba-winbind is &lt;3.6.3-94.14.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581318" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581319" version="1" comment="ldapsmb is &lt;1.34b-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581320" version="1" comment="libldb1 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581321" version="1" comment="libsmbclient0 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581322" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581323" version="1" comment="libtalloc2 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581324" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581325" version="1" comment="libtdb1 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581326" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581327" version="1" comment="libtevent0 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581328" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581329" version="1" comment="libwbclient0 is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581330" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581331" version="1" comment="samba is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581332" version="1" comment="samba-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581333" version="1" comment="samba-client is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581334" version="1" comment="samba-client-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581335" version="1" comment="samba-krb-printing is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581336" version="1" comment="samba-winbind is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581337" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581338" version="1" comment="ldapsmb is &lt;1.34b-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581339" version="1" comment="libldb1 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581340" version="1" comment="libsmbclient0 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581341" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581342" version="1" comment="libtalloc2 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581343" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581344" version="1" comment="libtdb1 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581345" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581346" version="1" comment="libtevent0 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581347" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581348" version="1" comment="libwbclient0 is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581349" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581350" version="1" comment="samba is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581351" version="1" comment="samba-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581352" version="1" comment="samba-client is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581353" version="1" comment="samba-client-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581354" version="1" comment="samba-krb-printing is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581355" version="1" comment="samba-winbind is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581356" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581357" version="1" comment="ldapsmb is &lt;1.34b-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581358" version="1" comment="libldb1 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581359" version="1" comment="libsmbclient0 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581360" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581361" version="1" comment="libtalloc2 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581362" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581363" version="1" comment="libtdb1 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581364" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581365" version="1" comment="libtevent0 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581366" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581367" version="1" comment="libwbclient0 is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581368" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581369" version="1" comment="samba is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581370" version="1" comment="samba-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581371" version="1" comment="samba-client is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581372" version="1" comment="samba-client-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581373" version="1" comment="samba-krb-printing is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581374" version="1" comment="samba-winbind is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581375" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581376" version="1" comment="ldapsmb is &lt;1.34b-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581377" version="1" comment="libldb1 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581378" version="1" comment="libsmbclient0 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581379" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581380" version="1" comment="libtalloc2 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581381" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581382" version="1" comment="libtdb1 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581383" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581384" version="1" comment="libtevent0 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581385" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581386" version="1" comment="libwbclient0 is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581387" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581388" version="1" comment="samba is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581389" version="1" comment="samba-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581390" version="1" comment="samba-client is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581391" version="1" comment="samba-client-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581392" version="1" comment="samba-krb-printing is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581393" version="1" comment="samba-winbind is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581394" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581395" version="1" comment="ldapsmb is &lt;1.34b-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581396" version="1" comment="libldb1 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581397" version="1" comment="libsmbclient0 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581398" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581399" version="1" comment="libtalloc2 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581400" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581401" version="1" comment="libtdb1 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581402" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581403" version="1" comment="libtevent0 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581404" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581405" version="1" comment="libwbclient0 is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581406" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581407" version="1" comment="samba is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581408" version="1" comment="samba-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581409" version="1" comment="samba-client is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581410" version="1" comment="samba-client-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581411" version="1" comment="samba-krb-printing is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581412" version="1" comment="samba-winbind is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581413" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655320" version="1" comment="ldapsmb is &lt;1.34b-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655321" version="1" comment="libldb1 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655322" version="1" comment="libsmbclient0 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655323" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655324" version="1" comment="libtalloc2 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655325" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655326" version="1" comment="libtdb1 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655327" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655328" version="1" comment="libtevent0 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655329" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655330" version="1" comment="libwbclient0 is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655331" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655332" version="1" comment="samba is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655333" version="1" comment="samba-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655334" version="1" comment="samba-client is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655335" version="1" comment="samba-client-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655336" version="1" comment="samba-doc is &lt;3.6.3-94.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655337" version="1" comment="samba-krb-printing is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655338" version="1" comment="samba-winbind is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655339" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581414" version="1" comment="ldapsmb is &lt;1.34b-12.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581415" version="1" comment="libldb1 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581416" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581417" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581418" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581419" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581420" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581421" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581422" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581423" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581424" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581425" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581426" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581427" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581428" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581429" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581430" version="1" comment="samba is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581431" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581432" version="1" comment="samba-client is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581433" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581434" version="1" comment="samba-client-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581435" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581436" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581437" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581438" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581439" version="1" comment="samba-x86 is &lt;3.6.3-0.56.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581440" version="1" comment="ldapsmb is &lt;1.34b-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581441" version="1" comment="libldb1 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581442" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581443" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581444" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581445" version="1" comment="libtalloc2 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581446" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581447" version="1" comment="libtalloc2-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581448" version="1" comment="libtdb1 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581449" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581450" version="1" comment="libtdb1-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581451" version="1" comment="libtevent0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581452" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581453" version="1" comment="libwbclient0 is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581454" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581455" version="1" comment="libwbclient0-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581456" version="1" comment="samba is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581457" version="1" comment="samba-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581458" version="1" comment="samba-client is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581459" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581460" version="1" comment="samba-client-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581461" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581462" version="1" comment="samba-winbind is &lt;3.6.3-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581463" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581464" version="1" comment="samba-winbind-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581465" version="1" comment="samba-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581466" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581467" version="1" comment="sblim-sfcb is &lt;1.3.11-0.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581468" version="1" comment="sblim-sfcb-openssl1 is &lt;1.3.11-0.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581469" version="1" comment="shim is &lt;15+git47-12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581470" version="1" comment="shim is &lt;15.4-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581471" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581472" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581473" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581474" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581475" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581476" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581477" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581478" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581479" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581480" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581481" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581482" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581483" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581484" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581485" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626552" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626553" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626554" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581486" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581487" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581488" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581489" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581490" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581491" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581492" version="1" comment="sudo is &lt;1.7.6p2-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581493" version="1" comment="sudo is &lt;1.7.6p2-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581494" version="1" comment="sudo is &lt;1.7.6p2-0.30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581495" version="1" comment="supportutils is &lt;1.20-121.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581496" version="1" comment="tboot is &lt;20120115_1.7.0-0.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581497" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581498" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581499" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581500" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.160.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581501" version="1" comment="tiff is &lt;3.8.2-141.160.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683272" version="1" comment="libtiff3 is &lt;3.8.2-141.169.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683273" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683274" version="1" comment="tiff is &lt;3.8.2-141.169.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581502" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581503" version="1" comment="unrar is &lt;3.80.2-4.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683761" version="1" comment="unrar is &lt;5.6.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581504" version="1" comment="unzip is &lt;6.00-11.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581505" version="1" comment="unzip is &lt;6.00-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581506" version="1" comment="unzip is &lt;6.00-11.18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581507" version="1" comment="unzip is &lt;6.00-11.18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670262" version="1" comment="unzip is &lt;6.00-11.18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581508" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581509" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581510" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581511" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581512" version="1" comment="util-linux is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581513" version="1" comment="util-linux-lang is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581514" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581515" version="1" comment="gvim is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581516" version="1" comment="vim is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581517" version="1" comment="vim-base is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581518" version="1" comment="vim-data is &lt;7.2-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581519" version="1" comment="gvim is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581520" version="1" comment="vim is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581521" version="1" comment="vim-base is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581522" version="1" comment="vim-data is &lt;7.2-8.20.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581523" version="1" comment="gvim is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581524" version="1" comment="vim is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581525" version="1" comment="vim-base is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581526" version="1" comment="vim-data is &lt;7.2-8.21.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581527" version="1" comment="gvim is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581528" version="1" comment="vim is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581529" version="1" comment="vim-base is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581530" version="1" comment="vim-data is &lt;7.2-8.21.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581531" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581532" version="1" comment="wget is &lt;1.11.4-1.32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581533" version="1" comment="wireshark is &lt;1.10.11-0.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581534" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581535" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581536" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581537" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581538" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581539" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581540" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581541" version="1" comment="xen is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581542" version="1" comment="xen-doc-html is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581543" version="1" comment="xen-doc-pdf is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581544" version="1" comment="xen-kmp-default is &lt;4.2.5_20_3.0.101_0.47.79-24.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581545" version="1" comment="xen-kmp-pae is &lt;4.2.5_20_3.0.101_0.47.79-24.9 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581546" version="1" comment="xen-libs is &lt;4.2.5_20-24.9 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581547" version="1" comment="xen-libs-32bit is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581548" version="1" comment="xen-tools is &lt;4.2.5_20-24.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581549" version="1" comment="xen-tools-domU is &lt;4.2.5_20-24.9 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581550" version="1" comment="xen is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581551" version="1" comment="xen-doc-html is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581552" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581553" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.86-27.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581554" version="1" comment="xen-libs is &lt;4.2.5_21-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581555" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581556" version="1" comment="xen-tools is &lt;4.2.5_21-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581557" version="1" comment="xen-tools-domU is &lt;4.2.5_21-27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581558" version="1" comment="xen is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581559" version="1" comment="xen-doc-html is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581560" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581561" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.90-30.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581562" version="1" comment="xen-libs is &lt;4.2.5_21-30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581563" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581564" version="1" comment="xen-tools is &lt;4.2.5_21-30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581565" version="1" comment="xen-tools-domU is &lt;4.2.5_21-30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581566" version="1" comment="xen is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581567" version="1" comment="xen-doc-html is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581568" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581569" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.113.TDC-31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581570" version="1" comment="xen-libs is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581571" version="1" comment="xen-tools is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581572" version="1" comment="xen-tools-domU is &lt;4.2.5_21-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581573" version="1" comment="xen is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581574" version="1" comment="xen-doc-html is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581575" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581576" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.96-35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581577" version="1" comment="xen-libs is &lt;4.2.5_21-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581578" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581579" version="1" comment="xen-tools is &lt;4.2.5_21-35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581580" version="1" comment="xen-tools-domU is &lt;4.2.5_21-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581581" version="1" comment="xen is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581582" version="1" comment="xen-doc-html is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581583" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581584" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.116.TDC-37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581585" version="1" comment="xen-libs is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581586" version="1" comment="xen-tools is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581587" version="1" comment="xen-tools-domU is &lt;4.2.5_21-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581588" version="1" comment="xen is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581589" version="1" comment="xen-doc-html is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581590" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581591" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581592" version="1" comment="xen-libs is &lt;4.2.5_21-38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581593" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581594" version="1" comment="xen-tools is &lt;4.2.5_21-38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581595" version="1" comment="xen-tools-domU is &lt;4.2.5_21-38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581596" version="1" comment="xen is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581597" version="1" comment="xen-doc-html is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581598" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581599" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.119.TDC-40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581600" version="1" comment="xen-libs is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581601" version="1" comment="xen-tools is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581602" version="1" comment="xen-tools-domU is &lt;4.2.5_21-40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581603" version="1" comment="xen is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581604" version="1" comment="xen-doc-html is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581605" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581606" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.119.TDC-43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581607" version="1" comment="xen-libs is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581608" version="1" comment="xen-tools is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581609" version="1" comment="xen-tools-domU is &lt;4.2.5_21-43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581610" version="1" comment="xen is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581611" version="1" comment="xen-doc-html is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581612" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581613" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.99-41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581614" version="1" comment="xen-libs is &lt;4.2.5_21-41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581615" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581616" version="1" comment="xen-tools is &lt;4.2.5_21-41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581617" version="1" comment="xen-tools-domU is &lt;4.2.5_21-41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581618" version="1" comment="xen is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581619" version="1" comment="xen-doc-html is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581620" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581621" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.102-44.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581622" version="1" comment="xen-libs is &lt;4.2.5_21-44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581623" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581624" version="1" comment="xen-tools is &lt;4.2.5_21-44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581625" version="1" comment="xen-tools-domU is &lt;4.2.5_21-44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581626" version="1" comment="xen is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581627" version="1" comment="xen-doc-html is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581628" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581629" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.122.TDC-46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581630" version="1" comment="xen-libs is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581631" version="1" comment="xen-tools is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581632" version="1" comment="xen-tools-domU is &lt;4.2.5_21-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581633" version="1" comment="xen is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581634" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581635" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581636" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.125.TDC-47.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581637" version="1" comment="xen-libs is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581638" version="1" comment="xen-tools is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581639" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581640" version="1" comment="xen is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581641" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581642" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581643" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581644" version="1" comment="xen-libs is &lt;4.2.5_21-45.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581645" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581646" version="1" comment="xen-tools is &lt;4.2.5_21-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581647" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581648" version="1" comment="xen is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581649" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581650" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581651" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.126.5.TDC-47.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581652" version="1" comment="xen-libs is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581653" version="1" comment="xen-tools is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581654" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581655" version="1" comment="xen is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581656" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581657" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581658" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.105-45.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581659" version="1" comment="xen-libs is &lt;4.2.5_21-45.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581660" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581661" version="1" comment="xen-tools is &lt;4.2.5_21-45.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581662" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581663" version="1" comment="xen is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581664" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581665" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581666" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.5-45.11.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581667" version="1" comment="xen-libs is &lt;4.2.5_21-45.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581668" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581669" version="1" comment="xen-tools is &lt;4.2.5_21-45.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581670" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581671" version="1" comment="xen is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581672" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581673" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581674" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.132.TDC-47.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581675" version="1" comment="xen-libs is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581676" version="1" comment="xen-tools is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581677" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581678" version="1" comment="xen is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581679" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581680" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581681" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.8-45.16.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581682" version="1" comment="xen-libs is &lt;4.2.5_21-45.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581683" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581684" version="1" comment="xen-tools is &lt;4.2.5_21-45.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581685" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581686" version="1" comment="xen is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581687" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581688" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581689" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.139.TDC-47.16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581690" version="1" comment="xen-libs is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581691" version="1" comment="xen-tools is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581692" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581693" version="1" comment="xen is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581694" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581695" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581696" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.150.TDC-47.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581697" version="1" comment="xen-libs is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581698" version="1" comment="xen-tools is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581699" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581700" version="1" comment="xen is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581701" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581702" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581703" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.14-45.19.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581704" version="1" comment="xen-libs is &lt;4.2.5_21-45.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581705" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581706" version="1" comment="xen-tools is &lt;4.2.5_21-45.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581707" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581708" version="1" comment="xen is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581709" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581710" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581711" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.19-45.22.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581712" version="1" comment="xen-libs is &lt;4.2.5_21-45.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581713" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581714" version="1" comment="xen-tools is &lt;4.2.5_21-45.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581715" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581716" version="1" comment="xen is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581717" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581718" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581719" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.156.TDC-47.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581720" version="1" comment="xen-libs is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581721" version="1" comment="xen-tools is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581722" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581723" version="1" comment="xen is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581724" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581725" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581726" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.181.TDC-47.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581727" version="1" comment="xen-libs is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581728" version="1" comment="xen-tools is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581729" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581730" version="1" comment="xen is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581731" version="1" comment="xen-doc-html is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581732" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581733" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.106.43-45.25.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581734" version="1" comment="xen-libs is &lt;4.2.5_21-45.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581735" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581736" version="1" comment="xen-tools is &lt;4.2.5_21-45.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581737" version="1" comment="xen-tools-domU is &lt;4.2.5_21-45.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581738" version="1" comment="xen is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581739" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581740" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581741" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.190.TDC-47.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581742" version="1" comment="xen-libs is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581743" version="1" comment="xen-tools is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581744" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581745" version="1" comment="xen is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581746" version="1" comment="xen-doc-html is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581747" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581748" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.219.TDC-47.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581749" version="1" comment="xen-libs is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581750" version="1" comment="xen-tools is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581751" version="1" comment="xen-tools-domU is &lt;4.2.5_21-47.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581752" version="1" comment="xen is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581753" version="1" comment="xen-doc-html is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581754" version="1" comment="xen-doc-pdf is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581755" version="1" comment="xen-kmp-default is &lt;4.2.5_22_3.0.101_0.238.TDC-47.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581756" version="1" comment="xen-libs is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581757" version="1" comment="xen-tools is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581758" version="1" comment="xen-tools-domU is &lt;4.2.5_22-47.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581759" version="1" comment="xen is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581760" version="1" comment="xen-doc-html is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581761" version="1" comment="xen-doc-pdf is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581762" version="1" comment="xen-kmp-default is &lt;4.2.5_24_3.0.101_0.238.TDC-47.43.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581763" version="1" comment="xen-libs is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581764" version="1" comment="xen-tools is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581765" version="1" comment="xen-tools-domU is &lt;4.2.5_24-47.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581766" version="1" comment="xen is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581767" version="1" comment="xen-doc-html is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581768" version="1" comment="xen-doc-pdf is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581769" version="1" comment="xen-kmp-default is &lt;4.2.5_26_3.0.101_0.241.TDC-47.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581770" version="1" comment="xen-libs is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581771" version="1" comment="xen-tools is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581772" version="1" comment="xen-tools-domU is &lt;4.2.5_26-47.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581773" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581774" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581775" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581776" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581777" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.42.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581778" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581779" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581780" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581781" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581782" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581783" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581784" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581785" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581786" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581787" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581788" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581789" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581790" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581791" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581792" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581793" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581794" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581795" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581796" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581797" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581798" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581799" version="1" comment="xorg-x11-server is &lt;7.4-27.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581800" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.118.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581801" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581802" version="1" comment="xorg-x11-server is &lt;7.4-27.121.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581803" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581804" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581805" version="1" comment="xorg-x11-server is &lt;7.4-27.122.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581806" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581807" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581808" version="1" comment="xorg-x11-server is &lt;7.4-27.122.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581809" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581810" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581811" version="1" comment="xorg-x11-server is &lt;7.4-27.122.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581812" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581813" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581814" version="1" comment="xorg-x11-server is &lt;7.4-27.122.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581815" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581816" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581817" version="1" comment="xorg-x11-server is &lt;7.4-27.122.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581818" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581819" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581820" version="1" comment="xorg-x11-server is &lt;7.4-27.122.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581821" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659912" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659913" version="1" comment="xorg-x11-server is &lt;7.4-27.122.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659914" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660947" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660948" version="1" comment="xorg-x11-server is &lt;7.4-27.122.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660949" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581822" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581823" version="1" comment="yast2-storage is &lt;2.17.147.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581824" version="1" comment="yast2-storage-lib is &lt;2.17.147.1-9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581825" version="1" comment="zlib is &lt;1.2.7-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581826" version="1" comment="zlib-32bit is &lt;1.2.7-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677179" version="1" comment="zlib is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677180" version="1" comment="zlib-32bit is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677951" version="1" comment="zlib-devel is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677952" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581827" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581828" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581829" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581830" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581831" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581832" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581833" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581834" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581835" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581836" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581837" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581838" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581839" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581840" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581841" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581842" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581843" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.77.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581844" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.77.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581845" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.5.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581846" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.5.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581847" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581848" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581849" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581850" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581851" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581852" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581853" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581854" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581855" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581856" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.29.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581857" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581858" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581859" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.78.37.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581860" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.78.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581861" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581862" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581863" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581864" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.45.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581865" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.56.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581866" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.56.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581867" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581868" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.59.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581869" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581870" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.74.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581871" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.79.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581872" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.79.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581873" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581874" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581875" version="1" comment="libMagickCore1 is &lt;6.4.3.6-78.135.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581876" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-78.135.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581877" version="1" comment="LibVNCServer is &lt;0.9.1-159.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581878" version="1" comment="LibVNCServer is &lt;0.9.1-160.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581879" version="1" comment="LibVNCServer is &lt;0.9.1-160.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581880" version="1" comment="LibVNCServer is &lt;0.9.1-160.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581881" version="1" comment="LibVNCServer is &lt;0.9.1-160.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581882" version="1" comment="LibVNCServer is &lt;0.9.1-160.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581883" version="1" comment="LibVNCServer is &lt;0.9.1-160.22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581884" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581885" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581886" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581887" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581888" version="1" comment="libfreebl3 is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581889" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581890" version="1" comment="libfreebl3-x86 is &lt;3.20.2-30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581891" version="1" comment="libsoftokn3 is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581892" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581893" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581894" version="1" comment="mozilla-nspr is &lt;4.12-26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581895" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581896" version="1" comment="mozilla-nspr-x86 is &lt;4.12-26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581897" version="1" comment="mozilla-nss is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581898" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581899" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581900" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581901" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581902" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581903" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581904" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581905" version="1" comment="libfreebl3 is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581906" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581907" version="1" comment="libfreebl3-x86 is &lt;3.21.1-35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581908" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581909" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581910" version="1" comment="libsoftokn3-x86 is &lt;3.21.1-35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581911" version="1" comment="mozilla-nspr is &lt;4.12-29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581912" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581913" version="1" comment="mozilla-nspr-x86 is &lt;4.12-29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581914" version="1" comment="mozilla-nss is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581915" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581916" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581917" version="1" comment="mozilla-nss-x86 is &lt;3.21.1-35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581918" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581919" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581920" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581921" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581922" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581923" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581924" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581925" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581926" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581927" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581928" version="1" comment="MozillaFirefox is &lt;45.9.0esr-71.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581929" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-71.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581930" version="1" comment="libfreebl3 is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581931" version="1" comment="libfreebl3-32bit is &lt;3.29.5-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581932" version="1" comment="libfreebl3-x86 is &lt;3.29.5-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581933" version="1" comment="libsoftokn3 is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581934" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581935" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581936" version="1" comment="mozilla-nspr is &lt;4.13.1-32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581937" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581938" version="1" comment="mozilla-nspr-x86 is &lt;4.13.1-32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581939" version="1" comment="mozilla-nss is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581940" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581941" version="1" comment="mozilla-nss-tools is &lt;3.29.5-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581942" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581943" version="1" comment="MozillaFirefox is &lt;52.2.0esr-72.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581944" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.3.44 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581945" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-72.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581946" version="1" comment="firefox-libffi4 is &lt;5.3.1+r233831-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581947" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581948" version="1" comment="libfreebl3 is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581949" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581950" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581951" version="1" comment="libsoftokn3 is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581952" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581953" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581954" version="1" comment="mozilla-nss is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581955" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581956" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581957" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581958" version="1" comment="MozillaFirefox is &lt;52.3.0esr-72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581959" version="1" comment="MozillaFirefox-branding-SLED is &lt;52-24.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581960" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581961" version="1" comment="MozillaFirefox is &lt;52.5.0esr-72.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581962" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-72.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581963" version="1" comment="MozillaFirefox is &lt;52.6.0esr-72.20.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581964" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-72.20.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581965" version="1" comment="MozillaFirefox is &lt;52.7.3esr-72.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581966" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-72.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581967" version="1" comment="MozillaFirefox is &lt;52.8.0esr-72.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581968" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-72.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581969" version="1" comment="MozillaFirefox is &lt;52.8.1esr-72.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581970" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-72.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581971" version="1" comment="MozillaFirefox is &lt;52.9.0esr-72.38.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581972" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-72.38.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581973" version="1" comment="mozilla-nspr-devel is &lt;4.23-29.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581974" version="1" comment="mozilla-nss-devel is &lt;3.47.1-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009134906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581975" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581976" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581977" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581978" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581979" version="1" comment="libfreebl3-x86 is &lt;3.20.2-28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581980" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581981" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581982" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581983" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581984" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581985" version="1" comment="mozilla-nspr-x86 is &lt;4.12-24.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581986" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581987" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581988" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581989" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-28.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581990" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581991" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581992" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581993" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581994" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581995" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3.15 for i586,ia64,ppc64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581996" version="1" comment="OpenEXR is &lt;1.6.1-83.17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581997" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581998" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009581999" version="1" comment="OpenEXR is &lt;1.6.1-83.17.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582000" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657137" version="1" comment="OpenEXR is &lt;1.6.1-83.17.30.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657138" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582001" version="1" comment="SDL is &lt;1.2.13-106.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582002" version="1" comment="SDL-32bit is &lt;1.2.13-106.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582003" version="1" comment="SDL-x86 is &lt;1.2.13-106.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679745" version="1" comment="SDL is &lt;1.2.13-106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679746" version="1" comment="SDL-32bit is &lt;1.2.13-106.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582004" version="1" comment="libadns1 is &lt;1.4-75.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664251" version="1" comment="aide is &lt;0.13.1-40.16.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582005" version="1" comment="amanda is &lt;2.5.2.1-188.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582006" version="1" comment="apache2 is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582007" version="1" comment="apache2-doc is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582008" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582009" version="1" comment="apache2-prefork is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582010" version="1" comment="apache2-utils is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582011" version="1" comment="apache2-worker is &lt;2.2.12-64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582012" version="1" comment="apache2 is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582013" version="1" comment="apache2-doc is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582014" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582015" version="1" comment="apache2-prefork is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582016" version="1" comment="apache2-utils is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582017" version="1" comment="apache2-worker is &lt;2.2.12-69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582018" version="1" comment="apache2 is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582019" version="1" comment="apache2-doc is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582020" version="1" comment="apache2-example-pages is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582021" version="1" comment="apache2-prefork is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582022" version="1" comment="apache2-utils is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582023" version="1" comment="apache2-worker is &lt;2.2.34-70.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582024" version="1" comment="apache2 is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582025" version="1" comment="apache2-doc is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582026" version="1" comment="apache2-example-pages is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582027" version="1" comment="apache2-prefork is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582028" version="1" comment="apache2-utils is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582029" version="1" comment="apache2-worker is &lt;2.2.34-70.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582030" version="1" comment="apache2 is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582031" version="1" comment="apache2-doc is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582032" version="1" comment="apache2-example-pages is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582033" version="1" comment="apache2-prefork is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582034" version="1" comment="apache2-utils is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582035" version="1" comment="apache2-worker is &lt;2.2.34-70.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582036" version="1" comment="apache2 is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582037" version="1" comment="apache2-doc is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582038" version="1" comment="apache2-example-pages is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582039" version="1" comment="apache2-prefork is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582040" version="1" comment="apache2-utils is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582041" version="1" comment="apache2-worker is &lt;2.2.34-70.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582042" version="1" comment="apache2 is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582043" version="1" comment="apache2-doc is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582044" version="1" comment="apache2-example-pages is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582045" version="1" comment="apache2-prefork is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582046" version="1" comment="apache2-utils is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582047" version="1" comment="apache2-worker is &lt;2.2.34-70.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582048" version="1" comment="apache2 is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582049" version="1" comment="apache2-doc is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582050" version="1" comment="apache2-example-pages is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582051" version="1" comment="apache2-prefork is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582052" version="1" comment="apache2-utils is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582053" version="1" comment="apache2-worker is &lt;2.2.34-70.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633957" version="1" comment="apache2 is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633958" version="1" comment="apache2-doc is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633959" version="1" comment="apache2-example-pages is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633960" version="1" comment="apache2-prefork is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633961" version="1" comment="apache2-utils is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633962" version="1" comment="apache2-worker is &lt;2.2.34-70.38.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673638" version="1" comment="apache2 is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673639" version="1" comment="apache2-doc is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673640" version="1" comment="apache2-example-pages is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673641" version="1" comment="apache2-prefork is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673642" version="1" comment="apache2-utils is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673643" version="1" comment="apache2-worker is &lt;2.2.34-70.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582054" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582055" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582056" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.63.3.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582057" version="1" comment="apport is &lt;0.114-12.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582058" version="1" comment="apport-crashdb-sle is &lt;0.114-0.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582059" version="1" comment="apport-gtk is &lt;0.114-12.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616452" version="1" comment="arpwatch is &lt;2.1a15-131.23.2.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627837" version="1" comment="aspell is &lt;0.60.6-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627838" version="1" comment="aspell-32bit is &lt;0.60.6-26.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627839" version="1" comment="aspell-ispell is &lt;0.60.6-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582060" version="1" comment="atftp is &lt;0.7.0-135.23.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582061" version="1" comment="audiofile is &lt;0.2.6-142.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582062" version="1" comment="audiofile-32bit is &lt;0.2.6-142.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582063" version="1" comment="audiofile-x86 is &lt;0.2.6-142.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582064" version="1" comment="augeas is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582065" version="1" comment="augeas-lenses is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582066" version="1" comment="libaugeas0 is &lt;0.9.0-3.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582067" version="1" comment="avahi is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582068" version="1" comment="avahi-lang is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582069" version="1" comment="avahi-utils is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582070" version="1" comment="libavahi-client3 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582071" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-35.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582072" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-35.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582073" version="1" comment="libavahi-common3 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582074" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-35.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582075" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-35.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582076" version="1" comment="libavahi-core5 is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582077" version="1" comment="libavahi-glib1 is &lt;0.6.23-35.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582078" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-35.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582079" version="1" comment="libavahi-glib1-x86 is &lt;0.6.23-35.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582080" version="1" comment="libdns_sd is &lt;0.6.23-35.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582081" version="1" comment="libdns_sd-32bit is &lt;0.6.23-35.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582082" version="1" comment="libdns_sd-x86 is &lt;0.6.23-35.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582083" version="1" comment="bash is &lt;3.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582084" version="1" comment="bash-doc is &lt;3.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582085" version="1" comment="bash-x86 is &lt;3.2-147.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582086" version="1" comment="libreadline5 is &lt;5.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582087" version="1" comment="libreadline5-32bit is &lt;5.2-147.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582088" version="1" comment="libreadline5-x86 is &lt;5.2-147.29.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582089" version="1" comment="readline-doc is &lt;5.2-147.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582090" version="1" comment="bash is &lt;3.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582091" version="1" comment="bash-doc is &lt;3.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582092" version="1" comment="bash-x86 is &lt;3.2-147.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582093" version="1" comment="libreadline5 is &lt;5.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582094" version="1" comment="libreadline5-32bit is &lt;5.2-147.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582095" version="1" comment="libreadline5-x86 is &lt;5.2-147.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582096" version="1" comment="readline-doc is &lt;5.2-147.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582097" version="1" comment="bind is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582098" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582099" version="1" comment="bind-doc is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582100" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582101" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582102" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582103" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582104" version="1" comment="bind is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582105" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582106" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582107" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582108" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582109" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582110" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582111" version="1" comment="bind is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582112" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582113" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582114" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582115" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582116" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582117" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582118" version="1" comment="bind is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582119" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582120" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582121" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582122" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582123" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582124" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582125" version="1" comment="bind is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582126" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582127" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582128" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582129" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582130" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582131" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582132" version="1" comment="bind is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582133" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582134" version="1" comment="bind-doc is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582135" version="1" comment="bind-libs is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582136" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582137" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582138" version="1" comment="bind-utils is &lt;9.9.6P1-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582139" version="1" comment="bind is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582140" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582141" version="1" comment="bind-doc is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582142" version="1" comment="bind-libs is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582143" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582144" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.47.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582145" version="1" comment="bind-utils is &lt;9.9.6P1-0.47.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582146" version="1" comment="bind is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582147" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582148" version="1" comment="bind-doc is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582149" version="1" comment="bind-libs is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582150" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582151" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582152" version="1" comment="bind-utils is &lt;9.9.6P1-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582153" version="1" comment="bind is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582154" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582155" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582156" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582157" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582158" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582159" version="1" comment="bind is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582160" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582161" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582162" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582163" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.15.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582164" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.15.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582165" version="1" comment="bind is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582166" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582167" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582168" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582169" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582170" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582171" version="1" comment="bind is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582172" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582173" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582174" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582175" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582176" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582177" version="1" comment="bind is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582178" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582179" version="1" comment="bind-doc is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582180" version="1" comment="bind-libs is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582181" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.51.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582182" version="1" comment="bind-utils is &lt;9.9.6P1-0.51.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582183" version="1" comment="libarchive2 is &lt;2.5.5-9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582184" version="1" comment="bzip2 is &lt;1.0.5-34.256.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582185" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582186" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582187" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582188" version="1" comment="bzip2 is &lt;1.0.5-34.256.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582189" version="1" comment="bzip2-doc is &lt;1.0.5-34.256.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582190" version="1" comment="libbz2-1 is &lt;1.0.5-34.256.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582191" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.256.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582192" version="1" comment="cairo is &lt;1.8.8-2.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582193" version="1" comment="cairo-32bit is &lt;1.8.8-2.3.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582194" version="1" comment="cairo-doc is &lt;1.8.8-2.3.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582195" version="1" comment="cairo-x86 is &lt;1.8.8-2.3.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681250" version="1" comment="cifs-utils is &lt;5.1-0.16.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582196" version="1" comment="clamav is &lt;0.99.2-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582197" version="1" comment="clamav is &lt;0.99.3-0.20.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582198" version="1" comment="clamav is &lt;0.99.4-0.20.7.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582199" version="1" comment="clamav is &lt;0.100.1-0.20.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582200" version="1" comment="clamav is &lt;0.100.2-0.20.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582201" version="1" comment="clamav is &lt;0.100.3-0.20.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582202" version="1" comment="clamav is &lt;0.100.3-0.20.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582203" version="1" comment="clamav is &lt;0.100.3-0.20.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582204" version="1" comment="clamav is &lt;0.103.0-0.20.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582205" version="1" comment="clamav is &lt;0.103.2-0.20.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657139" version="1" comment="clamav is &lt;0.103.4-0.20.41.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664015" version="1" comment="clamav is &lt;0.103.5-0.20.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582206" version="1" comment="rhnlib is &lt;2.5.69.8-11.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582207" version="1" comment="suseRegisterInfo is &lt;2.1.12-14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582208" version="1" comment="coreutils is &lt;8.12-6.25.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582209" version="1" comment="coreutils-lang is &lt;8.12-6.25.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582210" version="1" comment="coreutils-x86 is &lt;8.12-6.25.33.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630758" version="1" comment="cpio is &lt;2.9-75.81.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630759" version="1" comment="cpio-lang is &lt;2.9-75.81.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631550" version="1" comment="cpio is &lt;2.9-75.81.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631551" version="1" comment="cpio-lang is &lt;2.9-75.81.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582211" version="1" comment="cracklib is &lt;2.8.12-56.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582212" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582213" version="1" comment="cracklib-x86 is &lt;2.8.12-56.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582214" version="1" comment="crash is &lt;7.0.9-30.3.28 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582215" version="1" comment="crash-eppic is &lt;7.0.9-30.3.28 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582216" version="1" comment="cups is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582217" version="1" comment="cups-client is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582218" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582219" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582220" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582221" version="1" comment="cups is &lt;1.3.9-8.46.56.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582222" version="1" comment="cups-client is &lt;1.3.9-8.46.56.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582223" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582224" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582225" version="1" comment="cups is &lt;1.3.9-8.46.56.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582226" version="1" comment="cups-client is &lt;1.3.9-8.46.56.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582227" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582228" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582229" version="1" comment="cups is &lt;1.3.9-8.46.56.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582230" version="1" comment="cups-client is &lt;1.3.9-8.46.56.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582231" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582232" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582233" version="1" comment="curl is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582234" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582235" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582236" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.61.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582237" version="1" comment="curl is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582238" version="1" comment="libcurl4 is &lt;7.19.7-1.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582239" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582240" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582241" version="1" comment="curl is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582242" version="1" comment="libcurl4 is &lt;7.19.7-1.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582243" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582244" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.69.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582245" version="1" comment="curl is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582246" version="1" comment="libcurl4 is &lt;7.19.7-1.70.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582247" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582248" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582249" version="1" comment="curl is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582250" version="1" comment="libcurl4 is &lt;7.19.7-1.70.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582251" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582252" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.70.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582253" version="1" comment="curl is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582254" version="1" comment="libcurl4 is &lt;7.19.7-1.70.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582255" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.70.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582256" version="1" comment="curl is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582257" version="1" comment="libcurl4 is &lt;7.37.0-70.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582258" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582259" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582260" version="1" comment="curl is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582261" version="1" comment="libcurl4 is &lt;7.37.0-70.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582262" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582263" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582264" version="1" comment="curl is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582265" version="1" comment="libcurl4 is &lt;7.37.0-70.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582266" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582267" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582268" version="1" comment="curl is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582269" version="1" comment="libcurl4 is &lt;7.37.0-70.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582270" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582271" version="1" comment="libcurl4-x86 is &lt;7.37.0-70.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582272" version="1" comment="curl is &lt;7.37.0-70.41.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582273" version="1" comment="libcurl4 is &lt;7.37.0-70.41.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582274" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.41.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582275" version="1" comment="curl is &lt;7.37.0-70.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582276" version="1" comment="libcurl4 is &lt;7.37.0-70.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582277" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582278" version="1" comment="curl is &lt;7.37.0-70.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582279" version="1" comment="libcurl4 is &lt;7.37.0-70.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582280" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.47.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582281" version="1" comment="curl is &lt;7.37.0-70.66.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582282" version="1" comment="libcurl4 is &lt;7.37.0-70.66.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582283" version="1" comment="libcurl4-32bit is &lt;7.37.0-70.66.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582284" version="1" comment="cvs is &lt;1.12.12-144.23.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582285" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582286" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582287" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582288" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582289" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582290" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582291" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582292" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582293" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582294" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582295" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582296" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582297" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582298" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582299" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582300" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582301" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582302" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582303" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.4.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669501" version="1" comment="cyrus-sasl is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669502" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669503" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669504" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669505" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669506" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669507" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669508" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669509" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669510" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669511" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669512" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669513" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669514" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.22-182.26.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669515" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.22-182.26.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582304" version="1" comment="dbus-1 is &lt;1.2.10-3.34.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582305" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.34.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582306" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.34.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582307" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582308" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582309" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582310" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582311" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582312" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582313" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582314" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582315" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582316" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582317" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582318" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582319" version="1" comment="dhcp is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582320" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582321" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582322" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.28.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582323" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582324" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624089" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627840" version="1" comment="libdjvulibre21 is &lt;3.5.21-3.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582325" version="1" comment="dnsmasq is &lt;2.71-0.16.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582326" version="1" comment="dnsmasq is &lt;2.78-0.17.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582327" version="1" comment="dnsmasq is &lt;2.78-0.17.10.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582328" version="1" comment="dnsmasq is &lt;2.78-0.17.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679570" version="1" comment="dnsmasq is &lt;2.78-0.17.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582329" version="1" comment="dosfstools is &lt;3.0.26-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582330" version="1" comment="ed is &lt;0.2-1001.30.3.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582331" version="1" comment="emacs is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582332" version="1" comment="emacs-el is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582333" version="1" comment="emacs-info is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582334" version="1" comment="emacs-nox is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582335" version="1" comment="emacs-x11 is &lt;22.3-42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582336" version="1" comment="evince is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582337" version="1" comment="evince-doc is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582338" version="1" comment="evince-lang is &lt;2.28.2-0.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582339" version="1" comment="evince is &lt;2.28.2-0.7.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582340" version="1" comment="evince-doc is &lt;2.28.2-0.7.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582341" version="1" comment="evince-lang is &lt;2.28.2-0.7.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582342" version="1" comment="libexempi3 is &lt;2.0.2-4.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582343" version="1" comment="expat is &lt;2.0.1-88.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582344" version="1" comment="libexpat1 is &lt;2.0.1-88.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582345" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582346" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582347" version="1" comment="expat is &lt;2.0.1-88.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582348" version="1" comment="libexpat1 is &lt;2.0.1-88.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582349" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582350" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.41.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582351" version="1" comment="expat is &lt;2.0.1-88.42.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582352" version="1" comment="libexpat1 is &lt;2.0.1-88.42.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582353" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582354" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.42.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664123" version="1" comment="expat is &lt;2.0.1-88.42.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664124" version="1" comment="libexpat1 is &lt;2.0.1-88.42.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664125" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666464" version="1" comment="expat is &lt;2.0.1-88.42.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666465" version="1" comment="libexpat1 is &lt;2.0.1-88.42.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666466" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669850" version="1" comment="expat is &lt;2.0.1-88.42.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669851" version="1" comment="libexpat1 is &lt;2.0.1-88.42.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669852" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671294" version="1" comment="expat is &lt;2.0.1-88.42.22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671295" version="1" comment="libexpat1 is &lt;2.0.1-88.42.22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671296" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.42.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582355" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582356" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582357" version="1" comment="MozillaFirefox is &lt;52.4.0esr-72.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582358" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-72.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582359" version="1" comment="libfreebl3 is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582360" version="1" comment="libfreebl3-32bit is &lt;3.29.5-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582361" version="1" comment="libfreebl3-x86 is &lt;3.29.5-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582362" version="1" comment="libsoftokn3 is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582363" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582364" version="1" comment="libsoftokn3-x86 is &lt;3.29.5-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582365" version="1" comment="mozilla-nss is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582366" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582367" version="1" comment="mozilla-nss-tools is &lt;3.29.5-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582368" version="1" comment="mozilla-nss-x86 is &lt;3.29.5-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582369" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582370" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582371" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582372" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582373" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582374" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582375" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582376" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582377" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582378" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582379" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582380" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582381" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582382" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582383" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582384" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582385" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582386" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582387" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582388" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.11.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582389" version="1" comment="mozilla-nspr-devel is &lt;4.21-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582390" version="1" comment="mozilla-nss-devel is &lt;3.45-38.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009135202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582391" version="1" comment="firefox-at-spi2-core is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582392" version="1" comment="firefox-at-spi2-core-lang is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582393" version="1" comment="firefox-atk-lang is &lt;2.26.1-2.5.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582394" version="1" comment="firefox-dbus-1-glib is &lt;0.76-34.2.4.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582395" version="1" comment="firefox-gdk-pixbuf-lang is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582396" version="1" comment="firefox-gdk-pixbuf-query-loaders is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582397" version="1" comment="firefox-gdk-pixbuf-thumbnailer is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582398" version="1" comment="firefox-gio-branding-upstream is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582399" version="1" comment="firefox-glib2-lang is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582400" version="1" comment="firefox-glib2-tools is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582401" version="1" comment="firefox-gtk3-branding-upstream is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582402" version="1" comment="firefox-gtk3-data is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582403" version="1" comment="firefox-gtk3-immodule-amharic is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582404" version="1" comment="firefox-gtk3-immodule-inuktitut is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582405" version="1" comment="firefox-gtk3-immodule-multipress is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582406" version="1" comment="firefox-gtk3-immodule-thai is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582407" version="1" comment="firefox-gtk3-immodule-vietnamese is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582408" version="1" comment="firefox-gtk3-immodule-xim is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582409" version="1" comment="firefox-gtk3-immodules-tigrigna is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582410" version="1" comment="firefox-gtk3-lang is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582411" version="1" comment="firefox-gtk3-tools is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582412" version="1" comment="firefox-libatk-1_0-0 is &lt;2.26.1-2.5.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582413" version="1" comment="firefox-libatk-bridge-2_0-0 is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582414" version="1" comment="firefox-libatspi0 is &lt;2.10.2-2.6.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582415" version="1" comment="firefox-libcairo-gobject2 is &lt;1.15.10-2.8.7 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582416" version="1" comment="firefox-libcairo2 is &lt;1.15.10-2.8.7 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582417" version="1" comment="firefox-libfreetype6 is &lt;2.9-2.4.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582418" version="1" comment="firefox-libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582419" version="1" comment="firefox-libgdk_pixbuf-2_0-0 is &lt;2.36.11-2.5.4 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582420" version="1" comment="firefox-libgtk-3-0 is &lt;3.10.9-2.8.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582421" version="1" comment="firefox-libharfbuzz0 is &lt;1.7.5-2.4.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582422" version="1" comment="firefox-libpango-1_0-0 is &lt;1.40.14-2.4.5 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582423" version="1" comment="firefox-libpixman-1-0 is &lt;0.34.0-2.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582424" version="1" comment="firefox-libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,ppc64,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582425" version="1" comment="libfirefox-gio-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582426" version="1" comment="libfirefox-glib-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582427" version="1" comment="libfirefox-gmodule-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582428" version="1" comment="libfirefox-gobject-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582429" version="1" comment="libfirefox-gthread-2_0-0 is &lt;2.54.3-2.4.3 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582430" version="1" comment="libfreebl3 is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582431" version="1" comment="libfreebl3-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582432" version="1" comment="libsoftokn3 is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582433" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582434" version="1" comment="mozilla-nspr is &lt;4.20-29.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582435" version="1" comment="mozilla-nspr-32bit is &lt;4.20-29.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582436" version="1" comment="mozilla-nspr-devel is &lt;4.20-29.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582437" version="1" comment="mozilla-nss is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582438" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582439" version="1" comment="mozilla-nss-certs is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582440" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582441" version="1" comment="mozilla-nss-devel is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582442" version="1" comment="mozilla-nss-tools is &lt;3.41.1-38.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582443" version="1" comment="fontconfig is &lt;2.6.0-10.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582444" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582445" version="1" comment="fontconfig-x86 is &lt;2.6.0-10.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582446" version="1" comment="freeradius-server is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582447" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582448" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582449" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582450" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582451" version="1" comment="freeradius-server is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582452" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582453" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582454" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582455" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.25.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582456" version="1" comment="freetype2 is &lt;2.3.7-25.41.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582457" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41.4 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582458" version="1" comment="freetype2-x86 is &lt;2.3.7-25.41.4 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582459" version="1" comment="ft2demos is &lt;2.3.7-25.41.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582460" version="1" comment="freetype2 is &lt;2.3.7-25.45.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582461" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582462" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582463" version="1" comment="ft2demos is &lt;2.3.7-25.45.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582464" version="1" comment="freetype2 is &lt;2.3.7-25.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582465" version="1" comment="freetype2-32bit is &lt;2.3.7-25.45.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582466" version="1" comment="freetype2-x86 is &lt;2.3.7-25.45.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582467" version="1" comment="ft2demos is &lt;2.3.7-25.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582468" version="1" comment="fuse is &lt;2.8.7-0.11.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582469" version="1" comment="libfuse2 is &lt;2.8.7-0.11.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582470" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582471" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582472" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582473" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582474" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582475" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582476" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582477" version="1" comment="gcc43 is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582478" version="1" comment="gcc43-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582479" version="1" comment="gcc43-c++ is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582480" version="1" comment="gcc43-info is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582481" version="1" comment="gcc43-locale is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582482" version="1" comment="libstdc++43-devel is &lt;4.3.4_20091019-37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582483" version="1" comment="libstdc++43-devel-32bit is &lt;4.3.4_20091019-37.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582484" version="1" comment="libatomic1 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582485" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582486" version="1" comment="libffi4 is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582487" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582488" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582489" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582490" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582491" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582492" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582493" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582494" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1 for i586,ia64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582495" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582496" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582497" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582498" version="1" comment="gd is &lt;2.0.36.RC1-52.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582499" version="1" comment="gd is &lt;2.0.36.RC1-52.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582500" version="1" comment="gd is &lt;2.0.36.RC1-52.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582501" version="1" comment="gd is &lt;2.0.36.RC1-52.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582502" version="1" comment="gd is &lt;2.0.36.RC1-52.33.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582503" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582504" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582505" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582506" version="1" comment="ghostscript-library is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582507" version="1" comment="ghostscript-omni is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582508" version="1" comment="ghostscript-x11 is &lt;8.62-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582509" version="1" comment="libgimpprint is &lt;4.2.7-32.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582510" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582511" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582512" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582513" version="1" comment="ghostscript-library is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582514" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582515" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582516" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582517" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582518" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582519" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582520" version="1" comment="ghostscript-library is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582521" version="1" comment="ghostscript-omni is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582522" version="1" comment="ghostscript-x11 is &lt;8.62-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582523" version="1" comment="libgimpprint is &lt;4.2.7-32.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582524" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582525" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582526" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582527" version="1" comment="ghostscript-library is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582528" version="1" comment="ghostscript-omni is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582529" version="1" comment="ghostscript-x11 is &lt;8.62-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582530" version="1" comment="libgimpprint is &lt;4.2.7-32.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582531" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582532" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582533" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582534" version="1" comment="ghostscript-library is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582535" version="1" comment="ghostscript-omni is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582536" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582537" version="1" comment="libgimpprint is &lt;4.2.7-32.47.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582538" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582539" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582540" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582541" version="1" comment="ghostscript-library is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582542" version="1" comment="ghostscript-omni is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582543" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582544" version="1" comment="libgimpprint is &lt;4.2.7-32.47.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582545" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582546" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582547" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582548" version="1" comment="ghostscript-library is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582549" version="1" comment="ghostscript-omni is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582550" version="1" comment="ghostscript-x11 is &lt;8.62-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582551" version="1" comment="libgimpprint is &lt;4.2.7-32.47.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582552" version="1" comment="ghostscript-fonts-other is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582553" version="1" comment="ghostscript-fonts-rus is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582554" version="1" comment="ghostscript-fonts-std is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582555" version="1" comment="ghostscript-library is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582556" version="1" comment="ghostscript-omni is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582557" version="1" comment="ghostscript-x11 is &lt;8.62-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582558" version="1" comment="libgimpprint is &lt;4.2.7-47.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582559" version="1" comment="giflib is &lt;4.1.6-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582560" version="1" comment="giflib-32bit is &lt;4.1.6-21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582561" version="1" comment="giflib-progs is &lt;4.1.6-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582562" version="1" comment="giflib-x86 is &lt;4.1.6-21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582563" version="1" comment="glib2 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582564" version="1" comment="glib2-doc is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582565" version="1" comment="glib2-lang is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582566" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582567" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582568" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582569" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582570" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582571" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582572" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582573" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582574" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582575" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582576" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582577" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582578" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582579" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582580" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.36.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582581" version="1" comment="glib2 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582582" version="1" comment="glib2-doc is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582583" version="1" comment="glib2-lang is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582584" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582585" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582586" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582587" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582588" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582589" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582590" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582591" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582592" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.39.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582593" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582594" version="1" comment="glibc is &lt;2.11.3-17.102.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582595" version="1" comment="glibc-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582596" version="1" comment="glibc-devel is &lt;2.11.3-17.102.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582597" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582598" version="1" comment="glibc-html is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582599" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582600" version="1" comment="glibc-info is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582601" version="1" comment="glibc-locale is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582602" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582603" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.102.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582604" version="1" comment="glibc-profile is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582605" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582606" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.102.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582607" version="1" comment="glibc-x86 is &lt;2.11.3-17.102.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582608" version="1" comment="nscd is &lt;2.11.3-17.102.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582609" version="1" comment="glibc is &lt;2.11.3-17.109.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582610" version="1" comment="glibc-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582611" version="1" comment="glibc-devel is &lt;2.11.3-17.109.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582612" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582613" version="1" comment="glibc-html is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582614" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582615" version="1" comment="glibc-info is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582616" version="1" comment="glibc-locale is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582617" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582618" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582619" version="1" comment="glibc-profile is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582620" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582621" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582622" version="1" comment="glibc-x86 is &lt;2.11.3-17.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582623" version="1" comment="nscd is &lt;2.11.3-17.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582624" version="1" comment="glibc is &lt;2.11.3-17.110.3.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582625" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582626" version="1" comment="glibc-devel is &lt;2.11.3-17.110.3.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582627" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582628" version="1" comment="glibc-html is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582629" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582630" version="1" comment="glibc-info is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582631" version="1" comment="glibc-locale is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582632" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582633" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582634" version="1" comment="glibc-profile is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582635" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582636" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582637" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582638" version="1" comment="nscd is &lt;2.11.3-17.110.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582639" version="1" comment="glibc is &lt;2.11.3-17.110.6.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582640" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582641" version="1" comment="glibc-devel is &lt;2.11.3-17.110.6.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582642" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582643" version="1" comment="glibc-html is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582644" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582645" version="1" comment="glibc-info is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582646" version="1" comment="glibc-locale is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582647" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582648" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582649" version="1" comment="glibc-profile is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582650" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582651" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582652" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582653" version="1" comment="nscd is &lt;2.11.3-17.110.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582654" version="1" comment="glibc is &lt;2.11.3-17.110.9.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582655" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582656" version="1" comment="glibc-devel is &lt;2.11.3-17.110.9.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582657" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582658" version="1" comment="glibc-html is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582659" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582660" version="1" comment="glibc-info is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582661" version="1" comment="glibc-locale is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582662" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582663" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.9.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582664" version="1" comment="glibc-profile is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582665" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.9.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582666" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.9.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582667" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.9.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582668" version="1" comment="nscd is &lt;2.11.3-17.110.9.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582669" version="1" comment="glibc is &lt;2.11.3-17.110.14.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582670" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582671" version="1" comment="glibc-devel is &lt;2.11.3-17.110.14.1 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582672" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582673" version="1" comment="glibc-html is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582674" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582675" version="1" comment="glibc-info is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582676" version="1" comment="glibc-locale is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582677" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582678" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582679" version="1" comment="glibc-profile is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582680" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582681" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582682" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582683" version="1" comment="nscd is &lt;2.11.3-17.110.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582684" version="1" comment="glibc is &lt;2.11.3-17.110.19.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582685" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582686" version="1" comment="glibc-devel is &lt;2.11.3-17.110.19.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582687" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582688" version="1" comment="glibc-html is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582689" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582690" version="1" comment="glibc-info is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582691" version="1" comment="glibc-locale is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582692" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582693" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582694" version="1" comment="glibc-profile is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582695" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582696" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582697" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.19.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582698" version="1" comment="nscd is &lt;2.11.3-17.110.19.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582699" version="1" comment="glibc is &lt;2.11.3-17.110.24.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582700" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582701" version="1" comment="glibc-devel is &lt;2.11.3-17.110.24.2 for i586,i686,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582702" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582703" version="1" comment="glibc-html is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582704" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582705" version="1" comment="glibc-info is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582706" version="1" comment="glibc-locale is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582707" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582708" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.110.24.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582709" version="1" comment="glibc-profile is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582710" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.24.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582711" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.110.24.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582712" version="1" comment="glibc-x86 is &lt;2.11.3-17.110.24.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582713" version="1" comment="nscd is &lt;2.11.3-17.110.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582714" version="1" comment="glibc is &lt;2.11.3-17.110.33.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582715" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582716" version="1" comment="glibc-devel is &lt;2.11.3-17.110.33.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582717" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582718" version="1" comment="glibc-html is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582719" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582720" version="1" comment="glibc-info is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582721" version="1" comment="glibc-locale is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582722" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582723" version="1" comment="glibc-profile is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582724" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582725" version="1" comment="nscd is &lt;2.11.3-17.110.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634760" version="1" comment="glibc is &lt;2.11.3-17.110.37.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634761" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634762" version="1" comment="glibc-devel is &lt;2.11.3-17.110.37.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634763" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634764" version="1" comment="glibc-html is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634765" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634766" version="1" comment="glibc-info is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634767" version="1" comment="glibc-locale is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634768" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634769" version="1" comment="glibc-profile is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634770" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634771" version="1" comment="nscd is &lt;2.11.3-17.110.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673424" version="1" comment="glibc is &lt;2.11.3-17.110.40.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673425" version="1" comment="glibc-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673426" version="1" comment="glibc-devel is &lt;2.11.3-17.110.40.1 for i586,i686,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673427" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673428" version="1" comment="glibc-html is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673429" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673430" version="1" comment="glibc-info is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673431" version="1" comment="glibc-locale is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673432" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673433" version="1" comment="glibc-profile is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673434" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.110.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673435" version="1" comment="nscd is &lt;2.11.3-17.110.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582726" version="1" comment="gnome-session is &lt;2.28.0-3.11.12.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582727" version="1" comment="gnome-session-lang is &lt;2.28.0-3.11.12.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582728" version="1" comment="gnutls is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582729" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582730" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582731" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.67.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582732" version="1" comment="gnutls is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582733" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.70.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582734" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.70.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582735" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.70.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582736" version="1" comment="gpg2 is &lt;2.0.9-25.33.42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582737" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.42.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582738" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582739" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582740" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582741" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582742" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.66.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582743" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.66.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582744" version="1" comment="grub2-x86_64-efi is &lt;2.02-0.66.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582745" version="1" comment="grub2-x86_64-xen is &lt;2.02-0.66.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582746" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582747" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582748" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582749" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582750" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582751" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582752" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582753" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582754" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582755" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582756" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.17.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582757" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582758" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.18.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582759" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582760" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582761" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582762" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582763" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.18.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582764" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.18.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582765" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582766" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582767" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582768" version="1" comment="gtk2 is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582769" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582770" version="1" comment="gtk2-doc is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582771" version="1" comment="gtk2-lang is &lt;2.18.9-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582772" version="1" comment="gtk2-x86 is &lt;2.18.9-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582773" version="1" comment="gtk2 is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582774" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582775" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582776" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582777" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582778" version="1" comment="gtk2 is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582779" version="1" comment="gtk2-32bit is &lt;2.18.9-0.45.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582780" version="1" comment="gtk2-doc is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582781" version="1" comment="gtk2-lang is &lt;2.18.9-0.45.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582782" version="1" comment="gtk2-x86 is &lt;2.18.9-0.45.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582783" version="1" comment="guile is &lt;1.8.5-24.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582784" version="1" comment="libicu is &lt;4.0-7.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582785" version="1" comment="libicu-32bit is &lt;4.0-7.30.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582786" version="1" comment="libicu-doc is &lt;4.0-7.30.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582787" version="1" comment="libicu-x86 is &lt;4.0-7.30.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582788" version="1" comment="libicu is &lt;4.0-38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582789" version="1" comment="libicu-32bit is &lt;4.0-38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582790" version="1" comment="libicu-doc is &lt;4.0-38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582791" version="1" comment="libicu-x86 is &lt;4.0-38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582792" version="1" comment="libicu is &lt;4.0-43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582793" version="1" comment="libicu-32bit is &lt;4.0-43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582794" version="1" comment="libicu-doc is &lt;4.0-43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582795" version="1" comment="libicu-x86 is &lt;4.0-43.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582796" version="1" comment="libicu is &lt;4.0-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582797" version="1" comment="libicu-32bit is &lt;4.0-46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582798" version="1" comment="libicu-doc is &lt;4.0-46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582799" version="1" comment="libicu-x86 is &lt;4.0-46.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582800" version="1" comment="libicu is &lt;4.0-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582801" version="1" comment="libicu-32bit is &lt;4.0-47.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582802" version="1" comment="libicu-doc is &lt;4.0-47.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582803" version="1" comment="libicu-x86 is &lt;4.0-47.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582804" version="1" comment="inn is &lt;2.4.2-170.21.3.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582805" version="1" comment="ipmitool is &lt;1.8.15-0.30.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582806" version="1" comment="ipsec-tools is &lt;0.7.3-1.38.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582807" version="1" comment="libjasper is &lt;1.900.14-134.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582808" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582809" version="1" comment="libjasper-x86 is &lt;1.900.14-134.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582810" version="1" comment="libjasper is &lt;1.900.14-134.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582811" version="1" comment="libjasper-32bit is &lt;1.900.14-134.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582812" version="1" comment="libjasper-x86 is &lt;1.900.14-134.32.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582813" version="1" comment="libjasper is &lt;1.900.14-134.33.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582814" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582815" version="1" comment="libjasper-x86 is &lt;1.900.14-134.33.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582816" version="1" comment="libjasper is &lt;1.900.14-134.33.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582817" version="1" comment="libjasper-32bit is &lt;1.900.14-134.33.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582818" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582819" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582820" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582821" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582822" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582823" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582824" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582825" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582826" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582827" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582828" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582829" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582830" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582831" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582832" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582833" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582834" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582835" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582836" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582837" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582838" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582839" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582840" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-22.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582841" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582842" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582843" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582844" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582845" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582846" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-26.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582847" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-26.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582848" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-26.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582849" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-26.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582850" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-26.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582851" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-26.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582852" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-26.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582853" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-26.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582854" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-26.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582855" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582856" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-26.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582857" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-26.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582858" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-26.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582859" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582860" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-26.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582861" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582862" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-26.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582863" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-26.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582864" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-26.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582865" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-26.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582866" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-26.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582867" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-26.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-26.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582869" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-26.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582870" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582871" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-26.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582872" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-26.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582873" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-26.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582874" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-26.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582875" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582876" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-26.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582877" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-26.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582878" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582879" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-26.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582880" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-26.44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582881" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-26.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582882" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-26.44.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582883" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-26.44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582884" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-26.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582885" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.55-26.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582886" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-26.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582887" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-26.47.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582888" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.55-26.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582889" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-26.50.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582890" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.60-26.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582891" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-26.50.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582892" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-26.50.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582893" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.60-26.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582894" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-26.55.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582895" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.65-26.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582896" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-26.55.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582897" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-26.55.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582898" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.65-26.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582899" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-26.58.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582900" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.70-26.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582901" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-26.58.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582902" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-26.58.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582903" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.70-26.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582904" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-26.62.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582905" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.75-26.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582906" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-26.62.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582907" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-26.62.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582908" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.75-26.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582909" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-26.65.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582910" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.80-26.65.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582911" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-26.65.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582912" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-26.65.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582913" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.80-26.65.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662529" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.0-26.68.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662530" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.0-26.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662531" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.0-26.68.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662532" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.0-26.68.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662533" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.0-26.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674107" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.5-26.71.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674108" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.5-26.71.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674109" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.5-26.71.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674110" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.5-26.71.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674111" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.5-26.71.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582914" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582915" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582916" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582917" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582918" version="1" comment="jpeg is &lt;6b-879.12.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582919" version="1" comment="libjpeg is &lt;6.2.0-879.12.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582920" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582921" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582922" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582923" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582924" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582925" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582926" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582927" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582928" version="1" comment="kernel-default is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582929" version="1" comment="kernel-default-base is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582930" version="1" comment="kernel-default-devel is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582931" version="1" comment="kernel-default-man is &lt;3.0.101-80.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582932" version="1" comment="kernel-ec2 is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582933" version="1" comment="kernel-ec2-base is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582934" version="1" comment="kernel-ec2-devel is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582935" version="1" comment="kernel-pae is &lt;3.0.101-80.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582936" version="1" comment="kernel-pae-base is &lt;3.0.101-80.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582937" version="1" comment="kernel-pae-devel is &lt;3.0.101-80.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582938" version="1" comment="kernel-ppc64 is &lt;3.0.101-80.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582939" version="1" comment="kernel-ppc64-base is &lt;3.0.101-80.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582940" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-80.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582941" version="1" comment="kernel-source is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582942" version="1" comment="kernel-syms is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582943" version="1" comment="kernel-trace is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582944" version="1" comment="kernel-trace-base is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582945" version="1" comment="kernel-trace-devel is &lt;3.0.101-80.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582946" version="1" comment="kernel-xen is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582947" version="1" comment="kernel-xen-base is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582948" version="1" comment="kernel-xen-devel is &lt;3.0.101-80.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582949" version="1" comment="kernel-bigmem is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582950" version="1" comment="kernel-bigmem-base is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582951" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582952" version="1" comment="kernel-default is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582953" version="1" comment="kernel-default-base is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582954" version="1" comment="kernel-default-devel is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582955" version="1" comment="kernel-default-man is &lt;3.0.101-88.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582956" version="1" comment="kernel-ec2 is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582957" version="1" comment="kernel-ec2-base is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582958" version="1" comment="kernel-ec2-devel is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582959" version="1" comment="kernel-pae is &lt;3.0.101-88.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582960" version="1" comment="kernel-pae-base is &lt;3.0.101-88.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582961" version="1" comment="kernel-pae-devel is &lt;3.0.101-88.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582962" version="1" comment="kernel-ppc64 is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582963" version="1" comment="kernel-ppc64-base is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582964" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-88.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582965" version="1" comment="kernel-source is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582966" version="1" comment="kernel-syms is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582967" version="1" comment="kernel-trace is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582968" version="1" comment="kernel-trace-base is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582969" version="1" comment="kernel-trace-devel is &lt;3.0.101-88.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582970" version="1" comment="kernel-xen is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582971" version="1" comment="kernel-xen-base is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582972" version="1" comment="kernel-xen-devel is &lt;3.0.101-88.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582973" version="1" comment="kernel-bigmem is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582974" version="1" comment="kernel-bigmem-base is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582975" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582976" version="1" comment="kernel-default is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582977" version="1" comment="kernel-default-base is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582978" version="1" comment="kernel-default-devel is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582979" version="1" comment="kernel-default-man is &lt;3.0.101-94.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582980" version="1" comment="kernel-ec2 is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582981" version="1" comment="kernel-ec2-base is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582982" version="1" comment="kernel-ec2-devel is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582983" version="1" comment="kernel-pae is &lt;3.0.101-94.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582984" version="1" comment="kernel-pae-base is &lt;3.0.101-94.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582985" version="1" comment="kernel-pae-devel is &lt;3.0.101-94.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582986" version="1" comment="kernel-ppc64 is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582987" version="1" comment="kernel-ppc64-base is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582988" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-94.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582989" version="1" comment="kernel-source is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582990" version="1" comment="kernel-syms is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582991" version="1" comment="kernel-trace is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582992" version="1" comment="kernel-trace-base is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582993" version="1" comment="kernel-trace-devel is &lt;3.0.101-94.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582994" version="1" comment="kernel-xen is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582995" version="1" comment="kernel-xen-base is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582996" version="1" comment="kernel-xen-devel is &lt;3.0.101-94.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582997" version="1" comment="kernel-bigmem is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582998" version="1" comment="kernel-bigmem-base is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009582999" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583000" version="1" comment="kernel-default is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583001" version="1" comment="kernel-default-base is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583002" version="1" comment="kernel-default-devel is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583003" version="1" comment="kernel-default-man is &lt;3.0.101-97.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583004" version="1" comment="kernel-ec2 is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583005" version="1" comment="kernel-ec2-base is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583006" version="1" comment="kernel-ec2-devel is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583007" version="1" comment="kernel-pae is &lt;3.0.101-97.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583008" version="1" comment="kernel-pae-base is &lt;3.0.101-97.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583009" version="1" comment="kernel-pae-devel is &lt;3.0.101-97.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583010" version="1" comment="kernel-ppc64 is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583011" version="1" comment="kernel-ppc64-base is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583012" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-97.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583013" version="1" comment="kernel-source is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583014" version="1" comment="kernel-syms is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583015" version="1" comment="kernel-trace is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583016" version="1" comment="kernel-trace-base is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583017" version="1" comment="kernel-trace-devel is &lt;3.0.101-97.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583018" version="1" comment="kernel-xen is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583019" version="1" comment="kernel-xen-base is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583020" version="1" comment="kernel-xen-devel is &lt;3.0.101-97.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583021" version="1" comment="kernel-bigmem is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583022" version="1" comment="kernel-bigmem-base is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583023" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583024" version="1" comment="kernel-default is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583025" version="1" comment="kernel-default-base is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583026" version="1" comment="kernel-default-devel is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583027" version="1" comment="kernel-default-man is &lt;3.0.101-104.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583028" version="1" comment="kernel-ec2 is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583029" version="1" comment="kernel-ec2-base is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583030" version="1" comment="kernel-ec2-devel is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583031" version="1" comment="kernel-pae is &lt;3.0.101-104.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583032" version="1" comment="kernel-pae-base is &lt;3.0.101-104.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583033" version="1" comment="kernel-pae-devel is &lt;3.0.101-104.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583034" version="1" comment="kernel-ppc64 is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583035" version="1" comment="kernel-ppc64-base is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583036" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-104.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583037" version="1" comment="kernel-source is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583038" version="1" comment="kernel-syms is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583039" version="1" comment="kernel-trace is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583040" version="1" comment="kernel-trace-base is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583041" version="1" comment="kernel-trace-devel is &lt;3.0.101-104.2 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583042" version="1" comment="kernel-xen is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583043" version="1" comment="kernel-xen-base is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583044" version="1" comment="kernel-xen-devel is &lt;3.0.101-104.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583045" version="1" comment="kernel-bigmem is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583046" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583047" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583048" version="1" comment="kernel-default is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583049" version="1" comment="kernel-default-base is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583050" version="1" comment="kernel-default-devel is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583051" version="1" comment="kernel-default-man is &lt;3.0.101-108.7.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583052" version="1" comment="kernel-ec2 is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583053" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583054" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583055" version="1" comment="kernel-pae is &lt;3.0.101-108.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583056" version="1" comment="kernel-pae-base is &lt;3.0.101-108.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583057" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583058" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583059" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583060" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583061" version="1" comment="kernel-source is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583062" version="1" comment="kernel-syms is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583063" version="1" comment="kernel-trace is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583064" version="1" comment="kernel-trace-base is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583065" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583066" version="1" comment="kernel-xen is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583067" version="1" comment="kernel-xen-base is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583068" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583069" version="1" comment="kernel-bigmem is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583070" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583071" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583072" version="1" comment="kernel-default is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583073" version="1" comment="kernel-default-base is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583074" version="1" comment="kernel-default-devel is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583075" version="1" comment="kernel-default-man is &lt;3.0.101-108.13.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583076" version="1" comment="kernel-ec2 is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583077" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583078" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583079" version="1" comment="kernel-pae is &lt;3.0.101-108.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583080" version="1" comment="kernel-pae-base is &lt;3.0.101-108.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583081" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.13.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583082" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583083" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583084" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.13.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583085" version="1" comment="kernel-source is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583086" version="1" comment="kernel-syms is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583087" version="1" comment="kernel-trace is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583088" version="1" comment="kernel-trace-base is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583089" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.13.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583090" version="1" comment="kernel-xen is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583091" version="1" comment="kernel-xen-base is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583092" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.13.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583093" version="1" comment="kernel-bigmem is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583094" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583095" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583096" version="1" comment="kernel-default is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583097" version="1" comment="kernel-default-base is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583098" version="1" comment="kernel-default-devel is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583099" version="1" comment="kernel-default-man is &lt;3.0.101-108.71.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583100" version="1" comment="kernel-ec2 is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583101" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583102" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583103" version="1" comment="kernel-pae is &lt;3.0.101-108.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583104" version="1" comment="kernel-pae-base is &lt;3.0.101-108.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583105" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583106" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583107" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583108" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583109" version="1" comment="kernel-source is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583110" version="1" comment="kernel-syms is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583111" version="1" comment="kernel-trace is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583112" version="1" comment="kernel-trace-base is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583113" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583114" version="1" comment="kernel-xen is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583115" version="1" comment="kernel-xen-base is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583116" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657593" version="1" comment="kernel-bigmem is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657594" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657595" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657596" version="1" comment="kernel-default is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657597" version="1" comment="kernel-default-base is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657598" version="1" comment="kernel-default-devel is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657599" version="1" comment="kernel-default-man is &lt;3.0.101-108.132.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657600" version="1" comment="kernel-ec2 is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657601" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657602" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657603" version="1" comment="kernel-pae is &lt;3.0.101-108.132.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657604" version="1" comment="kernel-pae-base is &lt;3.0.101-108.132.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657605" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.132.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657606" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657607" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657608" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.132.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657609" version="1" comment="kernel-source is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657610" version="1" comment="kernel-syms is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657611" version="1" comment="kernel-trace is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657612" version="1" comment="kernel-trace-base is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657613" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.132.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657614" version="1" comment="kernel-xen is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657615" version="1" comment="kernel-xen-base is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657616" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.132.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671856" version="1" comment="kernel-bigmem is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671857" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671858" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671859" version="1" comment="kernel-default is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671860" version="1" comment="kernel-default-base is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671861" version="1" comment="kernel-default-devel is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671862" version="1" comment="kernel-default-man is &lt;3.0.101-108.135.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671863" version="1" comment="kernel-ec2 is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671864" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671865" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671866" version="1" comment="kernel-pae is &lt;3.0.101-108.135.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671867" version="1" comment="kernel-pae-base is &lt;3.0.101-108.135.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671868" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.135.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671869" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671870" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671871" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.135.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671872" version="1" comment="kernel-source is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671873" version="1" comment="kernel-syms is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671874" version="1" comment="kernel-trace is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671875" version="1" comment="kernel-trace-base is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671876" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.135.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671877" version="1" comment="kernel-xen is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671878" version="1" comment="kernel-xen-base is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671879" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.135.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583117" version="1" comment="kernel-default is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583118" version="1" comment="kernel-default-base is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583119" version="1" comment="kernel-default-devel is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583120" version="1" comment="kernel-default-man is &lt;3.0.101-65.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583121" version="1" comment="kernel-ec2 is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583122" version="1" comment="kernel-ec2-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583123" version="1" comment="kernel-ec2-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583124" version="1" comment="kernel-ppc64 is &lt;3.0.101-65.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583125" version="1" comment="kernel-ppc64-base is &lt;3.0.101-65.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583126" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-65.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583127" version="1" comment="kernel-source is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583128" version="1" comment="kernel-syms is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583129" version="1" comment="kernel-trace is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583130" version="1" comment="kernel-trace-base is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583131" version="1" comment="kernel-trace-devel is &lt;3.0.101-65.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583132" version="1" comment="kernel-default is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583133" version="1" comment="kernel-default-base is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583134" version="1" comment="kernel-default-devel is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583135" version="1" comment="kernel-default-man is &lt;3.0.101-71.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583136" version="1" comment="kernel-ec2 is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583137" version="1" comment="kernel-ec2-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583138" version="1" comment="kernel-ec2-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583139" version="1" comment="kernel-ppc64 is &lt;3.0.101-71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583140" version="1" comment="kernel-ppc64-base is &lt;3.0.101-71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583141" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-71.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583142" version="1" comment="kernel-source is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583143" version="1" comment="kernel-syms is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583144" version="1" comment="kernel-trace is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583145" version="1" comment="kernel-trace-base is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583146" version="1" comment="kernel-trace-devel is &lt;3.0.101-71.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583147" version="1" comment="kernel-bigmem is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583148" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583149" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583150" version="1" comment="kernel-default is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583151" version="1" comment="kernel-default-base is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583152" version="1" comment="kernel-default-devel is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583153" version="1" comment="kernel-default-man is &lt;3.0.101-108.18.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583154" version="1" comment="kernel-ec2 is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583155" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583156" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583157" version="1" comment="kernel-pae is &lt;3.0.101-108.18.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583158" version="1" comment="kernel-pae-base is &lt;3.0.101-108.18.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583159" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.18.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583160" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583161" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583162" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.18.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583163" version="1" comment="kernel-source is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583164" version="1" comment="kernel-syms is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583165" version="1" comment="kernel-trace is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583166" version="1" comment="kernel-trace-base is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583167" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.18.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583168" version="1" comment="kernel-xen is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583169" version="1" comment="kernel-xen-base is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583170" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.18.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583171" version="1" comment="kernel-bigmem is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583172" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583173" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583174" version="1" comment="kernel-default is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583175" version="1" comment="kernel-default-base is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583176" version="1" comment="kernel-default-devel is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583177" version="1" comment="kernel-default-man is &lt;3.0.101-108.21.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583178" version="1" comment="kernel-ec2 is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583179" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583180" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583181" version="1" comment="kernel-pae is &lt;3.0.101-108.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583182" version="1" comment="kernel-pae-base is &lt;3.0.101-108.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583183" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583184" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583185" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583186" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.21.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583187" version="1" comment="kernel-source is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583188" version="1" comment="kernel-syms is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583189" version="1" comment="kernel-trace is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583190" version="1" comment="kernel-trace-base is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583191" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.21.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583192" version="1" comment="kernel-xen is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583193" version="1" comment="kernel-xen-base is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583194" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583195" version="1" comment="kernel-default is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583196" version="1" comment="kernel-default-base is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583197" version="1" comment="kernel-default-devel is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583198" version="1" comment="kernel-default-man is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583199" version="1" comment="kernel-source is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583200" version="1" comment="kernel-syms is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583201" version="1" comment="kernel-trace is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583202" version="1" comment="kernel-trace-base is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583203" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.24.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583204" version="1" comment="kernel-bigmem is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583205" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583206" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583207" version="1" comment="kernel-default is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583208" version="1" comment="kernel-default-base is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583209" version="1" comment="kernel-default-devel is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583210" version="1" comment="kernel-default-man is &lt;3.0.101-108.35.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583211" version="1" comment="kernel-ec2 is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583212" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583213" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583214" version="1" comment="kernel-pae is &lt;3.0.101-108.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583215" version="1" comment="kernel-pae-base is &lt;3.0.101-108.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583216" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.35.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583217" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583218" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583219" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.35.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583220" version="1" comment="kernel-source is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583221" version="1" comment="kernel-syms is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583222" version="1" comment="kernel-trace is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583223" version="1" comment="kernel-trace-base is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583224" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.35.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583225" version="1" comment="kernel-xen is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583226" version="1" comment="kernel-xen-base is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583227" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583228" version="1" comment="kernel-bigmem is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583229" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583230" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583231" version="1" comment="kernel-default is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583232" version="1" comment="kernel-default-base is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583233" version="1" comment="kernel-default-devel is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583234" version="1" comment="kernel-default-man is &lt;3.0.101-108.48.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583235" version="1" comment="kernel-ec2 is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583236" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583237" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583238" version="1" comment="kernel-pae is &lt;3.0.101-108.48.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583239" version="1" comment="kernel-pae-base is &lt;3.0.101-108.48.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583240" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.48.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583241" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583242" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583243" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.48.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583244" version="1" comment="kernel-source is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583245" version="1" comment="kernel-syms is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583246" version="1" comment="kernel-trace is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583247" version="1" comment="kernel-trace-base is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583248" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.48.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583249" version="1" comment="kernel-xen is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583250" version="1" comment="kernel-xen-base is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583251" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.48.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583252" version="1" comment="kernel-bigmem is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583253" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583254" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583255" version="1" comment="kernel-default is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583256" version="1" comment="kernel-default-base is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583257" version="1" comment="kernel-default-devel is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583258" version="1" comment="kernel-default-man is &lt;3.0.101-108.52.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583259" version="1" comment="kernel-ec2 is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583260" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583261" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583262" version="1" comment="kernel-pae is &lt;3.0.101-108.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583263" version="1" comment="kernel-pae-base is &lt;3.0.101-108.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583264" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583265" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583266" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583267" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.52.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583268" version="1" comment="kernel-source is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583269" version="1" comment="kernel-syms is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583270" version="1" comment="kernel-trace is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583271" version="1" comment="kernel-trace-base is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583272" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.52.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583273" version="1" comment="kernel-xen is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583274" version="1" comment="kernel-xen-base is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583275" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583276" version="1" comment="kernel-bigmem is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583277" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583278" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583279" version="1" comment="kernel-default is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583280" version="1" comment="kernel-default-base is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583281" version="1" comment="kernel-default-devel is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583282" version="1" comment="kernel-default-man is &lt;3.0.101-108.68.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583283" version="1" comment="kernel-ec2 is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583284" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583285" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583286" version="1" comment="kernel-pae is &lt;3.0.101-108.68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583287" version="1" comment="kernel-pae-base is &lt;3.0.101-108.68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583288" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583289" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583290" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583291" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583292" version="1" comment="kernel-source is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583293" version="1" comment="kernel-syms is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583294" version="1" comment="kernel-trace is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583295" version="1" comment="kernel-trace-base is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583296" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583297" version="1" comment="kernel-xen is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583298" version="1" comment="kernel-xen-base is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583299" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583300" version="1" comment="kernel-bigmem is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583301" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583302" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583303" version="1" comment="kernel-default is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583304" version="1" comment="kernel-default-base is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583305" version="1" comment="kernel-default-devel is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583306" version="1" comment="kernel-default-man is &lt;3.0.101-108.77.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583307" version="1" comment="kernel-ec2 is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583308" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583309" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583310" version="1" comment="kernel-pae is &lt;3.0.101-108.77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583311" version="1" comment="kernel-pae-base is &lt;3.0.101-108.77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583312" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583313" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583314" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583315" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583316" version="1" comment="kernel-source is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583317" version="1" comment="kernel-syms is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583318" version="1" comment="kernel-trace is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583319" version="1" comment="kernel-trace-base is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583320" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583321" version="1" comment="kernel-xen is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583322" version="1" comment="kernel-xen-base is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583323" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583324" version="1" comment="kernel-bigmem is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583325" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583326" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583327" version="1" comment="kernel-default is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583328" version="1" comment="kernel-default-base is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583329" version="1" comment="kernel-default-devel is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583330" version="1" comment="kernel-default-man is &lt;3.0.101-108.87.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583331" version="1" comment="kernel-ec2 is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583332" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583333" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583334" version="1" comment="kernel-pae is &lt;3.0.101-108.87.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583335" version="1" comment="kernel-pae-base is &lt;3.0.101-108.87.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583336" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.87.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583337" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583338" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583339" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.87.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583340" version="1" comment="kernel-source is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583341" version="1" comment="kernel-syms is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583342" version="1" comment="kernel-trace is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583343" version="1" comment="kernel-trace-base is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583344" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.87.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583345" version="1" comment="kernel-xen is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583346" version="1" comment="kernel-xen-base is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583347" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.87.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583348" version="1" comment="kernel-bigmem is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583349" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583350" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583351" version="1" comment="kernel-default is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583352" version="1" comment="kernel-default-base is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583353" version="1" comment="kernel-default-devel is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583354" version="1" comment="kernel-default-man is &lt;3.0.101-108.90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583355" version="1" comment="kernel-ec2 is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583356" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583357" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583358" version="1" comment="kernel-pae is &lt;3.0.101-108.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583359" version="1" comment="kernel-pae-base is &lt;3.0.101-108.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583360" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.90.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583361" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583362" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583363" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.90.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583364" version="1" comment="kernel-source is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583365" version="1" comment="kernel-syms is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583366" version="1" comment="kernel-trace is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583367" version="1" comment="kernel-trace-base is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583368" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.90.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583369" version="1" comment="kernel-xen is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583370" version="1" comment="kernel-xen-base is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583371" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.90.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583372" version="1" comment="kernel-firmware is &lt;20110923-0.59.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583373" version="1" comment="kernel-default is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583374" version="1" comment="kernel-default-base is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583375" version="1" comment="kernel-default-devel is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583376" version="1" comment="kernel-default-man is &lt;3.0.101-68.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583377" version="1" comment="kernel-ec2 is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583378" version="1" comment="kernel-ec2-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583379" version="1" comment="kernel-ec2-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583380" version="1" comment="kernel-ppc64 is &lt;3.0.101-68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583381" version="1" comment="kernel-ppc64-base is &lt;3.0.101-68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583382" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-68.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583383" version="1" comment="kernel-source is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583384" version="1" comment="kernel-syms is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583385" version="1" comment="kernel-trace is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583386" version="1" comment="kernel-trace-base is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583387" version="1" comment="kernel-trace-devel is &lt;3.0.101-68.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583388" version="1" comment="kernel-default is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583389" version="1" comment="kernel-default-base is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583390" version="1" comment="kernel-default-devel is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583391" version="1" comment="kernel-default-man is &lt;3.0.101-77.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583392" version="1" comment="kernel-ec2 is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583393" version="1" comment="kernel-ec2-base is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583394" version="1" comment="kernel-ec2-devel is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583395" version="1" comment="kernel-pae is &lt;3.0.101-77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583396" version="1" comment="kernel-pae-base is &lt;3.0.101-77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583397" version="1" comment="kernel-pae-devel is &lt;3.0.101-77.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583398" version="1" comment="kernel-ppc64 is &lt;3.0.101-77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583399" version="1" comment="kernel-ppc64-base is &lt;3.0.101-77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583400" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-77.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583401" version="1" comment="kernel-source is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583402" version="1" comment="kernel-syms is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583403" version="1" comment="kernel-trace is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583404" version="1" comment="kernel-trace-base is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583405" version="1" comment="kernel-trace-devel is &lt;3.0.101-77.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583406" version="1" comment="kernel-xen is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583407" version="1" comment="kernel-xen-base is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583408" version="1" comment="kernel-xen-devel is &lt;3.0.101-77.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583409" version="1" comment="kernel-default is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583410" version="1" comment="kernel-default-base is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583411" version="1" comment="kernel-default-devel is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583412" version="1" comment="kernel-default-man is &lt;3.0.101-84.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583413" version="1" comment="kernel-ec2 is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583414" version="1" comment="kernel-ec2-base is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583415" version="1" comment="kernel-ec2-devel is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583416" version="1" comment="kernel-pae is &lt;3.0.101-84.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583417" version="1" comment="kernel-pae-base is &lt;3.0.101-84.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583418" version="1" comment="kernel-pae-devel is &lt;3.0.101-84.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583419" version="1" comment="kernel-ppc64 is &lt;3.0.101-84.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583420" version="1" comment="kernel-ppc64-base is &lt;3.0.101-84.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583421" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-84.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583422" version="1" comment="kernel-source is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583423" version="1" comment="kernel-syms is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583424" version="1" comment="kernel-trace is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583425" version="1" comment="kernel-trace-base is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583426" version="1" comment="kernel-trace-devel is &lt;3.0.101-84.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583427" version="1" comment="kernel-xen is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583428" version="1" comment="kernel-xen-base is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583429" version="1" comment="kernel-xen-devel is &lt;3.0.101-84.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583430" version="1" comment="kernel-bigmem is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583431" version="1" comment="kernel-bigmem-base is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583432" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583433" version="1" comment="kernel-default is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583434" version="1" comment="kernel-default-base is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583435" version="1" comment="kernel-default-devel is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583436" version="1" comment="kernel-default-man is &lt;3.0.101-107.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583437" version="1" comment="kernel-ec2 is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583438" version="1" comment="kernel-ec2-base is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583439" version="1" comment="kernel-ec2-devel is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583440" version="1" comment="kernel-pae is &lt;3.0.101-107.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583441" version="1" comment="kernel-pae-base is &lt;3.0.101-107.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583442" version="1" comment="kernel-pae-devel is &lt;3.0.101-107.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583443" version="1" comment="kernel-ppc64 is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583444" version="1" comment="kernel-ppc64-base is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583445" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-107.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583446" version="1" comment="kernel-source is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583447" version="1" comment="kernel-syms is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583448" version="1" comment="kernel-trace is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583449" version="1" comment="kernel-trace-base is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583450" version="1" comment="kernel-trace-devel is &lt;3.0.101-107.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583451" version="1" comment="kernel-xen is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583452" version="1" comment="kernel-xen-base is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583453" version="1" comment="kernel-xen-devel is &lt;3.0.101-107.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583454" version="1" comment="kernel-bigmem is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583455" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583456" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583457" version="1" comment="kernel-default is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583458" version="1" comment="kernel-default-base is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583459" version="1" comment="kernel-default-devel is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583460" version="1" comment="kernel-default-man is &lt;3.0.101-108.10.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583461" version="1" comment="kernel-ec2 is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583462" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583463" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583464" version="1" comment="kernel-pae is &lt;3.0.101-108.10.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583465" version="1" comment="kernel-pae-base is &lt;3.0.101-108.10.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583466" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.10.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583467" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583468" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583469" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.10.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583470" version="1" comment="kernel-source is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583471" version="1" comment="kernel-syms is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583472" version="1" comment="kernel-trace is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583473" version="1" comment="kernel-trace-base is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583474" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.10.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583475" version="1" comment="kernel-xen is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583476" version="1" comment="kernel-xen-base is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583477" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583478" version="1" comment="kernel-bigmem is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583479" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583480" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583481" version="1" comment="kernel-default is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583482" version="1" comment="kernel-default-base is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583483" version="1" comment="kernel-default-devel is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583484" version="1" comment="kernel-default-man is &lt;3.0.101-108.57.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583485" version="1" comment="kernel-ec2 is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583486" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583487" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583488" version="1" comment="kernel-pae is &lt;3.0.101-108.57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583489" version="1" comment="kernel-pae-base is &lt;3.0.101-108.57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583490" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583491" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583492" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583493" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.57.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583494" version="1" comment="kernel-source is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583495" version="1" comment="kernel-syms is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583496" version="1" comment="kernel-trace is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583497" version="1" comment="kernel-trace-base is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583498" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.57.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583499" version="1" comment="kernel-xen is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583500" version="1" comment="kernel-xen-base is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583501" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583502" version="1" comment="kernel-bigmem is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583503" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583504" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583505" version="1" comment="kernel-default is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583506" version="1" comment="kernel-default-base is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583507" version="1" comment="kernel-default-devel is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583508" version="1" comment="kernel-default-man is &lt;3.0.101-108.60.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583509" version="1" comment="kernel-ec2 is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583510" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583511" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583512" version="1" comment="kernel-pae is &lt;3.0.101-108.60.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583513" version="1" comment="kernel-pae-base is &lt;3.0.101-108.60.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583514" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.60.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583515" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583516" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583517" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.60.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583518" version="1" comment="kernel-source is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583519" version="1" comment="kernel-syms is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583520" version="1" comment="kernel-trace is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583521" version="1" comment="kernel-trace-base is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583522" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.60.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583523" version="1" comment="kernel-xen is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583524" version="1" comment="kernel-xen-base is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583525" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.60.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583526" version="1" comment="kernel-bigmem is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583527" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583528" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583529" version="1" comment="kernel-default is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583530" version="1" comment="kernel-default-base is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583531" version="1" comment="kernel-default-devel is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583532" version="1" comment="kernel-default-man is &lt;3.0.101-108.81.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583533" version="1" comment="kernel-ec2 is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583534" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583535" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583536" version="1" comment="kernel-pae is &lt;3.0.101-108.81.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583537" version="1" comment="kernel-pae-base is &lt;3.0.101-108.81.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583538" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.81.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583539" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583540" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583541" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.81.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583542" version="1" comment="kernel-source is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583543" version="1" comment="kernel-syms is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583544" version="1" comment="kernel-trace is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583545" version="1" comment="kernel-trace-base is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583546" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.81.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583547" version="1" comment="kernel-xen is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583548" version="1" comment="kernel-xen-base is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583549" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.81.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583550" version="1" comment="kernel-bigmem is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583551" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583552" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583553" version="1" comment="kernel-default is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583554" version="1" comment="kernel-default-base is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583555" version="1" comment="kernel-default-devel is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583556" version="1" comment="kernel-default-man is &lt;3.0.101-108.95.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583557" version="1" comment="kernel-ec2 is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583558" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583559" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583560" version="1" comment="kernel-pae is &lt;3.0.101-108.95.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583561" version="1" comment="kernel-pae-base is &lt;3.0.101-108.95.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583562" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.95.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583563" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583564" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583565" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.95.2 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583566" version="1" comment="kernel-source is &lt;3.0.101-108.95.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583567" version="1" comment="kernel-syms is &lt;3.0.101-108.95.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583568" version="1" comment="kernel-trace is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583569" version="1" comment="kernel-trace-base is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583570" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.95.2 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583571" version="1" comment="kernel-xen is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583572" version="1" comment="kernel-xen-base is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583573" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.95.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583574" version="1" comment="kernel-bigmem is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583575" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583576" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583577" version="1" comment="kernel-default is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583578" version="1" comment="kernel-default-base is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583579" version="1" comment="kernel-default-devel is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583580" version="1" comment="kernel-default-man is &lt;3.0.101-108.98.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583581" version="1" comment="kernel-ec2 is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583582" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583583" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583584" version="1" comment="kernel-pae is &lt;3.0.101-108.98.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583585" version="1" comment="kernel-pae-base is &lt;3.0.101-108.98.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583586" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.98.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583587" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583588" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583589" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.98.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583590" version="1" comment="kernel-source is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583591" version="1" comment="kernel-syms is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583592" version="1" comment="kernel-trace is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583593" version="1" comment="kernel-trace-base is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583594" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.98.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583595" version="1" comment="kernel-xen is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583596" version="1" comment="kernel-xen-base is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583597" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.98.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583598" version="1" comment="kernel-bigmem is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583599" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583600" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583601" version="1" comment="kernel-default is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583602" version="1" comment="kernel-default-base is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583603" version="1" comment="kernel-default-devel is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583604" version="1" comment="kernel-default-man is &lt;3.0.101-108.101.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583605" version="1" comment="kernel-ec2 is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583606" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583607" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583608" version="1" comment="kernel-pae is &lt;3.0.101-108.101.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583609" version="1" comment="kernel-pae-base is &lt;3.0.101-108.101.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583610" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.101.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583611" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583612" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583613" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.101.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583614" version="1" comment="kernel-source is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583615" version="1" comment="kernel-syms is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583616" version="1" comment="kernel-trace is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583617" version="1" comment="kernel-trace-base is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583618" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.101.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583619" version="1" comment="kernel-xen is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583620" version="1" comment="kernel-xen-base is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583621" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.101.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583622" version="1" comment="kernel-bigmem is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583623" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583624" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583625" version="1" comment="kernel-default is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583626" version="1" comment="kernel-default-base is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583627" version="1" comment="kernel-default-devel is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583628" version="1" comment="kernel-default-man is &lt;3.0.101-108.108.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583629" version="1" comment="kernel-ec2 is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583630" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583631" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583632" version="1" comment="kernel-pae is &lt;3.0.101-108.108.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583633" version="1" comment="kernel-pae-base is &lt;3.0.101-108.108.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583634" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.108.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583635" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583636" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583637" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.108.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583638" version="1" comment="kernel-source is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583639" version="1" comment="kernel-syms is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583640" version="1" comment="kernel-trace is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583641" version="1" comment="kernel-trace-base is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583642" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.108.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583643" version="1" comment="kernel-xen is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583644" version="1" comment="kernel-xen-base is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583645" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.108.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583646" version="1" comment="kernel-bigmem is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583647" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583648" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583649" version="1" comment="kernel-default is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583650" version="1" comment="kernel-default-base is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583651" version="1" comment="kernel-default-devel is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583652" version="1" comment="kernel-default-man is &lt;3.0.101-108.111.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583653" version="1" comment="kernel-ec2 is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583654" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583655" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583656" version="1" comment="kernel-pae is &lt;3.0.101-108.111.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583657" version="1" comment="kernel-pae-base is &lt;3.0.101-108.111.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583658" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.111.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583659" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583660" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583661" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.111.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583662" version="1" comment="kernel-source is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583663" version="1" comment="kernel-syms is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583664" version="1" comment="kernel-trace is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583665" version="1" comment="kernel-trace-base is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583666" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.111.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583667" version="1" comment="kernel-xen is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583668" version="1" comment="kernel-xen-base is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583669" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.111.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583670" version="1" comment="kernel-bigmem is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583671" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583672" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583673" version="1" comment="kernel-default is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583674" version="1" comment="kernel-default-base is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583675" version="1" comment="kernel-default-devel is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583676" version="1" comment="kernel-default-man is &lt;3.0.101-108.114.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583677" version="1" comment="kernel-ec2 is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583678" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583679" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583680" version="1" comment="kernel-pae is &lt;3.0.101-108.114.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583681" version="1" comment="kernel-pae-base is &lt;3.0.101-108.114.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583682" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.114.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583683" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583684" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583685" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.114.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583686" version="1" comment="kernel-source is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583687" version="1" comment="kernel-syms is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583688" version="1" comment="kernel-trace is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583689" version="1" comment="kernel-trace-base is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583690" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.114.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583691" version="1" comment="kernel-xen is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583692" version="1" comment="kernel-xen-base is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583693" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.114.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583694" version="1" comment="kernel-bigmem is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583695" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583696" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583697" version="1" comment="kernel-default is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583698" version="1" comment="kernel-default-base is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583699" version="1" comment="kernel-default-devel is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583700" version="1" comment="kernel-default-man is &lt;3.0.101-108.117.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583701" version="1" comment="kernel-ec2 is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583702" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583703" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583704" version="1" comment="kernel-pae is &lt;3.0.101-108.117.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583705" version="1" comment="kernel-pae-base is &lt;3.0.101-108.117.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583706" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.117.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583707" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583708" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583709" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.117.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583710" version="1" comment="kernel-source is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583711" version="1" comment="kernel-syms is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583712" version="1" comment="kernel-trace is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583713" version="1" comment="kernel-trace-base is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583714" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.117.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583715" version="1" comment="kernel-xen is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583716" version="1" comment="kernel-xen-base is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583717" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.117.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583718" version="1" comment="kernel-bigmem is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583719" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583720" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583721" version="1" comment="kernel-default is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583722" version="1" comment="kernel-default-base is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583723" version="1" comment="kernel-default-devel is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583724" version="1" comment="kernel-default-man is &lt;3.0.101-108.120.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583725" version="1" comment="kernel-ec2 is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583726" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583727" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583728" version="1" comment="kernel-pae is &lt;3.0.101-108.120.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583729" version="1" comment="kernel-pae-base is &lt;3.0.101-108.120.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583730" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.120.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583731" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583732" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583733" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.120.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583734" version="1" comment="kernel-source is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583735" version="1" comment="kernel-syms is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583736" version="1" comment="kernel-trace is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583737" version="1" comment="kernel-trace-base is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583738" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.120.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583739" version="1" comment="kernel-xen is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583740" version="1" comment="kernel-xen-base is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583741" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.120.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583742" version="1" comment="kernel-bigmem is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583743" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583744" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583745" version="1" comment="kernel-default is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583746" version="1" comment="kernel-default-base is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583747" version="1" comment="kernel-default-devel is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583748" version="1" comment="kernel-default-man is &lt;3.0.101-108.126.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583749" version="1" comment="kernel-ec2 is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583750" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583751" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583752" version="1" comment="kernel-pae is &lt;3.0.101-108.126.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583753" version="1" comment="kernel-pae-base is &lt;3.0.101-108.126.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583754" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.126.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583755" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583756" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583757" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.126.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583758" version="1" comment="kernel-source is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583759" version="1" comment="kernel-syms is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583760" version="1" comment="kernel-trace is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583761" version="1" comment="kernel-trace-base is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583762" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.126.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583763" version="1" comment="kernel-xen is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583764" version="1" comment="kernel-xen-base is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583765" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.126.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624243" version="1" comment="kernel-bigmem is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624244" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624245" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624246" version="1" comment="kernel-default is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624247" version="1" comment="kernel-default-base is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624248" version="1" comment="kernel-default-devel is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624249" version="1" comment="kernel-default-man is &lt;3.0.101-108.129.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624250" version="1" comment="kernel-ec2 is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624251" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624252" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624253" version="1" comment="kernel-pae is &lt;3.0.101-108.129.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624254" version="1" comment="kernel-pae-base is &lt;3.0.101-108.129.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624255" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.129.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624256" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624257" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624258" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.129.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624259" version="1" comment="kernel-source is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624260" version="1" comment="kernel-syms is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624261" version="1" comment="kernel-trace is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624262" version="1" comment="kernel-trace-base is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624263" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.129.1 for i586,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624264" version="1" comment="kernel-xen is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624265" version="1" comment="kernel-xen-base is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624266" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.129.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583766" version="1" comment="kernel-bigmem is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583767" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583768" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583769" version="1" comment="kernel-default is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583770" version="1" comment="kernel-default-base is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583771" version="1" comment="kernel-default-devel is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583772" version="1" comment="kernel-default-man is &lt;3.0.101-108.38.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583773" version="1" comment="kernel-ec2 is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583774" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583775" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583776" version="1" comment="kernel-pae is &lt;3.0.101-108.38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583777" version="1" comment="kernel-pae-base is &lt;3.0.101-108.38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583778" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.38.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583779" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583780" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583781" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.38.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583782" version="1" comment="kernel-source is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583783" version="1" comment="kernel-syms is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583784" version="1" comment="kernel-trace is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583785" version="1" comment="kernel-trace-base is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583786" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.38.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583787" version="1" comment="kernel-xen is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583788" version="1" comment="kernel-xen-base is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583789" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.38.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583790" version="1" comment="kernel-bigmem is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583791" version="1" comment="kernel-bigmem-base is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583792" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583793" version="1" comment="kernel-default is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583794" version="1" comment="kernel-default-base is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583795" version="1" comment="kernel-default-devel is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583796" version="1" comment="kernel-default-man is &lt;3.0.101-108.41.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583797" version="1" comment="kernel-ec2 is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583798" version="1" comment="kernel-ec2-base is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583799" version="1" comment="kernel-ec2-devel is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583800" version="1" comment="kernel-pae is &lt;3.0.101-108.41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583801" version="1" comment="kernel-pae-base is &lt;3.0.101-108.41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583802" version="1" comment="kernel-pae-devel is &lt;3.0.101-108.41.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583803" version="1" comment="kernel-ppc64 is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583804" version="1" comment="kernel-ppc64-base is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583805" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-108.41.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583806" version="1" comment="kernel-source is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583807" version="1" comment="kernel-syms is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583808" version="1" comment="kernel-trace is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583809" version="1" comment="kernel-trace-base is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583810" version="1" comment="kernel-trace-devel is &lt;3.0.101-108.41.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583811" version="1" comment="kernel-xen is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583812" version="1" comment="kernel-xen-base is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583813" version="1" comment="kernel-xen-devel is &lt;3.0.101-108.41.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583814" version="1" comment="iscsitarget is &lt;1.4.20-0.43.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583815" version="1" comment="iscsitarget-kmp-bigmem is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583816" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583817" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583818" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583819" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583820" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_108.52-0.43.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583821" version="1" comment="ofed is &lt;1.5.4.1-22.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583822" version="1" comment="ofed-doc is &lt;1.5.4.1-22.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583823" version="1" comment="ofed-kmp-bigmem is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583824" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583825" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583826" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583827" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_108.52-22.3.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583828" version="1" comment="iscsitarget is &lt;1.4.20-0.43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583829" version="1" comment="iscsitarget-kmp-bigmem is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583830" version="1" comment="iscsitarget-kmp-default is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583831" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583832" version="1" comment="iscsitarget-kmp-ppc64 is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583833" version="1" comment="iscsitarget-kmp-trace is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583834" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.20_3.0.101_108.87-0.43.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583835" version="1" comment="ofed is &lt;1.5.4.1-22.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583836" version="1" comment="ofed-doc is &lt;1.5.4.1-22.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583837" version="1" comment="ofed-kmp-bigmem is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583838" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583839" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583840" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583841" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_108.87-22.6.1 for i586,ia64,ppc64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583842" version="1" comment="oracleasm is &lt;2.0.5-7.44.2.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583843" version="1" comment="oracleasm-kmp-bigmem is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583844" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583845" version="1" comment="oracleasm-kmp-pae is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583846" version="1" comment="oracleasm-kmp-ppc64 is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583847" version="1" comment="oracleasm-kmp-trace is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583848" version="1" comment="oracleasm-kmp-xen is &lt;2.0.5_3.0.101_108.87-7.44.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583849" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583850" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583851" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583852" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583853" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583854" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583855" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.106.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583856" version="1" comment="krb5 is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583857" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583858" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583859" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583860" version="1" comment="krb5-client is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583861" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583862" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.109.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583863" version="1" comment="krb5 is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583864" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.113.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583865" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583866" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583867" version="1" comment="krb5-client is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583868" version="1" comment="krb5-server is &lt;1.6.3-133.49.113.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583869" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.113.7.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583870" version="1" comment="kvm is &lt;1.4.2-32.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583871" version="1" comment="kvm is &lt;1.4.2-35.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583872" version="1" comment="kvm is &lt;1.4.2-44.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583873" version="1" comment="kvm is &lt;1.4.2-47.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583874" version="1" comment="kvm is &lt;1.4.2-50.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583875" version="1" comment="kvm is &lt;1.4.2-59.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583876" version="1" comment="kvm is &lt;1.4.2-60.3.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583877" version="1" comment="kvm is &lt;1.4.2-60.6.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583878" version="1" comment="kvm is &lt;1.4.2-60.9.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583879" version="1" comment="kvm is &lt;1.4.2-60.12.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583880" version="1" comment="kvm is &lt;1.4.2-60.15.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583881" version="1" comment="kvm is &lt;1.4.2-60.18.2 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583882" version="1" comment="kvm is &lt;1.4.2-60.21.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583883" version="1" comment="kvm is &lt;1.4.2-60.24.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583884" version="1" comment="kvm is &lt;1.4.2-60.27.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583885" version="1" comment="kvm is &lt;1.4.2-60.31.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583886" version="1" comment="kvm is &lt;1.4.2-60.34.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626555" version="1" comment="kvm is &lt;1.4.2-60.37.1 for i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583887" version="1" comment="lha is &lt;1.14.0.894-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583888" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583889" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.3.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583890" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583891" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583892" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.13.2 for ppc64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670912" version="1" comment="libcaca is &lt;0.99.beta13b-49.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583893" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583894" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9.6 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583895" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9.6 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583896" version="1" comment="libcares2 is &lt;1.7.4-7.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630425" version="1" comment="libcares2 is &lt;1.7.4-7.10.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583897" version="1" comment="libcgroup1 is &lt;0.41.rc1-7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631920" version="1" comment="libcroco-0_6-3 is &lt;0.6.1-122.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631921" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.1-122.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583898" version="1" comment="db-doc is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583899" version="1" comment="db-utils is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583900" version="1" comment="db-utils-doc is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583901" version="1" comment="libdb-4_5 is &lt;4.5.20-97.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583902" version="1" comment="libdb-4_5-32bit is &lt;4.5.20-97.5 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583903" version="1" comment="libdb-4_5-x86 is &lt;4.5.20-97.5 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629509" version="1" comment="libesmtp is &lt;1.0.4-157.18.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583904" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583905" version="1" comment="libexif is &lt;0.6.17-2.14.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583906" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583907" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583908" version="1" comment="libexif is &lt;0.6.17-2.14.7.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583909" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.7.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583910" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583911" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583912" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583913" version="1" comment="libgcrypt11 is &lt;1.5.0-0.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583914" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583915" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.25.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583916" version="1" comment="libgcrypt11 is &lt;1.5.0-0.26.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583917" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.26.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583918" version="1" comment="libical0 is &lt;0.43-1.10.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583919" version="1" comment="libidn is &lt;1.10-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583920" version="1" comment="libidn-32bit is &lt;1.10-6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583921" version="1" comment="libidn-x86 is &lt;1.10-6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583922" version="1" comment="libidn is &lt;1.10-7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583923" version="1" comment="libidn-32bit is &lt;1.10-7.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583924" version="1" comment="libidn-x86 is &lt;1.10-7.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583925" version="1" comment="libksba is &lt;1.0.4-1.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583926" version="1" comment="liblouis is &lt;1.7.0-1.3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583927" version="1" comment="liblouis0 is &lt;1.7.0-1.3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583928" version="1" comment="python-louis is &lt;1.7.0-1.3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583929" version="1" comment="liblouis is &lt;1.7.0-1.3.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583930" version="1" comment="liblouis0 is &lt;1.7.0-1.3.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583931" version="1" comment="python-louis is &lt;1.7.0-1.3.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583932" version="1" comment="liblouis is &lt;1.7.0-1.3.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583933" version="1" comment="liblouis0 is &lt;1.7.0-1.3.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583934" version="1" comment="python-louis is &lt;1.7.0-1.3.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583935" version="1" comment="liblouis is &lt;1.7.0-1.3.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583936" version="1" comment="liblouis0 is &lt;1.7.0-1.3.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583937" version="1" comment="python-louis is &lt;1.7.0-1.3.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583938" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.11.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583939" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583940" version="1" comment="libpng12-0 is &lt;1.2.31-5.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583941" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583942" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.43.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583943" version="1" comment="libsamplerate is &lt;0.1.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583944" version="1" comment="libsamplerate-32bit is &lt;0.1.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583945" version="1" comment="libsamplerate-x86 is &lt;0.1.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583946" version="1" comment="libsndfile is &lt;1.0.20-2.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583947" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583948" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583949" version="1" comment="libsndfile is &lt;1.0.20-2.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583950" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583951" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583952" version="1" comment="libsndfile is &lt;1.0.20-2.19.7.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583953" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.7.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583954" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.7.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583955" version="1" comment="libsndfile is &lt;1.0.20-2.19.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583956" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583957" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.19.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626762" version="1" comment="libsndfile is &lt;1.0.20-2.19.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626763" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662534" version="1" comment="libsndfile is &lt;1.0.20-2.19.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662535" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.19.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583958" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583959" version="1" comment="libssh2-1 is &lt;1.4.3-17.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583960" version="1" comment="libssh2-1 is &lt;1.4.3-17.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583961" version="1" comment="libssh2-1 is &lt;1.4.3-17.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583962" version="1" comment="libssh2-1 is &lt;1.4.3-17.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583963" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583964" version="1" comment="libtcnative-1-0 is &lt;1.3.4-12.5.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583965" version="1" comment="libtirpc1 is &lt;0.2.1-1.12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583966" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.27.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583967" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583968" version="1" comment="libtirpc1 is &lt;0.2.1-1.13.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583969" version="1" comment="libvirt is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583970" version="1" comment="libvirt-client is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583971" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583972" version="1" comment="libvirt-doc is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583973" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-12.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583974" version="1" comment="libvirt is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583975" version="1" comment="libvirt-client is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583976" version="1" comment="libvirt-client-32bit is &lt;1.2.5-15.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583977" version="1" comment="libvirt-doc is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583978" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-15.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583979" version="1" comment="perl-Sys-Virt is &lt;1.2.5-4.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583980" version="1" comment="libvirt is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583981" version="1" comment="libvirt-client is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583982" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583983" version="1" comment="libvirt-doc is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583984" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583985" version="1" comment="libvirt is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583986" version="1" comment="libvirt-client is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583987" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583988" version="1" comment="libvirt-doc is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583989" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583990" version="1" comment="libvirt is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583991" version="1" comment="libvirt-client is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583992" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583993" version="1" comment="libvirt-doc is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583994" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583995" version="1" comment="libvirt is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583996" version="1" comment="libvirt-client is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583997" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583998" version="1" comment="libvirt-doc is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009583999" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584000" version="1" comment="libvirt is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584001" version="1" comment="libvirt-client is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584002" version="1" comment="libvirt-client-32bit is &lt;1.2.5-23.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584003" version="1" comment="libvirt-doc is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584004" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-23.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584005" version="1" comment="libvirt-python is &lt;1.2.5-3.3.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584006" version="1" comment="libvorbis is &lt;1.2.0-79.20.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584007" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584008" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584009" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584010" version="1" comment="libvorbis is &lt;1.2.0-79.20.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584011" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584012" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584013" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584014" version="1" comment="libvorbis is &lt;1.2.0-79.20.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584015" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584016" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584017" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584018" version="1" comment="libvorbis is &lt;1.2.0-79.20.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584019" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584020" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584021" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584022" version="1" comment="libxml2 is &lt;2.7.6-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584023" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584024" version="1" comment="libxml2-doc is &lt;2.7.6-0.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584025" version="1" comment="libxml2-python is &lt;2.7.6-0.40.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584026" version="1" comment="libxml2-x86 is &lt;2.7.6-0.40.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584027" version="1" comment="libxml2 is &lt;2.7.6-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584028" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584029" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584030" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584031" version="1" comment="libxml2-x86 is &lt;2.7.6-0.44.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584032" version="1" comment="libxml2 is &lt;2.7.6-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584033" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584034" version="1" comment="libxml2-doc is &lt;2.7.6-0.50.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584035" version="1" comment="libxml2-python is &lt;2.7.6-0.50.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584036" version="1" comment="libxml2-x86 is &lt;2.7.6-0.50.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584037" version="1" comment="libxml2 is &lt;2.7.6-0.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584038" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584039" version="1" comment="libxml2-doc is &lt;2.7.6-0.64.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584040" version="1" comment="libxml2-python is &lt;2.7.6-0.64.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584041" version="1" comment="libxml2-x86 is &lt;2.7.6-0.64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584042" version="1" comment="libxml2 is &lt;2.7.6-0.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584043" version="1" comment="libxml2-32bit is &lt;2.7.6-0.69.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584044" version="1" comment="libxml2-doc is &lt;2.7.6-0.69.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584045" version="1" comment="libxml2-python is &lt;2.7.6-0.69.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584046" version="1" comment="libxml2-x86 is &lt;2.7.6-0.69.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584047" version="1" comment="libxml2 is &lt;2.7.6-0.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584048" version="1" comment="libxml2-32bit is &lt;2.7.6-0.76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584049" version="1" comment="libxml2-doc is &lt;2.7.6-0.76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584050" version="1" comment="libxml2-python is &lt;2.7.6-0.76.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584051" version="1" comment="libxml2-x86 is &lt;2.7.6-0.76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584052" version="1" comment="libxml2 is &lt;2.7.6-0.77.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584053" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.3.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584054" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584055" version="1" comment="libxml2-python is &lt;2.7.6-0.77.3.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584056" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.3.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584057" version="1" comment="libxml2 is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584058" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584059" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584060" version="1" comment="libxml2-python is &lt;2.7.6-0.77.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584061" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584062" version="1" comment="libxml2 is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584063" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584064" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584065" version="1" comment="libxml2-python is &lt;2.7.6-0.77.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584066" version="1" comment="libxml2-x86 is &lt;2.7.6-0.77.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584067" version="1" comment="libxml2 is &lt;2.7.6-0.77.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584068" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584069" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584070" version="1" comment="libxml2-python is &lt;2.7.6-0.77.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584071" version="1" comment="libxml2 is &lt;2.7.6-0.77.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584072" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.36.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584073" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584074" version="1" comment="libxml2-python is &lt;2.7.6-0.77.36.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670913" version="1" comment="libxml2 is &lt;2.7.6-0.77.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670914" version="1" comment="libxml2-32bit is &lt;2.7.6-0.77.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670915" version="1" comment="libxml2-doc is &lt;2.7.6-0.77.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670916" version="1" comment="libxml2-python is &lt;2.7.6-0.77.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584075" version="1" comment="libxslt is &lt;1.1.24-19.33.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584076" version="1" comment="libxslt-32bit is &lt;1.1.24-19.33.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584077" version="1" comment="libxslt-x86 is &lt;1.1.24-19.33.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584078" version="1" comment="kernel-bigmem is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584079" version="1" comment="kernel-bigmem-base is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584080" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584081" version="1" comment="kernel-default is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584082" version="1" comment="kernel-default-base is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584083" version="1" comment="kernel-default-devel is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584084" version="1" comment="kernel-default-man is &lt;3.0.101-91.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584085" version="1" comment="kernel-ec2 is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584086" version="1" comment="kernel-ec2-base is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584087" version="1" comment="kernel-ec2-devel is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584088" version="1" comment="kernel-pae is &lt;3.0.101-91.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584089" version="1" comment="kernel-pae-base is &lt;3.0.101-91.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584090" version="1" comment="kernel-pae-devel is &lt;3.0.101-91.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584091" version="1" comment="kernel-ppc64 is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584092" version="1" comment="kernel-ppc64-base is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584093" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-91.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584094" version="1" comment="kernel-source is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584095" version="1" comment="kernel-syms is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584096" version="1" comment="kernel-trace is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584097" version="1" comment="kernel-trace-base is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584098" version="1" comment="kernel-trace-devel is &lt;3.0.101-91.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584099" version="1" comment="kernel-xen is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584100" version="1" comment="kernel-xen-base is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584101" version="1" comment="kernel-xen-devel is &lt;3.0.101-91.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584102" version="1" comment="kernel-bigmem is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584103" version="1" comment="kernel-bigmem-base is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584104" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584105" version="1" comment="kernel-default is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584106" version="1" comment="kernel-default-base is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584107" version="1" comment="kernel-default-devel is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584108" version="1" comment="kernel-default-man is &lt;3.0.101-100.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584109" version="1" comment="kernel-ec2 is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584110" version="1" comment="kernel-ec2-base is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584111" version="1" comment="kernel-ec2-devel is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584112" version="1" comment="kernel-pae is &lt;3.0.101-100.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584113" version="1" comment="kernel-pae-base is &lt;3.0.101-100.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584114" version="1" comment="kernel-pae-devel is &lt;3.0.101-100.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584115" version="1" comment="kernel-ppc64 is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584116" version="1" comment="kernel-ppc64-base is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584117" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-100.1 for ppc64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584118" version="1" comment="kernel-source is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584119" version="1" comment="kernel-syms is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584120" version="1" comment="kernel-trace is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584121" version="1" comment="kernel-trace-base is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584122" version="1" comment="kernel-trace-devel is &lt;3.0.101-100.1 for i586,ia64,ppc64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584123" version="1" comment="kernel-xen is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584124" version="1" comment="kernel-xen-base is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584125" version="1" comment="kernel-xen-devel is &lt;3.0.101-100.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584126" version="1" comment="mailman is &lt;2.1.15-9.6.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584127" version="1" comment="mailman is &lt;2.1.15-9.6.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584128" version="1" comment="mailman is &lt;2.1.15-9.6.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584129" version="1" comment="mailman is &lt;2.1.15-9.6.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584130" version="1" comment="mailman is &lt;2.1.15-9.6.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584131" version="1" comment="mailman is &lt;2.1.15-9.6.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584132" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584133" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584134" version="1" comment="libfreebl3 is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584135" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584136" version="1" comment="libfreebl3-x86 is &lt;3.21.3-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584137" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584138" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584139" version="1" comment="libsoftokn3-x86 is &lt;3.21.3-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584140" version="1" comment="mozilla-nss is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584141" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584142" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584143" version="1" comment="mozilla-nss-x86 is &lt;3.21.3-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584144" version="1" comment="g3utils is &lt;1.1.36-28.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584145" version="1" comment="mgetty is &lt;1.1.36-28.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584146" version="1" comment="microcode_ctl is &lt;1.17-102.83.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584147" version="1" comment="microcode_ctl is &lt;1.17-102.83.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584148" version="1" comment="microcode_ctl is &lt;1.17-102.83.41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584149" version="1" comment="microcode_ctl is &lt;1.17-102.83.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584150" version="1" comment="microcode_ctl is &lt;1.17-102.83.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584151" version="1" comment="microcode_ctl is &lt;1.17-102.83.53.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584152" version="1" comment="microcode_ctl is &lt;1.17-102.83.59.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584153" version="1" comment="microcode_ctl is &lt;1.17-102.83.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584154" version="1" comment="microcode_ctl is &lt;1.17-102.83.71.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584155" version="1" comment="minicom is &lt;2.3-27.24.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584156" version="1" comment="mono-core is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584157" version="1" comment="mono-data is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584158" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584159" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584160" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584161" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584162" version="1" comment="mono-web is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584163" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659260" version="1" comment="libfreebl3 is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659261" version="1" comment="libfreebl3-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659262" version="1" comment="libsoftokn3 is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659263" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659264" version="1" comment="mozilla-nss is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659265" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659266" version="1" comment="mozilla-nss-certs is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659267" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-47.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659268" version="1" comment="mozilla-nss-devel is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659269" version="1" comment="mozilla-nss-tools is &lt;3.68.1-47.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678417" version="1" comment="libfreebl3 is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678418" version="1" comment="libfreebl3-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678419" version="1" comment="libsoftokn3 is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678420" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678421" version="1" comment="mozilla-nss is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678422" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678423" version="1" comment="mozilla-nss-certs is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678424" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-47.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678425" version="1" comment="mozilla-nss-devel is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678426" version="1" comment="mozilla-nss-tools is &lt;3.68.3-47.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584164" version="1" comment="libfreebl3 is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584165" version="1" comment="libsoftokn3 is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584166" version="1" comment="mozilla-nspr is &lt;4.25-29.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584167" version="1" comment="mozilla-nspr-32bit is &lt;4.25-29.12.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584168" version="1" comment="mozilla-nspr-devel is &lt;4.25-29.12.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584169" version="1" comment="mozilla-nss is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584170" version="1" comment="mozilla-nss-certs is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584171" version="1" comment="mozilla-nss-devel is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584172" version="1" comment="mozilla-nss-tools is &lt;3.53.1-38.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584173" version="1" comment="mutt is &lt;1.5.17-42.43.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584174" version="1" comment="mutt is &lt;1.5.17-42.51.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584175" version="1" comment="mutt is &lt;1.5.17-42.56.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584176" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584177" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584178" version="1" comment="libmysql55client18-x86 is &lt;5.5.49-0.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584179" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584180" version="1" comment="mysql is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584181" version="1" comment="mysql-client is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584182" version="1" comment="mysql-tools is &lt;5.5.49-0.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584183" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584184" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584185" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.8.10.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584186" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584187" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584188" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584189" version="1" comment="libmysql55client18-x86 is &lt;5.5.52-0.27.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584190" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584191" version="1" comment="mysql is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584192" version="1" comment="mysql-client is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584193" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584194" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584195" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584196" version="1" comment="libmysql55client18-x86 is &lt;5.5.53-0.30.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584197" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584198" version="1" comment="mysql is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584199" version="1" comment="mysql-client is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584200" version="1" comment="mysql-tools is &lt;5.5.53-0.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584201" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584202" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584203" version="1" comment="libmysql55client18-x86 is &lt;5.5.54-0.35.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584204" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584205" version="1" comment="mysql is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584206" version="1" comment="mysql-client is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584207" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584208" version="1" comment="libmysql55client18 is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584209" version="1" comment="libmysql55client18-32bit is &lt;5.5.55-0.38.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584210" version="1" comment="libmysql55client18-x86 is &lt;5.5.55-0.38.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584211" version="1" comment="libmysql55client_r18 is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584212" version="1" comment="mysql is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584213" version="1" comment="mysql-client is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584214" version="1" comment="mysql-tools is &lt;5.5.55-0.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584215" version="1" comment="libmysql55client18 is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584216" version="1" comment="libmysql55client18-32bit is &lt;5.5.57-0.39.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584217" version="1" comment="libmysql55client18-x86 is &lt;5.5.57-0.39.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584218" version="1" comment="libmysql55client_r18 is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584219" version="1" comment="mysql is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584220" version="1" comment="mysql-client is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584221" version="1" comment="mysql-tools is &lt;5.5.57-0.39.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584222" version="1" comment="libmysql55client18 is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584223" version="1" comment="libmysql55client18-32bit is &lt;5.5.58-0.39.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584224" version="1" comment="libmysql55client18-x86 is &lt;5.5.58-0.39.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584225" version="1" comment="libmysql55client_r18 is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584226" version="1" comment="mysql is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584227" version="1" comment="mysql-client is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584228" version="1" comment="mysql-tools is &lt;5.5.58-0.39.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584229" version="1" comment="libmysql55client18 is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584230" version="1" comment="libmysql55client18-32bit is &lt;5.5.59-0.39.9.8 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584231" version="1" comment="libmysql55client18-x86 is &lt;5.5.59-0.39.9.8 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584232" version="1" comment="libmysql55client_r18 is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584233" version="1" comment="mysql is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584234" version="1" comment="mysql-client is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584235" version="1" comment="mysql-tools is &lt;5.5.59-0.39.9.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584236" version="1" comment="libmysql55client18 is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584237" version="1" comment="libmysql55client18-32bit is &lt;5.5.60-0.39.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584238" version="1" comment="libmysql55client18-x86 is &lt;5.5.60-0.39.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584239" version="1" comment="libmysql55client_r18 is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584240" version="1" comment="mysql is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584241" version="1" comment="mysql-client is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584242" version="1" comment="mysql-tools is &lt;5.5.60-0.39.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584243" version="1" comment="libmysql55client18 is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584244" version="1" comment="libmysql55client18-32bit is &lt;5.5.61-0.39.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584245" version="1" comment="libmysql55client18-x86 is &lt;5.5.61-0.39.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584246" version="1" comment="libmysql55client_r18 is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584247" version="1" comment="mysql is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584248" version="1" comment="mysql-client is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584249" version="1" comment="mysql-tools is &lt;5.5.61-0.39.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584250" version="1" comment="libmysql55client18 is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584251" version="1" comment="libmysql55client18-32bit is &lt;5.5.62-0.39.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584252" version="1" comment="libmysql55client18-x86 is &lt;5.5.62-0.39.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584253" version="1" comment="libmysql55client_r18 is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584254" version="1" comment="mysql is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584255" version="1" comment="mysql-client is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584256" version="1" comment="mysql-tools is &lt;5.5.62-0.39.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584257" version="1" comment="nagios is &lt;3.0.6-1.25.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584258" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584259" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584260" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584261" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584262" version="1" comment="nautilus is &lt;2.28.4-1.16.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584263" version="1" comment="nautilus-32bit is &lt;2.28.4-1.16.21.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584264" version="1" comment="nautilus-lang is &lt;2.28.4-1.16.21.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584265" version="1" comment="nautilus-x86 is &lt;2.28.4-1.16.21.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584266" version="1" comment="libncurses5 is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584267" version="1" comment="libncurses5-32bit is &lt;5.6-92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584268" version="1" comment="libncurses5-x86 is &lt;5.6-92.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584269" version="1" comment="libncurses6 is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584270" version="1" comment="libncurses6-32bit is &lt;5.6-92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584271" version="1" comment="libncurses6-x86 is &lt;5.6-92.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584272" version="1" comment="ncurses-devel is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584273" version="1" comment="ncurses-devel-32bit is &lt;5.6-92.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584274" version="1" comment="ncurses-utils is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584275" version="1" comment="tack is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584276" version="1" comment="terminfo is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584277" version="1" comment="terminfo-base is &lt;5.6-92.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584278" version="1" comment="libncurses5 is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584279" version="1" comment="libncurses5-32bit is &lt;5.6-93.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584280" version="1" comment="libncurses5-x86 is &lt;5.6-93.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584281" version="1" comment="libncurses6 is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584282" version="1" comment="libncurses6-32bit is &lt;5.6-93.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584283" version="1" comment="libncurses6-x86 is &lt;5.6-93.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584284" version="1" comment="ncurses-devel is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584285" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584286" version="1" comment="ncurses-utils is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584287" version="1" comment="tack is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584288" version="1" comment="terminfo is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584289" version="1" comment="terminfo-base is &lt;5.6-93.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584290" version="1" comment="libncurses5 is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584291" version="1" comment="libncurses5-32bit is &lt;5.6-93.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584292" version="1" comment="libncurses5-x86 is &lt;5.6-93.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584293" version="1" comment="libncurses6 is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584294" version="1" comment="libncurses6-32bit is &lt;5.6-93.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584295" version="1" comment="libncurses6-x86 is &lt;5.6-93.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584296" version="1" comment="ncurses-devel is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584297" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584298" version="1" comment="ncurses-utils is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584299" version="1" comment="tack is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584300" version="1" comment="terminfo is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584301" version="1" comment="terminfo-base is &lt;5.6-93.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584302" version="1" comment="libncurses5 is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584303" version="1" comment="libncurses5-32bit is &lt;5.6-93.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584304" version="1" comment="libncurses5-x86 is &lt;5.6-93.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584305" version="1" comment="libncurses6 is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584306" version="1" comment="libncurses6-32bit is &lt;5.6-93.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584307" version="1" comment="libncurses6-x86 is &lt;5.6-93.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584308" version="1" comment="ncurses-devel is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584309" version="1" comment="ncurses-devel-32bit is &lt;5.6-93.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584310" version="1" comment="ncurses-utils is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584311" version="1" comment="tack is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584312" version="1" comment="terminfo is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584313" version="1" comment="terminfo-base is &lt;5.6-93.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584314" version="1" comment="libnetpbm10 is &lt;10.26.44-101.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584315" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584316" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584317" version="1" comment="netpbm is &lt;10.26.44-101.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584318" version="1" comment="libnetpbm10 is &lt;10.26.44-101.15.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584319" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.15.5.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584320" version="1" comment="netpbm is &lt;10.26.44-101.15.5.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584321" version="1" comment="ntp is &lt;4.2.8p4-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584322" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584323" version="1" comment="ntp is &lt;4.2.8p6-8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584324" version="1" comment="ntp-doc is &lt;4.2.8p6-8.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584325" version="1" comment="ntp is &lt;4.2.8p7-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584326" version="1" comment="ntp-doc is &lt;4.2.8p7-11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584327" version="1" comment="ntp is &lt;4.2.8p8-14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584328" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584329" version="1" comment="libtasn1 is &lt;1.5-1.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584330" version="1" comment="libtasn1-3 is &lt;1.5-1.34.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584331" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584332" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.34.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584333" version="1" comment="ntp is &lt;4.2.8p9-57.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584334" version="1" comment="ntp-doc is &lt;4.2.8p9-57.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584335" version="1" comment="ntp is &lt;4.2.8p10-63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584336" version="1" comment="ntp-doc is &lt;4.2.8p10-63.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584337" version="1" comment="ntp is &lt;4.2.8p11-64.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584338" version="1" comment="ntp-doc is &lt;4.2.8p11-64.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584339" version="1" comment="ntp is &lt;4.2.8p12-64.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584340" version="1" comment="ntp-doc is &lt;4.2.8p12-64.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584341" version="1" comment="ntp is &lt;4.2.8p13-64.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584342" version="1" comment="ntp-doc is &lt;4.2.8p13-64.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584343" version="1" comment="ntp is &lt;4.2.8p15-64.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584344" version="1" comment="ntp-doc is &lt;4.2.8p15-64.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584345" version="1" comment="libvmtools0 is &lt;10.1.0-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584346" version="1" comment="open-vm-tools is &lt;10.1.0-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584347" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584348" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584349" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584350" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584351" version="1" comment="openldap2 is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584352" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584353" version="1" comment="openldap2-client is &lt;2.4.26-0.74.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584354" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584355" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584356" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584357" version="1" comment="openldap2 is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584358" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584359" version="1" comment="openldap2-client is &lt;2.4.26-0.74.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584360" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584361" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584362" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584363" version="1" comment="openldap2 is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584364" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584365" version="1" comment="openldap2-client is &lt;2.4.26-0.74.16.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584366" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584367" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584368" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.74.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584369" version="1" comment="openldap2 is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584370" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584371" version="1" comment="openldap2-client is &lt;2.4.26-0.74.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584372" version="1" comment="libopensc2 is &lt;0.11.6-5.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584373" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584374" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584375" version="1" comment="opensc is &lt;0.11.6-5.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584376" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584377" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653638" version="1" comment="libopensc2 is &lt;0.11.6-5.27.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653639" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653640" version="1" comment="opensc is &lt;0.11.6-5.27.14.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653641" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584378" version="1" comment="openslp is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584379" version="1" comment="openslp-32bit is &lt;1.2.0-172.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584380" version="1" comment="openslp-server is &lt;1.2.0-172.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584381" version="1" comment="openslp-x86 is &lt;1.2.0-172.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584382" version="1" comment="openssh is &lt;6.6p1-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584383" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584384" version="1" comment="openssh-fips is &lt;6.6p1-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584385" version="1" comment="openssh-helpers is &lt;6.6p1-13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584386" version="1" comment="openssh is &lt;6.6p1-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584387" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-21.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584388" version="1" comment="openssh-fips is &lt;6.6p1-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584389" version="1" comment="openssh-helpers is &lt;6.6p1-21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584390" version="1" comment="openssh is &lt;6.6p1-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584391" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-28.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584392" version="1" comment="openssh-fips is &lt;6.6p1-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584393" version="1" comment="openssh-helpers is &lt;6.6p1-28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584394" version="1" comment="openssh is &lt;6.6p1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584395" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-35.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584396" version="1" comment="openssh-fips is &lt;6.6p1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584397" version="1" comment="openssh-helpers is &lt;6.6p1-35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584398" version="1" comment="openssh is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584399" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584400" version="1" comment="openssh-fips is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584401" version="1" comment="openssh-helpers is &lt;6.6p1-36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584402" version="1" comment="openssh is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584403" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584404" version="1" comment="openssh-fips is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584405" version="1" comment="openssh-helpers is &lt;6.6p1-36.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584406" version="1" comment="openssh is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584407" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584408" version="1" comment="openssh-fips is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584409" version="1" comment="openssh-helpers is &lt;6.6p1-36.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584410" version="1" comment="openssh is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584411" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584412" version="1" comment="openssh-fips is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584413" version="1" comment="openssh-helpers is &lt;6.6p1-36.20.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658399" version="1" comment="openssh is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658400" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658401" version="1" comment="openssh-fips is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658402" version="1" comment="openssh-helpers is &lt;6.6p1-36.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584414" version="1" comment="openssh is &lt;6.6p1-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584415" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584416" version="1" comment="openssh-fips is &lt;6.6p1-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584417" version="1" comment="openssh-helpers is &lt;6.6p1-16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584418" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584419" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584420" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584421" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584422" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.89.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584423" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584424" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584425" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584426" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584427" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584428" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584429" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.97.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584430" version="1" comment="openssl is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584431" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584432" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584433" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584434" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584435" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584436" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.102.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584437" version="1" comment="openssl is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584438" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584439" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584440" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584441" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584442" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584443" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.105.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584444" version="1" comment="openssl is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584445" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584446" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584447" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584448" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584449" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584450" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584451" version="1" comment="openssl is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584452" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584453" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584454" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584455" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584456" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584457" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.12.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584458" version="1" comment="openssl is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584459" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584460" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584461" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584462" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584463" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584464" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584465" version="1" comment="openssl is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584466" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584467" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584468" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584469" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584470" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584471" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.106.18.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584472" version="1" comment="openssl is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584473" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584474" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584475" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584476" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584477" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584478" version="1" comment="openssl is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584479" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.21.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584480" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584481" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584482" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584483" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.25.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584484" version="1" comment="openssl is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584485" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.25.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584486" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584487" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584488" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584489" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.28.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584490" version="1" comment="openssl is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584491" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.28.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584492" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584493" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584494" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584495" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584496" version="1" comment="openssl is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584497" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584498" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584499" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584500" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584501" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584502" version="1" comment="openssl is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584503" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584504" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584505" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584506" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584507" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.37.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584508" version="1" comment="openssl is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584509" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631752" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631753" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631754" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631755" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.40.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631756" version="1" comment="openssl is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631757" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632467" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632468" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632469" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632470" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.43.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632471" version="1" comment="openssl is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632472" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673436" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673437" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.106.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673438" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673439" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.106.46.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673440" version="1" comment="openssl is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673441" version="1" comment="openssl-doc is &lt;0.9.8j-0.106.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584510" version="1" comment="openvpn is &lt;2.0.9-143.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584511" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.46.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584512" version="1" comment="openvpn is &lt;2.0.9-143.47.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584513" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.47.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584514" version="1" comment="libwsman1 is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584515" version="1" comment="openwsman-client is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584516" version="1" comment="openwsman-server is &lt;2.2.3-0.16.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584517" version="1" comment="pam is &lt;1.1.5-0.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584518" version="1" comment="pam-32bit is &lt;1.1.5-0.17.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584519" version="1" comment="pam-doc is &lt;1.1.5-0.17.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584520" version="1" comment="pam-x86 is &lt;1.1.5-0.17.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584521" version="1" comment="pam-modules is &lt;11-1.27.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584522" version="1" comment="pam-modules-32bit is &lt;11-1.27.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584523" version="1" comment="pam-modules-x86 is &lt;11-1.27.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584524" version="1" comment="pam_pkcs11 is &lt;0.6.0-141.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584525" version="1" comment="pam_pkcs11-32bit is &lt;0.6.0-141.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584526" version="1" comment="pam_pkcs11-x86 is &lt;0.6.0-141.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584527" version="1" comment="patch is &lt;2.5.9-252.22.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584528" version="1" comment="perl is &lt;5.10.0-64.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584529" version="1" comment="perl-32bit is &lt;5.10.0-64.80.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584530" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584531" version="1" comment="perl-Test-Simple is &lt;0.72-0.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584532" version="1" comment="perl-base is &lt;5.10.0-64.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584533" version="1" comment="perl-doc is &lt;5.10.0-64.80.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584534" version="1" comment="perl-x86 is &lt;5.10.0-64.80.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584535" version="1" comment="perl is &lt;5.10.0-64.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584536" version="1" comment="perl-32bit is &lt;5.10.0-64.81.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584537" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584538" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584539" version="1" comment="perl-base is &lt;5.10.0-64.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584540" version="1" comment="perl-doc is &lt;5.10.0-64.81.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584541" version="1" comment="perl-x86 is &lt;5.10.0-64.81.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584542" version="1" comment="perl is &lt;5.10.0-64.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584543" version="1" comment="perl-32bit is &lt;5.10.0-64.81.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584544" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584545" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584546" version="1" comment="perl-base is &lt;5.10.0-64.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584547" version="1" comment="perl-doc is &lt;5.10.0-64.81.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584548" version="1" comment="perl-x86 is &lt;5.10.0-64.81.10.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584549" version="1" comment="perl is &lt;5.10.0-64.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584550" version="1" comment="perl-32bit is &lt;5.10.0-64.81.13.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584551" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584552" version="1" comment="perl-Test-Simple is &lt;0.72-0.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584553" version="1" comment="perl-base is &lt;5.10.0-64.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584554" version="1" comment="perl-doc is &lt;5.10.0-64.81.13.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584555" version="1" comment="perl-x86 is &lt;5.10.0-64.81.13.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584556" version="1" comment="perl-Archive-Zip is &lt;1.24-4.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584557" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584558" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584559" version="1" comment="perl-DBD-mysql is &lt;4.008-10.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584560" version="1" comment="perl-DBI is &lt;1.607-3.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584561" version="1" comment="perl-DBI is &lt;1.607-3.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584562" version="1" comment="perl-XML-LibXML is &lt;1.66-3.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584563" version="1" comment="permissions is &lt;2013.1.7-0.6.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584564" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584565" version="1" comment="php53 is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584566" version="1" comment="php53-bcmath is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584567" version="1" comment="php53-bz2 is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584568" version="1" comment="php53-calendar is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584569" version="1" comment="php53-ctype is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584570" version="1" comment="php53-curl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584571" version="1" comment="php53-dba is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584572" version="1" comment="php53-dom is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584573" version="1" comment="php53-exif is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584574" version="1" comment="php53-fastcgi is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584575" version="1" comment="php53-fileinfo is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584576" version="1" comment="php53-ftp is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584577" version="1" comment="php53-gd is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584578" version="1" comment="php53-gettext is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584579" version="1" comment="php53-gmp is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584580" version="1" comment="php53-iconv is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584581" version="1" comment="php53-intl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584582" version="1" comment="php53-json is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584583" version="1" comment="php53-ldap is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584584" version="1" comment="php53-mbstring is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584585" version="1" comment="php53-mcrypt is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584586" version="1" comment="php53-mysql is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584587" version="1" comment="php53-odbc is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584588" version="1" comment="php53-openssl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584589" version="1" comment="php53-pcntl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584590" version="1" comment="php53-pdo is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584591" version="1" comment="php53-pear is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584592" version="1" comment="php53-pgsql is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584593" version="1" comment="php53-pspell is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584594" version="1" comment="php53-shmop is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584595" version="1" comment="php53-snmp is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584596" version="1" comment="php53-soap is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584597" version="1" comment="php53-suhosin is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584598" version="1" comment="php53-sysvmsg is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584599" version="1" comment="php53-sysvsem is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584600" version="1" comment="php53-sysvshm is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584601" version="1" comment="php53-tokenizer is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584602" version="1" comment="php53-wddx is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584603" version="1" comment="php53-xmlreader is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584604" version="1" comment="php53-xmlrpc is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584605" version="1" comment="php53-xmlwriter is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584606" version="1" comment="php53-xsl is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584607" version="1" comment="php53-zip is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584608" version="1" comment="php53-zlib is &lt;5.3.17-59.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584609" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584610" version="1" comment="php53 is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584611" version="1" comment="php53-bcmath is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584612" version="1" comment="php53-bz2 is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584613" version="1" comment="php53-calendar is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584614" version="1" comment="php53-ctype is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584615" version="1" comment="php53-curl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584616" version="1" comment="php53-dba is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584617" version="1" comment="php53-dom is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584618" version="1" comment="php53-exif is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584619" version="1" comment="php53-fastcgi is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584620" version="1" comment="php53-fileinfo is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584621" version="1" comment="php53-ftp is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584622" version="1" comment="php53-gd is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584623" version="1" comment="php53-gettext is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584624" version="1" comment="php53-gmp is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584625" version="1" comment="php53-iconv is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584626" version="1" comment="php53-intl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584627" version="1" comment="php53-json is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584628" version="1" comment="php53-ldap is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584629" version="1" comment="php53-mbstring is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584630" version="1" comment="php53-mcrypt is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584631" version="1" comment="php53-mysql is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584632" version="1" comment="php53-odbc is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584633" version="1" comment="php53-openssl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584634" version="1" comment="php53-pcntl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584635" version="1" comment="php53-pdo is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584636" version="1" comment="php53-pear is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584637" version="1" comment="php53-pgsql is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584638" version="1" comment="php53-pspell is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584639" version="1" comment="php53-shmop is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584640" version="1" comment="php53-snmp is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584641" version="1" comment="php53-soap is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584642" version="1" comment="php53-suhosin is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584643" version="1" comment="php53-sysvmsg is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584644" version="1" comment="php53-sysvsem is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584645" version="1" comment="php53-sysvshm is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584646" version="1" comment="php53-tokenizer is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584647" version="1" comment="php53-wddx is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584648" version="1" comment="php53-xmlreader is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584649" version="1" comment="php53-xmlrpc is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584650" version="1" comment="php53-xmlwriter is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584651" version="1" comment="php53-xsl is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584652" version="1" comment="php53-zip is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584653" version="1" comment="php53-zlib is &lt;5.3.17-62.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584654" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584655" version="1" comment="php53 is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584656" version="1" comment="php53-bcmath is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584657" version="1" comment="php53-bz2 is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584658" version="1" comment="php53-calendar is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584659" version="1" comment="php53-ctype is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584660" version="1" comment="php53-curl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584661" version="1" comment="php53-dba is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584662" version="1" comment="php53-dom is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584663" version="1" comment="php53-exif is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584664" version="1" comment="php53-fastcgi is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584665" version="1" comment="php53-fileinfo is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584666" version="1" comment="php53-ftp is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584667" version="1" comment="php53-gd is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584668" version="1" comment="php53-gettext is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584669" version="1" comment="php53-gmp is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584670" version="1" comment="php53-iconv is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584671" version="1" comment="php53-intl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584672" version="1" comment="php53-json is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584673" version="1" comment="php53-ldap is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584674" version="1" comment="php53-mbstring is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584675" version="1" comment="php53-mcrypt is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584676" version="1" comment="php53-mysql is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584677" version="1" comment="php53-odbc is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584678" version="1" comment="php53-openssl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584679" version="1" comment="php53-pcntl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584680" version="1" comment="php53-pdo is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584681" version="1" comment="php53-pear is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584682" version="1" comment="php53-pgsql is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584683" version="1" comment="php53-pspell is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584684" version="1" comment="php53-shmop is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584685" version="1" comment="php53-snmp is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584686" version="1" comment="php53-soap is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584687" version="1" comment="php53-suhosin is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584688" version="1" comment="php53-sysvmsg is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584689" version="1" comment="php53-sysvsem is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584690" version="1" comment="php53-sysvshm is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584691" version="1" comment="php53-tokenizer is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584692" version="1" comment="php53-wddx is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584693" version="1" comment="php53-xmlreader is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584694" version="1" comment="php53-xmlrpc is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584695" version="1" comment="php53-xmlwriter is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584696" version="1" comment="php53-xsl is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584697" version="1" comment="php53-zip is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584698" version="1" comment="php53-zlib is &lt;5.3.17-71.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584699" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584700" version="1" comment="php53 is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584701" version="1" comment="php53-bcmath is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584702" version="1" comment="php53-bz2 is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584703" version="1" comment="php53-calendar is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584704" version="1" comment="php53-ctype is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584705" version="1" comment="php53-curl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584706" version="1" comment="php53-dba is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584707" version="1" comment="php53-dom is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584708" version="1" comment="php53-exif is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584709" version="1" comment="php53-fastcgi is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584710" version="1" comment="php53-fileinfo is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584711" version="1" comment="php53-ftp is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584712" version="1" comment="php53-gd is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584713" version="1" comment="php53-gettext is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584714" version="1" comment="php53-gmp is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584715" version="1" comment="php53-iconv is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584716" version="1" comment="php53-intl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584717" version="1" comment="php53-json is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584718" version="1" comment="php53-ldap is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584719" version="1" comment="php53-mbstring is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584720" version="1" comment="php53-mcrypt is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584721" version="1" comment="php53-mysql is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584722" version="1" comment="php53-odbc is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584723" version="1" comment="php53-openssl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584724" version="1" comment="php53-pcntl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584725" version="1" comment="php53-pdo is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584726" version="1" comment="php53-pear is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584727" version="1" comment="php53-pgsql is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584728" version="1" comment="php53-pspell is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584729" version="1" comment="php53-shmop is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584730" version="1" comment="php53-snmp is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584731" version="1" comment="php53-soap is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584732" version="1" comment="php53-suhosin is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584733" version="1" comment="php53-sysvmsg is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584734" version="1" comment="php53-sysvsem is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584735" version="1" comment="php53-sysvshm is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584736" version="1" comment="php53-tokenizer is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584737" version="1" comment="php53-wddx is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584738" version="1" comment="php53-xmlreader is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584739" version="1" comment="php53-xmlrpc is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584740" version="1" comment="php53-xmlwriter is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584741" version="1" comment="php53-xsl is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584742" version="1" comment="php53-zip is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584743" version="1" comment="php53-zlib is &lt;5.3.17-74.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584744" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584745" version="1" comment="php53 is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584746" version="1" comment="php53-bcmath is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584747" version="1" comment="php53-bz2 is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584748" version="1" comment="php53-calendar is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584749" version="1" comment="php53-ctype is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584750" version="1" comment="php53-curl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584751" version="1" comment="php53-dba is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584752" version="1" comment="php53-dom is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584753" version="1" comment="php53-exif is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584754" version="1" comment="php53-fastcgi is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584755" version="1" comment="php53-fileinfo is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584756" version="1" comment="php53-ftp is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584757" version="1" comment="php53-gd is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584758" version="1" comment="php53-gettext is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584759" version="1" comment="php53-gmp is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584760" version="1" comment="php53-iconv is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584761" version="1" comment="php53-intl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584762" version="1" comment="php53-json is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584763" version="1" comment="php53-ldap is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584764" version="1" comment="php53-mbstring is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584765" version="1" comment="php53-mcrypt is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584766" version="1" comment="php53-mysql is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584767" version="1" comment="php53-odbc is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584768" version="1" comment="php53-openssl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584769" version="1" comment="php53-pcntl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584770" version="1" comment="php53-pdo is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584771" version="1" comment="php53-pear is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584772" version="1" comment="php53-pgsql is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584773" version="1" comment="php53-pspell is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584774" version="1" comment="php53-shmop is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584775" version="1" comment="php53-snmp is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584776" version="1" comment="php53-soap is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584777" version="1" comment="php53-suhosin is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584778" version="1" comment="php53-sysvmsg is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584779" version="1" comment="php53-sysvsem is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584780" version="1" comment="php53-sysvshm is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584781" version="1" comment="php53-tokenizer is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584782" version="1" comment="php53-wddx is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584783" version="1" comment="php53-xmlreader is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584784" version="1" comment="php53-xmlrpc is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584785" version="1" comment="php53-xmlwriter is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584786" version="1" comment="php53-xsl is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584787" version="1" comment="php53-zip is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584788" version="1" comment="php53-zlib is &lt;5.3.17-79.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584789" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584790" version="1" comment="php53 is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584791" version="1" comment="php53-bcmath is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584792" version="1" comment="php53-bz2 is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584793" version="1" comment="php53-calendar is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584794" version="1" comment="php53-ctype is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584795" version="1" comment="php53-curl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584796" version="1" comment="php53-dba is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584797" version="1" comment="php53-dom is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584798" version="1" comment="php53-exif is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584799" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584800" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584801" version="1" comment="php53-ftp is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584802" version="1" comment="php53-gd is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584803" version="1" comment="php53-gettext is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584804" version="1" comment="php53-gmp is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584805" version="1" comment="php53-iconv is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584806" version="1" comment="php53-intl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584807" version="1" comment="php53-json is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584808" version="1" comment="php53-ldap is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584809" version="1" comment="php53-mbstring is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584810" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584811" version="1" comment="php53-mysql is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584812" version="1" comment="php53-odbc is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584813" version="1" comment="php53-openssl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584814" version="1" comment="php53-pcntl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584815" version="1" comment="php53-pdo is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584816" version="1" comment="php53-pear is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584817" version="1" comment="php53-pgsql is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584818" version="1" comment="php53-pspell is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584819" version="1" comment="php53-shmop is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584820" version="1" comment="php53-snmp is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584821" version="1" comment="php53-soap is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584822" version="1" comment="php53-suhosin is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584823" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584824" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584825" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584826" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584827" version="1" comment="php53-wddx is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584828" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584829" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584830" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584831" version="1" comment="php53-xsl is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584832" version="1" comment="php53-zip is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584833" version="1" comment="php53-zlib is &lt;5.3.17-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584834" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584835" version="1" comment="php53 is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584836" version="1" comment="php53-bcmath is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584837" version="1" comment="php53-bz2 is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584838" version="1" comment="php53-calendar is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584839" version="1" comment="php53-ctype is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584840" version="1" comment="php53-curl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584841" version="1" comment="php53-dba is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584842" version="1" comment="php53-dom is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584843" version="1" comment="php53-exif is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584844" version="1" comment="php53-fastcgi is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584845" version="1" comment="php53-fileinfo is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584846" version="1" comment="php53-ftp is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584847" version="1" comment="php53-gd is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584848" version="1" comment="php53-gettext is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584849" version="1" comment="php53-gmp is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584850" version="1" comment="php53-iconv is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584851" version="1" comment="php53-intl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584852" version="1" comment="php53-json is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584853" version="1" comment="php53-ldap is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584854" version="1" comment="php53-mbstring is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584855" version="1" comment="php53-mcrypt is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584856" version="1" comment="php53-mysql is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584857" version="1" comment="php53-odbc is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584858" version="1" comment="php53-openssl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584859" version="1" comment="php53-pcntl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584860" version="1" comment="php53-pdo is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584861" version="1" comment="php53-pear is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584862" version="1" comment="php53-pgsql is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584863" version="1" comment="php53-pspell is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584864" version="1" comment="php53-shmop is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584865" version="1" comment="php53-snmp is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584866" version="1" comment="php53-soap is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584867" version="1" comment="php53-suhosin is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584868" version="1" comment="php53-sysvmsg is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584869" version="1" comment="php53-sysvsem is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584870" version="1" comment="php53-sysvshm is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584871" version="1" comment="php53-tokenizer is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584872" version="1" comment="php53-wddx is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584873" version="1" comment="php53-xmlreader is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584874" version="1" comment="php53-xmlrpc is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584875" version="1" comment="php53-xmlwriter is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584876" version="1" comment="php53-xsl is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584877" version="1" comment="php53-zip is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584878" version="1" comment="php53-zlib is &lt;5.3.17-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584879" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584880" version="1" comment="php53 is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584881" version="1" comment="php53-bcmath is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584882" version="1" comment="php53-bz2 is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584883" version="1" comment="php53-calendar is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584884" version="1" comment="php53-ctype is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584885" version="1" comment="php53-curl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584886" version="1" comment="php53-dba is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584887" version="1" comment="php53-dom is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584888" version="1" comment="php53-exif is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584889" version="1" comment="php53-fastcgi is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584890" version="1" comment="php53-fileinfo is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584891" version="1" comment="php53-ftp is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584892" version="1" comment="php53-gd is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584893" version="1" comment="php53-gettext is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584894" version="1" comment="php53-gmp is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584895" version="1" comment="php53-iconv is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584896" version="1" comment="php53-intl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584897" version="1" comment="php53-json is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584898" version="1" comment="php53-ldap is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584899" version="1" comment="php53-mbstring is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584900" version="1" comment="php53-mcrypt is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584901" version="1" comment="php53-mysql is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584902" version="1" comment="php53-odbc is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584903" version="1" comment="php53-openssl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584904" version="1" comment="php53-pcntl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584905" version="1" comment="php53-pdo is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584906" version="1" comment="php53-pear is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584907" version="1" comment="php53-pgsql is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584908" version="1" comment="php53-pspell is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584909" version="1" comment="php53-shmop is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584910" version="1" comment="php53-snmp is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584911" version="1" comment="php53-soap is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584912" version="1" comment="php53-suhosin is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584913" version="1" comment="php53-sysvmsg is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584914" version="1" comment="php53-sysvsem is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584915" version="1" comment="php53-sysvshm is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584916" version="1" comment="php53-tokenizer is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584917" version="1" comment="php53-wddx is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584918" version="1" comment="php53-xmlreader is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584919" version="1" comment="php53-xmlrpc is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584920" version="1" comment="php53-xmlwriter is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584921" version="1" comment="php53-xsl is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584922" version="1" comment="php53-zip is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584923" version="1" comment="php53-zlib is &lt;5.3.17-94.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584924" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584925" version="1" comment="php53 is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584926" version="1" comment="php53-bcmath is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584927" version="1" comment="php53-bz2 is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584928" version="1" comment="php53-calendar is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584929" version="1" comment="php53-ctype is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584930" version="1" comment="php53-curl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584931" version="1" comment="php53-dba is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584932" version="1" comment="php53-dom is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584933" version="1" comment="php53-exif is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584934" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584935" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584936" version="1" comment="php53-ftp is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584937" version="1" comment="php53-gd is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584938" version="1" comment="php53-gettext is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584939" version="1" comment="php53-gmp is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584940" version="1" comment="php53-iconv is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584941" version="1" comment="php53-intl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584942" version="1" comment="php53-json is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584943" version="1" comment="php53-ldap is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584944" version="1" comment="php53-mbstring is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584945" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584946" version="1" comment="php53-mysql is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584947" version="1" comment="php53-odbc is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584948" version="1" comment="php53-openssl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584949" version="1" comment="php53-pcntl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584950" version="1" comment="php53-pdo is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584951" version="1" comment="php53-pear is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584952" version="1" comment="php53-pgsql is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584953" version="1" comment="php53-pspell is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584954" version="1" comment="php53-shmop is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584955" version="1" comment="php53-snmp is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584956" version="1" comment="php53-soap is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584957" version="1" comment="php53-suhosin is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584958" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584959" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584960" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584961" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584962" version="1" comment="php53-wddx is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584963" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584964" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584965" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584966" version="1" comment="php53-xsl is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584967" version="1" comment="php53-zip is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584968" version="1" comment="php53-zlib is &lt;5.3.17-101.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584969" version="1" comment="apache2-mod_php53 is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584970" version="1" comment="php53 is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584971" version="1" comment="php53-bcmath is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584972" version="1" comment="php53-bz2 is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584973" version="1" comment="php53-calendar is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584974" version="1" comment="php53-ctype is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584975" version="1" comment="php53-curl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584976" version="1" comment="php53-dba is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584977" version="1" comment="php53-dom is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584978" version="1" comment="php53-exif is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584979" version="1" comment="php53-fastcgi is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584980" version="1" comment="php53-fileinfo is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584981" version="1" comment="php53-ftp is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584982" version="1" comment="php53-gd is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584983" version="1" comment="php53-gettext is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584984" version="1" comment="php53-gmp is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584985" version="1" comment="php53-iconv is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584986" version="1" comment="php53-intl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584987" version="1" comment="php53-json is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584988" version="1" comment="php53-ldap is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584989" version="1" comment="php53-mbstring is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584990" version="1" comment="php53-mcrypt is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584991" version="1" comment="php53-mysql is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584992" version="1" comment="php53-odbc is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584993" version="1" comment="php53-openssl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584994" version="1" comment="php53-pcntl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584995" version="1" comment="php53-pdo is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584996" version="1" comment="php53-pear is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584997" version="1" comment="php53-pgsql is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584998" version="1" comment="php53-pspell is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009584999" version="1" comment="php53-shmop is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585000" version="1" comment="php53-snmp is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585001" version="1" comment="php53-soap is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585002" version="1" comment="php53-suhosin is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585003" version="1" comment="php53-sysvmsg is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585004" version="1" comment="php53-sysvsem is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585005" version="1" comment="php53-sysvshm is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585006" version="1" comment="php53-tokenizer is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585007" version="1" comment="php53-wddx is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585008" version="1" comment="php53-xmlreader is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585009" version="1" comment="php53-xmlrpc is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585010" version="1" comment="php53-xmlwriter is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585011" version="1" comment="php53-xsl is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585012" version="1" comment="php53-zip is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585013" version="1" comment="php53-zlib is &lt;5.3.17-108.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585014" version="1" comment="apache2-mod_php53 is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585015" version="1" comment="php53 is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585016" version="1" comment="php53-bcmath is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585017" version="1" comment="php53-bz2 is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585018" version="1" comment="php53-calendar is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585019" version="1" comment="php53-ctype is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585020" version="1" comment="php53-curl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585021" version="1" comment="php53-dba is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585022" version="1" comment="php53-dom is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585023" version="1" comment="php53-exif is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585024" version="1" comment="php53-fastcgi is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585025" version="1" comment="php53-fileinfo is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585026" version="1" comment="php53-ftp is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585027" version="1" comment="php53-gd is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585028" version="1" comment="php53-gettext is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585029" version="1" comment="php53-gmp is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585030" version="1" comment="php53-iconv is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585031" version="1" comment="php53-intl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585032" version="1" comment="php53-json is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585033" version="1" comment="php53-ldap is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585034" version="1" comment="php53-mbstring is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585035" version="1" comment="php53-mcrypt is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585036" version="1" comment="php53-mysql is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585037" version="1" comment="php53-odbc is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585038" version="1" comment="php53-openssl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585039" version="1" comment="php53-pcntl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585040" version="1" comment="php53-pdo is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585041" version="1" comment="php53-pear is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585042" version="1" comment="php53-pgsql is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585043" version="1" comment="php53-pspell is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585044" version="1" comment="php53-shmop is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585045" version="1" comment="php53-snmp is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585046" version="1" comment="php53-soap is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585047" version="1" comment="php53-suhosin is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585048" version="1" comment="php53-sysvmsg is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585049" version="1" comment="php53-sysvsem is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585050" version="1" comment="php53-sysvshm is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585051" version="1" comment="php53-tokenizer is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585052" version="1" comment="php53-wddx is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585053" version="1" comment="php53-xmlreader is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585054" version="1" comment="php53-xmlrpc is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585055" version="1" comment="php53-xmlwriter is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585056" version="1" comment="php53-xsl is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585057" version="1" comment="php53-zip is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585058" version="1" comment="php53-zlib is &lt;5.3.17-111.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585059" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585060" version="1" comment="php53 is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585061" version="1" comment="php53-bcmath is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585062" version="1" comment="php53-bz2 is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585063" version="1" comment="php53-calendar is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585064" version="1" comment="php53-ctype is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585065" version="1" comment="php53-curl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585066" version="1" comment="php53-dba is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585067" version="1" comment="php53-dom is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585068" version="1" comment="php53-exif is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585069" version="1" comment="php53-fastcgi is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585070" version="1" comment="php53-fileinfo is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585071" version="1" comment="php53-ftp is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585072" version="1" comment="php53-gd is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585073" version="1" comment="php53-gettext is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585074" version="1" comment="php53-gmp is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585075" version="1" comment="php53-iconv is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585076" version="1" comment="php53-intl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585077" version="1" comment="php53-json is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585078" version="1" comment="php53-ldap is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585079" version="1" comment="php53-mbstring is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585080" version="1" comment="php53-mcrypt is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585081" version="1" comment="php53-mysql is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585082" version="1" comment="php53-odbc is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585083" version="1" comment="php53-openssl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585084" version="1" comment="php53-pcntl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585085" version="1" comment="php53-pdo is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585086" version="1" comment="php53-pear is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585087" version="1" comment="php53-pgsql is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585088" version="1" comment="php53-pspell is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585089" version="1" comment="php53-shmop is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585090" version="1" comment="php53-snmp is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585091" version="1" comment="php53-soap is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585092" version="1" comment="php53-suhosin is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585093" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585094" version="1" comment="php53-sysvsem is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585095" version="1" comment="php53-sysvshm is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585096" version="1" comment="php53-tokenizer is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585097" version="1" comment="php53-wddx is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585098" version="1" comment="php53-xmlreader is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585099" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585100" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585101" version="1" comment="php53-xsl is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585102" version="1" comment="php53-zip is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585103" version="1" comment="php53-zlib is &lt;5.3.17-112.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585104" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585105" version="1" comment="php53 is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585106" version="1" comment="php53-bcmath is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585107" version="1" comment="php53-bz2 is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585108" version="1" comment="php53-calendar is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585109" version="1" comment="php53-ctype is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585110" version="1" comment="php53-curl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585111" version="1" comment="php53-dba is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585112" version="1" comment="php53-dom is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585113" version="1" comment="php53-exif is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585114" version="1" comment="php53-fastcgi is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585115" version="1" comment="php53-fileinfo is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585116" version="1" comment="php53-ftp is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585117" version="1" comment="php53-gd is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585118" version="1" comment="php53-gettext is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585119" version="1" comment="php53-gmp is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585120" version="1" comment="php53-iconv is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585121" version="1" comment="php53-intl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585122" version="1" comment="php53-json is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585123" version="1" comment="php53-ldap is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585124" version="1" comment="php53-mbstring is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585125" version="1" comment="php53-mcrypt is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585126" version="1" comment="php53-mysql is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585127" version="1" comment="php53-odbc is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585128" version="1" comment="php53-openssl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585129" version="1" comment="php53-pcntl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585130" version="1" comment="php53-pdo is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585131" version="1" comment="php53-pear is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585132" version="1" comment="php53-pgsql is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585133" version="1" comment="php53-pspell is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585134" version="1" comment="php53-shmop is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585135" version="1" comment="php53-snmp is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585136" version="1" comment="php53-soap is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585137" version="1" comment="php53-suhosin is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585138" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585139" version="1" comment="php53-sysvsem is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585140" version="1" comment="php53-sysvshm is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585141" version="1" comment="php53-tokenizer is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585142" version="1" comment="php53-wddx is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585143" version="1" comment="php53-xmlreader is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585144" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585145" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585146" version="1" comment="php53-xsl is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585147" version="1" comment="php53-zip is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585148" version="1" comment="php53-zlib is &lt;5.3.17-112.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585149" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585150" version="1" comment="php53 is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585151" version="1" comment="php53-bcmath is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585152" version="1" comment="php53-bz2 is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585153" version="1" comment="php53-calendar is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585154" version="1" comment="php53-ctype is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585155" version="1" comment="php53-curl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585156" version="1" comment="php53-dba is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585157" version="1" comment="php53-dom is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585158" version="1" comment="php53-exif is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585159" version="1" comment="php53-fastcgi is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585160" version="1" comment="php53-fileinfo is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585161" version="1" comment="php53-ftp is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585162" version="1" comment="php53-gd is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585163" version="1" comment="php53-gettext is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585164" version="1" comment="php53-gmp is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585165" version="1" comment="php53-iconv is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585166" version="1" comment="php53-intl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585167" version="1" comment="php53-json is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585168" version="1" comment="php53-ldap is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585169" version="1" comment="php53-mbstring is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585170" version="1" comment="php53-mcrypt is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585171" version="1" comment="php53-mysql is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585172" version="1" comment="php53-odbc is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585173" version="1" comment="php53-openssl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585174" version="1" comment="php53-pcntl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585175" version="1" comment="php53-pdo is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585176" version="1" comment="php53-pear is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585177" version="1" comment="php53-pgsql is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585178" version="1" comment="php53-pspell is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585179" version="1" comment="php53-shmop is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585180" version="1" comment="php53-snmp is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585181" version="1" comment="php53-soap is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585182" version="1" comment="php53-suhosin is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585183" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585184" version="1" comment="php53-sysvsem is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585185" version="1" comment="php53-sysvshm is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585186" version="1" comment="php53-tokenizer is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585187" version="1" comment="php53-wddx is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585188" version="1" comment="php53-xmlreader is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585189" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585190" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585191" version="1" comment="php53-xsl is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585192" version="1" comment="php53-zip is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585193" version="1" comment="php53-zlib is &lt;5.3.17-112.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585194" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585195" version="1" comment="php53 is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585196" version="1" comment="php53-bcmath is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585197" version="1" comment="php53-bz2 is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585198" version="1" comment="php53-calendar is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585199" version="1" comment="php53-ctype is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585200" version="1" comment="php53-curl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585201" version="1" comment="php53-dba is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585202" version="1" comment="php53-dom is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585203" version="1" comment="php53-exif is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585204" version="1" comment="php53-fastcgi is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585205" version="1" comment="php53-fileinfo is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585206" version="1" comment="php53-ftp is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585207" version="1" comment="php53-gd is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585208" version="1" comment="php53-gettext is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585209" version="1" comment="php53-gmp is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585210" version="1" comment="php53-iconv is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585211" version="1" comment="php53-intl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585212" version="1" comment="php53-json is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585213" version="1" comment="php53-ldap is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585214" version="1" comment="php53-mbstring is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585215" version="1" comment="php53-mcrypt is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585216" version="1" comment="php53-mysql is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585217" version="1" comment="php53-odbc is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585218" version="1" comment="php53-openssl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585219" version="1" comment="php53-pcntl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585220" version="1" comment="php53-pdo is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585221" version="1" comment="php53-pear is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585222" version="1" comment="php53-pgsql is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585223" version="1" comment="php53-pspell is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585224" version="1" comment="php53-shmop is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585225" version="1" comment="php53-snmp is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585226" version="1" comment="php53-soap is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585227" version="1" comment="php53-suhosin is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585228" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585229" version="1" comment="php53-sysvsem is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585230" version="1" comment="php53-sysvshm is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585231" version="1" comment="php53-tokenizer is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585232" version="1" comment="php53-wddx is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585233" version="1" comment="php53-xmlreader is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585234" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585235" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585236" version="1" comment="php53-xsl is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585237" version="1" comment="php53-zip is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585238" version="1" comment="php53-zlib is &lt;5.3.17-112.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585239" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585240" version="1" comment="php53 is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585241" version="1" comment="php53-bcmath is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585242" version="1" comment="php53-bz2 is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585243" version="1" comment="php53-calendar is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585244" version="1" comment="php53-ctype is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585245" version="1" comment="php53-curl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585246" version="1" comment="php53-dba is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585247" version="1" comment="php53-dom is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585248" version="1" comment="php53-exif is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585249" version="1" comment="php53-fastcgi is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585250" version="1" comment="php53-fileinfo is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585251" version="1" comment="php53-ftp is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585252" version="1" comment="php53-gd is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585253" version="1" comment="php53-gettext is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585254" version="1" comment="php53-gmp is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585255" version="1" comment="php53-iconv is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585256" version="1" comment="php53-intl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585257" version="1" comment="php53-json is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585258" version="1" comment="php53-ldap is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585259" version="1" comment="php53-mbstring is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585260" version="1" comment="php53-mcrypt is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585261" version="1" comment="php53-mysql is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585262" version="1" comment="php53-odbc is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585263" version="1" comment="php53-openssl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585264" version="1" comment="php53-pcntl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585265" version="1" comment="php53-pdo is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585266" version="1" comment="php53-pear is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585267" version="1" comment="php53-pgsql is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585268" version="1" comment="php53-pspell is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585269" version="1" comment="php53-shmop is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585270" version="1" comment="php53-snmp is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585271" version="1" comment="php53-soap is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585272" version="1" comment="php53-suhosin is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585273" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585274" version="1" comment="php53-sysvsem is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585275" version="1" comment="php53-sysvshm is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585276" version="1" comment="php53-tokenizer is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585277" version="1" comment="php53-wddx is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585278" version="1" comment="php53-xmlreader is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585279" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585280" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585281" version="1" comment="php53-xsl is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585282" version="1" comment="php53-zip is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585283" version="1" comment="php53-zlib is &lt;5.3.17-112.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585284" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585285" version="1" comment="php53 is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585286" version="1" comment="php53-bcmath is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585287" version="1" comment="php53-bz2 is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585288" version="1" comment="php53-calendar is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585289" version="1" comment="php53-ctype is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585290" version="1" comment="php53-curl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585291" version="1" comment="php53-dba is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585292" version="1" comment="php53-dom is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585293" version="1" comment="php53-exif is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585294" version="1" comment="php53-fastcgi is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585295" version="1" comment="php53-fileinfo is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585296" version="1" comment="php53-ftp is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585297" version="1" comment="php53-gd is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585298" version="1" comment="php53-gettext is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585299" version="1" comment="php53-gmp is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585300" version="1" comment="php53-iconv is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585301" version="1" comment="php53-intl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585302" version="1" comment="php53-json is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585303" version="1" comment="php53-ldap is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585304" version="1" comment="php53-mbstring is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585305" version="1" comment="php53-mcrypt is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585306" version="1" comment="php53-mysql is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585307" version="1" comment="php53-odbc is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585308" version="1" comment="php53-openssl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585309" version="1" comment="php53-pcntl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585310" version="1" comment="php53-pdo is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585311" version="1" comment="php53-pear is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585312" version="1" comment="php53-pgsql is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585313" version="1" comment="php53-pspell is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585314" version="1" comment="php53-shmop is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585315" version="1" comment="php53-snmp is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585316" version="1" comment="php53-soap is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585317" version="1" comment="php53-suhosin is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585318" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585319" version="1" comment="php53-sysvsem is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585320" version="1" comment="php53-sysvshm is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585321" version="1" comment="php53-tokenizer is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585322" version="1" comment="php53-wddx is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585323" version="1" comment="php53-xmlreader is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585324" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585325" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585326" version="1" comment="php53-xsl is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585327" version="1" comment="php53-zip is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585328" version="1" comment="php53-zlib is &lt;5.3.17-112.38.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585329" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585330" version="1" comment="php53 is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585331" version="1" comment="php53-bcmath is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585332" version="1" comment="php53-bz2 is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585333" version="1" comment="php53-calendar is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585334" version="1" comment="php53-ctype is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585335" version="1" comment="php53-curl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585336" version="1" comment="php53-dba is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585337" version="1" comment="php53-dom is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585338" version="1" comment="php53-exif is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585339" version="1" comment="php53-fastcgi is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585340" version="1" comment="php53-fileinfo is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585341" version="1" comment="php53-ftp is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585342" version="1" comment="php53-gd is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585343" version="1" comment="php53-gettext is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585344" version="1" comment="php53-gmp is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585345" version="1" comment="php53-iconv is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585346" version="1" comment="php53-intl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585347" version="1" comment="php53-json is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585348" version="1" comment="php53-ldap is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585349" version="1" comment="php53-mbstring is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585350" version="1" comment="php53-mcrypt is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585351" version="1" comment="php53-mysql is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585352" version="1" comment="php53-odbc is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585353" version="1" comment="php53-openssl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585354" version="1" comment="php53-pcntl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585355" version="1" comment="php53-pdo is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585356" version="1" comment="php53-pear is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585357" version="1" comment="php53-pgsql is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585358" version="1" comment="php53-pspell is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585359" version="1" comment="php53-shmop is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585360" version="1" comment="php53-snmp is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585361" version="1" comment="php53-soap is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585362" version="1" comment="php53-suhosin is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585363" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585364" version="1" comment="php53-sysvsem is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585365" version="1" comment="php53-sysvshm is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585366" version="1" comment="php53-tokenizer is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585367" version="1" comment="php53-wddx is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585368" version="1" comment="php53-xmlreader is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585369" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585370" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585371" version="1" comment="php53-xsl is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585372" version="1" comment="php53-zip is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585373" version="1" comment="php53-zlib is &lt;5.3.17-112.41.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585374" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585375" version="1" comment="php53 is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585376" version="1" comment="php53-bcmath is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585377" version="1" comment="php53-bz2 is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585378" version="1" comment="php53-calendar is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585379" version="1" comment="php53-ctype is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585380" version="1" comment="php53-curl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585381" version="1" comment="php53-dba is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585382" version="1" comment="php53-dom is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585383" version="1" comment="php53-exif is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585384" version="1" comment="php53-fastcgi is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585385" version="1" comment="php53-fileinfo is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585386" version="1" comment="php53-ftp is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585387" version="1" comment="php53-gd is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585388" version="1" comment="php53-gettext is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585389" version="1" comment="php53-gmp is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585390" version="1" comment="php53-iconv is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585391" version="1" comment="php53-intl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585392" version="1" comment="php53-json is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585393" version="1" comment="php53-ldap is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585394" version="1" comment="php53-mbstring is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585395" version="1" comment="php53-mcrypt is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585396" version="1" comment="php53-mysql is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585397" version="1" comment="php53-odbc is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585398" version="1" comment="php53-openssl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585399" version="1" comment="php53-pcntl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585400" version="1" comment="php53-pdo is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585401" version="1" comment="php53-pear is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585402" version="1" comment="php53-pgsql is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585403" version="1" comment="php53-pspell is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585404" version="1" comment="php53-shmop is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585405" version="1" comment="php53-snmp is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585406" version="1" comment="php53-soap is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585407" version="1" comment="php53-suhosin is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585408" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585409" version="1" comment="php53-sysvsem is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585410" version="1" comment="php53-sysvshm is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585411" version="1" comment="php53-tokenizer is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585412" version="1" comment="php53-wddx is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585413" version="1" comment="php53-xmlreader is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585414" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585415" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585416" version="1" comment="php53-xsl is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585417" version="1" comment="php53-zip is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585418" version="1" comment="php53-zlib is &lt;5.3.17-112.45.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585419" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585420" version="1" comment="php53 is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585421" version="1" comment="php53-bcmath is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585422" version="1" comment="php53-bz2 is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585423" version="1" comment="php53-calendar is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585424" version="1" comment="php53-ctype is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585425" version="1" comment="php53-curl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585426" version="1" comment="php53-dba is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585427" version="1" comment="php53-dom is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585428" version="1" comment="php53-exif is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585429" version="1" comment="php53-fastcgi is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585430" version="1" comment="php53-fileinfo is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585431" version="1" comment="php53-ftp is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585432" version="1" comment="php53-gd is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585433" version="1" comment="php53-gettext is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585434" version="1" comment="php53-gmp is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585435" version="1" comment="php53-iconv is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585436" version="1" comment="php53-intl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585437" version="1" comment="php53-json is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585438" version="1" comment="php53-ldap is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585439" version="1" comment="php53-mbstring is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585440" version="1" comment="php53-mcrypt is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585441" version="1" comment="php53-mysql is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585442" version="1" comment="php53-odbc is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585443" version="1" comment="php53-openssl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585444" version="1" comment="php53-pcntl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585445" version="1" comment="php53-pdo is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585446" version="1" comment="php53-pear is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585447" version="1" comment="php53-pgsql is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585448" version="1" comment="php53-pspell is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585449" version="1" comment="php53-shmop is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585450" version="1" comment="php53-snmp is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585451" version="1" comment="php53-soap is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585452" version="1" comment="php53-suhosin is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585453" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585454" version="1" comment="php53-sysvsem is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585455" version="1" comment="php53-sysvshm is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585456" version="1" comment="php53-tokenizer is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585457" version="1" comment="php53-wddx is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585458" version="1" comment="php53-xmlreader is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585459" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585460" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585461" version="1" comment="php53-xsl is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585462" version="1" comment="php53-zip is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585463" version="1" comment="php53-zlib is &lt;5.3.17-112.53.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585464" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585465" version="1" comment="php53 is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585466" version="1" comment="php53-bcmath is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585467" version="1" comment="php53-bz2 is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585468" version="1" comment="php53-calendar is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585469" version="1" comment="php53-ctype is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585470" version="1" comment="php53-curl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585471" version="1" comment="php53-dba is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585472" version="1" comment="php53-dom is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585473" version="1" comment="php53-exif is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585474" version="1" comment="php53-fastcgi is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585475" version="1" comment="php53-fileinfo is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585476" version="1" comment="php53-ftp is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585477" version="1" comment="php53-gd is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585478" version="1" comment="php53-gettext is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585479" version="1" comment="php53-gmp is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585480" version="1" comment="php53-iconv is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585481" version="1" comment="php53-intl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585482" version="1" comment="php53-json is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585483" version="1" comment="php53-ldap is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585484" version="1" comment="php53-mbstring is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585485" version="1" comment="php53-mcrypt is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585486" version="1" comment="php53-mysql is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585487" version="1" comment="php53-odbc is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585488" version="1" comment="php53-openssl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585489" version="1" comment="php53-pcntl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585490" version="1" comment="php53-pdo is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585491" version="1" comment="php53-pear is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585492" version="1" comment="php53-pgsql is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585493" version="1" comment="php53-pspell is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585494" version="1" comment="php53-shmop is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585495" version="1" comment="php53-snmp is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585496" version="1" comment="php53-soap is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585497" version="1" comment="php53-suhosin is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585498" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585499" version="1" comment="php53-sysvsem is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585500" version="1" comment="php53-sysvshm is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585501" version="1" comment="php53-tokenizer is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585502" version="1" comment="php53-wddx is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585503" version="1" comment="php53-xmlreader is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585504" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585505" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585506" version="1" comment="php53-xsl is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585507" version="1" comment="php53-zip is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585508" version="1" comment="php53-zlib is &lt;5.3.17-112.58.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585509" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585510" version="1" comment="php53 is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585511" version="1" comment="php53-bcmath is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585512" version="1" comment="php53-bz2 is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585513" version="1" comment="php53-calendar is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585514" version="1" comment="php53-ctype is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585515" version="1" comment="php53-curl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585516" version="1" comment="php53-dba is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585517" version="1" comment="php53-dom is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585518" version="1" comment="php53-exif is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585519" version="1" comment="php53-fastcgi is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585520" version="1" comment="php53-fileinfo is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585521" version="1" comment="php53-ftp is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585522" version="1" comment="php53-gd is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585523" version="1" comment="php53-gettext is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585524" version="1" comment="php53-gmp is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585525" version="1" comment="php53-iconv is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585526" version="1" comment="php53-intl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585527" version="1" comment="php53-json is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585528" version="1" comment="php53-ldap is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585529" version="1" comment="php53-mbstring is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585530" version="1" comment="php53-mcrypt is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585531" version="1" comment="php53-mysql is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585532" version="1" comment="php53-odbc is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585533" version="1" comment="php53-openssl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585534" version="1" comment="php53-pcntl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585535" version="1" comment="php53-pdo is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585536" version="1" comment="php53-pear is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585537" version="1" comment="php53-pgsql is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585538" version="1" comment="php53-pspell is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585539" version="1" comment="php53-shmop is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585540" version="1" comment="php53-snmp is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585541" version="1" comment="php53-soap is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585542" version="1" comment="php53-suhosin is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585543" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585544" version="1" comment="php53-sysvsem is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585545" version="1" comment="php53-sysvshm is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585546" version="1" comment="php53-tokenizer is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585547" version="1" comment="php53-wddx is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585548" version="1" comment="php53-xmlreader is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585549" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585550" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585551" version="1" comment="php53-xsl is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585552" version="1" comment="php53-zip is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585553" version="1" comment="php53-zlib is &lt;5.3.17-112.71.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585554" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585555" version="1" comment="php53 is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585556" version="1" comment="php53-bcmath is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585557" version="1" comment="php53-bz2 is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585558" version="1" comment="php53-calendar is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585559" version="1" comment="php53-ctype is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585560" version="1" comment="php53-curl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585561" version="1" comment="php53-dba is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585562" version="1" comment="php53-dom is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585563" version="1" comment="php53-exif is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585564" version="1" comment="php53-fastcgi is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585565" version="1" comment="php53-fileinfo is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585566" version="1" comment="php53-ftp is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585567" version="1" comment="php53-gd is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585568" version="1" comment="php53-gettext is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585569" version="1" comment="php53-gmp is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585570" version="1" comment="php53-iconv is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585571" version="1" comment="php53-intl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585572" version="1" comment="php53-json is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585573" version="1" comment="php53-ldap is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585574" version="1" comment="php53-mbstring is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585575" version="1" comment="php53-mcrypt is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585576" version="1" comment="php53-mysql is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585577" version="1" comment="php53-odbc is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585578" version="1" comment="php53-openssl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585579" version="1" comment="php53-pcntl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585580" version="1" comment="php53-pdo is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585581" version="1" comment="php53-pear is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585582" version="1" comment="php53-pgsql is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585583" version="1" comment="php53-pspell is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585584" version="1" comment="php53-shmop is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585585" version="1" comment="php53-snmp is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585586" version="1" comment="php53-soap is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585587" version="1" comment="php53-suhosin is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585588" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585589" version="1" comment="php53-sysvsem is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585590" version="1" comment="php53-sysvshm is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585591" version="1" comment="php53-tokenizer is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585592" version="1" comment="php53-wddx is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585593" version="1" comment="php53-xmlreader is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585594" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585595" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585596" version="1" comment="php53-xsl is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585597" version="1" comment="php53-zip is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585598" version="1" comment="php53-zlib is &lt;5.3.17-112.79.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585599" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585600" version="1" comment="php53 is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585601" version="1" comment="php53-bcmath is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585602" version="1" comment="php53-bz2 is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585603" version="1" comment="php53-calendar is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585604" version="1" comment="php53-ctype is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585605" version="1" comment="php53-curl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585606" version="1" comment="php53-dba is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585607" version="1" comment="php53-dom is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585608" version="1" comment="php53-exif is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585609" version="1" comment="php53-fastcgi is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585610" version="1" comment="php53-fileinfo is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585611" version="1" comment="php53-ftp is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585612" version="1" comment="php53-gd is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585613" version="1" comment="php53-gettext is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585614" version="1" comment="php53-gmp is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585615" version="1" comment="php53-iconv is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585616" version="1" comment="php53-intl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585617" version="1" comment="php53-json is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585618" version="1" comment="php53-ldap is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585619" version="1" comment="php53-mbstring is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585620" version="1" comment="php53-mcrypt is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585621" version="1" comment="php53-mysql is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585622" version="1" comment="php53-odbc is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585623" version="1" comment="php53-openssl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585624" version="1" comment="php53-pcntl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585625" version="1" comment="php53-pdo is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585626" version="1" comment="php53-pear is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585627" version="1" comment="php53-pgsql is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585628" version="1" comment="php53-pspell is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585629" version="1" comment="php53-shmop is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585630" version="1" comment="php53-snmp is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585631" version="1" comment="php53-soap is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585632" version="1" comment="php53-suhosin is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585633" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585634" version="1" comment="php53-sysvsem is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585635" version="1" comment="php53-sysvshm is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585636" version="1" comment="php53-tokenizer is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585637" version="1" comment="php53-wddx is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585638" version="1" comment="php53-xmlreader is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585639" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585640" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585641" version="1" comment="php53-xsl is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585642" version="1" comment="php53-zip is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585643" version="1" comment="php53-zlib is &lt;5.3.17-112.93.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585644" version="1" comment="apache2-mod_php53 is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585645" version="1" comment="php53 is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585646" version="1" comment="php53-bcmath is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585647" version="1" comment="php53-bz2 is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585648" version="1" comment="php53-calendar is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585649" version="1" comment="php53-ctype is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585650" version="1" comment="php53-curl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585651" version="1" comment="php53-dba is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585652" version="1" comment="php53-dom is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585653" version="1" comment="php53-exif is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585654" version="1" comment="php53-fastcgi is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585655" version="1" comment="php53-fileinfo is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585656" version="1" comment="php53-ftp is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585657" version="1" comment="php53-gd is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585658" version="1" comment="php53-gettext is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585659" version="1" comment="php53-gmp is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585660" version="1" comment="php53-iconv is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585661" version="1" comment="php53-intl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585662" version="1" comment="php53-json is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585663" version="1" comment="php53-ldap is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585664" version="1" comment="php53-mbstring is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585665" version="1" comment="php53-mcrypt is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585666" version="1" comment="php53-mysql is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585667" version="1" comment="php53-odbc is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585668" version="1" comment="php53-openssl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585669" version="1" comment="php53-pcntl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585670" version="1" comment="php53-pdo is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585671" version="1" comment="php53-pear is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585672" version="1" comment="php53-pgsql is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585673" version="1" comment="php53-pspell is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585674" version="1" comment="php53-shmop is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585675" version="1" comment="php53-snmp is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585676" version="1" comment="php53-soap is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585677" version="1" comment="php53-suhosin is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585678" version="1" comment="php53-sysvmsg is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585679" version="1" comment="php53-sysvsem is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585680" version="1" comment="php53-sysvshm is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585681" version="1" comment="php53-tokenizer is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585682" version="1" comment="php53-wddx is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585683" version="1" comment="php53-xmlreader is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585684" version="1" comment="php53-xmlrpc is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585685" version="1" comment="php53-xmlwriter is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585686" version="1" comment="php53-xsl is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585687" version="1" comment="php53-zip is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585688" version="1" comment="php53-zlib is &lt;5.3.17-112.99.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585689" version="1" comment="policycoreutils is &lt;2.0.79-4.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585690" version="1" comment="policycoreutils is &lt;2.0.79-4.9.3.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585691" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585692" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585693" version="1" comment="libpoppler5 is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585694" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585695" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585696" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585697" version="1" comment="libpoppler5 is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585698" version="1" comment="poppler-tools is &lt;0.12.3-1.13.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585699" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585700" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585701" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585702" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585703" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585704" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585705" version="1" comment="postgresql94-server is &lt;9.4.6-0.14.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585706" version="1" comment="libecpg6 is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585707" version="1" comment="libpq5 is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585708" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585709" version="1" comment="postgresql94 is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585710" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585711" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585712" version="1" comment="postgresql94-server is &lt;9.4.9-0.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585713" version="1" comment="libecpg6 is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585714" version="1" comment="libpq5 is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585715" version="1" comment="libpq5-32bit is &lt;9.4.12-0.22.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585716" version="1" comment="postgresql94 is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585717" version="1" comment="postgresql94-contrib is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585718" version="1" comment="postgresql94-docs is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585719" version="1" comment="postgresql94-server is &lt;9.4.12-0.22.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585720" version="1" comment="libecpg6 is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585721" version="1" comment="libpq5 is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585722" version="1" comment="libpq5-32bit is &lt;9.4.13-0.23.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585723" version="1" comment="postgresql94 is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585724" version="1" comment="postgresql94-contrib is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585725" version="1" comment="postgresql94-docs is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585726" version="1" comment="postgresql94-server is &lt;9.4.13-0.23.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585727" version="1" comment="libecpg6 is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585728" version="1" comment="libpq5 is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585729" version="1" comment="libpq5-32bit is &lt;9.4.15-0.23.10.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585730" version="1" comment="postgresql94 is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585731" version="1" comment="postgresql94-contrib is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585732" version="1" comment="postgresql94-docs is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585733" version="1" comment="postgresql94-server is &lt;9.4.15-0.23.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585734" version="1" comment="libecpg6 is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585735" version="1" comment="libpq5 is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585736" version="1" comment="libpq5-32bit is &lt;9.4.16-0.23.13.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585737" version="1" comment="postgresql94 is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585738" version="1" comment="postgresql94-contrib is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585739" version="1" comment="postgresql94-docs is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585740" version="1" comment="postgresql94-server is &lt;9.4.16-0.23.13.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585741" version="1" comment="libecpg6 is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585742" version="1" comment="libpq5 is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585743" version="1" comment="libpq5-32bit is &lt;9.4.17-0.23.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585744" version="1" comment="postgresql94 is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585745" version="1" comment="postgresql94-contrib is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585746" version="1" comment="postgresql94-docs is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585747" version="1" comment="postgresql94-server is &lt;9.4.17-0.23.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585748" version="1" comment="libecpg6 is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585749" version="1" comment="libpq5 is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585750" version="1" comment="libpq5-32bit is &lt;9.4.19-0.23.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585751" version="1" comment="postgresql94 is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585752" version="1" comment="postgresql94-contrib is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585753" version="1" comment="postgresql94-docs is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585754" version="1" comment="postgresql94-server is &lt;9.4.19-0.23.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585755" version="1" comment="ppp is &lt;2.4.5.git-2.31.7 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585756" version="1" comment="ppp is &lt;2.4.5.git-2.32.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585757" version="1" comment="procmail is &lt;3.22-240.8.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585758" version="1" comment="procps is &lt;3.2.7-152.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585759" version="1" comment="puppet is &lt;2.7.26-0.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585760" version="1" comment="puppet-server is &lt;2.7.26-0.5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585761" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585762" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585763" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585764" version="1" comment="python is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585765" version="1" comment="python-32bit is &lt;2.6.9-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585766" version="1" comment="python-base is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585767" version="1" comment="python-base-32bit is &lt;2.6.9-39.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585768" version="1" comment="python-base-x86 is &lt;2.6.9-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585769" version="1" comment="python-curses is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585770" version="1" comment="python-demo is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585771" version="1" comment="python-gdbm is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585772" version="1" comment="python-idle is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585773" version="1" comment="python-tk is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585774" version="1" comment="python-x86 is &lt;2.6.9-39.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585775" version="1" comment="python-xml is &lt;2.6.9-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585776" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585777" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585778" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585779" version="1" comment="python is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585780" version="1" comment="python-32bit is &lt;2.6.9-40.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585781" version="1" comment="python-base is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585782" version="1" comment="python-base-32bit is &lt;2.6.9-40.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585783" version="1" comment="python-base-x86 is &lt;2.6.9-40.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585784" version="1" comment="python-curses is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585785" version="1" comment="python-demo is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585786" version="1" comment="python-gdbm is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585787" version="1" comment="python-idle is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585788" version="1" comment="python-tk is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585789" version="1" comment="python-x86 is &lt;2.6.9-40.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585790" version="1" comment="python-xml is &lt;2.6.9-40.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585791" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585792" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585793" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585794" version="1" comment="python is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585795" version="1" comment="python-32bit is &lt;2.6.9-40.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585796" version="1" comment="python-base is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585797" version="1" comment="python-base-32bit is &lt;2.6.9-40.6.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585798" version="1" comment="python-base-x86 is &lt;2.6.9-40.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585799" version="1" comment="python-curses is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585800" version="1" comment="python-demo is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585801" version="1" comment="python-gdbm is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585802" version="1" comment="python-idle is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585803" version="1" comment="python-tk is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585804" version="1" comment="python-x86 is &lt;2.6.9-40.6.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585805" version="1" comment="python-xml is &lt;2.6.9-40.6.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585806" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585807" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585808" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585809" version="1" comment="python is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585810" version="1" comment="python-32bit is &lt;2.6.9-40.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585811" version="1" comment="python-base is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585812" version="1" comment="python-base-32bit is &lt;2.6.9-40.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585813" version="1" comment="python-base-x86 is &lt;2.6.9-40.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585814" version="1" comment="python-curses is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585815" version="1" comment="python-demo is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585816" version="1" comment="python-gdbm is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585817" version="1" comment="python-idle is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585818" version="1" comment="python-tk is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585819" version="1" comment="python-x86 is &lt;2.6.9-40.15.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585820" version="1" comment="python-xml is &lt;2.6.9-40.15.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585821" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585822" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585823" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-40.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585824" version="1" comment="python is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585825" version="1" comment="python-32bit is &lt;2.6.9-40.21.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585826" version="1" comment="python-base is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585827" version="1" comment="python-base-32bit is &lt;2.6.9-40.21.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585828" version="1" comment="python-base-x86 is &lt;2.6.9-40.21.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585829" version="1" comment="python-curses is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585830" version="1" comment="python-demo is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585831" version="1" comment="python-gdbm is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585832" version="1" comment="python-idle is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585833" version="1" comment="python-tk is &lt;2.6.9-40.21.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585834" version="1" comment="python-x86 is &lt;2.6.9-40.21.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585835" version="1" comment="python-xml is &lt;2.6.9-40.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585836" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585837" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585838" version="1" comment="python is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585839" version="1" comment="python-32bit is &lt;2.6.9-40.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585840" version="1" comment="python-base is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585841" version="1" comment="python-base-32bit is &lt;2.6.9-40.24.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585842" version="1" comment="python-curses is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585843" version="1" comment="python-demo is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585844" version="1" comment="python-gdbm is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585845" version="1" comment="python-idle is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585846" version="1" comment="python-tk is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585847" version="1" comment="python-xml is &lt;2.6.9-40.24.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585848" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585849" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585850" version="1" comment="python is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585851" version="1" comment="python-32bit is &lt;2.6.9-40.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585852" version="1" comment="python-base is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585853" version="1" comment="python-base-32bit is &lt;2.6.9-40.29.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585854" version="1" comment="python-curses is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585855" version="1" comment="python-demo is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585856" version="1" comment="python-gdbm is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585857" version="1" comment="python-idle is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585858" version="1" comment="python-tk is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585859" version="1" comment="python-xml is &lt;2.6.9-40.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585860" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585861" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585862" version="1" comment="python is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585863" version="1" comment="python-32bit is &lt;2.6.9-40.32.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585864" version="1" comment="python-base is &lt;2.6.9-40.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585865" version="1" comment="python-base-32bit is &lt;2.6.9-40.32.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585866" version="1" comment="python-curses is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585867" version="1" comment="python-demo is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585868" version="1" comment="python-gdbm is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585869" version="1" comment="python-idle is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585870" version="1" comment="python-tk is &lt;2.6.9-40.32.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585871" version="1" comment="python-xml is &lt;2.6.9-40.32.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585872" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585873" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585874" version="1" comment="python is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585875" version="1" comment="python-32bit is &lt;2.6.9-40.35.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585876" version="1" comment="python-base is &lt;2.6.9-40.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585877" version="1" comment="python-base-32bit is &lt;2.6.9-40.35.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585878" version="1" comment="python-curses is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585879" version="1" comment="python-demo is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585880" version="1" comment="python-gdbm is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585881" version="1" comment="python-idle is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585882" version="1" comment="python-tk is &lt;2.6.9-40.35.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585883" version="1" comment="python-xml is &lt;2.6.9-40.35.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585884" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585885" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-40.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585886" version="1" comment="python is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585887" version="1" comment="python-32bit is &lt;2.6.9-40.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585888" version="1" comment="python-base is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585889" version="1" comment="python-base-32bit is &lt;2.6.9-40.48.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585890" version="1" comment="python-curses is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585891" version="1" comment="python-demo is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585892" version="1" comment="python-gdbm is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585893" version="1" comment="python-idle is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585894" version="1" comment="python-tk is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585895" version="1" comment="python-xml is &lt;2.6.9-40.48.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585896" version="1" comment="python-numpy is &lt;1.8.0-6.4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585897" version="1" comment="quagga is &lt;0.99.15-0.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585898" version="1" comment="quagga is &lt;0.99.15-0.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585899" version="1" comment="quagga is &lt;0.99.15-0.24.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585900" version="1" comment="quagga is &lt;0.99.15-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585901" version="1" comment="quagga is &lt;0.99.15-0.30.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585902" version="1" comment="rsync is &lt;3.0.4-2.52.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585903" version="1" comment="rsync is &lt;3.0.4-2.53.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585904" version="1" comment="rsync is &lt;3.0.4-2.53.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585905" version="1" comment="ruby is &lt;1.8.7.p357-0.9.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585906" version="1" comment="rzsz is &lt;0.12.21~rc-936.3.1 for i586,ia64,ppc64,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585907" version="1" comment="ldapsmb is &lt;1.34b-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585908" version="1" comment="libldb1 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585909" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585910" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585911" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585912" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585913" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585914" version="1" comment="libtalloc2-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585915" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585916" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585917" version="1" comment="libtdb1-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585918" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585919" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585920" version="1" comment="libtevent0-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585921" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585922" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585923" version="1" comment="libwbclient0-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585924" version="1" comment="samba is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585925" version="1" comment="samba-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585926" version="1" comment="samba-client is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585927" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585928" version="1" comment="samba-client-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585929" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585930" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585931" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585932" version="1" comment="samba-winbind-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585933" version="1" comment="samba-x86 is &lt;3.6.3-67.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585934" version="1" comment="ldapsmb is &lt;1.34b-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585935" version="1" comment="libldb1 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585936" version="1" comment="libsmbclient0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585937" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585938" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585939" version="1" comment="libtalloc2 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585940" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585941" version="1" comment="libtalloc2-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585942" version="1" comment="libtdb1 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585943" version="1" comment="libtdb1-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585944" version="1" comment="libtdb1-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585945" version="1" comment="libtevent0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585946" version="1" comment="libtevent0-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585947" version="1" comment="libtevent0-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585948" version="1" comment="libwbclient0 is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585949" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585950" version="1" comment="libwbclient0-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585951" version="1" comment="samba is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585952" version="1" comment="samba-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585953" version="1" comment="samba-client is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585954" version="1" comment="samba-client-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585955" version="1" comment="samba-client-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585956" version="1" comment="samba-krb-printing is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585957" version="1" comment="samba-winbind is &lt;3.6.3-76.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585958" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585959" version="1" comment="samba-winbind-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585960" version="1" comment="samba-x86 is &lt;3.6.3-76.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585961" version="1" comment="ldapsmb is &lt;1.34b-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585962" version="1" comment="libldb1 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585963" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585964" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585965" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585966" version="1" comment="libtalloc2 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585967" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585968" version="1" comment="libtalloc2-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585969" version="1" comment="libtdb1 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585970" version="1" comment="libtdb1-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585971" version="1" comment="libtdb1-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585972" version="1" comment="libtevent0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585973" version="1" comment="libtevent0-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585974" version="1" comment="libtevent0-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585975" version="1" comment="libwbclient0 is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585976" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585977" version="1" comment="libwbclient0-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585978" version="1" comment="samba is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585979" version="1" comment="samba-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585980" version="1" comment="samba-client is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585981" version="1" comment="samba-client-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585982" version="1" comment="samba-client-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585983" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585984" version="1" comment="samba-winbind is &lt;3.6.3-84.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585985" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585986" version="1" comment="samba-winbind-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585987" version="1" comment="samba-x86 is &lt;3.6.3-84.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585988" version="1" comment="ldapsmb is &lt;1.34b-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585989" version="1" comment="libldb1 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585990" version="1" comment="libsmbclient0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585991" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585992" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585993" version="1" comment="libtalloc2 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585994" version="1" comment="libtalloc2-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585995" version="1" comment="libtalloc2-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585996" version="1" comment="libtdb1 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585997" version="1" comment="libtdb1-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585998" version="1" comment="libtdb1-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009585999" version="1" comment="libtevent0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586000" version="1" comment="libtevent0-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586001" version="1" comment="libtevent0-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586002" version="1" comment="libwbclient0 is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586003" version="1" comment="libwbclient0-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586004" version="1" comment="libwbclient0-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586005" version="1" comment="samba is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586006" version="1" comment="samba-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586007" version="1" comment="samba-client is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586008" version="1" comment="samba-client-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586009" version="1" comment="samba-client-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586010" version="1" comment="samba-krb-printing is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586011" version="1" comment="samba-winbind is &lt;3.6.3-87.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586012" version="1" comment="samba-winbind-32bit is &lt;3.6.3-87.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586013" version="1" comment="samba-winbind-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586014" version="1" comment="samba-x86 is &lt;3.6.3-87.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586015" version="1" comment="ldapsmb is &lt;1.34b-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586016" version="1" comment="libldb1 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586017" version="1" comment="libsmbclient0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586018" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586019" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586020" version="1" comment="libtalloc2 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586021" version="1" comment="libtalloc2-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586022" version="1" comment="libtalloc2-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586023" version="1" comment="libtdb1 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586024" version="1" comment="libtdb1-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586025" version="1" comment="libtdb1-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586026" version="1" comment="libtevent0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586027" version="1" comment="libtevent0-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586028" version="1" comment="libtevent0-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586029" version="1" comment="libwbclient0 is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586030" version="1" comment="libwbclient0-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586031" version="1" comment="libwbclient0-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586032" version="1" comment="samba is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586033" version="1" comment="samba-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586034" version="1" comment="samba-client is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586035" version="1" comment="samba-client-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586036" version="1" comment="samba-client-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586037" version="1" comment="samba-krb-printing is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586038" version="1" comment="samba-winbind is &lt;3.6.3-90.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586039" version="1" comment="samba-winbind-32bit is &lt;3.6.3-90.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586040" version="1" comment="samba-winbind-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586041" version="1" comment="samba-x86 is &lt;3.6.3-90.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586042" version="1" comment="ldapsmb is &lt;1.34b-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586043" version="1" comment="libldb1 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586044" version="1" comment="libsmbclient0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586045" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586046" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586047" version="1" comment="libtalloc2 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586048" version="1" comment="libtalloc2-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586049" version="1" comment="libtalloc2-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586050" version="1" comment="libtdb1 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586051" version="1" comment="libtdb1-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586052" version="1" comment="libtdb1-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586053" version="1" comment="libtevent0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586054" version="1" comment="libtevent0-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586055" version="1" comment="libtevent0-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586056" version="1" comment="libwbclient0 is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586057" version="1" comment="libwbclient0-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586058" version="1" comment="libwbclient0-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586059" version="1" comment="samba is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586060" version="1" comment="samba-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586061" version="1" comment="samba-client is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586062" version="1" comment="samba-client-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586063" version="1" comment="samba-client-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586064" version="1" comment="samba-krb-printing is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586065" version="1" comment="samba-winbind is &lt;3.6.3-93.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586066" version="1" comment="samba-winbind-32bit is &lt;3.6.3-93.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586067" version="1" comment="samba-winbind-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586068" version="1" comment="samba-x86 is &lt;3.6.3-93.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586069" version="1" comment="ldapsmb is &lt;1.34b-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586070" version="1" comment="libldb1 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586071" version="1" comment="libsmbclient0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586072" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586073" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586074" version="1" comment="libtalloc2 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586075" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586076" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586077" version="1" comment="libtdb1 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586078" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586079" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586080" version="1" comment="libtevent0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586081" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586082" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586083" version="1" comment="libwbclient0 is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586084" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586085" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586086" version="1" comment="samba is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586087" version="1" comment="samba-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586088" version="1" comment="samba-client is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586089" version="1" comment="samba-client-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586090" version="1" comment="samba-client-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586091" version="1" comment="samba-krb-printing is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586092" version="1" comment="samba-winbind is &lt;3.6.3-94.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586093" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.5.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586094" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586095" version="1" comment="samba-x86 is &lt;3.6.3-94.5.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586096" version="1" comment="ldapsmb is &lt;1.34b-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586097" version="1" comment="libldb1 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586098" version="1" comment="libsmbclient0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586099" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586100" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586101" version="1" comment="libtalloc2 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586102" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586103" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586104" version="1" comment="libtdb1 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586105" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586106" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586107" version="1" comment="libtevent0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586108" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586109" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586110" version="1" comment="libwbclient0 is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586111" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586112" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586113" version="1" comment="samba is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586114" version="1" comment="samba-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586115" version="1" comment="samba-client is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586116" version="1" comment="samba-client-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586117" version="1" comment="samba-client-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586118" version="1" comment="samba-krb-printing is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586119" version="1" comment="samba-winbind is &lt;3.6.3-94.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586120" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586121" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586122" version="1" comment="samba-x86 is &lt;3.6.3-94.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586123" version="1" comment="ldapsmb is &lt;1.34b-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586124" version="1" comment="libldb1 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586125" version="1" comment="libsmbclient0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586126" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586127" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586128" version="1" comment="libtalloc2 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586129" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586130" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586131" version="1" comment="libtdb1 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586132" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586133" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586134" version="1" comment="libtevent0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586135" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586136" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586137" version="1" comment="libwbclient0 is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586138" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586139" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586140" version="1" comment="samba is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586141" version="1" comment="samba-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586142" version="1" comment="samba-client is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586143" version="1" comment="samba-client-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586144" version="1" comment="samba-client-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586145" version="1" comment="samba-krb-printing is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586146" version="1" comment="samba-winbind is &lt;3.6.3-94.11.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586147" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.11.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586148" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586149" version="1" comment="samba-x86 is &lt;3.6.3-94.11.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586150" version="1" comment="ldapsmb is &lt;1.34b-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586151" version="1" comment="libldb1 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586152" version="1" comment="libsmbclient0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586153" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586154" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586155" version="1" comment="libtalloc2 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586156" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586157" version="1" comment="libtalloc2-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586158" version="1" comment="libtdb1 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586159" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586160" version="1" comment="libtdb1-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586161" version="1" comment="libtevent0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586162" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586163" version="1" comment="libtevent0-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586164" version="1" comment="libwbclient0 is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586165" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586166" version="1" comment="libwbclient0-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586167" version="1" comment="samba is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586168" version="1" comment="samba-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586169" version="1" comment="samba-client is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586170" version="1" comment="samba-client-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586171" version="1" comment="samba-client-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586172" version="1" comment="samba-krb-printing is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586173" version="1" comment="samba-winbind is &lt;3.6.3-94.14.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586174" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.14.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586175" version="1" comment="samba-winbind-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586176" version="1" comment="samba-x86 is &lt;3.6.3-94.14.2 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586177" version="1" comment="ldapsmb is &lt;1.34b-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586178" version="1" comment="libldb1 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586179" version="1" comment="libsmbclient0 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586180" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586181" version="1" comment="libtalloc2 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586182" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586183" version="1" comment="libtdb1 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586184" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586185" version="1" comment="libtevent0 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586186" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586187" version="1" comment="libwbclient0 is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586188" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586189" version="1" comment="samba is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586190" version="1" comment="samba-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586191" version="1" comment="samba-client is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586192" version="1" comment="samba-client-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586193" version="1" comment="samba-krb-printing is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586194" version="1" comment="samba-winbind is &lt;3.6.3-94.19.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586195" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.19.2 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586196" version="1" comment="ldapsmb is &lt;1.34b-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586197" version="1" comment="libldb1 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586198" version="1" comment="libsmbclient0 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586199" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586200" version="1" comment="libtalloc2 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586201" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586202" version="1" comment="libtdb1 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586203" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586204" version="1" comment="libtevent0 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586205" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586206" version="1" comment="libwbclient0 is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586207" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586208" version="1" comment="samba is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586209" version="1" comment="samba-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586210" version="1" comment="samba-client is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586211" version="1" comment="samba-client-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586212" version="1" comment="samba-krb-printing is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586213" version="1" comment="samba-winbind is &lt;3.6.3-94.23.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586214" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.23.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586215" version="1" comment="ldapsmb is &lt;1.34b-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586216" version="1" comment="libldb1 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586217" version="1" comment="libsmbclient0 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586218" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586219" version="1" comment="libtalloc2 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586220" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586221" version="1" comment="libtdb1 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586222" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586223" version="1" comment="libtevent0 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586224" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586225" version="1" comment="libwbclient0 is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586226" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586227" version="1" comment="samba is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586228" version="1" comment="samba-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586229" version="1" comment="samba-client is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586230" version="1" comment="samba-client-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586231" version="1" comment="samba-krb-printing is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586232" version="1" comment="samba-winbind is &lt;3.6.3-94.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586233" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586234" version="1" comment="ldapsmb is &lt;1.34b-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586235" version="1" comment="libldb1 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586236" version="1" comment="libsmbclient0 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586237" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586238" version="1" comment="libtalloc2 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586239" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586240" version="1" comment="libtdb1 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586241" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586242" version="1" comment="libtevent0 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586243" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586244" version="1" comment="libwbclient0 is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586245" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586246" version="1" comment="samba is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586247" version="1" comment="samba-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586248" version="1" comment="samba-client is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586249" version="1" comment="samba-client-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586250" version="1" comment="samba-krb-printing is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586251" version="1" comment="samba-winbind is &lt;3.6.3-94.31.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586252" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586253" version="1" comment="ldapsmb is &lt;1.34b-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586254" version="1" comment="libldb1 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586255" version="1" comment="libsmbclient0 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586256" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586257" version="1" comment="libtalloc2 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586258" version="1" comment="libtalloc2-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586259" version="1" comment="libtdb1 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586260" version="1" comment="libtdb1-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586261" version="1" comment="libtevent0 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586262" version="1" comment="libtevent0-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586263" version="1" comment="libwbclient0 is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586264" version="1" comment="libwbclient0-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586265" version="1" comment="samba is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586266" version="1" comment="samba-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586267" version="1" comment="samba-client is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586268" version="1" comment="samba-client-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586269" version="1" comment="samba-krb-printing is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586270" version="1" comment="samba-winbind is &lt;3.6.3-94.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586271" version="1" comment="samba-winbind-32bit is &lt;3.6.3-94.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586272" version="1" comment="libtevent0-x86 is &lt;3.6.3-64.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009137276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586273" version="1" comment="sane-backends is &lt;1.0.20-7.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586274" version="1" comment="sblim-sfcb is &lt;1.3.11-0.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586275" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586276" version="1" comment="libspice-server1 is &lt;0.12.4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586277" version="1" comment="libspice-server1 is &lt;0.12.4-8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586278" version="1" comment="libspice-server1 is &lt;0.12.4-11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586279" version="1" comment="libspice-server1 is &lt;0.12.4-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586280" version="1" comment="libspice-server1 is &lt;0.12.4-18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586281" version="1" comment="libspice-server1 is &lt;0.12.4-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586282" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586283" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586284" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586285" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586286" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586287" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586288" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.7.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586289" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586290" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586291" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586292" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586293" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586294" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.12.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586295" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626556" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.7.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626557" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.7.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626558" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.7.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586296" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670263" version="1" comment="squid is &lt;2.7.STABLE5-2.12.30.6.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586297" version="1" comment="squid3 is &lt;3.1.23-8.16.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586298" version="1" comment="squid3 is &lt;3.1.23-8.16.36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586299" version="1" comment="squid3 is &lt;3.1.23-8.16.37.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586300" version="1" comment="squid3 is &lt;3.1.23-8.16.37.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586301" version="1" comment="squid3 is &lt;3.1.23-8.16.37.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586302" version="1" comment="squid3 is &lt;3.1.23-8.16.37.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586303" version="1" comment="squid3 is &lt;3.1.23-8.16.37.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671880" version="1" comment="squid3 is &lt;3.1.23-8.16.37.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586304" version="1" comment="squidGuard is &lt;1.4-13.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586305" version="1" comment="squidGuard-doc is &lt;1.4-13.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586306" version="1" comment="strongswan is &lt;4.4.0-6.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586307" version="1" comment="strongswan-doc is &lt;4.4.0-6.29.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586308" version="1" comment="strongswan is &lt;4.4.0-6.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586309" version="1" comment="strongswan-doc is &lt;4.4.0-6.35.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586310" version="1" comment="strongswan is &lt;4.4.0-6.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586311" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652842" version="1" comment="strongswan is &lt;4.4.0-6.36.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652843" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.9.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664949" version="1" comment="strongswan is &lt;4.4.0-6.36.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664950" version="1" comment="strongswan-doc is &lt;4.4.0-6.36.12.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586312" version="1" comment="sudo is &lt;1.7.6p2-0.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586313" version="1" comment="sudo is &lt;1.7.6p2-0.30.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586314" version="1" comment="syslog-ng is &lt;2.0.9-27.34.40.5.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586315" version="1" comment="tar is &lt;1.26-1.2.10.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586316" version="1" comment="tar is &lt;1.27.1-14.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586317" version="1" comment="tboot is &lt;20120115_1.7.0-0.5.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586318" version="1" comment="tcpdump is &lt;3.9.8-1.29.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586319" version="1" comment="tcpdump is &lt;3.9.8-1.30.5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586320" version="1" comment="tcpdump is &lt;3.9.8-1.30.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668245" version="1" comment="tcpdump is &lt;3.9.8-1.30.19.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586321" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586322" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586323" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.163.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586324" version="1" comment="tiff is &lt;3.8.2-141.163.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586325" version="1" comment="libtiff3 is &lt;3.8.2-141.168.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586326" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586327" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.168.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586328" version="1" comment="tiff is &lt;3.8.2-141.168.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586329" version="1" comment="libtiff3 is &lt;3.8.2-141.169.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586330" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586331" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586332" version="1" comment="tiff is &lt;3.8.2-141.169.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586333" version="1" comment="libtiff3 is &lt;3.8.2-141.169.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586334" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.6.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586335" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.6.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586336" version="1" comment="tiff is &lt;3.8.2-141.169.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586337" version="1" comment="libtiff3 is &lt;3.8.2-141.169.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586338" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586339" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586340" version="1" comment="tiff is &lt;3.8.2-141.169.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586341" version="1" comment="libtiff3 is &lt;3.8.2-141.169.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586342" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.16.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586343" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.16.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586344" version="1" comment="tiff is &lt;3.8.2-141.169.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586345" version="1" comment="libtiff3 is &lt;3.8.2-141.169.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586346" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.19.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586347" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.19.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586348" version="1" comment="tiff is &lt;3.8.2-141.169.19.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586349" version="1" comment="libtiff3 is &lt;3.8.2-141.169.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586350" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.22.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586351" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.22.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586352" version="1" comment="tiff is &lt;3.8.2-141.169.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586353" version="1" comment="libtiff3 is &lt;3.8.2-141.169.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586354" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.26.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586355" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.26.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586356" version="1" comment="tiff is &lt;3.8.2-141.169.26.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586357" version="1" comment="libtiff3 is &lt;3.8.2-141.169.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586358" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.31.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586359" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.169.31.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586360" version="1" comment="tiff is &lt;3.8.2-141.169.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666467" version="1" comment="libtiff3 is &lt;3.8.2-141.169.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666468" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.169.34.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666469" version="1" comment="tiff is &lt;3.8.2-141.169.34.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586361" version="1" comment="tightvnc is &lt;1.3.9-81.15.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586362" version="1" comment="tomcat6 is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586363" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586364" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586365" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586366" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586367" version="1" comment="tomcat6-lib is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586368" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586369" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586370" version="1" comment="transfig is &lt;3.2.5-160.3.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651177" version="1" comment="transfig is &lt;3.2.8a-1.160.13.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653707" version="1" comment="transfig is &lt;3.2.8b-160.16.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586371" version="1" comment="unrar is &lt;3.80.2-4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586372" version="1" comment="unrar is &lt;5.6.1-5.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586373" version="1" comment="unzip is &lt;6.00-11.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586374" version="1" comment="unzip is &lt;6.00-11.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586375" version="1" comment="unzip is &lt;6.00-11.18.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586376" version="1" comment="gvim is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586377" version="1" comment="vim is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586378" version="1" comment="vim-base is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586379" version="1" comment="vim-data is &lt;7.2-8.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586380" version="1" comment="gvim is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586381" version="1" comment="vim is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586382" version="1" comment="vim-base is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586383" version="1" comment="vim-data is &lt;7.2-8.20.8 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586384" version="1" comment="gvim is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586385" version="1" comment="vim is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586386" version="1" comment="vim-base is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586387" version="1" comment="vim-data is &lt;7.2-8.21.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586388" version="1" comment="gvim is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586389" version="1" comment="vim is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586390" version="1" comment="vim-base is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586391" version="1" comment="vim-data is &lt;7.2-8.21.6.2 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586392" version="1" comment="w3m is &lt;0.5.3.git20161120-4.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586393" version="1" comment="libwavpack1 is &lt;4.50.1-1.27.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586394" version="1" comment="libwavpack1 is &lt;4.50.1-1.30.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586395" version="1" comment="libwavpack1 is &lt;4.50.1-1.33.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586396" version="1" comment="wget is &lt;1.11.4-1.32.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586397" version="1" comment="wget is &lt;1.11.4-1.40.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586398" version="1" comment="wget is &lt;1.11.4-1.41.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586399" version="1" comment="wireshark is &lt;1.12.11-0.18.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586400" version="1" comment="wireshark is &lt;1.12.13-0.23.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586401" version="1" comment="wireshark is &lt;2.0.12-36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586402" version="1" comment="wireshark-gtk is &lt;2.0.12-36.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586403" version="1" comment="wireshark is &lt;2.0.13-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586404" version="1" comment="wireshark-gtk is &lt;2.0.13-39.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586405" version="1" comment="wireshark is &lt;2.0.14-40.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586406" version="1" comment="wireshark-gtk is &lt;2.0.14-40.7.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586407" version="1" comment="libwireshark8 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586408" version="1" comment="libwiretap6 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586409" version="1" comment="libwscodecs1 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586410" version="1" comment="libwsutil7 is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586411" version="1" comment="wireshark is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586412" version="1" comment="wireshark-gtk is &lt;2.2.11-40.14.5 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586413" version="1" comment="libwireshark8 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586414" version="1" comment="libwiretap6 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586415" version="1" comment="libwscodecs1 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586416" version="1" comment="libwsutil7 is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586417" version="1" comment="wireshark is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586418" version="1" comment="wireshark-gtk is &lt;2.2.12-40.17.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586419" version="1" comment="libwireshark8 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586420" version="1" comment="libwiretap6 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586421" version="1" comment="libwscodecs1 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586422" version="1" comment="libwsutil7 is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586423" version="1" comment="wireshark is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586424" version="1" comment="wireshark-gtk is &lt;2.2.13-40.22.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586425" version="1" comment="libwireshark8 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586426" version="1" comment="libwiretap6 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586427" version="1" comment="libwscodecs1 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586428" version="1" comment="libwsutil7 is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586429" version="1" comment="wireshark is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586430" version="1" comment="wireshark-gtk is &lt;2.2.14-40.25.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586431" version="1" comment="libwireshark8 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586432" version="1" comment="libwiretap6 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586433" version="1" comment="libwscodecs1 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586434" version="1" comment="libwsutil7 is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586435" version="1" comment="wireshark is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586436" version="1" comment="wireshark-gtk is &lt;2.2.16-40.28.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586437" version="1" comment="libwireshark8 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586438" version="1" comment="libwiretap6 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586439" version="1" comment="libwscodecs1 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586440" version="1" comment="libwsutil7 is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586441" version="1" comment="wireshark is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586442" version="1" comment="wireshark-gtk is &lt;2.2.17-40.31.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586443" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586444" version="1" comment="wpa_supplicant is &lt;0.7.1-6.18.6.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586445" version="1" comment="xen is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586446" version="1" comment="xen-doc-html is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586447" version="1" comment="xen-kmp-default is &lt;4.4.4_07_3.0.101_77-37.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586448" version="1" comment="xen-kmp-pae is &lt;4.4.4_07_3.0.101_77-37.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586449" version="1" comment="xen-libs is &lt;4.4.4_07-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586450" version="1" comment="xen-libs-32bit is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586451" version="1" comment="xen-tools is &lt;4.4.4_07-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586452" version="1" comment="xen-tools-domU is &lt;4.4.4_07-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586453" version="1" comment="xen is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586454" version="1" comment="xen-doc-html is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586455" version="1" comment="xen-kmp-default is &lt;4.4.4_08_3.0.101_80-40.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586456" version="1" comment="xen-kmp-pae is &lt;4.4.4_08_3.0.101_80-40.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586457" version="1" comment="xen-libs is &lt;4.4.4_08-40.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586458" version="1" comment="xen-libs-32bit is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586459" version="1" comment="xen-tools is &lt;4.4.4_08-40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586460" version="1" comment="xen-tools-domU is &lt;4.4.4_08-40.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586461" version="1" comment="xen is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586462" version="1" comment="xen-doc-html is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586463" version="1" comment="xen-kmp-default is &lt;4.4.4_10_3.0.101_88-43.5 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586464" version="1" comment="xen-kmp-pae is &lt;4.4.4_10_3.0.101_88-43.5 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586465" version="1" comment="xen-libs is &lt;4.4.4_10-43.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586466" version="1" comment="xen-libs-32bit is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586467" version="1" comment="xen-tools is &lt;4.4.4_10-43.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586468" version="1" comment="xen-tools-domU is &lt;4.4.4_10-43.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586469" version="1" comment="xen is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586470" version="1" comment="xen-doc-html is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586471" version="1" comment="xen-kmp-default is &lt;4.4.4_12_3.0.101_91-46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586472" version="1" comment="xen-kmp-pae is &lt;4.4.4_12_3.0.101_91-46.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586473" version="1" comment="xen-libs is &lt;4.4.4_12-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586474" version="1" comment="xen-libs-32bit is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586475" version="1" comment="xen-tools is &lt;4.4.4_12-46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586476" version="1" comment="xen-tools-domU is &lt;4.4.4_12-46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586477" version="1" comment="xen is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586478" version="1" comment="xen-doc-html is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586479" version="1" comment="xen-kmp-default is &lt;4.4.4_14_3.0.101_94-51.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586480" version="1" comment="xen-kmp-pae is &lt;4.4.4_14_3.0.101_94-51.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586481" version="1" comment="xen-libs is &lt;4.4.4_14-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586482" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586483" version="1" comment="xen-tools is &lt;4.4.4_14-51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586484" version="1" comment="xen-tools-domU is &lt;4.4.4_14-51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586485" version="1" comment="xen is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586486" version="1" comment="xen-doc-html is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586487" version="1" comment="xen-kmp-default is &lt;4.4.4_16_3.0.101_97-54.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586488" version="1" comment="xen-kmp-pae is &lt;4.4.4_16_3.0.101_97-54.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586489" version="1" comment="xen-libs is &lt;4.4.4_16-54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586490" version="1" comment="xen-libs-32bit is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586491" version="1" comment="xen-tools is &lt;4.4.4_16-54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586492" version="1" comment="xen-tools-domU is &lt;4.4.4_16-54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586493" version="1" comment="xen is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586494" version="1" comment="xen-doc-html is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586495" version="1" comment="xen-kmp-default is &lt;4.4.4_18_3.0.101_97-57.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586496" version="1" comment="xen-kmp-pae is &lt;4.4.4_18_3.0.101_97-57.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586497" version="1" comment="xen-libs is &lt;4.4.4_18-57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586498" version="1" comment="xen-libs-32bit is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586499" version="1" comment="xen-tools is &lt;4.4.4_18-57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586500" version="1" comment="xen-tools-domU is &lt;4.4.4_18-57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586501" version="1" comment="xen is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586502" version="1" comment="xen-doc-html is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586503" version="1" comment="xen-kmp-default is &lt;4.4.4_20_3.0.101_104-60.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586504" version="1" comment="xen-kmp-pae is &lt;4.4.4_20_3.0.101_104-60.3 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586505" version="1" comment="xen-libs is &lt;4.4.4_20-60.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586506" version="1" comment="xen-libs-32bit is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586507" version="1" comment="xen-tools is &lt;4.4.4_20-60.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586508" version="1" comment="xen-tools-domU is &lt;4.4.4_20-60.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586509" version="1" comment="xen is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586510" version="1" comment="xen-doc-html is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586511" version="1" comment="xen-kmp-default is &lt;4.4.4_22_3.0.101_108.7-61.9.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586512" version="1" comment="xen-kmp-pae is &lt;4.4.4_22_3.0.101_108.7-61.9.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586513" version="1" comment="xen-libs is &lt;4.4.4_22-61.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586514" version="1" comment="xen-libs-32bit is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586515" version="1" comment="xen-tools is &lt;4.4.4_22-61.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586516" version="1" comment="xen-tools-domU is &lt;4.4.4_22-61.9.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586517" version="1" comment="xen is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586518" version="1" comment="xen-doc-html is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586519" version="1" comment="xen-kmp-default is &lt;4.4.4_24_3.0.101_108.10-61.12.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586520" version="1" comment="xen-kmp-pae is &lt;4.4.4_24_3.0.101_108.10-61.12.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586521" version="1" comment="xen-libs is &lt;4.4.4_24-61.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586522" version="1" comment="xen-libs-32bit is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586523" version="1" comment="xen-tools is &lt;4.4.4_24-61.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586524" version="1" comment="xen-tools-domU is &lt;4.4.4_24-61.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586525" version="1" comment="xen is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586526" version="1" comment="xen-doc-html is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586527" version="1" comment="xen-kmp-default is &lt;4.4.4_26_3.0.101_108.13-61.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586528" version="1" comment="xen-kmp-pae is &lt;4.4.4_26_3.0.101_108.13-61.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586529" version="1" comment="xen-libs is &lt;4.4.4_26-61.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586530" version="1" comment="xen-libs-32bit is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586531" version="1" comment="xen-tools is &lt;4.4.4_26-61.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586532" version="1" comment="xen-tools-domU is &lt;4.4.4_26-61.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586533" version="1" comment="xen is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586534" version="1" comment="xen-doc-html is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586535" version="1" comment="xen-kmp-default is &lt;4.4.4_28_3.0.101_108.35-61.23.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586536" version="1" comment="xen-kmp-pae is &lt;4.4.4_28_3.0.101_108.35-61.23.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586537" version="1" comment="xen-libs is &lt;4.4.4_28-61.23.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586538" version="1" comment="xen-libs-32bit is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586539" version="1" comment="xen-tools is &lt;4.4.4_28-61.23.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586540" version="1" comment="xen-tools-domU is &lt;4.4.4_28-61.23.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586541" version="1" comment="xen is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586542" version="1" comment="xen-doc-html is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586543" version="1" comment="xen-kmp-default is &lt;4.4.4_30_3.0.101_108.38-61.26.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586544" version="1" comment="xen-kmp-pae is &lt;4.4.4_30_3.0.101_108.38-61.26.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586545" version="1" comment="xen-libs is &lt;4.4.4_30-61.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586546" version="1" comment="xen-libs-32bit is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586547" version="1" comment="xen-tools is &lt;4.4.4_30-61.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586548" version="1" comment="xen-tools-domU is &lt;4.4.4_30-61.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586549" version="1" comment="xen is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586550" version="1" comment="xen-doc-html is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586551" version="1" comment="xen-kmp-default is &lt;4.4.4_32_3.0.101_108.52-61.29.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586552" version="1" comment="xen-kmp-pae is &lt;4.4.4_32_3.0.101_108.52-61.29.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586553" version="1" comment="xen-libs is &lt;4.4.4_32-61.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586554" version="1" comment="xen-libs-32bit is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586555" version="1" comment="xen-tools is &lt;4.4.4_32-61.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586556" version="1" comment="xen-tools-domU is &lt;4.4.4_32-61.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586557" version="1" comment="xen is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586558" version="1" comment="xen-doc-html is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586559" version="1" comment="xen-kmp-default is &lt;4.4.4_34_3.0.101_108.57-61.32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586560" version="1" comment="xen-kmp-pae is &lt;4.4.4_34_3.0.101_108.57-61.32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586561" version="1" comment="xen-libs is &lt;4.4.4_34-61.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586562" version="1" comment="xen-libs-32bit is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586563" version="1" comment="xen-tools is &lt;4.4.4_34-61.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586564" version="1" comment="xen-tools-domU is &lt;4.4.4_34-61.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586565" version="1" comment="xen is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586566" version="1" comment="xen-doc-html is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586567" version="1" comment="xen-kmp-default is &lt;4.4.4_36_3.0.101_108.68-61.37.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586568" version="1" comment="xen-kmp-pae is &lt;4.4.4_36_3.0.101_108.68-61.37.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586569" version="1" comment="xen-libs is &lt;4.4.4_36-61.37.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586570" version="1" comment="xen-libs-32bit is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586571" version="1" comment="xen-tools is &lt;4.4.4_36-61.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586572" version="1" comment="xen-tools-domU is &lt;4.4.4_36-61.37.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586573" version="1" comment="xen is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586574" version="1" comment="xen-doc-html is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586575" version="1" comment="xen-kmp-default is &lt;4.4.4_38_3.0.101_108.84-61.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586576" version="1" comment="xen-kmp-pae is &lt;4.4.4_38_3.0.101_108.84-61.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586577" version="1" comment="xen-libs is &lt;4.4.4_38-61.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586578" version="1" comment="xen-libs-32bit is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586579" version="1" comment="xen-tools is &lt;4.4.4_38-61.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586580" version="1" comment="xen-tools-domU is &lt;4.4.4_38-61.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586581" version="1" comment="xen is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586582" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586583" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.87-61.43.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586584" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.87-61.43.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586585" version="1" comment="xen-libs is &lt;4.4.4_40-61.43.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586586" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586587" version="1" comment="xen-tools is &lt;4.4.4_40-61.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586588" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.43.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586589" version="1" comment="xen is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586590" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586591" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.90-61.46.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586592" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.90-61.46.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586593" version="1" comment="xen-libs is &lt;4.4.4_40-61.46.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586594" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586595" version="1" comment="xen-tools is &lt;4.4.4_40-61.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586596" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.46.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586597" version="1" comment="xen is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586598" version="1" comment="xen-doc-html is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586599" version="1" comment="xen-kmp-default is &lt;4.4.4_40_3.0.101_108.101-61.49.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586600" version="1" comment="xen-kmp-pae is &lt;4.4.4_40_3.0.101_108.101-61.49.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586601" version="1" comment="xen-libs is &lt;4.4.4_40-61.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586602" version="1" comment="xen-libs-32bit is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586603" version="1" comment="xen-tools is &lt;4.4.4_40-61.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586604" version="1" comment="xen-tools-domU is &lt;4.4.4_40-61.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586605" version="1" comment="xen is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586606" version="1" comment="xen-doc-html is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586607" version="1" comment="xen-kmp-default is &lt;4.4.4_42_3.0.101_108.114-61.52.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586608" version="1" comment="xen-kmp-pae is &lt;4.4.4_42_3.0.101_108.114-61.52.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586609" version="1" comment="xen-libs is &lt;4.4.4_42-61.52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586610" version="1" comment="xen-libs-32bit is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586611" version="1" comment="xen-tools is &lt;4.4.4_42-61.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586612" version="1" comment="xen-tools-domU is &lt;4.4.4_42-61.52.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586613" version="1" comment="xen is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586614" version="1" comment="xen-doc-html is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586615" version="1" comment="xen-kmp-default is &lt;4.4.4_44_3.0.101_108.117-61.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586616" version="1" comment="xen-kmp-pae is &lt;4.4.4_44_3.0.101_108.117-61.55.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586617" version="1" comment="xen-libs is &lt;4.4.4_44-61.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586618" version="1" comment="xen-libs-32bit is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586619" version="1" comment="xen-tools is &lt;4.4.4_44-61.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586620" version="1" comment="xen-tools-domU is &lt;4.4.4_44-61.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586621" version="1" comment="xen is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586622" version="1" comment="xen-doc-html is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586623" version="1" comment="xen-kmp-default is &lt;4.4.4_46_3.0.101_108.117-61.58.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586624" version="1" comment="xen-kmp-pae is &lt;4.4.4_46_3.0.101_108.117-61.58.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586625" version="1" comment="xen-libs is &lt;4.4.4_46-61.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586626" version="1" comment="xen-libs-32bit is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586627" version="1" comment="xen-tools is &lt;4.4.4_46-61.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586628" version="1" comment="xen-tools-domU is &lt;4.4.4_46-61.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586629" version="1" comment="xen is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586630" version="1" comment="xen-doc-html is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586631" version="1" comment="xen-kmp-default is &lt;4.4.4_48_3.0.101_108.117-61.61.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586632" version="1" comment="xen-kmp-pae is &lt;4.4.4_48_3.0.101_108.117-61.61.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586633" version="1" comment="xen-libs is &lt;4.4.4_48-61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586634" version="1" comment="xen-libs-32bit is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586635" version="1" comment="xen-tools is &lt;4.4.4_48-61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586636" version="1" comment="xen-tools-domU is &lt;4.4.4_48-61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586637" version="1" comment="xen is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586638" version="1" comment="xen-doc-html is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586639" version="1" comment="xen-kmp-default is &lt;4.4.4_48_3.0.101_108.123-61.64.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586640" version="1" comment="xen-kmp-pae is &lt;4.4.4_48_3.0.101_108.123-61.64.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586641" version="1" comment="xen-libs is &lt;4.4.4_48-61.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586642" version="1" comment="xen-libs-32bit is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586643" version="1" comment="xen-tools is &lt;4.4.4_48-61.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586644" version="1" comment="xen-tools-domU is &lt;4.4.4_48-61.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658848" version="1" comment="xen is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658849" version="1" comment="xen-doc-html is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658850" version="1" comment="xen-kmp-default is &lt;4.4.4_50_3.0.101_108.129-61.67.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658851" version="1" comment="xen-kmp-pae is &lt;4.4.4_50_3.0.101_108.129-61.67.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658852" version="1" comment="xen-libs is &lt;4.4.4_50-61.67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658853" version="1" comment="xen-libs-32bit is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658854" version="1" comment="xen-tools is &lt;4.4.4_50-61.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658855" version="1" comment="xen-tools-domU is &lt;4.4.4_50-61.67.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666470" version="1" comment="xen is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666471" version="1" comment="xen-doc-html is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666472" version="1" comment="xen-kmp-default is &lt;4.4.4_52_3.0.101_108.132-61.70.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666473" version="1" comment="xen-kmp-pae is &lt;4.4.4_52_3.0.101_108.132-61.70.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666474" version="1" comment="xen-libs is &lt;4.4.4_52-61.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666475" version="1" comment="xen-libs-32bit is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666476" version="1" comment="xen-tools is &lt;4.4.4_52-61.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666477" version="1" comment="xen-tools-domU is &lt;4.4.4_52-61.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586645" version="1" comment="xorg-x11-libICE is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586646" version="1" comment="xorg-x11-libICE-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586647" version="1" comment="xorg-x11-libICE-x86 is &lt;7.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586648" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586649" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586650" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.65.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586651" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586652" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586653" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.68.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586654" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.9.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586655" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.9.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586656" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.72.9.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586657" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.15.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586658" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.15.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586659" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.18.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586660" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.18.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586661" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.72.27.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586662" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.72.27.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586663" version="1" comment="xorg-x11-libXdmcp is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586664" version="1" comment="xorg-x11-libXdmcp-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586665" version="1" comment="xorg-x11-libXdmcp-x86 is &lt;7.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586666" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586667" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586668" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586669" version="1" comment="xorg-x11-libXpm is &lt;7.4-3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586670" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586671" version="1" comment="xorg-x11-libXpm-x86 is &lt;7.4-3.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586672" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586673" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586674" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586675" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586676" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586677" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.20.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586678" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586679" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586680" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.49.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586681" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.5.3 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586682" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.5.3 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586683" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.5.3 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586684" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.50.8.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586685" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.50.8.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586686" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.50.8.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586687" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586688" version="1" comment="xorg-x11-server is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586689" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.118.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586690" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586691" version="1" comment="xorg-x11-server is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586692" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.121.2 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586693" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586694" version="1" comment="xorg-x11-server is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586695" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.16.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586696" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586697" version="1" comment="xorg-x11-server is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586698" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.21.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586699" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586700" version="1" comment="xorg-x11-server is &lt;7.4-27.122.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586701" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.26.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586702" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586703" version="1" comment="xorg-x11-server is &lt;7.4-27.122.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586704" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.29.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586705" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586706" version="1" comment="xorg-x11-server is &lt;7.4-27.122.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586707" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.37.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586708" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586709" version="1" comment="xorg-x11-server is &lt;7.4-27.122.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586710" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.40.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659915" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659916" version="1" comment="xorg-x11-server is &lt;7.4-27.122.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659917" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.43.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660950" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.122.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660951" version="1" comment="xorg-x11-server is &lt;7.4-27.122.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660952" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.122.46.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586711" version="1" comment="xterm is &lt;238-3.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679347" version="1" comment="liblzma5 is &lt;5.0.3-0.12.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679348" version="1" comment="liblzma5-32bit is &lt;5.0.3-0.12.7.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679349" version="1" comment="xz is &lt;5.0.3-0.12.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679350" version="1" comment="xz-lang is &lt;5.0.3-0.12.7.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586712" version="1" comment="yast2-storage is &lt;2.17.161-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586713" version="1" comment="yast2-storage-lib is &lt;2.17.161-5.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586714" version="1" comment="zlib is &lt;1.2.7-0.14.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586715" version="1" comment="zlib-32bit is &lt;1.2.7-0.14.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586716" version="1" comment="zlib-x86 is &lt;1.2.7-0.14.1 for ia64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677181" version="1" comment="zlib is &lt;1.2.7-0.17.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677182" version="1" comment="zlib-32bit is &lt;1.2.7-0.17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677953" version="1" comment="zlib-devel is &lt;1.2.7-0.17.3.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677954" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.17.3.1 for ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586717" version="1" comment="zsh is &lt;4.3.6-67.9.3.1 for i586,ia64,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671297" version="1" comment="zsh is &lt;4.3.6-67.9.8.1 for i586,ppc64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157975"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fvwm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acpid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpv6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libwww-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-trax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcharselect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdessh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfloppy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktimer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwikdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okteta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libldap-2_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-dmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-rdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-openssl1-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-sdk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-nodeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winfxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>misc-console-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-testtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_8-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-gnome-vfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obex-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-Pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppower4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-cache-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-1_6_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-capng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb_java-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libofx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmythes-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-importlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmxml1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SOAP-Lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portaudio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-digestmd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread_ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cabextract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ui-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-avc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-v4l2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-hae-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>csync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-heartbeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldirectord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-pos-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Minimal3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Netboot-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Migration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Admin3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminGUI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-BranchTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Modules3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>posbios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio_cdda0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio_paranoia0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tightvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brocade-bna-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLE_RT-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sap_suse_cluster_connector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamsap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-certs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-cfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-osad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-remote-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-client-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-client-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-wrouesnel-postgres_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-custom-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mgr-push</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-uyuni-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-oscap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils-plugin-susemanager-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE_SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-file-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akonadi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akregator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kaddressbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kalarm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kjots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kontact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-korganizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktimetracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktnef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4-wizards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libakonadi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knewsticker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>websphere-as_ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-cim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pptp-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasmoid-networkmanagement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amanda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-crashdb-sle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-kde4-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-glib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfirefox-gthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-atk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libffi7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-at-spi2-core-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatk-bridge-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libatspi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db-utils-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cxgb3-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslp1-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-General</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PlRPC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-coverage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-passlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLES-for-VMware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-SINIT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-s3transfer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>growpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-Cheetah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-MarkupSafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PrettyTable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-blinker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-dateutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-enum34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-futures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jmespath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-jsonschema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-lockfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-oauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pyserial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-pytest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-python-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python27-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libICE-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXdmcp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-x86</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-154.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.22.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.16.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.12.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.40.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.35-0.2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.34.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.34.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.19.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.246</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-22.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.24.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.11.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.3.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.17.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.2.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.7.19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.26-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-26.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.2.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.1.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.17-1.1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-3.4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.1.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.14.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-1.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-73.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.17-0.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-31.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.27.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.2.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.23.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.1.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2-17.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.31.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:184-147.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.13.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.47.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.56-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.028-50.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5-26.22.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.8-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.8b-88.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.33.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.27.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.9.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-0.15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.80.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-142.23.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-36.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04-0.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0_21091_04_2.6.32.12_0.7-0.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.19.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:238-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-911.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.20.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.23.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.30.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.199.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3.P2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.26.33.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.27-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.5.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.7.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.84-3.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.13_0.27-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.10.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.816-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-10.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.11-0.9.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.7-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.47-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.7.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14_3.0.13_0.27-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.119-0.5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.44-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.10.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.28.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.25.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.9.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.9.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.26.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.16.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.76-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-0.8.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.31-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.9.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.1-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.11.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.76_0.11-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.38.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.7.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.54-0.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.45.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.23.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.31.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-0.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.12-517.12.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.76_0.11-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.62.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.81.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.129-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.45-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.28.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.30.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.51.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.6.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.32.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.39.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.12-0.18.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.15.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.4-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.38.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.17.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.38.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_63-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-0.11.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.50.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-10.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_3.0.101_63-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.65.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.140-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.46-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.54-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.18-4.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.10.10-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.6-95.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.1.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.13.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-294.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-401.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.18.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-130.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-116.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.9-9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-126.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.1.141</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.14-4.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-23.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-143.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-249.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-2.7.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.139.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.3-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.56.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-0.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.1-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-0.7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007-219.34.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.45-28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-31.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.44.45.129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46-62.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-0.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0u-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.78.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-78.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-72.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-72.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-72.38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-84.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-84.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-31.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-318.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20171128-8.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.162.1-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.9-30.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.9-30.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-26.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-132.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11a-116.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.03.beta1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-2.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-146.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.18.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03.90-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-249.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.4.12-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.4.12-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.02.1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.02.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.02.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.710.08-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.13-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.13-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19-234.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.16-40.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.16-40.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.17-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.17-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.29.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.161-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.41.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-1.47.51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.336-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46-62.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.95-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009101461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.97-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-0.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.55-2.28.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.55-0.17.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.55-0.21.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_0.40-0.22.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-0.13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.2-8.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0+git.1430140184.8e872c5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.7-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.7-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.7-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.7-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.7-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.7-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.7-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.7-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.7-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.7-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.7-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.7-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.7-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.7-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.7-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.7-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.35-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.35-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.35-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.35-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.35-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.35-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.35-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.35-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.35-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.35-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.35-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.35-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.35-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.35-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.35-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.35-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.108-0.28.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.108-0.28.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.108-0.28.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.108-0.28.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.87-2.32.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.87-2.32.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.87-2.32.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_108.87-2.32.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.87-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.87-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.87-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_108.87-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.87-0.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.87-0.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.87-0.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_108.87-0.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_108.87-0.28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.5-50.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-72.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-72.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-72.38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-40.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.63.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-0.20.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-0.20.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-0.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.25-65.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.30-65.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.35-65.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.40-65.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.50-65.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.55-65.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.60-65.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.65-65.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.70-65.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.75-65.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.80-65.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.5-65.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.0-65.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80-8.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.5.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-26.32.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-26.32.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-26.32.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-48.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.41.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.40.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-81.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-1.160.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-160.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.102-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.5-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.8-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.14-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.19-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.43-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.59-45.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.59-45.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_22_3.0.101_0.47.106.59-45.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_22-45.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:238-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.5-0.2.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.5-2.5.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.5-0.3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.5-0.9.11.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.5-0.4.2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.5-0.9.13.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.18_rt31_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.7.9-2.18.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.7.9-0.6.6.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.7.9-0.25.25.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.7.9-0.9.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.7.9-0.11.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.7.9-0.28.28.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.28-2.27.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.28-0.22.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.28-0.38.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.28-0.11.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.28-0.20.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.28-0.13.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_68-2.32.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_68-0.27.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_68-0.24.2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_68-0.28.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_69.14-2.32.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_69.14-0.27.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_69.14-0.24.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.14-0.28.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.42-0.28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_69.24-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_69.24-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_69.42-2.32.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_69.42-0.27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_rt130_69.42-0.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_69.42-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_69.42-0.28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_69.42-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-69.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.51.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.51.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.15-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.33-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.84.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.24.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.13.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-5.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.11-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.14-18.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.25-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.7-27.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.8-18.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-5.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-5.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-5.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-27.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-6.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-18.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.14-27.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.13-18.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-0.68.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.4-43.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.10-43.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.11.4-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-0.38.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-1.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-151.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.1.1-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-14.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.10-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0.13.1.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.54_0.2-94.14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.54_0.2-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.870-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.56-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-42.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-128.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.60.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-8.47.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-66.42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.3-3.57.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.27-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.21-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-64.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-64.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.10-64.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.78.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.122.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.125.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-5.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.5-0.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-20.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-77.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-78.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-21.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-78.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-78.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-78.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-78.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-78.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-78.32.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0esr-78.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-78.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-29.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-78.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-78.61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-78.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-78.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-78.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-78.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-78.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-78.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-78.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-78.90.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-78.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-78.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-78.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-78.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-78.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-78.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-78.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.1-78.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-78.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-78.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-78.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-78.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-78.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-78.137.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-78.140.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-78.151.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-78.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-78.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.2-38.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-78.162.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-78.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-78.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.9.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.14.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6_SVNr208-2.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-40.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-200.26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.63.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-147.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.16.16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.25.25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009134999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-148.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-148.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.31.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.51-1.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-0.20.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-0.20.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-32.41.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.10.2-0.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.71.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.71.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3.ESV-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-12.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.6.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009099347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.137-8.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.137-8.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.18-0.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-5.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.6-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-78.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0esr-78.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-78.51.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-21.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1.git259-2.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.45-38.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0esr-78.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-21.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.2-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.33.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.12.846</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.80.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-3.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-7.3.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.2-8.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.2-8.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.25-1.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.27.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.20.27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2012.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-88.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-234.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.41-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.3.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.3.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.3.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-7.9.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-7.9.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-7.9.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-7.9.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.3-0.18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.32.19_0.3-0.7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.32.19_0.3-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.24-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.121.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-133.49.125.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.31.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:424b-10.24.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80-8.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-20.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.2.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.11.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-49.22.6.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.44.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.21-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-28.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.6.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.3.3.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.35.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.5.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.6-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.34.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.34.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.57.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-27.24.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.0esr-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-38.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-29.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.75-1.30.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-3.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.9-1.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.9-1.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.9-1.2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.14.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-48.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-48.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-48.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.32.46_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.32.46_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.32.46_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.31.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.31.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.17.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.17.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.74.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.79.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.80.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-80.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-80.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.58.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.35.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.6.28-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.22.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.32.46-2.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.63.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2019-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.111.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-111.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.9.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.29.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.20-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1-0.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8-0.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-0.2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10-0.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-0.2.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-0.2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-0.2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-0.2.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-0.2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-0.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.17-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-0.2.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.40.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-8.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.9-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190408.32abece-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-6.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-6.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-50.36.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.48.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-936.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-70.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-70.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-162.19.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.99.91-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.4-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.21.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.40.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.48-101.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-81.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.53-0.57.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-1.160.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-160.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-142.34.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-5.3.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.41.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.13-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-40.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.109.2-67.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-40.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19-234.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-40.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-40.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.14-40.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.16-40.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.17-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.9-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_12_2.6.32.54_0.11.TDC-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.68.TDC-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.68.TDC-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.85.TDC-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.94.TDC-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.97.TDC-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.103.TDC-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.103.TDC-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.112.TDC-53.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.112.TDC-53.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.116.TDC-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.122.TDC-53.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.133.TDC-53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20-53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20_2.6.32.54_0.172.TDC-53.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20-53.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_20_2.6.32.54_0.178.TDC-53.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.30-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08_2.6.32.36_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08_2.6.32.36_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.31-0.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02_2.6.32.43_0.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02_2.6.32.43_0.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.6-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02_2.6.32.54_0.3-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_02_2.6.32.54_0.3-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04_2.6.32.59_0.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_04_2.6.32.59_0.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.34-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08_2.6.32.59_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_08_2.6.32.59_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_11_2.6.32.54_0.11.TDC-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_14-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_14_2.6.32.54_0.31.TDC-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.54_0.33.TDC-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.45.TDC-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.55.TDC-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.59.TDC-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.54_0.73.TDC-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.79.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4_0.11.0-0.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4_0.11.0-0.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4_0.11.0-0.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.02-138.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:238-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.99.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.21-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-20.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009135156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.36-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.149.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.29.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-72.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-72.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-72.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-72.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-72.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-72.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-72.38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-78.179.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2.0-11.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.22.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-0.15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10-0.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6-0.11.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-0.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.22-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.27-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.236.44.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-236.236.44.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-257.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-257.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.6-0.20.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-121.31.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.3.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.10.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-10.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-72.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.9-59.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.4_20091019-37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-0.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-0.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-5.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.53.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.53.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-0.81.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.45-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.50-85.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.5-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.10-65.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.15-65.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.20-65.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.25-65.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.25-65.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.30-65.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.30-65.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.35-65.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.35-65.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.40-65.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.45-65.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.50-65.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.55-65.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.60-65.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.65-65.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.70-65.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.75-65.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.80-65.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.5-65.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr11.0-65.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.40-0.38.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_0.40-0.13.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_0.40-7.39.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.106.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-53.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43-1.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.42.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.16.3.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-21.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009136999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.41.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-41.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-0.2.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-152.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-2.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-0.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.213-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.213-3.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-3.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-0.3.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.3.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-2.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.42-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.57-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-1.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10-0.3.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-3.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-0.3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.5-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-0.3.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-0.3.4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.5-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-0.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.13-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.3.3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-12.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120115_1.7.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.113.TDC-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.116.TDC-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.119.TDC-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.119.TDC-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.99-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.102-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.122.TDC-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.125.TDC-47.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.126.5.TDC-47.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.105-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.5-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.132.TDC-47.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.8-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.139.TDC-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.150.TDC-47.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.14-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.19-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.156.TDC-47.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.181.TDC-47.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.106.43-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.190.TDC-47.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-47.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.219.TDC-47.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_22-47.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_22_3.0.101_0.238.TDC-47.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_24-47.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_24_3.0.101_0.238.TDC-47.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_26-47.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_26_3.0.101_0.241.TDC-47.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.147.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-78.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-160.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.3.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-40.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2.1-188.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.34-70.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.63.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-12.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.114-0.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-131.23.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-135.23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-142.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.23-35.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.51.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.256.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-2.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-0.20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-0.20.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-0.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-0.20.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-0.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-0.20.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-0.20.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-0.20.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-0.20.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.12-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.81.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.70.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-70.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.34.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-0.17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.42.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.2-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.1-2.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.76-34.2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.11-2.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.3-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.9-2.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-2.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.14-2.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-47.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.110.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-3.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.42.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.66.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.66.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.45.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-47.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.15-0.30.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-26.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-26.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-26.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-26.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-26.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-26.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-26.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-26.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-26.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-26.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-26.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-26.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-26.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-26.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-26.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-26.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-26.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6b-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20110923-0.59.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-108.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.52-0.43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.52-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_108.87-0.43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_108.87-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_108.87-7.44.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.113.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-60.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta13b-49.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-122.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20-97.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.5.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-23.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.77.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009137999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-9.6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-102.83.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-27.24.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-47.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-47.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-29.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-29.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.55-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.57-0.39.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.58-0.39.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.59-0.39.9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-0.39.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.61-0.39.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.62-0.39.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.16.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-93.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-64.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-64.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.74.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.106.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.47.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-252.22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.81.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.008-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.607-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.17-112.99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.9.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-0.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-0.23.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-0.23.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-0.23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-0.23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-152.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-40.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-936.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34b-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-94.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.30.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.36.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.40.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-14.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120115_1.7.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.30.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.169.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-81.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-1.160.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-160.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.80.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-8.21.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.50.1-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_3.0.101_97-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_16_3.0.101_97-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_3.0.101_97-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_18_3.0.101_97-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20_3.0.101_104-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_20_3.0.101_104-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_3.0.101_108.7-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_22_3.0.101_108.7-61.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_3.0.101_108.10-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_24_3.0.101_108.10-61.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_3.0.101_108.13-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_26_3.0.101_108.13-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_3.0.101_108.35-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_28_3.0.101_108.35-61.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30_3.0.101_108.38-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_30_3.0.101_108.38-61.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32_3.0.101_108.52-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_32_3.0.101_108.52-61.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34_3.0.101_108.57-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_34_3.0.101_108.57-61.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36_3.0.101_108.68-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_36_3.0.101_108.68-61.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38_3.0.101_108.84-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_38_3.0.101_108.84-61.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.87-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.87-61.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.90-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.90-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.101-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40_3.0.101_108.101-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_40-61.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42_3.0.101_108.114-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42_3.0.101_108.114-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_42-61.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44_3.0.101_108.117-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44_3.0.101_108.117-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_44-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46_3.0.101_108.117-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46_3.0.101_108.117-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_46-61.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.117-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.117-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.123-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48_3.0.101_108.123-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_48-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50_3.0.101_108.129-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50_3.0.101_108.129-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_50-61.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52_3.0.101_108.132-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52_3.0.101_108.132-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_52-61.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.72.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.50.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:238-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-0.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ia64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ia64|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-67.9.8.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
